Techniques for securely executing code that operates on encrypted data on a public computer
A technology for encrypting data and computers, applied in computer security devices, quantum computers, internal/peripheral computer component protection, etc., can solve problems such as loss efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The present invention proposes a method and system for securely processing encrypted data on a common resource, for example, taking advantage of superior processing power, efficiency or resiliency, or a combination thereof, on a common resource such as the cloud. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the invention.
[0053] Notwithstanding that the numerical ranges and parameters setting forth broad ranges are approximations, the numerical values set forth in specific non-limiting examples are reported as precisely as possible. Any numerical value, however, inherently contains certain errors resu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


