Systems and methods for protecting privacy
First Claim
1. A method of protecting privacy comprising the steps of:
- determining sources of extracted information;
determining a request for information from the extracted information sources;
determining a privacy policy;
determining extraction characteristics associated with the extracted information based on at least one of;
the characteristics of the extraction transformations used to extract the information and the characteristics of the data from which the information was extracted; and
determining privacy protecting transformations based on the privacy policy and the extraction characteristics.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing privacy protection are provided. A query is received. Privacy policy information, extracted knowledge and optional information about available public information are determined. Information about the knowledge extraction transformations applied to create the extracted knowledge and the source data is determined. Privacy protecting transformations are determined and applied to transform the extracted knowledge based on the selected privacy policy, optional information about available public information, the characteristics of the applied knowledge extractions transformations, the source data and optional previous user queries.
107 Citations
51 Claims
-
1. A method of protecting privacy comprising the steps of:
-
determining sources of extracted information;
determining a request for information from the extracted information sources;
determining a privacy policy;
determining extraction characteristics associated with the extracted information based on at least one of;
the characteristics of the extraction transformations used to extract the information and the characteristics of the data from which the information was extracted; and
determining privacy protecting transformations based on the privacy policy and the extraction characteristics. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for protecting privacy comprising:
-
an input/output circuit that receives a request for information from source of extracted information;
a memory;
a processor that determines a privacy policy, the sources of extracted information, extraction characteristics based on at least one of;
characteristics of the extraction transformations and characteristics of the data from which theinformation is extracted, and which determines privacy protecting transformations of the extracted information based on the privacy policy and the extraction characteristics. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. Computer readable storage medium comprising:
- computer readable program code embodied on the computer readable storage medium, the computer readable program code usable to program a computer for protecting privacy comprising the steps of;
determining sources of extracted information;
determining a request for information from the extracted information sources;
determining a privacy policy;
determining extraction characteristics associated with the extracted information based on at least one of;
the characteristics of the extraction transformations used to extract the information; and
the characteristics of the data from which the information was extracted; and
determining privacy protecting transformations based on the privacy policy and the extraction characteristics.
- computer readable program code embodied on the computer readable storage medium, the computer readable program code usable to program a computer for protecting privacy comprising the steps of;
-
48. A carrier wave encoded to transmit a control program, useable to program a computer for protecting privacy, to a device for executing the program, the control program comprising:
-
instructions for determining sources of extracted information;
instructions for determining a request for information from the extracted information sources;
instructions for determining a privacy policy;
instructions for determining extraction characteristics associated with the extracted information based on at least one of;
the characteristics of the extraction transformations used to extract the information; and
the characteristics of the data from which the information was extracted; and
instructions for determining privacy protecting transformations based on the privacy policy and the extraction characteristics.
-
-
49. A method of protecting privacy comprising the steps of:
-
determining a request for information;
determining a privacy policy;
determining sources of information;
determining extraction transformations;
determining extracted information from the sources of information based on the extraction transformation;
determining privacy protecting transformations of the extracted information based on the determined privacy policy; and
determining privacy protected extracted information based on the privacy protecting transformations.
-
-
50. A system for protecting privacy comprising:
-
an input/output circuit that receives a request for information;
a memory;
a processor that determines a privacy policy, sources of information, information about publicly available information and at least one of;
characteristics of the extraction transformations and characteristics of the data from which the extracted information is obtained; and
which determines privacy protecting transformations of the extracted information based on the privacy policy, the information about the publicly available information and at least one of;
the characteristics of the extraction transformations and the characteristics of the data from which the extracted information is obtained; and
determines privacy induced extracted information based on the privacy protecting transformations.
-
-
51. A system for protecting privacy comprising:
-
an input/output circuit that receives a request for information;
a memory;
a processor that determines a privacy policy, sources of extracted information and at least one of;
characteristics of the applied extraction transformations and characteristics of the data from which the extracted information is obtained; and
which determines privacy protecting transformations of the extracted information based on the privacy policy, and at least one of;
the characteristics of the extraction transformations and the characteristics of the data from which the extracted information is obtained; and
determines privacy induced extracted information based on the determinedprivacy protecting transformations.
-
Specification