Data processing: database and file management or data structures – Database and file access – Record – file – and data search and comparisons
Reexamination Certificate
2011-03-08
2011-03-08
Wong, Don (Department: 2163)
Data processing: database and file management or data structures
Database and file access
Record, file, and data search and comparisons
C707S744000, C707S752000, C707S783000, C707S802000, C707S803000, C707S807000, C707SE17005, C707S999100, C707S999101, C707S999102
Reexamination Certificate
active
07904471
ABSTRACT:
Privacy in data mining of sparse high dimensional data records is preserved by transforming the data records into anonymized data records. This transformation involves creating a sketch-based private representation of each data record, each data record containing only a small number of non-zero attribute value in relation to the high dimensionality of the data records.
REFERENCES:
patent: 5987470 (1999-11-01), Meyers et al.
patent: 7043476 (2006-05-01), Robson
patent: 2005/0168460 (2005-08-01), Razdan et al.
patent: 2005/0246354 (2005-11-01), Tamayo et al.
Data Privacy Through Optimal K-Anonymization [online]; [retrieved on Jun. 11, 2007] retrieved from the Internet—http://ccsdl2.computer.org/persagen/DLAbsToc.jsp?resourcePath=/dl/proceedings/&toc=co...
The Space Complexity of Approximating The Frequency Moments [online][retrieved on Jun. 11, 2007]; retrieved from the Internet http://portal.acm.org/citation.cfm?doid=237814.237823.
On K-Anonymity and the Curse of Dimensionality [online] [retrieved on Jun. 11, 2007]; retrieved from the Internet http://portal.acm.org/citation.cfm?id=1083696.
Privacy-Preserving Data Mining [online][retrieved on Jun. 11, 2007]; retrieved from the Internet http://portal.acm.org/citation.cfm?doid=342009.335438.
On the Design and Quantification of Privacy Preserving Data Mining Algorithms [online] [retrieved on Jun. 11, 2007]; retrieved from the Internet http://portal.acm.org/citation.cfm?id=375602&dI=ACM&coll=portal.
Protecting Privacy When Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression (1998) [online][retrieved on Jun. 11, 2007]; retrieved from the Internet http://citeseer.ist.psu.edu/samarati98protecting.html.
Privacy Via Pseudorandom Sketches [online][retrieved on Jun. 11, 2007]; retrieved from the Internet http://portal.acm.org/citation.cfm?id=1142373.
A Condensation Approach to Privacy Preserving Data Mining [online][retrieved on Jun. 11, 2007]; retrieved from the Internet http://www.springerlink.com/content/48xek4dqyy4rvaj2/.
State-Of-The-Art In Privacy Preserving Data Mining, Verykios et al., Cerias Tech Report 2004-63, pp. 1-8.
On Randomization, Public Information and the Curse of Dimensionality [online][retrieved on Aug. 8, 2007]; retrieved from the Internet http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=4221662.
Aggarwal Charu
Yu Philip S.
Cantor & Colburn LLP
International Business Machines - Corporation
Lodhi Andalib F
Stock William
Wong Don
LandOfFree
Method, apparatus and computer program product for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, apparatus and computer program product for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, apparatus and computer program product for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2650393