`
`InnovationQ Plus - |P.com
`
` Visuais
`
`
`
`
`
`for different workfiows, data situ
`ihe system scans: da-
`.
`., .
`r
`.
`
`
`
`
`:1“. ntimng daaasets, and to enat
`. of senSitwe 0:2,.
`
`CURRENT A35R3NEES: PER/STAR LTD
`WOZOiflSHC-YM 5 WE“) APPUCATEONS E OZN-‘JV—ZOW
`
`
`
`‘
`\\‘\\\\\ “
`
`‘\\
`‘“ ““““““““““‘\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
`
`
`
`(IHBNA APPLICATEONS E GEiJ‘JIA‘i—ZQH
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`'
`VAC it.’ “bki
`m u” Wgfiws y 9 “an“
`PRNWAR LTD (4}
`DifiwlTAL DOORS NC (34)
`:‘VHTSUB!SHi E EC RSCH LA...
`DATAGT (10)
`HASAN SYED KAM RAN (165
`NEUST \R NC (2)
`AMAZ i TECH h 'C (865
`...r»l.A.r»lT(‘.\l\ALf.‘.C. .L .I.r7. 1.5.1 ...............................
`
`(5)
`
`
`
`v
`
`
`A :Iysterri ailows the identificatien ‘
`‘id protectien 0'? sensitive c'ata in a rultipie ways, which can be tembined
`
`
`‘ns OF USE C359"
`
`= to iderit
`for different workfiows, data situ
`Erie system scans: da-
`sarzsitive data or
`
`
`
`
`
`
`If:
`
`
`tii'ying (3?:
`in
`assets, and to enat
`. of sensitive 0:2,.
`he anonyi‘ni.;
`CURRENT ASSEGNEES: FEB/STAR LTD
`EE’334334MA1 EPD APPLECATiC-NS i 06wMAE~2€E133
`
`3- Camputei‘ impiemented privacy engineering system art-1i method
`
`“ 'stem aliC-ws tc- ident.
`
`y and protect sensitive Lia-:3 in many ways, and for different working flow, c'ata
`
`
`
`
`cae Or use-case, the mode can he combnwii'he systs I 5 an data set reaiizes sensitive or identificatieri data
`
`ion by ha: idiing the data t-3 identify sensitive data sari.
`set axiom/min:
`CURRENT ASSEGNEES: PREVETAR LTD
`CN‘:€C-S)N€.‘§45A
`
`, T
`
`.
`.
`.
`..
`,
`,.
`.
`.
`4 System and metharj to identify, tiassaty and monetize informatiah as an intangibie
`asset and a productisn medei based thereon
`
`
`
`
`‘ ’ 'J
`gibie ass 't (LAC)
`
`
`" int?mar
`“ ‘ssfie
`at] and system identifies ant
`The me
`'
`digita‘
`
`
`
`ons and ir‘ '
`
`taticns Enterprise
`in a mmputei 5'
`em by danership charac '
`ettaai pmpeity r-APA) dass
`
`
`
`and rzoiveriierprise Lia-:3 celieuions are searched based upon an expanded.”
`CURRENT ASSIGNEES: DiCii'iAi. DOORS ENC
`USZC‘SGOMGQEB E US APPLECATiC-NS E mam-23m
`
`34 Differentiaily private aggregate ciassifiar fur muitipie databases
`Emhmimerrts o‘ the irwenticn disdc " ‘
`'
`method far 0:
`
`
`' fining a ditteremia “' §_ ":vate
`system and "
`.
`
`
`Cu
`
`
`
`b
`
`5 ‘ wherein eav. ’ database in the set at databases is associated with a
`aggregate classi:
`'r a se-z 0'? da
`cias
`sgfier and a noise value, wherein the ciassifier and the noise value are determined...
`CURRENT ASSIGNEESI METSUBES
`
`ELEC RSCH LAB ENC
`USZG'SZOMSQZZ US APPLECATiC-NS E 07-JLEN-2C-EZ
`
`5 Laai‘rsing with trarss‘formed data
`' sure ielates to tear "
`This I
`‘
`g with transformed data such as determining m "
`
`
`
`
`
`" itipie data sampiee Each 5-:
`the muiiipie data sam ‘ ‘s corrinrise" one or more :
`
`
`CiESa: ie: that data sample. A processor determines each of the mu.
