Framework for anonymous reporting of social incidents
First Claim
Patent Images
1. An anonymous reporting system comprising:
- a non-transitory memory device for storing computer-readable program code; and
a processor in communication with the memory device, the processor being operative with the computer-readable program code toverify user credentials of reporting users wishing to submit social incident reports, wherein each social incident report includes personal information of the reporting users based on the user credentials and incident information of a social incident,register, in response to successful verification of the user credentials, the verified reporting users, wherein the registration enables the verified reporting users to login to the anonymous reporting system to submit incident reports,receive, from reporting user devices of the verified reporting users, incident reports of at least one social incident,determine one or more equivalence classes of the incident reports by applying a classifier trained by a machine learning technique that identifies similar incident reports associated with multiple substantially matching parameter values, wherein one or more of said parameter values are associated with at least one victim of the at least one social incident,select, from the one or more equivalence classes, an equivalence class with a count exceeding a predetermined threshold value,transform the incident reports into anonymized incident reports, wherein the anonymized incident reports contain no personal information of the verified reporting users, anddistribute, to at least one client device, the anonymized incident reports of the selected equivalence class to initiate action responsive to the social incident by a client user of the client device.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein is a framework to facilitate anonymous reporting of social incidents. In accordance with one aspect of the framework, at least one input report of a social incident is received from at least one user device. The input report may be submitted by a user associated with verified credentials. An equivalence class may be identified for the input report. If a count associated with the equivalence class exceeds a predetermined threshold value, anonymized information based on the input report may be distributed to initiate action responsive to the social incident.
37 Citations
19 Claims
-
1. An anonymous reporting system comprising:
-
a non-transitory memory device for storing computer-readable program code; and a processor in communication with the memory device, the processor being operative with the computer-readable program code to verify user credentials of reporting users wishing to submit social incident reports, wherein each social incident report includes personal information of the reporting users based on the user credentials and incident information of a social incident, register, in response to successful verification of the user credentials, the verified reporting users, wherein the registration enables the verified reporting users to login to the anonymous reporting system to submit incident reports, receive, from reporting user devices of the verified reporting users, incident reports of at least one social incident, determine one or more equivalence classes of the incident reports by applying a classifier trained by a machine learning technique that identifies similar incident reports associated with multiple substantially matching parameter values, wherein one or more of said parameter values are associated with at least one victim of the at least one social incident, select, from the one or more equivalence classes, an equivalence class with a count exceeding a predetermined threshold value, transform the incident reports into anonymized incident reports, wherein the anonymized incident reports contain no personal information of the verified reporting users, and distribute, to at least one client device, the anonymized incident reports of the selected equivalence class to initiate action responsive to the social incident by a client user of the client device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of anonymous reporting performed by a computer system, comprising:
-
verifying user credentials of a reporting user wishing to submit a social incident report from a reporting user device; registering, in response to successful verification of the user credentials, the verified reporting user, wherein the registration enables the verified reporting user to login to the anonymous reporting system to submit the incident report; receiving, from the reporting user device, at least one input incident report of a social incident submitted by the verified reporting user, wherein the incident report includes personal information of the verified reporting user based on the user credentials and incident information of a social incident; transforming the input incident report into an anonymized input incident report, the anonymized incident report contains no personal information of the verified reporting user; storing the input anonymized incident report in an anonymous report storage containing previously submitted anonymized incident reports; identifying an equivalence class for the input incident report based on the previously submitted anonymized incident reports stored in an incident report database by applying a classifier trained by a machine learning technique that identifies similar incident reports associated with multiple substantially matching parameter values, wherein one or more of said parameter values are associated with at least one victim of the social incident; and distributing anonymized incident reports to initiate action responsive to the social incident of the anonymized input incident report, wherein the distributing is performed in response to a count associated with the equivalence class exceeding a predetermined threshold value. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium having stored thereon program code, the program code executable by a computer to perform anonymous reporting comprising:
-
verifying user credentials of a reporting user wishing to submit a social incident report from a reporting user device; registering, in response to successful verification of the user credentials, the verified reporting user, wherein the registration enables the verified reporting user to login to the anonymous reporting system to submit the incident report; receiving, from the reporting user device, at least one input incident report of a social incident submitted by the verified reporting user, wherein the incident report includes personal information of the verified reporting user based on the user credentials and incident information of a social incident; transforming the input incident report into an anonymized input incident report, the anonymized incident report contains no personal information of the verified reporting user; storing the input anonymized incident report in an anonymous report storage containing previously submitted anonymized incident reports; identifying an equivalence class for the input incident report based on the previously submitted anonymized incident reports stored in an incident report database by applying a classifier trained by a machine learning technique that identifies similar incident reports associated with multiple substantially matching parameter values, wherein one or more of said parameter values are associated with at least one victim of the social incident; and distributing anonymized incident reports to initiate action responsive to the social incident of the anonymized input incident report, wherein the distributing is performed in response to a count associated with the equivalence class exceeding a predetermined threshold value. - View Dependent Claims (19)
-
Specification