-
公开(公告)号:US20180052894A1
公开(公告)日:2018-02-22
申请号:US15783306
申请日:2017-10-13
Applicant: SEBASTIAN PROBST EIDE , PAUL FRANCIS , CRISTIAN DANIEL BERNEANU , SASA JURIC , PAWEL OBROK
Inventor: SEBASTIAN PROBST EIDE , PAUL FRANCIS , CRISTIAN DANIEL BERNEANU , SASA JURIC , PAWEL OBROK
CPC classification number: G06F16/2462 , G06F7/582 , G06F16/221 , G06F16/2457 , G06F21/6227 , G06F21/6254 , H04L9/0662
Abstract: An anonymizing method for a database system is provided. The method includes receiving a query, identifying one or more attack components in the query, computing one or more noise elements from the one or more attack components, and computing fixed noise or fixed thresholds from the one or more noise elements.
-
公开(公告)号:US20170329873A1
公开(公告)日:2017-11-16
申请号:US15366449
申请日:2016-12-01
Applicant: SEBASTIAN PROBST EIDE , PAUL FRANCIS , CRISTIAN DANIEL BERNEANU , SASA JURIC , PAWEL OBROK
Inventor: SEBASTIAN PROBST EIDE , PAUL FRANCIS , CRISTIAN DANIEL BERNEANU , SASA JURIC , PAWEL OBROK
CPC classification number: G06F16/90335 , G06F7/582 , G06F21/6227 , G06F21/6254
Abstract: A computer system contains a module configured to receive a query, to request rows and columns from a data store, to add or remove rows in such a way that combinations of queries cannot be used to infer information about individuals in the data store. The module executes a statistical computation over the adjusted rows and columns to produce a perturbed answer so that neither the perturbed answer alone, nor repeats of the perturbed answer can be used to infer information about individuals in the data store.
-
公开(公告)号:US11194823B2
公开(公告)日:2021-12-07
申请号:US15783306
申请日:2017-10-13
Applicant: Sebastian Probst Eide , Paul Francis , Cristian Daniel Berneanu , Sasa Juric , Pawel Obrok
Inventor: Sebastian Probst Eide , Paul Francis , Cristian Daniel Berneanu , Sasa Juric , Pawel Obrok
IPC: G06F16/00 , G06F16/2458 , H04L9/06 , G06F16/22 , G06F16/2457 , G06F21/62 , G06F7/58
Abstract: An anonymizing method for a database system is provided. The method includes receiving a query, identifying one or more attack components in the query, computing one or more noise elements from the one or more attack components, and computing fixed noise or fixed thresholds from the one or more noise elements.
-
-