Vector Space Method for Secure Information Sharing
First Claim
1. A computer-based method for securely sharing confidential information, comprising:
- (a) receiving term vectors corresponding to ones of a plurality of confidential terms included in a plurality of confidential documents;
(b) mapping each of the received term vectors into a vector space;
(c) mapping non-confidential documents into the vector space to generate a document vector corresponding to each non-confidential document, wherein the generation of each document vector is based on a subset of the received term vectors; and
(d) identifying at least one of the non-confidential documents in response to a query mapped into the vector space.
3 Assignments
0 Petitions
Accused Products
Abstract
Presented are systems and methods for securely sharing confidential information. In such a method, term vectors corresponding to ones of a plurality of confidential terms included in a plurality of confidential documents is received. Each of the received term vectors is mapped into a vector space. Non-confidential documents are mapped into the vector space to generate a document vector corresponding to each non-confidential document, wherein the generation of each document vector is based on a subset of the received term vectors. At least one of the non-confidential documents is identified in response to a query mapped into the vector space.
32 Citations
18 Claims
-
1. A computer-based method for securely sharing confidential information, comprising:
-
(a) receiving term vectors corresponding to ones of a plurality of confidential terms included in a plurality of confidential documents; (b) mapping each of the received term vectors into a vector space; (c) mapping non-confidential documents into the vector space to generate a document vector corresponding to each non-confidential document, wherein the generation of each document vector is based on a subset of the received term vectors; and (d) identifying at least one of the non-confidential documents in response to a query mapped into the vector space. - View Dependent Claims (2, 3)
-
-
4. A computer-based method for securely sharing confidential documents, wherein a non-confidential vector space is embodied in a computer readable medium, and the non-confidential vector space includes non-confidential term vectors and non-confidential document vectors corresponding to a collection of non-confidential documents, the computer-based method comprising:
-
(a) transmitting a subset of the non-confidential term vectors to a plurality of entities that each manage a confidential document database, each non-confidential term vector corresponding to a non-confidential term; (b) receiving offset vectors from the plurality of entities responsive to confidential documents in the confidential document databases that contain the non-confidential terms; (c) updating the term vectors in the non-confidential vector space responsive to the offset vectors; (d) generating a vector representation of a query in the non-confidential vector space based on the updated term vectors; and (e) identifying at least one non-confidential document based on a comparison between the vector representation of the query and the non-confidential document vectors. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A computer program product comprising a computer readable storage medium having computer readable code stored therein for securely sharing confidential information, the computer readable program code comprising:
-
computer readable first program code for causing the computer to receive term vectors corresponding to ones of a plurality of confidential terms included in a plurality of confidential documents; computer readable second program code for causing the computer to map each of the received term vectors into a vector space; computer readable third program code for causing the computer to map non-confidential documents into the vector space to generate a document vector corresponding to each non-confidential document, wherein the generation of each document vector is based on a subset of the received term vectors; and computer readable fourth program code for causing the computer to identify at least one of the non-confidential documents in response to a query mapped into the vector space. - View Dependent Claims (11, 12)
-
-
13. A computer program product comprising a computer readable storage medium having computer readable code stored therein for securely sharing confidential information, wherein a non-confidential vector space is embodied in the computer readable medium, and the non-confidential vector space includes non-confidential term vectors and non-confidential document vectors corresponding to a collection of non-confidential documents, the computer readable program code comprising:
-
computer readable first program code for causing the computer to transmit a subset of the non-confidential term vectors to a plurality of entities that each manage a confidential document database, each non-confidential term vector corresponding to a non-confidential term; computer readable second program code for causing the computer to receive offset vectors from the plurality of entities responsive to confidential documents in the confidential document databases that contain the non-confidential terms; computer readable third program code for causing the computer to update the term vectors in the non-confidential vector space responsive to the offset vectors; computer readable fourth program code for causing the computer to generate a vector representation of a query in the non-confidential vector space based on the updated term vectors; and computer readable fifth program code for causing the computer to identify at least one non-confidential document based on a comparison between the vector representation of the query and the non-confidential document vectors. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification