Systems and methods for protecting privacy
First Claim
1. A computer-implemented method of protecting privacy, wherein the computer includes a processor, comprising the steps of:
- receiving a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining;
determining extraction characteristics based on characteristics of the extraction transformation, or the stored information, or both;
applying, by the computer, a privacy protecting transformation to the aggregated information based on a privacy policy and the extraction characteristics, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of individual subjects, from a respective individual subject covered by the privacy policy; and
returning a response to the request based on the applied privacy protecting transformation.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing privacy protection are provided. A query is received. Privacy policy information, extracted knowledge and optional information about available public information are determined. Information about the knowledge extraction transformations applied to create the extracted knowledge and the source data is determined. Privacy protecting transformations are determined and applied to transform the extracted knowledge based on the selected privacy policy, optional information about available public information, the characteristics of the applied knowledge extractions transformations, the source data and optional previous user queries.
101 Citations
47 Claims
-
1. A computer-implemented method of protecting privacy, wherein the computer includes a processor, comprising the steps of:
-
receiving a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining; determining extraction characteristics based on characteristics of the extraction transformation, or the stored information, or both; applying, by the computer, a privacy protecting transformation to the aggregated information based on a privacy policy and the extraction characteristics, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of individual subjects, from a respective individual subject covered by the privacy policy; and returning a response to the request based on the applied privacy protecting transformation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for protecting privacy comprising:
-
an input/output circuit that receives a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining; a memory; and a processor that determines extraction characteristics based on characteristics of the extraction transformation, or the stored information, or both; applies a privacy protecting transformation to the aggregated information based on a privacy policy and the extraction characteristics, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of individual subjects, from a respective individual subject covered by the privacy policy; and returns a response to the request based on the applied privacy protecting transformation. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A non-transitory computer-readable storage device comprising:
- computer readable program code embodied on the computer readable storage medium, the computer readable program code usable to program a computer for protecting privacy comprising;
receiving a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining; determining extraction characteristics based on characteristics of the extraction transformation, or the stored information, or both; and applying a privacy protecting transformation to the aggregated information based on a privacy policy and the extraction characteristics, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of the individual subjects, from a respective individual subject covered by the privacy policy; and returning a response to the request based on the applied privacy protecting transformation.
- computer readable program code embodied on the computer readable storage medium, the computer readable program code usable to program a computer for protecting privacy comprising;
-
46. A method of protecting privacy comprising:
-
determining a privacy policy; determining an extraction transformation, which is based on data mining; aggregating the stored information by applying the extraction transformation to the stored information; and applying a privacy protecting transformation to the aggregated information based on the determined privacy policy, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of the individual subjects, from a respective individual subject covered by the privacy policy.
-
-
47. A system for protecting privacy comprising:
-
an input/output circuit that receives a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining; a memory; and a processor that determines a privacy policy; and determines an extraction transformation, which is based on data mining and comprises characteristics of the extraction transformation, or the stored information, or both; applies a privacy protecting transformation to the aggregated information based on the privacy policy and the extraction transformation, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of the individual subjects, from a respective individual subject covered by the privacy policy.
-
Specification