SYSTEM AND METHOD FOR PRIVACY PROTECTION USING IDENTIFIABILITY RISK ASSESSMENT
First Claim
Patent Images
1. A risk assessment system, comprising:
- an information system configured to disclose information to a third party; and
a risk determination model configured to compute identifiability risk for one or more records in storage, the identifiability risk being compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
0 Assignments
0 Petitions
Accused Products
Abstract
A risk assessment system and method includes an information system configured to disclose information to a third party. A risk determination model is configured to compute identifiability risk for on one or more records in storage. The identifiability risk is compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party.
48 Citations
35 Claims
-
1. A risk assessment system, comprising:
-
an information system configured to disclose information to a third party; and a risk determination model configured to compute identifiability risk for one or more records in storage, the identifiability risk being compared to a threshold prior to being disclosed wherein the information system is informed of the identifiability risk exceeding the threshold prior to disclosure to the third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A risk monitoring system, comprising:
-
an information system configured to disclose information to an entity; a risk determination model configured to compute identifiability risk for on one or more records in storage; a privacy monitor configured to receive the one or more records being released, and prior to disclosing the one or more records to the entity, the privacy monitor being configured to detect whether the identifiability risk exceeds a threshold and perform a function to mitigate unauthorized disclosure of the records to the entity. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for privacy protection, comprising:
-
evaluating identifiability risk for one or more records in storage using a risk assessment model; comparing the identifiability risk with a threshold to determine whether the one or more records can be disclosed to a third party without violation of privacy criteria; and disclosing the one or more records if disclosure is acceptable based on the comparing step. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A computer program product of privacy protection comprising a computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
evaluating identifiability risk for one or more records in storage using a risk assessment model; comparing the identifiability risk with a threshold to determine whether the one or more records can be disclosed to a third party without violation of privacy criteria; and disclosing the one or more records if disclosure is acceptable based on the comparing step. - View Dependent Claims (35)
-
Specification