Patents by Inventor David Clyde Williamson
David Clyde Williamson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250139132Abstract: A data privacy system automatically determines quasi-identifiers in a database containing individuals' records. The data privacy system applies a machine learning model to the database, the model configured to classify each record in the database and output a measure of its confidence in its classification. The data privacy system determines, based on the measure of confidence, how important each attribute is to the model's classification. The data privacy system iteratively applies a machine learning model on a modified database that includes the highest ranked attributes to identify the quasi-identifiers in the records in the database. The data privacy system can use identified quasi-identifiers to determine if the database is susceptible to a membership inference attack, and in response to such a determination, can perform one or more data privacy operations on the database to reduce this risk.Type: ApplicationFiled: October 11, 2024Publication date: May 1, 2025Inventors: André Castro, David Clyde Williamson, Vichai Levy, Chandan Chaitanya
-
Publication number: 20250139131Abstract: A data privacy system automatically determines quasi-identifiers in a database containing individuals' records. The data privacy system applies a machine learning model to the database, the model configured to classify each record in the database and output a measure of its confidence in its classification. The data privacy system determines, based on the measure of confidence, how important each attribute is to the model's classification. The data privacy system iteratively applies a machine learning model on a modified database that includes the highest ranked attributes to identify the quasi-identifiers in the records in the database. The data privacy system can use identified quasi-identifiers to determine if the database is susceptible to a membership inference attack, and in response to such a determination, can perform one or more data privacy operations on the database to reduce this risk.Type: ApplicationFiled: October 11, 2024Publication date: May 1, 2025Inventors: André Castro, David Clyde Williamson, Vichai Levy, Chandan Chaitanya
-
Publication number: 20250117603Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: ApplicationFiled: December 15, 2024Publication date: April 10, 2025Inventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Patent number: 12210846Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: GrantFiled: January 17, 2023Date of Patent: January 28, 2025Assignee: PROTEGRITY US HOLDING, LLCInventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Patent number: 12153693Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: September 15, 2022Date of Patent: November 26, 2024Assignee: PROTEGRITY CORPORATIONInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Publication number: 20240362356Abstract: Data in a database can be protected, for instance by tokenizing the entries of the database using one or more token tables. To enable searching data within the database without first detokenizing the tokenized database entries, bigrams of each data entry can also be tokenized and stored in association with the tokenized data entry. When a query term is received, the query term can be parsed into bigrams, and each bigram can be tokenized. The tokenized query bigrams can be used to query the database, and tokenized database entries corresponding to tokenized bigrams that match the tokenized query bigrams can be identified and returned as search results.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Ulf Mattsson, David Clyde Williamson
-
Patent number: 12093420Abstract: Data in a database can be protected, for instance by tokenizing the entries of the database using one or more token tables. To enable searching data within the database without first detokenizing the tokenized database entries, bigrams of each data entry can also be tokenized and stored in association with the tokenized data entry. When a query term is received, the query term can be parsed into bigrams, and each bigram can be tokenized. The tokenized query bigrams can be used to query the database, and tokenized database entries corresponding to tokenized bigrams that match the tokenized query bigrams can be identified and returned as search results.Type: GrantFiled: October 2, 2021Date of Patent: September 17, 2024Assignee: PROTEGRITY US HOLDING, LLCInventors: Ulf Mattsson, David Clyde Williamson
-
Patent number: 11882220Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: April 29, 2022Date of Patent: January 23, 2024Assignee: PROTEGRITY CORPORATIONInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20230153544Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: ApplicationFiled: January 17, 2023Publication date: May 18, 2023Inventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Patent number: 11586832Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: GrantFiled: February 17, 2021Date of Patent: February 21, 2023Assignee: PROTEGRITY CORPORATIONInventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Publication number: 20230013306Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: ApplicationFiled: September 15, 2022Publication date: January 19, 2023Inventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Patent number: 11475143Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: September 12, 2020Date of Patent: October 18, 2022Assignee: Protegrity CorporationInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Publication number: 20220255746Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: ApplicationFiled: April 29, 2022Publication date: August 11, 2022Inventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Patent number: 11349661Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: September 21, 2020Date of Patent: May 31, 2022Assignee: PROTEGRITY CORPORATIONInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20220121768Abstract: Data in a database can be protected, for instance by tokenizing the entries of the database using one or more token tables. To enable searching data within the database without first detokenizing the tokenized database entries, bigrams of each data entry can also be tokenized and stored in association with the tokenized data entry. When a query term is received, the query term can be parsed into bigrams, and each bigram can be tokenized. The tokenized query bigrams can be used to query the database, and tokenized database entries corresponding to tokenized bigrams that match the tokenized query bigrams can be identified and returned as search results.Type: ApplicationFiled: October 2, 2021Publication date: April 21, 2022Inventors: Ulf Mattsson, David Clyde Williamson
-
Publication number: 20220114341Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: ApplicationFiled: February 17, 2021Publication date: April 14, 2022Inventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Publication number: 20210006406Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: ApplicationFiled: September 21, 2020Publication date: January 7, 2021Inventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20200410116Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: ApplicationFiled: September 12, 2020Publication date: December 31, 2020Inventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Patent number: 10819519Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: November 13, 2018Date of Patent: October 27, 2020Assignee: Protegrity CorporationInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Patent number: 10810317Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: February 9, 2018Date of Patent: October 20, 2020Assignee: Protegrity CorporationInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan