US 12,231,563 B2
Secure computation and communication
Haohao Qian, Beijing (CN); Jian Du, Culver City, CA (US); and Qiang Yan, Beijing (CN)
Assigned to Lemon Inc., Grand Cayman (KY)
Filed by Lemon Inc., Grand Cayman (KY)
Filed on Apr. 7, 2023, as Appl. No. 18/297,339.
Prior Publication US 2024/0340178 A1, Oct. 10, 2024
Int. Cl. H04L 9/30 (2006.01); G06F 16/2455 (2019.01); G06F 16/25 (2019.01)
CPC H04L 9/3066 (2013.01) [G06F 16/2456 (2019.01); G06F 16/258 (2019.01); H04L 2209/46 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for secure computation and communication, the method comprising:
transforming identifications of a first dataset using a first transforming scheme and then a third transforming scheme so that the identifications of the first dataset are transformed twice;
transforming attributes of the first dataset using a second transforming scheme
transforming identifications of a second dataset using the third transforming scheme and then the first transforming scheme so that the identifications of the second dataset are transformed twice;
generating a first intersection of the identifications of the transformed first dataset and the transformed second dataset;
after the first intersection being generated, generating a first share based on the generated first intersection by applying a masking scheme to attributes of the generated first intersection;
generating a second intersection of the identifications of the transformed second dataset and the transformed first dataset;
generating a second share based on the second intersection; and
constructing a first result based on the first share and the second share.