http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-111801670-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_11d05e40924c78e685d633fda269401b
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_4a3721ca264753e2b424149847dc94df
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-033
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2125
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-16
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N5-01
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-602
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-12
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-14
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N10-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0618
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-125
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0631
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-60
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-72
filingDate 2018-12-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_53c7998bdfebd715f5aacf074119f129
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_304e0dcaed03d857cbaec1d8e096b590
publicationDate 2020-10-20-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CN-111801670-A
titleOfInvention Secure execution techniques for manipulating code that encrypts data on public computers
abstract A technique for securely processing encrypted data on a public resource, comprising: receiving first data, the first data representing a sequence of reversible q-bit gates, including a first segment for decryption, a second segment for operating on the decrypted data, and a third segment for encrypting the resulting decrypted data. A second data representation rule for the first sequence of two q-bit gates operating on at least one shared bit of an input N-bit word is replaced by the first sequence of one or more q-bit gates that produce the same output N-bit word Second sequence. The second data is used to: propagate the door a distance from the first segment into or out of the second segment; and, propagate the door from the third segment a distance into or before the second segment. The above process produces an obfuscated sequence of reversible gates. A gate-based obfuscation sequence of obfuscated instructions is sent to a public resource.
priorityDate 2017-12-18-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419491693
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID31155
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ59801
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID115100
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCP0CZ01
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCP0CZ00
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCB2FHL8
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ54873
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID31155
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCQ53591
http://rdf.ncbi.nlm.nih.gov/pubchem/protein/ACCA0A3D9VCI6

Total number of triples: 37.