Patent Issued for Coordinated de-identification of a dataset across a network (USPTO 11093645)
2021 SEP 08 (NewsRx) -- By a
Patent number 11093645 is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors:
“1. Technical Field
“Present invention embodiments relate to methods, systems and computer program products for receiving at a network device a dataset with masked direct identifiers from a client’s site and performing further data de-identification of the dataset to protect indirect (or quasi) identifiers and sensitive attributes. In particular, a server receives from a customer site a person-specific dataset with masked direct identifiers, discovers indirect/quasi identifiers and sensitive attributes within the dataset, and performs further compatible data de-identification techniques to protect the indirect identifiers and the sensitive attributes of the dataset.
“2. Discussion of the Related Art
“Data anonymization is a data sanitization process for protecting personally identifiable information in datasets, including both direct identifiers that can directly identify individuals such as, for example, full names of individuals, social security numbers, customer numbers, patient identifiers, phone numbers, credit card numbers, etc., as well as indirect identifiers, which are non-direct identifier attribute values in a dataset, a combination of which may be unique for some individuals and could be used to re-identify these individuals. For example, a five-digit zip code of a home address, a gender, and a date of birth of individuals are well-known quasi-identifiers because a combination of their values has been shown to be unique for a large number of
“A third type of identifier in a dataset is sensitive attributes, which are non-direct, non-quasi-identifier attributes having values that are sensitive and should therefore not be linked to specific individuals. As an example, individuals may not want to be linked with disease, salary, or sensitive location information in a dataset (e.g., church, hospital, etc.). Preventing linkage of individuals to their sensitive attribute values blocks sensitive information disclosure attacks and goes beyond protection against subject re-identification. However, preventing sensitive information disclosure is usually part of data de-identification efforts.
“Personal data that have been “sufficiently anonymized” such as, for example, anonymized data that satisfies the Health Insurance Portability and Accountability Act (HIPAA) requirements in
“Data owners are hesitant to allow highly sensitive personal data such as, for example, customers’ transactions, purchase records, healthcare information, etc., to leave their premises (even in encrypted form using state-of-the-art encryption algorithms) for uploading to a cloud platform for de-identification and additional processing to support business use cases, analytics and other uses. Before allowing highly sensitive personal data to leave their premises, data owners are increasingly using existing in-house solutions for performing data de-identification, which are limited to the support of data masking algorithms and in most cases are unable to adequately protect data to meet legal requirements.”
In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “According to a first aspect of embodiments of the invention, a method of de-identifying a dataset is provided. A network device receives information from a client device, wherein the information includes a list of at least one group of techniques selected from groups consisting of a group of data masking techniques and a group of pseudonymization techniques, associated configuration options that are supported by the client device and a description of a dataset to be de-identified. The network device determines a first technique from the at least one group of techniques and associated configuration options supported by the client device and the network device. The network device receives a dataset from the client device, wherein the dataset is produced at the client device by applying the determined first technique and the associated configuration options to corresponding attributes. A de-identification technique is applied to the dataset at the network device to produce a resulting set of de-identified data, wherein the data de-identification technique is coordinated with the first technique and configuration options to further de-identify the dataset.
“According to a second aspect of embodiments of the invention, a system for de-identifying data of a dataset is provided. The system includes at least one processor and at least one memory having instructions embodied therein such that the at least one processor is configured to perform: receiving information from a client device, wherein the information includes a list of at least one group of techniques selected from groups consisting of a group of data masking techniques and a group of data pseudonymization techniques, and associated configuration options that are supported by the client device and a description of a dataset to be de-identified; determining a first technique from the at least one group of techniques and configuration options that are supported by the client device and the system; receiving a dataset from the client device, wherein the dataset is produced at the client device by applying the determined first technique and the associated configuration options to corresponding data attributes; and applying a de-identification technique to the dataset to produce a resulting set of de-identified data, wherein the de-identification technique is coordinated with the first technique and the associated configuration options to de-identify the masked dataset.
“According to a third aspect of embodiments of the invention, a computer program product including at least one computer readable storage medium having computer readable program code embodied therewith for execution on at least one processor is provided. The computer readable program code is configured to be executed by the at least one processor to perform: receiving information from a client device, wherein the information includes a list of at least one group of techniques selected from groups consisting of a group of data masking techniques and a group of data pseudonymization techniques, and associated configuration options that are supported by the client device and a description of a dataset to be de-identified; determining a first technique from the at least one group of techniques, associated configuration options supported by the client device and a system including the at least one processor; receiving a dataset from the client device, wherein the dataset is produced at the client device by applying the determined first technique and the associated configuration options to corresponding data attributes; and applying a de-identification technique to the dataset to produce a resulting set of de-identified data, wherein the de-identification technique is coordinated with the first technique and the configuration options to de-identify the dataset.”
The claims supplied by the inventors are:
“1. A method of de-identifying a dataset comprising: receiving information from a client device at a network device, wherein the information includes a list of at least one group of techniques supported by the client device and selected from groups consisting of a group of data masking techniques and a group of data pseudonymization techniques, configuration options associated with the at least one group of techniques supported by the client device, and a first data dictionary of a dataset to be de-identified, the first data dictionary including attribute names, attribute types and associated metadata including attribute descriptions of attributes of the dataset; mapping at the network device attributes of the first data dictionary to attributes of a second data dictionary included in the network device by matching attributes of the first data dictionary with attributes of the second data dictionary based on corresponding attribute names and attribute descriptions, the second data dictionary being different from the first data dictionary and including attribute names, attribute types and associated metadata including attribute descriptions of attributes that appear in each ingested data source, the second data dictionary further including a characterization of all direct identifiers from the each ingested data source leading to recognition of direct identifiers of the dataset; determining at the network device first techniques and associated configuration options mutually supported by the client device and the network device based on the at least one group of techniques, wherein the determined first techniques are compatible with de-identification techniques of the network device and selected from a group of data masking techniques and data pseudonymization techniques; sending the determined first techniques to the client device; receiving at the network device the dataset from the client device, wherein the dataset is produced at the client device by applying one or more of the determined first techniques and the associated configuration options to corresponding attributes; and applying a de-identification technique to the dataset at the network device to produce a resulting set of de-identified data, wherein the de-identification technique is compatible with the applied one or more first techniques and the associated configuration options to de-identify the dataset.
“2. The method of claim 1, wherein the network device resides within a cloud computing environment.
“3. The method of claim 1, wherein the attributes of the first data dictionary include one or more direct identifiers.
“4. The method of claim 3, wherein the applying the de-identification technique further comprises: identifying one or more sets of quasi-identifiers within the dataset; and applying the de-identification technique to the identified one or more sets of quasi-identifiers to produce the resulting set of de-identified data.
“5. The method of claim 4, wherein the identifying the one or more sets of quasi-identifiers comprises: analyzing values of attributes of each record to find unique combinations of the values; and identifying attributes of the unique combinations of the values as the one or more sets of quasi-identifiers.
“6. The method of claim 1, further comprising: applying further protection to the resulting set of de-identified data at the network device to improve a privacy level by extending the one or more first techniques applied at the client device using compatible techniques supported at the network device; identifying at least one sensitive attribute within the dataset; and applying the de-identification technique to the at least one identified sensitive attribute to produce the resulting set of de-identified data.”
URL and more information on this patent, see: Gkoulalas-Divanis, Aris. Coordinated de-identification of a dataset across a network.
(Our reports deliver fact-based news of research and discoveries from around the world.)



Springfield firefighters demand COVID merit pay; Mayor Domenic Sarno calls union leadership a ‘political pawn’
Homeland Security Department; Federal Emergency Management Agency (F.R. Page 48238) – Meeting
Advisor News
- CFP Board appoints K. Dane Snowden as CEO
- TIAA unveils ‘policy roadmap’ to boost retirement readiness
- 2026 may bring higher volatility, slower GDP growth, experts say
- Why affluent clients underuse advisor services and how to close the gap
- America’s ‘confidence recession’ in retirement
More Advisor NewsAnnuity News
- Insurer Offers First Fixed Indexed Annuity with Bitcoin
- Assured Guaranty Enters Annuity Reinsurance Market
- Ameritas: FINRA settlement precludes new lawsuit over annuity sales
- Guaranty Income Life Marks 100th Anniversary
- Delaware Life Insurance Company Launches Industry’s First Fixed Indexed Annuity with Bitcoin Exposure
More Annuity NewsHealth/Employee Benefits News
- Investigators from Stanford University Target Economics (Exogenous Exits, Market Structure, and Equilibrium Contracts In Health Care): Economics
- Reports Outline Opioids Findings from University of Pennsylvania School of Nursing (Buprenorphine dosing patterns and treatment outcomes for patients with opioid use disorder insured by Medicaid in Philadelphia): Opioids
- Reports Outline Managed Care Findings from Harvard University (Community-Entry Home Health Made Up Nearly Half Of Home Health Episodes And Spending In Traditional Medicare, 2017-21): Managed Care
- Reports Outline Insurance Study Results from RAND Corporation (The Unaffordability of Affordable Care Act Health Insurance Plans): Insurance
- Recent Reports from National Yang Ming Chiao Tung University Highlight Findings in Women’s Health (Health-care utilization after domestic violence: A nationwide study in Taiwan comparing individuals with and without intellectual disability): Women’s Health
More Health/Employee Benefits NewsLife Insurance News