Hiding And Masking Database Data Patents (Class 707/757)
  • Patent number: 10242360
    Abstract: A data protection system for online data is described that can be used to obfuscate sensitive data to relieve security compliance requirements for one or more entities involved in processing, storing, and/or communicating the sensitive data to complete an online purchase transaction. The data protection system can receive online purchase data from a client application, and then remove the sensitive information of the online purchase data to sanitize the online purchase data. The data protection system can also maintain the sensitive information, and communicate the sanitized online purchase data to an eCommerce server that then communicates with a payment service provider for payment authorization of the online purchase, where the sanitized online purchase data relieves security compliance requirements at the eCommerce server.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: March 26, 2019
    Assignee: Adobe Inc.
    Inventors: Daniel C. Brotsky, Michael Brian Orr, Shyama P. Padhi
  • Patent number: 10121024
    Abstract: The privacy of linear queries on histograms is protected. A database containing private data is queried. Base decomposition is performed to recursively compute an orthonormal basis for the database space. Using correlated (or Gaussian) noise and/or least squares estimation, an answer having differential privacy is generated and provided in response to the query. In some implementations, the differential privacy is ?-differential privacy (pure differential privacy) or is (?,?)-differential privacy (i.e., approximate differential privacy). In some implementations, the data in the database may be dense. Such implementations may use correlated noise without using least squares estimation. In other implementations, the data in the database may be sparse. Such implementations may use least squares estimation with or without using correlated noise.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: November 6, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Li Zhang, Kunal Talwar, Aleksandar Nikolov
  • Patent number: 9892281
    Abstract: Systems and methods for evaluating elements of a computer network using deidentified production data are described. The production data can include a set of alias records, which include deidentified data, and can be generated from corresponding real records of actual users. Evaluating elements can include passing the production data to the elements as messages for processing.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: February 13, 2018
    Assignee: HCA Holdings, Inc.
    Inventors: Alan Scott, Ryan Staggs, Kevin Ronald Linkous, Jack Hutchinson Blalock, Mason Adam Blalock
  • Patent number: 9747467
    Abstract: A method for generating anonymized data includes: (A) extracting, from plural data blocks, each of which includes a secret attribute value and a numeric attribute value, plural groups of data blocks, wherein each of the plural groups includes data blocks that include a first data block, which has not been grouped, whose frequency distribution of the secret attribute value satisfies a predetermined condition and whose numeric attribute values are within a certain area that has a predetermined size; and (B) replacing the numeric attribute values of the data blocks that belong to each group of the plural groups with a numeric attribute value calculated for the group. And, the certain area is determined without any relation with other certain areas for other groups.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: August 29, 2017
    Assignee: FUJITSU LIMITED
    Inventor: Yuji Yamaoka
  • Patent number: 9286475
    Abstract: Embodiments relate to systems and methods for the enforcement of security profiles in a multi-tenant database. A multi-tenant database can be populated with data from different users or other entities. Different users may enjoy different sets of permissions to access, modify, store, and/or otherwise manipulate sets of data within the database. After authentication, a user's associated set of permissions are retrieved. When data is requested, matching tables or other objects located in the database are identified based on the user's query. Rather than retrieving matching tables or other objects directly, a meta data security engine can check the requesting user's permissions, and apply any filters or restrictions required by those permissions to the data present in the table(s). A substitution can be made of a table-valued function, including any filtered data entries, for the table itself. Flexible and granular data security rules can thereby be applied, transparently to the user.
    Type: Grant
    Filed: February 21, 2012
    Date of Patent: March 15, 2016
    Assignee: XEROX CORPORATION
    Inventors: Yue Li, Chloe Pajerek, Manish Dixit, Jeremy L. Reitz
  • Patent number: 9135452
    Abstract: In some embodiments, a computer-implemented method includes receiving a first location-based service (LBS) request from a requesting device. One or more peer devices are selected from a plurality of actual peer devices. A set of false queries is generated, by a computer processor, based on the selected peer devices. Transmitted to a service provider are a real query, representing the first LBS request of the requesting device, and the set of false queries representing the selected peer devices. A set of query responses are received from the service provider. From the set of query responses, a real query response is extracted, corresponding to the real query. The real query response is transmitted to the requesting device in reply to the first LBS request.
