Emoji frequency detection and deep link frequency
- US 9,705,908 B1
- Filed: 09/24/2016
- Issued: 07/11/2017
- Est. Priority Date: 06/12/2016
- Status: Expired due to Fees
First Claim
1. A computer-implemented method practiced on a client device, comprising:
- receiving a term from an application on the client device by a differential privacy engine eecuting on the client device;
applying, by the differential privacy engine, a differential privacy algorithm to the term thereby generating a differentially private sketch of the term, wherein generating the differentially private sketch of the term comprises;
determining, by the differential privacy engine, a noise constant c,initializing, by the differential privacy engine, a vector v having dimension m;
randomly selecting a hash function h from a set of hash functions H and setting v[h(term)]=a constant, c2;
generating a vector b of dimension m with each bit b[j]∈
{−
1, 1} for each j∈
m, and b[j] having a value of 1 with a predetermined probability;
generating the differentially private sketch using noise constant c, constant c2, and vector b;
storing, by the differential privacy engine, the differentially private sketch for transmission to a term frequency server in response to determining, by the differential privacy engine, that there is privacy budget available to transmit the differentially private sketch of the term to the term frequency server.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for generating term frequencies of known terms based on crowdsourced differentially private sketches of the known terms. An asset catalog can be updated with new frequency counts for known terms based on the crowdsourced differentially private sketches. Known terms can have a classification. A client device can maintain a privacy budget for each classification of known terms. Classifications can include emojis, deep links, locations, finance terms, and health terms, etc. A privacy budget ensures that a client does not transmit too much information to a term frequency server, thereby compromising the privacy of the client device.
-
Citations
21 Claims
-
1. A computer-implemented method practiced on a client device, comprising:
-
receiving a term from an application on the client device by a differential privacy engine eecuting on the client device; applying, by the differential privacy engine, a differential privacy algorithm to the term thereby generating a differentially private sketch of the term, wherein generating the differentially private sketch of the term comprises; determining, by the differential privacy engine, a noise constant c, initializing, by the differential privacy engine, a vector v having dimension m; randomly selecting a hash function h from a set of hash functions H and setting v[h(term)]=a constant, c2; generating a vector b of dimension m with each bit b[j]∈
{−
1, 1} for each j∈
m, and b[j] having a value of 1 with a predetermined probability;generating the differentially private sketch using noise constant c, constant c2, and vector b; storing, by the differential privacy engine, the differentially private sketch for transmission to a term frequency server in response to determining, by the differential privacy engine, that there is privacy budget available to transmit the differentially private sketch of the term to the term frequency server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable medium programmed with instructions that, when eecuted by a processing system, perform operations, comprising:
-
receiving a term from an application on the client device by a differential privacy engine eecuting on a client device; applying, by the differential privacy engine, a differential privacy algorithm to the term thereby generating a differentially private sketch of the term, wherein generating the differentially private sketch of the term comprises; determining, by the differential privacy engine, a noise constant c, and initializing, by the differential privacy engine, a vector v having dimension m; randomly selecting a hash function h from a set of hash functions H and setting v[h(term)]=a constant, c2; generating a vector b of dimension m with each bit b[j]∈
{−
1, 1} for each j∈
m, and b[j] having a value of 1 with a predetermined probability;generating the differentially private sketch using noise constant c, constant c2, and vector b; storing, by the differential privacy engine, the differentially private sketch for transmission to a term frequency server in response to determining that there is privacy budget available to transmit the differentially private sketch of the term to the term frequency server. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a processing system coupled to a memory programmed with eecutable instructions that, when eecuted by the processing system perform operations, comprising; receiving a term from an application on a client device, by a differential privacy engine eecuting on the client device; applying, by the differential privacy engine, a differential privacy algorithm to the term thereby generating a differentially private sketch of the term, wherein generating a differentially private sketch of the term comprises; determining, by the differential privacy engine, a noise constant c, and initializing, by the differential privacy engine, a vector v having dimension m; randomly selecting a hash function h from a set of hash functions H and setting v[h(term)]=a constant, c2; generating a vector b of dimension m with each bit b[j]∈
{−
1, 1} for each j∈
m, and b[j] having a value of 1 with a predetermined probability;generating the differentially private sketch using noise constant c, constant c2, and vector b; storing the differentially private sketch for transmission to a term frequency server in response to determining that there is privacy budget available to transmit the differentially private sketch of the term to the term frequency server. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification