Selector derived encryption systems and methods
Abstract:
Example selector derived encryption methods and systems include creating a hashed and encrypted database, as well as performing a query against the hashed and encrypted database using an encrypted selector exchange protocol to prevent the exposure of extraneous data from the hashed and encrypted database.
Public/Granted literature
Information query
Patent Agency Ranking
0/0