    Type: Grant
    Filed: November 21, 2013
    Date of Patent: September 15, 2015
    Assignee: International Business Machines Corporation
    Inventors: Aris Gkoulalas-Divanis, Martin Stephenson
  • Patent number: 9069949
    Abstract: An access filtering device includes a receiving unit that receives a URL of a prohibited site or a prohibited page; an executing unit that accesses the page by using the URL; an acquiring unit that acquires page information corresponding to the URL; a prohibited site list that includes character strings of prohibited sites and prohibited pages; a determining unit that determines whether the URL is a character string of a prohibited site or a prohibited page; a display control unit that, when the URL is a character string of a prohibited site or a prohibited page, displays the page in a decreased page-readability state, i.e., in a transparent state.
    Type: Grant
    Filed: July 8, 2011
    Date of Patent: June 30, 2015
    Assignee: FUJITSU LIMITED
    Inventors: Shinji Matsune, Kanako Ogasawara
  • Patent number: 9043342
    Abstract: A method, system and computer-usable medium are disclosed for controlling the distribution of data. Data stored in a datastore is filtered according to a data release policy to generate filtered data. A data release policy agreement, corresponding to the data release policy, is generated. The filtered data and the data release policy agreement are then provided to an information consumer. The data release policy agreement is then used to enforce the data release policy.
    Type: Grant
    Filed: December 29, 2009
    Date of Patent: May 26, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ivan M. Milman, Charles D. Wolfson, Matthias Schunter, Heather M. Hinton, Michael P. Waidner
  • Patent number: 9031982
    Abstract: A service delivery platform receives a request for a catalogue. The system obtains subscriber-specific multi-media catalogue entries based on profile information stored with the service delivery platform. The system sends the subscriber-specific catalogue entries along with service details of the subscription back to the subscriber.
    Type: Grant
    Filed: August 22, 2008
    Date of Patent: May 12, 2015
    Assignee: Accenture Global Services Limited
    Inventors: Laura Martino, Domenico De Luca, Roberto Privitera
  • Patent number: 9015178
    Abstract: Apparatuses, Methods and programs are provided. A method may comprise receiving a first request to verify an identifier associated with a destination from a first requester, responding to the request with a response, the response indicating an existence of a physical address associated with the identifier, the response further comprising a list of authorized entities authorized to access information specifying the physical address, receiving a second request from a second requester to access information specifying the physical address associated with the identifier, determining if the second requester is authorized to have access to information specifying the physical address by analyzing the list of authorized entities corresponding to the identifier; and providing the physical address to the second requester if the second requester is authorized.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 21, 2015
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Stefan Ionescu, John Kane
  • Patent number: 9002007
    Abstract: A method and apparatus are disclosed herein for classification. In one embodiment, the method comprises performing tree-based classification of a user input by a classifier with a classification tree at a first location, including exchanging data with a second location, different from the first location, to obtain the user input and provide results of classification to a user using singly homomorphic encryption so that the user input is not revealed to the classifier, the classification tree is not revealed to the user and the classifier's output is not revealed to the classifier.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: April 7, 2015
    Assignee: Ricoh Co., Ltd.
    Inventors: Mohamed Nabeel, David G. Stork
  • Patent number: 9003054
    Abstract: Systems and methodologies that enhance a Tabular Data Stream (TDS) protocol by enabling efficient transmission of a row(s) with null columns(s). An identification component employs a bit map that can be positioned at beginning of a row, to indicate to the receiving side (e.g., a client) columns that are to be sent. Accordingly, by distinguishing columns that are null from columns that are not null—followed by sending columns that are not null—transmission resources can be effectively employed.
    Type: Grant
    Filed: October 25, 2007
    Date of Patent: April 7, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Il-Sung Lee, Matthew A. Neerincx, Peter Gvozdjak, Chadwin James Mumford
  • Patent number: 8983985
    Abstract: Access to a data element stored within a database object is controlled. A request is received from a user to perform an operation in relation to the database object, the operation including retrieval of information from the data element of the database object. Prior to retrieving information from the data element, a determination is made whether at least a portion of the information from the data element is subject to masking in accordance with an access policy. In response to determining that information from the data element is subject to masking, the request is modified to require that information from the data element be retrieved in a masked condition.
    Type: Grant
    Filed: January 28, 2011
    Date of Patent: March 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Stephen Yao Ching Chen, Curt L. Cotner, Gerald G. Kiernan, Irene Ching-Hua Liu, Claire W. McFeely, Walid Rjaibi, Timothy J. Vincent
  • Patent number: 8972426
    Abstract: A method includes defining a host capability; creating for a storage device a second directory tree from a first directory tree of the storage device that is included in a file system within the storage device; and, for a data file that is stored in the storage device and is selectable for consumption by a host through the first directory tree that is included in the storage device's file system, determining whether the data file requires for consumption a host having the defined host capability. If the data file requires a host having the defined host capability, an entry is created in the second directory tree in which the data file is not selectable for consumption by the host. Otherwise, an entry is created in the second directory tree in which the data file is selectable for consumption by the host.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: March 3, 2015
    Assignee: Sandisk IL Ltd.
    Inventors: Ari Daniel Fruchter, Judah Gamliel Hahn, Donald Ray Bryant-Rich, Daniel Isaac Goodman
  • Patent number: 8954457
    Abstract: The present invention concerns a method for processing a structured document to render, such as XML or HTML files. The method comprises the steps of: parsing the structured document into parsed tokens TK of structured data; constructing a first tree structure DTree storing the structured data of parsed tokens; constructing a render tree structure RTree storing the document content to render, said render tree structure being synchronized with the first tree structure; rendering the structured document based on the render tree structure RTree; wherein constructing the first tree structure DTree comprises deciding, for each parsed token TK, whether or not the parsed token is to be stored in said first tree structure, and storing the structured data of the parsed token therein only in case of positive decision. Partial first (DOM) tree DTree is therefore stored in memory, reducing memory use and processing time before rendering the structured document.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: February 10, 2015
    Assignee: Canon Kabushiki Kaisha
    Inventors: Youenn Fablet, Romain Bellessort, Hervé Ruellan
  • Patent number: 8943027
    Abstract: Methods, systems, and computer readable media for content item purging are provided. A contact item purger, such as may be incorporated within a local client application of a content management system running on a user device, may leverage knowledge as to which items have been uploaded to the content management system, and how long such content items have been stored on the user device, to propose items for deletion from the user device so as to reclaim storage space. A contact item purger may run on one or more user devices, and may activate upon various triggering events, based on various conditions and parameters, with or without user interaction, thus maintaining available memory capacity at all times.
    Type: Grant
    Filed: November 20, 2013
    Date of Patent: January 27, 2015
    Assignee: Dropbox, Inc.
    Inventors: Michael Dwan, Anthony Grue, Daniel Kluesing
  • Patent number: 8943062
    Abstract: A first server is configured to receive one or more summarized data groups from a second server. Each summarized data group may include: information regarding a quantity of a group of records, where the group of records includes records associated with a record type and a time interval; information regarding a quantity of records associated with an indicator within the group of records; and information regarding a failure rate associated with the group of records based on the quantity of records associated with the group of records and the quantity of records associated with the indicator within the group of records. The first server is further configured to determine a threshold based on the summarized data groups and based on the failure rates associated with the summarized data groups and send an indication to the client device based on determining that the failure rate does not satisfy the threshold.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: January 27, 2015
    Assignee: Cellco Partnership
    Inventors: Jeffrey L. Baumgartner, Eric W. Baumgartner, Michael W. Monsey
  • Patent number: 8943079
    Abstract: Methods and systems are disclosed for anonymizing a dataset that correlates a set of entities with respective attributes. The method comprises determine clusters of similar entities. Determining the clusters comprises (1) partitioning the entities into a first group with similar attributes to one another and a complement group of entities with similar attributes to one another and (2) recursively repeating the partitioning on the groups until every group meets one or more criteria. The partitioning a group comprises choosing a reference entity from the group, determining a symmetric set of attributes based on the reference entity attributes and on an average of the group's attributes, and assigning each entity to the first or second group depending on whether its attributes are more similar to those of the reference user or to those of the symmetric set.
    Type: Grant
    Filed: February 1, 2012
    Date of Patent: January 27, 2015
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Vincent Huang, Xiaoqiang Chen
  • Patent number: 8938386
    Abstract: When redacting natural language text, a classifier is used to provide a sensitive concept model according to features in natural language text and in which the various classes employed are sensitive concepts reflected in the natural language text. Similarly, the classifier is used to provide an utility concepts model based on utility concepts. Based on these models, and for one or more identified sensitive concept and identified utility concept, at least one feature in the natural language text is identified that implicates the at least one identified sensitive topic more than the at least one identified utility concept. At least some of the features thus identified may be perturbed such that the modified natural language text may be provided as at least one redacted document. In this manner, features are perturbed to maximize classification error for sensitive concepts while simultaneously minimizing classification error in the utility concepts.
    Type: Grant
    Filed: March 15, 2011
    Date of Patent: January 20, 2015
    Assignee: Accenture Global Services Limited
    Inventors: Chad Cumby, Rayid Ghani
  • Patent number: 8935268
    Abstract: A method and system for controlling disclosure of trace data related to moving object. The method includes the steps of: receiving, for at least one moving object in a first region, a first record aggregate; receiving, for at least one moving object in a second region, a second record aggregate; calculating trace data from at least one attribute value of a first identifier that is in received first and second record aggregates in response to data search request; calculating to satisfy a condition of the moving object passing through at least one region and to satisfy another condition of at least two of the moving objects being present in each of the region; and returning calculated trace data as a search result if the moving object moves in calculated ranges and if the moving object has the first identifier that is in both the received first and second record aggregates.
    Type: Grant
    Filed: January 17, 2012
    Date of Patent: January 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: Naohiko Uramoto, Yuji Watanabe
  • Patent number: 8930423
    Abstract: Various techniques, including a method, system and computer program product for restoring encrypted files are disclosed. The method includes accessing a file table record for an encrypted file. The file table record includes an encrypted file stream and extent information identifying a location of one or more portions of the encrypted file in a virtual machine image. In response to accessing the file table record a consecutive data stream is stored. Storing the consecutive data stream includes encapsulating the encrypted file stream and the one or more portions of the encrypted file.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: January 6, 2015
    Assignee: Symantec Corporation
    Inventors: Sridhar Surampudi, Timothy M. Naftel
  • Patent number: 8930382
    Abstract: A mechanism is provided for secure data access in a parallel processing system. A database having two tables is provided. A subset of the tables' primary key attributes is considered sensitive. A first user is authorized to access the primary key's sensitive attribute in an unmasked format, while a second user is authorized to access same data in a masked format. Two security tables are generated having a plurality of entries mapping the values of the primary key attribute in the unmasked format to the values of the primary key attribute in the masked format. A security view is generated joining the two security tables. The security view grants the first user access to the values of the primary key's sensitive attribute in the unmasked format only and grants the second user access to the values of the primary key's sensitive attribute in the masked format only.
    Type: Grant
    Filed: October 10, 2012
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Edward Gust Branish, II, Veerabhadra Chinnam, George Richard Hughes, Jr., James Sun
  • Patent number: 8924401
    Abstract: A system and method for logically masking data by implementing masking algorithms is provided. The method includes receiving one or more inputs from user regarding type of data masking to be implemented depending on type of data entry. Data entries include alphabetical data, data comprising unique codes, data comprising dates and numerical data. Based on inputs received, the data entries are classified and appropriate masking algorithms are executed. For masking numerical data entries, the data entries are first grouped using clustering algorithms and are then shuffled using shuffling algorithms. For low level of data masking selected by a user, numerical data entries are shuffled within groups and for high level of data masking selected by a user, numerical data entries are shuffled across groups.
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: December 30, 2014
    Assignee: Infosys Limited
    Inventors: Kolandaiswamy Antony Arokia Durai Raj, Balasubramanian Kanagasabapathi
  • Patent number: 8924402
    Abstract: A method of transferring files in a data-processing network using a current node within the network includes reading an outbound content and outbound characteristics of an outbound file. An outbound message is created having outbound strings including a first set of the outbound strings representing the outbound characteristics and a second set of the outbound strings representing the outbound content. The outbound message is sent to a receiver node within the network. An inbound message is received from a sender node within the network. The inbound message has inbound strings including a first set of the inbound strings representing inbound characteristics and a second set of the inbound strings representing inbound content. An inbound file having the inbound content is stored, and the inbound characteristics are applied to the inbound file.
    Type: Grant
    Filed: October 8, 2012
    Date of Patent: December 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: You-Chin Fuh, Shuo Li, Heng Liu, Michael Schenker, Ke Wei Wei, Xin Ying Yang
  • Patent number: 8914369
    Abstract: A method for rearranging a data segment. The method comprises providing a data segment containing digital content, generating a set of human dependent variables according to a plurality of human related activities, rearranging the data segment according to the set of human dependent variables, and updating a log according to the rearranging. The digital content may be retrieved from the rearranged data segment according to the log.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: December 16, 2014
    Assignee: Privacy Inside Ltd.
    Inventor: Roy Cohen
  • Patent number: 8904490
    Abstract: A method and apparatus for a non-revealing do-not-contact list system in which a do-not-contact list of one-way hashed consumer contact information is provided to a set of one or more entities. The set of entities determine whether certain consumers wish to be contacted with the do-not-contact list without discovering actual consumer contact information.
    Type: Grant
    Filed: May 10, 2011
    Date of Patent: December 2, 2014
    Assignee: Unspam, LLC
    Inventor: Matthew B. Prince
  • Patent number: 8868579
    Abstract: The present invention is a method and system for searching for items on a computer network, such as the internet, based on a query and an exclusion specification comprising a specification of a characteristic of sources of the items, to create a list of identifiers of items relevant to the query that are not excluded by the exclusion specification. Such characteristics include measures of popularity of the sources of the items so that items from sources having popularity greater than the specified popularity may be excluded from the list.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: October 21, 2014
    Assignee: Exponential Labs Inc.
    Inventor: Sanjay Arora
  • Patent number: 8856157
    Abstract: Various embodiments of systems and methods for automatic obfuscation of sensitive data in a database schema are described herein. The technique uses static detection of sensitive data by application type, static detection by column name, and data profiling by examining a sample of the tables data from the database schema.
    Type: Grant
    Filed: August 23, 2011
    Date of Patent: October 7, 2014
    Assignee: Business Objects Software Limited
    Inventor: John O'Byrne
  • Patent number: 8856158
    Abstract: A method and system for a secured search. The method includes the steps of: receiving a search request from a searching user; determining search results to be returned to the searching user based on a security schema; and returning the search results to the searching user, where at least one of the steps is carried out by using a computer device.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Feng Cao, Chen Yang Wu
  • Patent number: 8812524
    Abstract: A method and a system for preserving privacy of a dataset are provided. In the method, a k-anonymity value with respect to a sensitive data field is determined according to at least one first quasi-identifier. Data entries in each group have the same value in the one or more fields of the first quasi-identifier and data entries in different groups have different values in the one or more fields of the first quasi-identifier. A first group and a second group among the plurality of groups are determined according to the reference number Kr, where the first group and the second group are merged into a merging group. The number of data entries in the merging group is not less than a reference number Kr. One or more fields of at least one first quasi-identifier is masked for the merging group.
    Type: Grant
    Filed: August 16, 2012
    Date of Patent: August 19, 2014
    Assignees: Industrial Technology Research Institute, International Business Machines Corporation
    Inventors: Ya-Ling Chen, Ci-Wei Lan, Tyrone W Grandison, Jen-Hao Hsiao, Li-Feng Tseng, Yi-Hui Chen
  • Patent number: 8805834
    Abstract: A data mashup system having information extraction capabilities for receiving multiple streams of textual data, at least one of which contains unstructured textual data. A repository stores annotators that describe how to analyze the streams of textual data for specified unstructured data components. The annotators are applied to the data streams to identify and extract the specified data components according to the annotators. The extracted data components are tagged to generate structured data components and the specified unstructured data components in the input data streams are replaced with the tagged data components. The system then combines the tagged data from the multiple streams to form a mashup output data stream.
    Type: Grant
    Filed: March 7, 2012
    Date of Patent: August 12, 2014
    Assignee: International Business Machines Corporation
    Inventors: Yunyao Li, Frederick Ralph Reiss, David Everett Simmen, Suresh Thalamati
  • Patent number: 8775449
    Abstract: Technology for a method for backing up and restoring mobile game application state across multiple devices is disclosed herein. The method includes running an instance of a game application at a first electronic device, determining a backup event that occurs in the first electronic device, wherein the backup event suggests a backup of application state data and the application state data represent an application state of the game application at the backup event, and transmitting the application state data of the game application to a remote storage service, in response to the backup event. A second electronic device can retrieve the application state data from the remote storage service and restore the game application state.
    Type: Grant
    Filed: February 5, 2014
    Date of Patent: July 8, 2014
    Assignee: Nextbit Systems Inc.
    Inventors: Justin Quan, Michael A. Chan, Tom Moss, Michael K. Fleming
  • Patent number: 8756703
    Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.
    Type: Grant
    Filed: March 5, 2008
    Date of Patent: June 17, 2014
    Assignee: NEC Europe Ltd.
    Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
  • Patent number: 8725714
    Abstract: Information management techniques for performing private information request are provided. Original information request entered on a personal computing device are obscured by a camouflaging engine. The obscured information request is then submitted to a search engine accessible over the Internet by the device. Subsequently, the search engine will generate search results based on the obscured information request. Upon completion of the search, a filtering engine on the device will filter the obscured search result based on the original entered information request, preferences or personal profile. The output of the filtering engine, reflecting the personalized result for the original information request, can be displayed on the device. The device could also include ways to receive advertisements from the search engine, or a third or an outside advertisement party. An advertisement filtering engine on the device filters the received advertisements and displays the filtered advertisements on the device.
    Type: Grant
    Filed: September 8, 2009
    Date of Patent: May 13, 2014
    Inventor: Chuan David Ai
  • Patent number: 8725762
    Abstract: Information is acquired over a network by acquiring an original request including a current search value that specifies information to be acquired from a database. It is determined whether the information to be acquired by the original request is singular with respect to a request previously issued by the information processing apparatus and stored in a request log in which a history of search values is registered. A diffusion request is generated including a dummy request to dilute singularity of an access log related to the current search value to the database issued by the information processing apparatus where the original request is determined to be singular with respect to the current search value, the dummy request being generated from a dummy value that provides a different search value requesting information different from the information to be acquired. The diffusion request is issued as a search request to the database over the network.
    Type: Grant
    Filed: July 7, 2010
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Shunsuke Ishikawa, Ryoji Kurosawa, Yuriko Nishikawa, Yoshinori Tahara
  • Patent number: 8725751
    Abstract: One embodiment relates to an apparatus for blocking or blurring unwanted image features. The apparatus includes at least a memory, a processor, a browsing application, and an image blocking component. The image blocking component is configured to block or blur images with unwanted image features before the images are displayed by the browsing application. Another embodiment relates to a process for blocking or blurring unwanted image features prior to displaying web pages. A web page including an image is received, but it is not displayed the image until after checking the image for unwanted image features. Image features are extracted from the image, and the extracted image features are compared against features in a customized image feature database. The image is displayed if no match is found during said comparison. The image is blocked or blurred if a match is found during said comparison. Other embodiments are also disclosed.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: May 13, 2014
    Assignee: Trend Micro Incorporated
    Inventors: Cheng-Jyun Lai, Wei-Chin Chen, Shih-Yun Chen
  • Patent number: 8682847
    Abstract: A method for accessing information in a replicated database includes receiving a request for information in a database. The request is associated with a table in the database. The table includes a plurality of identifiers each identifying a portion of the information in the table. The method also includes executing a logical structure associated with the table to produce a logical view of the table. The logical view contains at least a portion of the information from the table without containing the identifiers. The method further includes identifying the requested information in the logical view, and communicating the identified requested information in the logical view.
    Type: Grant
    Filed: August 25, 2005
    Date of Patent: March 25, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: William B. Zoltan, Sunny C. Venderbeck
  • Patent number: 8676818
    Abstract: A method for modeling a process includes receiving a plurality of graphs representing processes wherein for each graph. A sequence of process steps of the processes are represented as nodes and edges connecting pairs of nodes represent transitions between process steps. A numeric value representative of graph appearance for each of the plurality of received graphs is calculated. Each of the plurality of received graphs is stored within a tree-like data structure according to its corresponding numeric value. Each of the above steps is performed using a computer system.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Francisco Phelan Curbera, Paul T. Keyser, Rania Khalaf, Geetika Tewari Lakshmanan
  • Patent number: 8661047
    Abstract: A system for answering sets of queries on a set of private data while providing differential privacy protection is provided. The set of queries is received and applied to the set of private data to generate a set of results or answers. A geometric representation of the set of queries is generated. Example geometric representations include polytopes. Error values are generated for the set of queries using a K-norm mechanism based on values sampled from the geometric representation. The sampled values are added to the set of results to provide the differential privacy protection. By generating the error values based on the set of queries rather than the set of results or the set of private data, the amount of error added to the generated results to achieve a level of differential privacy protection is reduced.
    Type: Grant
    Filed: May 17, 2010
    Date of Patent: February 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Kunal Talwar, Moritz A. W. Hardt
  • Patent number: 8661423
    Abstract: A system and method for automated determination of quasi-identifiers for sensitive data fields in a dataset are provided. In one aspect, the system and method identifies quasi-identifier fields in the dataset based upon a static analysis of program statements in a computer program having access to—sensitive data fields in the dataset. In another aspect, the system and method identifies quasi-identifier fields based upon a dynamic analysis of program statements in a computer program having access to—sensitive data fields in the dataset. Once such quasi-identifiers have been identified, the data stored in such fields may be anonymized using techniques such as k-anonymity. As a result, the data in the anonymized quasi-identifiers fields cannot be used to infer a value stored in a sensitive data field in the dataset.
    Type: Grant
    Filed: April 30, 2010
    Date of Patent: February 25, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Hiralal Agrawal, Munir Cochinwala, Joseph R. Horgan
  • Patent number: 8639825
    Abstract: An electronic product code information service (EPCIS) interface is provided, where the EPCIS interface is capable of allowing one or more accessing applications residing on a variety of systems and associated with a plurality of enterprises to receive EPC-related data. Also provided is an enterprise profile for each enterprise that is allowed to receive the EPC-related data. An enterprise is authenticated based on its enterprise profile. A query is performed to generate a result set that is within an extent permitted by access authorization associated with the authenticated enterprise. The result set is then provided to the EPCIS accessing application of that enterprise.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: January 28, 2014
    Assignee: SAP AG
    Inventor: Steve Winkler
  • Publication number: 20140019467
    Abstract: A disclosed method includes: generating a predetermined number of sets, wherein each of the sets includes n mask values and n is the number of attributes to be masked in a database; selecting, for each record of a plurality of records, which includes attribute values of the attributes to be masked, one set of the predetermined number of sets; and performing, for each record of the plurality of records, a predetermined operation for the selected one set of the n mask values and the attribute values of the attributes to be masked in the record to generate masked data for the plurality of records.
    Type: Application
    Filed: September 18, 2013
    Publication date: January 16, 2014
    Applicant: FUJITSU LIMITED
    Inventors: Kouichi ITOH, Hiroshi TSUDA, Mebae USHIDA
  • Patent number: 8631500
    Abstract: The present disclosure is directed to systems, methods, and computer-readable storage media for generating data and data sets that are resistant to minimality attacks. Data sets having a number of tuples are received, and the tuples are ordered according to an aspect of the tuples. The tuples can be split into groups of tuples, and each of the groups may be analyzed to determine if the group complies with a privacy requirement. Groups that satisfy the privacy requirement may be output as new data sets that are resistant to minimality attacks.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: January 14, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Graham Cormode, Tiancheng Li, Divesh Srivastava
  • Patent number: 8615520
    Abstract: Methods, devices and systems for moderating and policing voluntarily established transparency regarding past and present, and personal and professional relationships via online networking services. Identity of a person or commercial entity is verified before registration as a user. Each user is permitted a single profile. A profile includes a record of all relationships entered in the profile, some of which may be hidden by user. Each user is capable of linking his profile to profiles of other consenting users. Owner of a profile may flag inaccurate information on other linked profiles. The reliability or value of information in a profile is measured as a function of duration of existence of profile, transparency of the information in the profile, periods of inactivation, and number of times the profile is correctly flagged. A code is generated and used to allow gradual exposing of the profile of a user to his prospective contacts.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: December 24, 2013
    Inventor: Farzan Fallah
  • Patent number: 8612460
    Abstract: A first content entity and one or more associated second content entities are presented to one or more arbiters. Arbiter determinations relating to the association of at least one of the second content entities with the first content entity are received. A determination as to whether the at least one of the second content entities is to be disassociated from the first content entity based on the arbiter determinations can be made.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: December 17, 2013
    Assignee: Google Inc.
    Inventors: Mayur Datar, Ashutosh Garg
  • Patent number: 8600972
    Abstract: Systems and methods are provided for document searching. In one implementation, a computer-implemented method provides keyword searching. The method may receive a plurality of noisy keywords for a document collection. A server may generate tokens for a plurality of keywords in the document collection and merge the tokens to create an index. A search query may be received. The search query may include at least one search phrase. For the at least one search phrase, an indication may be received from a user specifying to perform one of a noisy phrase search or a noiseless phrase search. The method may search the index for the at least one search phrase based on the indication received from the user.
    Type: Grant
    Filed: February 23, 2012
    Date of Patent: December 3, 2013
    Assignee: LexisNexis, a division of Reed Elsevier Inc.
    Inventor: David James Miller
  • Patent number: 8590034
    Abstract: A system (101) for implementing redaction rules in compliance with an organization's privacy policy, where the system intercepts messages between an information source (103) and an information destination (102), modifies the message contents based on redaction rules (106) and forwards the redacted contents over to the client. The system also maintains a record of the redacted information and updates the contents of any message submitted by the client (102) in order to maintain database integrity.
    Type: Grant
    Filed: September 21, 2009
    Date of Patent: November 19, 2013
    Inventors: Basit Hussain, Saeed Rajput
  • Patent number: 8590049
    Abstract: A method and apparatus for providing an anonymization of data are disclosed. For example, the method receives a request for anonymizing, wherein the request comprises a bipartite graph for a plurality of associations or a table that encodes the plurality of associations for the bipartite graph. The method places each node in the bipartite graph in a safe group and provides an anonymized graph that encodes the plurality of associations of the bipartite graph, if a safe group for all nodes of the bipartite graph is found.
    Type: Grant
    Filed: August 17, 2009
    Date of Patent: November 19, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang
  • Publication number: 20130282723
    Abstract: A system and method are provided for maintaining a historical record of anonymized user profile data for mobile device users. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations and user profiles for users of mobile devices. The central system processes the current locations and the user profiles of the users over time to maintain a historical record of anonymized user profile data by location. By anonymizing the user data, privacy of the users of the mobile devices is maintained. The central system may then use the historical record of anonymized user profile data to respond to historical requests. The historical requests may be made by users of the mobile devices, subscribers, and/or third party services.
    Type: Application
    Filed: June 17, 2013
    Publication date: October 24, 2013
    Inventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings, Sean T. Purdy
  • Patent number: 8554779
    Abstract: Methods, systems and apparatus, including computer program products, for generating respective random weights for identified audience members matching an audience specification in order to mask the behavior of individuals. The mean value of the random weights for large audience results approaches one so that a sum of the weights approximates a count of the matching records.
    Type: Grant
    Filed: April 24, 2009
    Date of Patent: October 8, 2013
    Assignee: Google Inc.
    Inventor: John D. Batali