`tat-Ea,”
`CURRENT ASSIGNEESI DPJAET
`U3201?b"37382’ 1 US AF’F‘U-‘LATEGNS E 23-NOV»24§17
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`https://iq.ip.com/discover
`
`1/1
`
`
`
`10/10/2019
`
`lnnovationQ Plus - lP.com
`
`
`
`Visuais
`
`
`a fitters
`
`5: Egg“
`
`
`
`1- Secure and Private Management of i-ieaithcare Databases for Data Mining
`
`
`
`
`There he. oeen a 'tremeridcus growth in heaiti: data coilec‘tiori since the deveiopmer:t of Eiettrcnic Meditai
`
`
`
`V‘urposes. D many
`Record (EMR) systems, Such coiiected data - .thiiei'
`.iared and analyzed for Ci
`
`
`and sharing have ,
`“AT-G a big- concern as it threatens...
` i Symposium on C-
`' EEK CONFERENCE 0’: -_iUN-2Cv‘a$ i 201:? BEEE 28th internatic-
`
`vita! Systems (F'ageis):1331~1j6)
`
`auter-Based
`
`
`
`
`
`
`
`Differeritiaiiy Private Distributed flats Anaiysis
`
`i with mu ipie en 2 rivacy has been.”
`
`
`
`
` . Qne exampie of
`
`
`
`EEEE CONFER£NCES 0‘. NOV-2026 i 2016 HEEE 2nd internatianai Conference on Coiiabm‘ation arid
`putihg (CBC?- (Page/s}: 2124118}
`
`3 Ariana/1L: Locaiiy Private Machine Learning ever a Network (if Peers
`
`
`
`
`
`We present Anew/1i.
`'i syste
`nera
`an over a network of peers. Our 905:! is to
`n.3,, privacy .pregewing model
`
`aiiew a group at users to {Graeme eriatigl'i data to generate usefui machine learning inodeis ‘ivithau‘t reveanrig
`
`private iriforrrt
`tion. in our setting, each peer has 3. singie raw 0i featurized data“
`EEIEBE (ZONSEREENCBES E
`t3‘-»£)CT—2€C—1'f
`l 201‘? iiEEIE internatiana! (Zanferehce or- !)ata Sirlenre and Advanced
`
`
`
`4. Expiode: Ari Extensible Piatfarrn tar Dii‘ter'entiaiiy Private Data Anaiysis
`
`
`
`an and rereived great attentirjn
`emerged as a pcpuiar standard fer privacy prot.
`i privacy (DP) ii
`Di-‘ierer
`
`
`n find DP v:
`
`from the research communitv. i-lowe
`practitioners c
`nhersorrae to impieinen‘tl since it requires
`
`additionai protocois (e.g,, for random _ .d response, neise addition) and.
`SEE CONFERENCES i GLUE-2016 i 2036 535 16th internatic-riai Conference on Data Mining
`Workahnps \ LDtvEW) (F'age(s): 13630—13433)
`
` £83
`
`5-
`
`iriPi‘ivate Digging: Enabling Tree-based Distributed flats Mining with Differentiai
`Privacy
`
` - : 3 mining i’ia'
`
`
`"super crui'ichei'" t-3 discover
`erairjed the major breaktl'irougi’i in data ai'ieiysis, sen/in
`,.
`
`
`ipiicatiorts, the mile
`in of big
`hidden inl‘ormati
`hie knowiedge in big data systerris. For m
`
`
`
`
`iriv
`as various parties who are interested in pooiing their pix e
`data usat
`»
`Eiii CONFEIRENCSS5(i1~APR-20181 EEESE ENFOCCEE‘A 3018 - iEiEEI Conference on (Zamputer
`
`i.
`Lorrimanications (Pagers): 2087-2095)
`
`Relevance
`
`
`
`
`
`
`
`
`rr. 'v'l
`
`
`
`S‘ubiicatisn Date
`
`
`
`
`
`6- Differentiai private rand-3m farest
`
` niormatiori about an individuai who are their
`Organizations be it pi'i ate or public often coiiect persaii
`
`ive which has to be secured
`cmei‘s or
`s. The persona! information Of an individuai is private and 5?:
`
`
`from data minim igorithrn which an adversary may appiy tr: get ac
`tr: the,"
`EEEE CONFERENCES 0‘. 633-2014 E 21314
`
`
`
`
`https://iq.ip.com/discover
`
`1/1
`
`
`
`10/10/2019
`
`InnovationQ Plus - |P.com
`
`
`
`\v‘
`
`dinereritiai privacy random _.
`
`+ ~13 minds
`
`(B filters
`
`g E ii
`
`Visuais
`
`
` /”"
`
`1- Differential private randnrri fairest
`
`
`,tioris be it
`
`Orqani;
`ate or publit often coiiett perstin
`
`
`
`dual is private and 5e
`The personal ihicrmaticn of an in
`
`
`from clam mininci . igoritnm which an adversary may anpiy tr: get at
`' EEK CONFERENCE 01-5EP-2014 5 21314 internatic-nai Conference on Advances in C
`
`Cnmmunicatiena and iriforrriatiaa (KIA-‘32!) (i’ageis): 2623<263<D
`
`nlorinatiori about an ind
`
`
`
`
`
`tive which has to be secured
`
`me! who are their
`
`ting.
`
`
`
`
`
`Relevance
`
`/
`
`\\\\\
`\\\\\\
`
`\\\
`
`\“
`
`
`
`e ‘\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
`
`Random ferest algnrithrri under differential privacy
`Trying to soive the risk a? data privacy disclosure in ciassil‘icatic-ri pretess, a Randorri Farest aigerithrri under
`diiterentiai privacy named DPR
`2% proposed in the pan
`in the process of building decision 'tr-3-3 l
`.
`
`
`
`algoritiin’: first disturbed the protest) of teature selection and attribute 4
`
`.E; X:
`EEE CONFERlENCES 0‘. OCT-294? l 2017 lEEE Wth lmernationai Conference on Communication
`Technology rliIiIT) (Pagers): 19131-1905?-
`
`
`
`algorithm based on differential privacy is preposed t0 protect the“,
`
`DPRF: A Differential Privacy Pretection Random Forest
`
`
`
`r- tor r.‘
`ifiC
` s. has
`
`rch hotsn-s in current data mining.
`ion algorith
`Providing privacy protei
`
`in this paper. aiilei'eritiai privacy is applied to the rariotcin forest tiassil‘itatiori algoi
`'l’im, and a. random rarest
`
`”I iEIElE PEREOEJE'IIALS E i314AN~2019E ilEEEE Access
`
`S‘ublicatisn Date
`
`
`
`4- Differentially Private Randdrn Fame? with High Utility
`,
`,
`“in active focus or the research com
`*v‘ing data irning has becen
`
`
` example; it
`e dig
`
`: per
`mm
`
`
`m
`
`:on malt
`financial records otter eriern‘u’nm value
`tar rislz' predicts-3n and (let
`
`iEEE CONFERENCES i 01~NOV~2015 l 2015 iEEE iraterriatinnai Conference on Beta Mining (Pages): 335?
`
`
`
`5- Analysis and Research Based on Differential Privacy Pretection Reiaterl Algerithms
`Aiming at the problem tiat tr;
`
`renticil privaty protection model is pronosed. ThL
`any becktirtitind kritiwledge, a d
`
`garivacy, and then intretluce; tiie relevant tletinitie
`
` ElES CONFEIRENCSS l (i1~i)EC-2C‘-8 5 3201896“. internatinnai ESyniprisrum on Parallel Architectures,
`
`
`ie '
`
`ritrsdtites tiie
`
`Kerrie a research hotspot iri
`
` the field i " " Le greedy decision forest
`
`
`
`algorithm C:
`at, -preserving data,"
`'r'rl Ff:
`_
`EEE CONFERlENCES Ge-APR-Zéi‘} [ lCASSP 2019 - 2019 EEEE international Coniererite on Acoustics,
`Speetn and signal Pracessing (iCASSP) (Page(a}: 2672~2§7Cvi
`
`azionai privacy protettion rnet':0rjs can not tone with malicious analysis under
`
`
`7 Software Defect Prediction i‘v’iotlei Enaririg Under Differential Privacy v
`
`
`........... llTI. fl JJfKGSD'l’. F“ .xfil’llRff—L 3F:-
`rt. .n redii
`mnx‘fiif‘iPiJI-sea
`rouiden‘thu .................
`
`
`https://iq.ip.com/discover
`
`1/1
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site