-
公开(公告)号:US20250021689A1
公开(公告)日:2025-01-16
申请号:US18901614
申请日:2024-09-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sergey YEKHANIN , Joshua Stanley ALLEN , Ankit SRIVASTAVA , Ralph Kennedy JOHNSTON , Janardhan Dattatreya KULKARNI
Abstract: Data may contain personal information and be subject to privacy requirements. The data may be encrypted and only a secure enclave may be able to decrypt the encrypted data. The secure enclave may be used to generate a report based on the encrypted data and a first set of added noise. The report may be subject to audit requirements and satisfy a differential privacy guarantee. The encrypted data may be stored for a first period. After the first period, the secure enclave may be used to generate a private synopsis based on the encrypted data and a second set of added noise. The private synopsis may satisfy the differential privacy guarantee. The private synopsis may be encrypted and only the secure enclave may be able to decrypt the encrypted private synopsis. The encrypted data may be expunged, and the encrypted private synopsis may be retained for a second period.
-
2.
公开(公告)号:US20240089100A1
公开(公告)日:2024-03-14
申请号:US17970148
申请日:2022-10-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sergey YEKHANIN , Joshua Stanley ALLEN , Ankit SRIVASTAVA , Ralph Kennedy JOHNSTON, JR. , Janardhan Dattatreya KULKARNI
Abstract: A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.
-
公开(公告)号:US20210357526A1
公开(公告)日:2021-11-18
申请号:US15931020
申请日:2020-05-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sergey YEKHANIN , Joshua Stanley ALLEN , Ankit SRIVASTAVA , Ralph Kennedy JOHNSTON, Jr. , Janardhan Dattatreya KULKARNI
Abstract: A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.
-
公开(公告)号:US20190147188A1
公开(公告)日:2019-05-16
申请号:US15815593
申请日:2017-11-16
Applicant: Microsoft Technology Licensing, LLC
Inventor: Josh D. BENALOH , Harsha P. NORI , Janardhan Dattatreya KULKARNI , Joshua Stanley ALLEN , Jacob Rubin LORCH , Melissa Erin CHASE , Olga OHRIMENKO , Sergey YEKHANIN , Srinath T.V. SETTY , Bolin DING
Abstract: This document relates to hardware protection of differential privacy techniques. One example obtains multiple instances of encrypted telemetry data within a secure enclave and processes the encrypted telemetry data to obtain multiple instances of unencrypted telemetry data. The example also processes, within the secure enclave, the multiple instances of unencrypted telemetry data to obtain a perturbed aggregate. The example also releases the perturbed aggregate from the secure enclave.
-
-
-