System and method for transforming data to preserve privacy
First Claim
Patent Images
1. A data transform system comprising:
- a processor;
a memory connected to the processor, storing a collection of data; and
a data transform module, accepting two data constraints and the collection of data from memory, wherein a first constraint is a usage constraint and a second constraint is a privacy constraint, the data transform module transforming the collection of data according to the usage constraint and the privacy constraint.
2 Assignments
0 Petitions
Accused Products
Abstract
A data transform system comprises a processor, a memory connected to the processor, storing a collection of data, and a data transform module, accepting two data constraints and the collection of data from memory, wherein a first constraint is a usage constraint and a second constraint is a privacy constraint, the data transform module transforming the collection of data according to the usage constraint and the privacy constraint.
-
Citations
25 Claims
-
1. A data transform system comprising:
-
a processor;
a memory connected to the processor, storing a collection of data; and
a data transform module, accepting two data constraints and the collection of data from memory, wherein a first constraint is a usage constraint and a second constraint is a privacy constraint, the data transform module transforming the collection of data according to the usage constraint and the privacy constraint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for constraining data comprising the steps of:
-
determining, for a collection of data, a level of granularity;
determining an application specific constraint;
determining a metric according to the level of granularity, the application specific constraint; and
constraining the collection of data according to the metric. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for constraining data, the method steps comprising:
-
determining, for a collection of data, a level of granularity;
determining an application specific constraint;
determining a metric according to the level of granularity, the application specific constraint; and
constraining the collection of data according to the metric.
-
Specification