Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction
Reexamination Certificate
2007-09-11
2007-09-11
Elisca, Pierre Eddy (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Secure transaction
C705S064000
Reexamination Certificate
active
10119553
ABSTRACT:
Systems and methods for deidentifying, or anonymizing, entries in an input data source are presented. According to one embodiment, the system includes a deidentification module for modifying entries in a version of the input data source to yield an output data source such that the entries of the output data source match a specified anonymity requirement. According to one embodiment, the resulting output data source may match the specified anonymity requirement with respect to a recipient profile that is input to the system. The deidentification module may further modify the entries in the version of the input data source such that the entries in the output data source are minimally distorted given the specified anonymity requirement.
REFERENCES:
patent: 5708828 (1998-01-01), Coleman
patent: 6259977 (2001-07-01), Mayer et al.
patent: 6389533 (2002-05-01), Davis et al.
patent: 2004/0254893 (2004-12-01), Tsuei et al.
patent: 2004/0254894 (2004-12-01), Tsuei et al.
patent: 2004/0260653 (2004-12-01), Tsuei et al.
patent: 2007/0061393 (2007-03-01), Moore
patent: 2006190244 (2006-07-01), None
patent: 2006190244 (2006-07-01), None
Samarati et al., “Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression,”SRI International, Technical Report(1998).
Sweeney, “Datafly: a system for providing anonymity in medical data,”11thInternational Conference on Database Security(1997).
Samarati et al., “Generalizing data to provide anonymity when disclosing information,”Proceedings of the Seventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Data Systems(1998).
Adam et al., “Security-control methods for statistical databases: a comparative study,”Computing Surveys(1989).
Duncan et al., “Cell Suppression to limit content-based disclosure,”System Sciences(1997).
Sweeney, L., “Guaranteeing anonymity when sharing medical data, the datafly system,”Massachusetts Institute of Technology Artificial Intelligence Laboratory, Working Paper No. AIWP-WP344, May 1997.
Sweeney, L., “Guaranteeing anonymity when sharing medical data, the datafly system,”Proc. Journal of the American Medical Informatics Association, 1997.
Sweeney, L., “Weaving technology and policy together to maintain confidentiality,”Journal of Law, Medicine and Ethics. 1997, 25:98-110.
Elisca Pierre Eddy
Kirkpatrick & Lockhart Preston Gates & Ellis LLP
LandOfFree
Systems and methods for deidentifying entries in a data source does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for deidentifying entries in a data source, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for deidentifying entries in a data source will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3771812