US 11,841,973 B2
Methods for aggregating credit across interactions
Karn Seth, New York, NY (US); Sarvar Patel, Montville, NJ (US); Mariana Raykova, New York, NY (US); Srinivasan Seshadri, Los Altos, CA (US); Margo Narayan, San Francisco, CA (US); Philip McDonnell, Belmont, CA (US); and Amin Charaniya, Santa Clara, CA (US)
Assigned to GOOGLE LLC, Mountain View, CA (US)
Appl. No. 17/285,831
Filed by Google LLC, Mountain View, CA (US)
PCT Filed Aug. 24, 2020, PCT No. PCT/US2020/047643
§ 371(c)(1), (2) Date Apr. 15, 2021,
PCT Pub. No. WO2021/242290, PCT Pub. Date Dec. 2, 2021.
Claims priority of provisional application 63/029,835, filed on May 26, 2020.
Prior Publication US 2022/0147650 A1, May 12, 2022
Int. Cl. G06F 21/62 (2013.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/00 (2022.01); G06F 21/60 (2013.01)
CPC G06F 21/6245 (2013.01) [G06F 21/602 (2013.01); G06F 21/62 (2013.01); G06F 21/6254 (2013.01); H04L 9/008 (2013.01); H04L 9/0643 (2013.01); H04L 9/0869 (2013.01); H04L 9/14 (2013.01); G06F 2221/2107 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at a first computing system, encrypted identifiers and encrypted values;
performing, by the first computing system, a concealing operation on the encrypted identifiers to produce concealed encrypted identifiers, wherein the concealing operation conceals the encrypted identifiers from the first computing system and a second computing system but enables matching between the concealed encrypted identifiers;
decrypting, by the second computing system, the concealed encrypted identifiers to produce concealed identifiers;
performing, by the second computing system, an aggregation operation using the concealed identifiers and the encrypted values to produce an encrypted aggregate value without accessing personal information associated with the encrypted values;
decrypting, by a third computing system, the encrypted aggregate value to produce an aggregate value;
cooperatively generating by the first computing system and the second computing system a first encryption key;
generating by the first computing system a second encryption key associated with the first encryption key and a third encryption key;
generating by the second computing system a first decryption key associated with the first encryption key; and
generating by the third computing system a second decryption key and a fourth encryption key.