We deliver solutions to our clients rooted in our commitment to uphold excellence, individual privacy and consent management throughout the process.
A brief overview of some past proof-of-concepts with industrial partners.
Sensitive information comprises equipment parameters set by the user. By sharing equipment sensor values and parameters with the equipment manufacturer, the production line OEE (Overall Equipment Effectiveness) could be enhanced. Our approach was to apply homomorphic encryption on sensitive data.
The problem is to mutualize transactional data between multiple financial institutes under regulation constraints and client secret. By overcoming this problem, each institute can improve the detection capabilities of their algorithm. Our approach was to combine federated learning, homomorphic encryption and differential privacy with a Bayesian model.
The speaker's speech signature is highly sensitive information. Our approach ensures that the signature remains confidential through the use of fully homomorphic encryption and innovative techniques. Our recognition algorithm is state-of-the-art, capable of processing encrypted signatures in real-time and with minimal delay.
The big challenge was to authenticate a user who wants to access to a SaaS service while considering malicious parties in the use case. Our approach combined an advanced homomorphic cryptography protocol and the implementation of a complex non-linear matching algorithm.
Please contact us for more information.
Commissariat à l'Energie Atomique et aux Energies Alternatives - Smart Digital Systems.
To help developers of innovative projects with high growth potential build their business plan
Paris-Saclay's technological incubator