Compute Encrypted Data Using Lazy Evaluation
A technology for encrypting data and delaying evaluation. It is used in computing, network data indexing, and network data retrieval. It can solve problems such as difficulty in implementing database queries and restrictions on operation types.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] I. Introduction
[0021] The specification and drawings disclose one or more embodiments that embody the features of the invention. The scope of the invention is not limited to the disclosed embodiments. The disclosed embodiments are merely illustrative of the invention, and modified versions of the disclosed embodiments are also intended to be encompassed in the invention. Embodiments of the invention are defined by the appended claims.
[0022] References in the specification to "one embodiment," "an embodiment," "an example embodiment," etc. indicate that the described embodiments may include a particular feature, structure, or characteristic, but that each embodiment does not necessarily include the particular feature, structure, or characteristic. feature, structure or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a specific feature, structure or characteristic is described in conjunction with an embo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


