- San Francisco CA, US Seth Yates - Danville CA, US Maxwell Anderson - San Francisco CA, US Vivek Vaidya - San Francisco CA, US Anton Winter - San Mateo CA, US Samuel Alexander - San Francisco CA, US Tom Chavez - San Francisco CA, US
Methods, systems, and devices for data processing are described. Some database systems may implement data processing permits to manage data access. A database system may use encryption schemes to tie permits to data (e.g., cryptographically ensuring that the system follows data regulations). To support queries for a database implementing such encryption schemes, the database may implement a proxy. When the system receives a query, the database proxy may intercept and transform the query based on the encryption schema of the database. The database proxy may execute the transformed query at the database, receive encrypted query results in response, and decrypt the results for use by the querying application. Additionally, the system may access relevant data processing permits to support querying operations. For example, the system may use permits when transforming the query, executing the query in the database, preparing query results for the querying application, or any combination thereof.
- San Francisco CA, US Seth Yates - Danville CA, US Maxwell Anderson - San Francisco CA, US Vivek Vaidya - San Francisco CA, US Anton Winter - San Francisco CA, US Samuel Alexander - San Francisco CA, US Tom Chavez - San Francisco CA, US
Methods, systems, and devices for data processing are described. Some database systems may support differential privacy for encrypted data. For example, a database may store user data as ciphertext. A system may receive a statistical query for the user data and may identify a relevant differential privacy mechanism. The system may transform the query to operate on encrypted data while including a noisification function based on the mechanism. The system may execute the transformed query at the database, involving adding noise to the query result according to the noisification function without decrypting the data. For example, the system may leverage homomorphic encryption techniques to inject the noise while the data remains encrypted. The database may return the noisified, encrypted query results, which the system may decrypt for statistical analysis. By applying differential privacy on the encrypted data, the system may avoid exposing any private user information throughout the process.
- San Francisco CA, US Seth Yates - Danville CA, US Maxwell Anderson - San Francisco CA, US Vivek Vaidya - San Francisco CA, US Anton Winter - San Mateo CA, US Samuel Alexander - San Francisco CA, US Tom Chavez - San Francisco CA, US
International Classification:
H04L 9/06 H04L 9/08 G06F 21/60
Abstract:
Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
- San Francisco CA, US Seth Yates - Danville CA, US Maxwell Anderson - San Francisco CA, US Vivek Vaidya - San Francisco CA, US Anton Winter - San Mateo CA, US Samuel Alexander - San Francisco CA, US Tom Chavez - San Francisco CA, US
International Classification:
H04L 9/06 H04L 9/08 G06F 21/60
Abstract:
Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
- San Francisco CA, US Seth Yates - Danville CA, US Maxwell Anderson - San Francisco CA, US Vivek Vaidya - San Francisco CA, US Anton Winter - San Mateo CA, US Samuel Alexander - San Francisco CA, US Tom Chavez - San Francisco CA, US
International Classification:
H04L 9/06 G06F 21/60 H04L 9/08
Abstract:
Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.
2013 to 2000 Turlock, Ca. Sales CounselorBuilders Flooring of Merced Merced, CA 2012 to 2012 InternDragon Tobacco Company Chico, CA 2009 to 2011 ManagerEddie Bauer Novato, CA 2008 to 2009 Sales AssociateLogan's Roadhouse Chico, CA 2006 to 2008 Waiter
Education:
California State University Chico Chico, CA 2011 to 2012 Pending BA in CommunicationsButte Community College Chico, CA 2010 Associate of ArtsBuhach Colony High School Atwater Atwater, CA 2004 High School Diploma
Jan 2013 to 2000 Sales CoordinatorBuilders Flooring of Merced Merced, CA 2012 to 2012 InternDragon Tobacco Company Chico, CA 2009 to 2011 ManagerEddie Bauer Novato, CA 2008 to 2009 Sales AssociateLogan's Roadhouse Chico, CA 2006 to 2008 Waiter
Education:
California State University Chico Chico, CA 2012 Bachelors of Arts in CommunicationsButte Community College Chico, CA 2010 Associate of ArtsBuhach Colony High School Atwater Atwater, CA 2004 High School Diploma