System and methods for validating and performing operations on homomorphically encrypted data

a technology of homomorphic encryption and data validation, applied in the field of homomorphic encryption data validation and performing operations on confidential data, can solve the problem of not solving the possible misuse of sensitive data by the service provider itsel

Inactive Publication Date: 2017-10-12
LORICA CYBERSECURITY INC
View PDF5 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]According to an embodiment of the invention, there is provided a method of processing a secure financial transaction, comprising: receiving a transaction request to complete a financial transaction, with at least a portion of the request encrypted according to a homomorphic encryption scheme, and the transaction request comprising confidential cardholder data including an account number, non-confidential cardholder data and transaction data; retrieving one or more sets of encrypted comparison cardholder data encrypted according to a homomorphic encryption scheme; comparing the encrypted confidential cardholder data to each set of the encrypted comparison cardholder data using one or more homomorphic operations to determine which set of comparison cardholder data matches the confidential cardholder data and validating the confidential cardholder data; generating an encrypted indicator indicating authorization or rejection of the request to complete the financial transaction based upon at least the validation of the confidential cardholder data; and forwarding the encrypted indicator indicating authorization or rejection of the request to complete the financial transaction to a party seeking authorization to complete the financial transaction, wherein the confidential cardholder data is never decrypted during the method.
[0006]According to a further embodi

Problems solved by technology

Privacy issues arise due to the fear of having a security breach on cloud servers or due to the fear that the service providers themselves misuse this sensitive information.
Standard encryption s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and methods for validating and performing operations on homomorphically encrypted data
  • System and methods for validating and performing operations on homomorphically encrypted data
  • System and methods for validating and performing operations on homomorphically encrypted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]Although financial applications form the basis of the inventive examples discussed herein, the inventive techniques discussed have application to other forms of confidential data. In this context, the different devices and parties involved in data acquisition, storage, and analysis may be reconsidered as appropriate for the type of confidential data being processed.

[0027]Homomorphic Encryption / Decryption

[0028]The homomorphic encryption / decryption operations executed on confidential data may be performed as shown in FIGS. 1-5 and FIGS. 6A-6J. Key generation may be performed at a secure system, such as the key authority system 36. Public keys 68 may be pre-loaded onto the remote devices 20 containing the confidential information (such as a credit card, remote sensor, etc.) prior to deployment of remote devices 20. Alternatively, or additionally, public keys 68 may be made available to the remote devices 20 via a network resource (such as a public cloud), which may be configured ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method of validating and performing operations on homomorphically encrypted data are described herein. The methods include processing a secure financial transaction by receiving a transaction request to complete a financial transaction, with at least a portion of the request encrypted according to a homomorphic encryption scheme, and the transaction request comprising confidential cardholder data including an account number, non-confidential cardholder data, and transaction data, and retrieving one or more sets of encrypted comparison cardholder data encrypted according to a homomorphic encryption scheme. The confidential cardholder data is then compared to each set of the comparison cardholder data using one or more homomorphic operations to determine which set of comparison cardholder data matches the confidential cardholder data and validating the confidential cardholder data. An encrypted indicator is generated indicating authorization or rejection of the request and forwarded to a party seeking authorization to complete the financial transaction.

Description

FIELD OF THE INVENTION[0001]This disclosure relates to homomorphically encrypted data systems and methods, and more specifically, to validation of, and performing operations on, homomorphically encrypted confidential data without decryption of the confidential data, such as financial data.BACKGROUND OF THE INVENTION[0002]Privacy of sensitive personal information is an increasingly important topic as more personal data is transmitted and shared, particular via the use of wireless transmissions and cloud data services. Privacy issues arise due to the fear of having a security breach on cloud servers or due to the fear that the service providers themselves misuse this sensitive information. Standard encryption schemes try to address these concerns by devising encryption schemes that are harder to break, yet they do not solve the possible misuse of this sensitive data by the service providers themselves.[0003]While privacy of confidential and personal data, such as financial data, is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G16H10/60
CPCG06Q20/3829G06Q20/08G06Q2220/00G06Q20/382G06Q20/38215H04L9/008G06N20/00A61B5/72G06Q20/10G16H10/40G16H10/60H04L63/0414H04L63/0428H04L9/14H04L9/3093
Inventor GULAK, GLENNKHEDR, ALHASSAN
Owner LORICA CYBERSECURITY INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products