A method and system for secure computational outsourcing and disguise. According to an embodiment, a first set of actual arguments and a second set of actual arguments for an outsourced computation are determined. A first group of disguised arguments corresponding to the first set of actual arguments is prepared with a first computer. A second group of disguised arguments corresponding to the second set of actual arguments is prepared with a second computer. The first and second groups of disguised arguments are output from the first and second computers, respectively, for performance of the outsourced computation. A third computer performs the outsourced computation and returns a disguised result to the first and/or second computers. The first and/or second computers then unveil the actual result from the disguised result.

 
Web www.patentalert.com

< Method and apparatus for dynamic configuration of a lexical analysis parser

< Programmatic universal policy based software component system for software component framework

> Physical device placement assistant

> Clock synchronization with removal of clock skews through network measurements in derivation of a convext hull

~ 00215