Privacy firewall
S Nagasundaram, S Aissi - US Patent 9,665,722, 2017 - Google Patents
3, 1999 9, 1999 9, 1999 12, 1999 1, 2000 3, 2000 12, 2000 5, 2001 5, 2001 6, 2001 T/2001
12, 2001 1, 2002 5, 2002 T/2002 T/2002 T/2003 10, 2003 6, 2004 10, 2004 4, 2005 5/2005 …
12, 2001 1, 2002 5, 2002 T/2002 T/2002 T/2003 10, 2003 6, 2004 10, 2004 4, 2005 5/2005 …
Consent handling during data harvesting
AS Yadgiri, R Alapati - US Patent 10,268,838, 2019 - Google Patents
The described technologies can be used for consent handling during data harvesting. In one
example, a method can include receiving social media data associated with a user identifier …
example, a method can include receiving social media data associated with a user identifier …
Privacy firewall
S Nagasundaram, S Aissi - US Patent 10,204,227, 2019 - Google Patents
Embodiments of the invention relate to systems and methods for providing an anonymization
engine. One embodiment of the present invention relates to a method comprising receiv ing …
engine. One embodiment of the present invention relates to a method comprising receiv ing …
Maintaining Data Privacy in a Shared Data Storage System
BACKGROUND 0004 Data stored in network storage systems may include personal
identifiable information (PII) such as a person's name, address, phone number, social …
identifiable information (PII) such as a person's name, address, phone number, social …
Management of drone operations and security in a pervasive computing environment
T Lemmey, S Vonog - US Patent 10,839,089, 2020 - Google Patents
A method to provide negotiation control to data such that a person or entity can negotiate the
use of data gathered beyond what is needed for a particular use by a third party transaction …
use of data gathered beyond what is needed for a particular use by a third party transaction …
Generation method and device for generating anonymous dataset, and method and device for risk evaluation
YL Chen, DJ Yin, KY Hung - US Patent 9,129,117, 2015 - Google Patents
An anonymous dataset generation method comprises following steps. A critical attribute set
and a quasi-identifier (QID) set are acquired, and one of the critical attribute and the quasi …
and a quasi-identifier (QID) set are acquired, and one of the critical attribute and the quasi …
System and method for stack crawl testing and caching
F Burton, P Andersen, M Stanek - US Patent 9,274,923, 2016 - Google Patents
BACKGROUND In a computing architecture utilizing stack-based memory allocation, stacks
may reference regions within a memory where data is added/removed in a last-in-first-out (" …
may reference regions within a memory where data is added/removed in a last-in-first-out (" …
Mathematical method for performing homomorphic operations
S Trepetin, M Reston - US Patent 9,946,810, 2018 - Google Patents
The present invention relates generally to a system and method of querying an anonymized
database. More particularly, the invention provides a method and system for querying an …
database. More particularly, the invention provides a method and system for querying an …
System and method of analyzing encrypted data in a database in near real-time
S Trepetin, M Reston - US Patent 8,626,749, 2014 - Google Patents
The present invention relates generally to a system and method of querying an anonymiZed
database. More particu larly, the invention provides a method and system for query ing an …
database. More particu larly, the invention provides a method and system for query ing an …
Systems and methods for anonymizing log entries
M Spertus, WE Sobel - US Patent 10,326,772, 2019 - Google Patents
The disclosed computer-implemented method for anonymizing log entries may include (1)
detecting a data pattern in a group of log entries documenting events performed by at least …
detecting a data pattern in a group of log entries documenting events performed by at least …