×

Systems and methods for protecting privacy

  • US 7,797,725 B2
  • Filed: 12/02/2004
  • Issued: 09/14/2010
  • Est. Priority Date: 12/02/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of protecting privacy, wherein the computer includes a processor, comprising the steps of:

  • receiving a request for aggregated information that is based on an extraction transformation applied to stored information, wherein the extraction transformation is based on data mining;

    determining extraction characteristics based on characteristics of the extraction transformation, or the stored information, or both;

    applying, by the computer, a privacy protecting transformation to the aggregated information based on a privacy policy and the extraction characteristics, wherein the privacy protecting transformation decouples the aggregated information, which combines information associated with a plurality of individual subjects, from a respective individual subject covered by the privacy policy; and

    returning a response to the request based on the applied privacy protecting transformation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×