51 patents
Utility
Asserted Relationships Matching in an Identity Graph Data Structure
11 Jan 24
An identity graph is partitioned into records pertaining to entities with similar data.
W. Dwayne Collins, Pavan Roy Marupally
Filed: 29 Oct 21
Utility
Client-Side Device Bloom Filter Mapping
30 Nov 23
Targeted messages are sent from a server to a client device through an app installed on the client device, but which operates without sending any personal data from the client device to any remote device.
Ian Meyers
Filed: 12 Oct 21
Utility
Methods and systems of a matching platform for entitites
28 Nov 23
In one aspect, a computerized method for implementing a matching platform for entities includes the step of, in a real-time data processing layer, implementing a real-time linking on an input event stream.
Shirish Kumar
Filed: 13 May 21
Utility
Identity graph data structure with entity-level opt-ins
28 Nov 23
A system and method for propagating an opt-in through an identity graph fully honors opt-in requests without otherwise modifying the graph data structure.
Mike Dobrovich, Erin Boelkens
Filed: 12 Aug 21
Utility
Privacy Manager for Connected TV and Over-the-Top Applications
23 Nov 23
A system for processing privacy permissions for consumers utilizing vendor applications allows for recording, storing, and retrieving consent transactions performed by the users (data subjects) in data schemas.
Niels Baarsma, Martijn Eindhoven
Filed: 13 Oct 21
Utility
Data Analytics Privacy Platform with Quantified Re-Identification Risk
2 Nov 23
The present invention is directed to a differential privacy platform in which the privacy risk of a computation can be objectively and quantitatively calculated.
David Gilmore, Philip Stubbings, Chi Lang Ngo, Maciej Makowski
Filed: 17 Sep 21
Utility
System and Method for Matching into a Complex Data Set
26 Oct 23
A system and method for efficiently matching into an extremely large data set uses two data stores.
Adam Zimmerman, Pavan Roy Marupally, Joseph Shannon Duncan
Filed: 28 Sep 21
Utility
Analytics Platform for Federated Private Data
26 Oct 23
A data analytics platform provides secure access to federated data for advanced analytics and machine learning.
David Gilmore, Jason Michael Bradshaw, Maciej Makowski, Marcin Andrzej Adamowski, Chi Lang Ngo, Philip Stubbings, Grzegorz Gawron
Filed: 17 Sep 21
Utility
Evolutionary Analysis of an Identity Graph Data Structure
5 Oct 23
An environment measures the value of data sources as input to an identity graph in terms of the impact of the inclusion or removal of the data sources.
W. Dwayne Collins, Pavan Roy Marupally
Filed: 11 Aug 21
Utility
System and Method for Exchange of Data without Sharing Personally Identifiable Information
5 Oct 23
A system provides for a client to receive enhancement data without having personally identifiable information leave its systems.
Collin Turney
Filed: 6 Aug 21
Utility
Fault Tolerant Big Data Processing
28 Sep 23
A method for improving fault tolerance of MapReduce computing systems processing extremely large data sets employs a custom mapper script that outputs the results to the shuffle and reduce processes.
Adam Zimmerman, Pavan Marupally, Joseph Shannon Duncan
Filed: 2 Aug 21
Utility
Machine for Analysis of Entity Resolution Data Graphs Using Peer Data Structures
17 Aug 23
A machine analyzes an entity resolution data graph using a curated peer review set of data structures.
W. Dwayne Collins
Filed: 29 Apr 21
Utility
Graph Data Structure Edge Profiling in MapReduce Computational Framework
3 Aug 23
A method for edge profiling within a data graph measures the impact that a particular type of edge has on a data graph.
Connor Taffe
Filed: 28 May 21
Utility
Search term extraction and optimization from natural language text files
18 Jul 23
A system and method for extracting search terms for corresponding data elements from a natural language document identifies meaningful words within the context; identifies and structures the keywords; expounds on the keywords to optimize the search results; and captures the most relevant data elements from the corresponding database.
Chivon Powers, Tzung-Han Lai, Michael Anderson
Filed: 4 Oct 18
Utility
Salting text in database tables, text files, and data feeds
4 Apr 23
A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data.
Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
Filed: 21 Apr 21
Utility
Data watermarking and fingerprinting system and method
21 Feb 23
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data.
Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
Filed: 6 Dec 21
Utility
Identity Graph Data Structure with Entity-Level Opt-Ins
16 Feb 23
A system and method for propagating an opt-in through an identity graph fully honors opt-in requests without otherwise modifying the graph data structure.
Mike Dobrovich, Erin Boelkens
Filed: 12 Aug 21
Utility
Data watermarking and fingerprinting system and method
31 Jan 23
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data.
Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
Filed: 6 Dec 21
Utility
Cyber Security System and Method
12 Jan 23
A cyber security system creates a behavioral framework for evaluating the cyber security of an organization's computer systems based on its employees.
Rachael Boyle, Lucy Huang, Lisa Cramer
Filed: 8 Mar 21
Utility
Multi-Controller Opt Out System and Method
5 Jan 23
A system and method for processing a multiple data controller workflow fully honors data subject opt-outs but nevertheless takes advantage of the synergy of the combined data from multiple controllers to improve the effectiveness of messaging.
Eloise Dietz, Chris Fetterolf, Joshua Lang, Henry Hartwell Swaffield
Filed: 19 Nov 20