SYSTEMS AND METHODS FOR DE-IDENTIFICATION OF PERSONAL DATA
First Claim
Patent Images
1. A data de-identification system, comprising:
- an original data source;
a processor coupled to the original data source; and
a storage device in communication with said processor and storing instructions adapted to be executed by said processor to;
retrieve original data from the original data source;
automatically search the original data for potential personal information;
select an obfuscation method from a plurality of potential obfuscation methods; and
automatically replace the potential personal information in the original data with fictional data in accordance with the selected obfuscation method.
1 Assignment
0 Petitions
Accused Products
Abstract
According to some embodiments, original data is retrieved from an original data source. The original data may be automatically searched for potential personal information, such as a person'"'"'s name, address, or Social Security number. An obfuscation method may be selected from a plurality of potential obfuscation methods. The potential personal information in the original data may then be automatically replaced with fictional data in accordance with the selected obfuscation method.
133 Citations
24 Claims
-
1. A data de-identification system, comprising:
-
an original data source; a processor coupled to the original data source; and a storage device in communication with said processor and storing instructions adapted to be executed by said processor to; retrieve original data from the original data source; automatically search the original data for potential personal information; select an obfuscation method from a plurality of potential obfuscation methods; and automatically replace the potential personal information in the original data with fictional data in accordance with the selected obfuscation method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving original data from a data source; automatically creating an inventory of elements in the original data; searching the elements in the inventory for potential personal information; selecting an obfuscation method from a plurality of potential obfuscation methods; and automatically replacing the potential personal information in the original data with fictional data in accordance with the selected obfuscation method. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable medium storing instructions adapted to be executed by a processor to perform a data de-identification method, said method comprising:
-
receiving original data from memory; analyzing metadata data associated with the original data to create an inventory of elements in the original data; searching elements in the inventory for potential personal information based on at least one character matching rule; evaluating an obfuscation rule; automatically creating scripts to be used during a database refresh process to replace the potential personal information in the original data with fictional data in accordance with (i) a result of said evaluation and (ii) an obfuscation method selected from a set of potential obfuscation methods; transforming the original data by executing the automatically created scripts; and transmitting the transformed original data to a remote device via a communication network.
-
Specification