-
公开(公告)号:US20240283632A1
公开(公告)日:2024-08-22
申请号:US18421778
申请日:2024-01-24
Applicant: Apple Inc.
Inventor: Rehan Rishi , Fabian K. Boemer , Karl Tarbe , Brandon J. Van Ryswyk , Marco Zuliani , Abhishek (APS) Bhowmick , Tancrède Lepoint
Abstract: A computing device sends a request for location-based information (LBI) to a server, where the request includes first address information indicative of a geographic area (e.g., where the computing device is located), and an encrypted version of second address information that specifies a sub-region of the geographic area. The second address information is encrypted by a first key not accessible to the server. The first address information is used to select a subset of the LBI stored on the server. The server then performs a privacy protocol such as Private Information Retrieval on the selected subset using the encrypted second address information. This produces an encrypted version of the requested LBI without the server having access to information indicating which item of LBI was requested. The encrypted version of the particular item of LBI is returned to the computing device, where it can be decrypted using a second key.
-
公开(公告)号:US20240403476A1
公开(公告)日:2024-12-05
申请号:US18437866
申请日:2024-02-09
Applicant: Apple Inc.
Inventor: Fabian K. Boemer , Venkat Kranthi Chalasani , Andrii Cherkashyn , Matthew L. Jockers , Muqun Li , Sudhanshu Mohan , Rahul Nim , Yuantao Peng , Rehan Rishi , Hazi Malang Riyaaz Shaik , Karl Tarbe , Pranav Prashant Thombre , Haluk N. Tokgozoglu , Chandrasekar Venkataraman , Wei Xu
IPC: G06F21/62 , G06F16/9535 , G06F21/60
Abstract: A computing device provides a user recommendation according to one or more privacy protocols. The computing device sends to a server one or more encrypted recommendation requests for recommendation information relating to a set of items, where the recommendation requests are encrypted by a cryptographic key not accessible to the server. The server uses the encrypted recommendation requests and a recommendation data store to generate one or more encrypted recommendation responses that it returns to the computing device using at least one of the privacy protocols, which prevents the server from accessing the encrypted recommendation request and recommendation response. The computing device receives from the server the encrypted recommendation responses relating to the set of items and decrypts the recommendation responses. Then, the computing device generates a user recommendation relating to the set of items from the decrypted recommendation responses and provides the recommendation to the user.
-