CPC G06F 16/215 (2019.01) [G06F 16/258 (2019.01); G06F 40/00 (2020.01); G06N 20/00 (2019.01); H04L 9/3247 (2013.01)] | 17 Claims |
1. A computing device implemented method comprising:
receiving cryptographically secured data representing a request for information stored at a node of a distributed network based on whether the cryptographically secured data has been previously validated, the stored information containing sensitive information;
semantically searching, using a machine learning system trained on historical data, the received cryptographically secured data to identify one or more data types reflected in the received cryptographically secured data;
selecting one or more digitally signed and authenticated transforms based on the one or more data types of the received cryptographically secured data and data types used by the one or more digitally signed and authenticated transforms;
evaluating the received cryptographically secured data using the one or more selected digitally signed and authenticated transforms to generate an evaluated cryptographically secured result that does not contain sensitive information; and
providing the evaluated cryptographically secured result to the distributed network in response to the request for information.
|