Method and system for searching encrypted data

    公开(公告)号:US10095776B2

    公开(公告)日:2018-10-09

    申请号:US15586483

    申请日:2017-05-04

    Applicant: Yahoo! Inc.

    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.

    METHOD AND SYSTEM FOR DIGITAL SIGNATURE-BASED ADJUSTABLE ONE-TIME PASSWORDS

    公开(公告)号:US20170264436A1

    公开(公告)日:2017-09-14

    申请号:US15063752

    申请日:2016-03-08

    Applicant: Yahoo! Inc.

    Abstract: The present teaching relates to adjustable one-time password (OTP) setup, sign-in, and verification. In one example, a first length of a signature is determined. The signature has been used previously by a first user to initially sign in a second device. A second length that is different from the first length is determined. A signing key is generated based at least partially on the second length. A new signature having the second length is generated based on the signing key. The new signature is provided to a second user so that the second user can input at least a portion of the new signature into the second device for a subsequent sign in. The verification key is generated based at least partially on the new signature. The new signature input by the second user into the second device is transmitted from the second device to the third device.

    METHOD AND SYSTEM FOR EXCHANGING CRYPTOGRAPHIC KEYS WITH AN UNAUTHENTICATED DEVICE
    3.
    发明申请
    METHOD AND SYSTEM FOR EXCHANGING CRYPTOGRAPHIC KEYS WITH AN UNAUTHENTICATED DEVICE 审中-公开
    用未交换装置交换克隆键的方法和系统

    公开(公告)号:US20170078090A1

    公开(公告)日:2017-03-16

    申请号:US14853087

    申请日:2015-09-14

    Applicant: Yahoo! Inc.

    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.

    Abstract translation: 本教导涉及与设备交换密钥。 在一个示例中,生成秘密值。 消息被传送到设备。 该消息包括与基于该设备创建加密密钥的秘密值相关的信息。 捕获设备上显示的视觉代码。 视觉代码包括第一条信息和第二条信息。 基于第一条信息和秘密值生成键值。 基于键值计算测试值。 根据测试值确定设备是否安全连接。

    Method and system for searching encrypted data

    公开(公告)号:US09715546B1

    公开(公告)日:2017-07-25

    申请号:US15047003

    申请日:2016-02-18

    Applicant: Yahoo! Inc.

    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.

    METHOD AND SYSTEM FOR SEARCHING ENCRYPTED DATA

    公开(公告)号:US20170242912A1

    公开(公告)日:2017-08-24

    申请号:US15586483

    申请日:2017-05-04

    Applicant: Yahoo! Inc.

    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.

Patent Agency Ranking