Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_11d05e40924c78e685d633fda269401b http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_4a3721ca264753e2b424149847dc94df |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-033 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2125 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-16 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N5-01 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-602 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06N10-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0618 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-125 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0631 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-60 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-72 |
filingDate |
2018-12-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_53c7998bdfebd715f5aacf074119f129 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_304e0dcaed03d857cbaec1d8e096b590 |
publicationDate |
2020-10-20-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
CN-111801670-A |
titleOfInvention |
Secure execution techniques for manipulating code that encrypts data on public computers |
abstract |
A technique for securely processing encrypted data on a public resource, comprising: receiving first data, the first data representing a sequence of reversible q-bit gates, including a first segment for decryption, a second segment for operating on the decrypted data, and a third segment for encrypting the resulting decrypted data. A second data representation rule for the first sequence of two q-bit gates operating on at least one shared bit of an input N-bit word is replaced by the first sequence of one or more q-bit gates that produce the same output N-bit word Second sequence. The second data is used to: propagate the door a distance from the first segment into or out of the second segment; and, propagate the door from the third segment a distance into or before the second segment. The above process produces an obfuscated sequence of reversible gates. A gate-based obfuscation sequence of obfuscated instructions is sent to a public resource. |
priorityDate |
2017-12-18-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |