-
公开(公告)号:US11449674B2
公开(公告)日:2022-09-20
申请号:US16860857
申请日:2020-04-28
IPC分类号: G06F40/205 , G06F21/62 , G06F40/117 , G06F40/169
摘要: One embodiment of the invention provides a method for utility-preserving text de-identification. The method comprises generating corresponding processed text for each text document by applying at least one natural language processor (NLP) annotator to the text document to recognize and tag privacy-sensitive personal information corresponding to an individual, and replacing some words in the text document with some replacement values. The method further comprises determining infrequent terms occurring across all processed texts, filtering out the infrequent terms from the processed texts, and selectively reinstating to the processed texts at least one of the infrequent terms that is innocuous. The method further comprises generating a corresponding de-identified text document for each processed text by anonymizing privacy-sensitive personal information corresponding to an individual in the processed text to an extent that preserves data utility of the processed text and conceals the individual's personal identity.
-
公开(公告)号:US20220222370A1
公开(公告)日:2022-07-14
申请号:US17146837
申请日:2021-01-12
IPC分类号: G06F21/62
摘要: Examples described herein provide a computer-implemented method that includes scanning, by a processing device, a code dependency list and a hierarchy of a core code component. The method further includes pulling, by the processing device, data of the core code using the scanned code dependency list. The method further includes extracting, by the processing device, information from the data for each dependency. The method further includes scoring, by the processing device, the information between versions to detect a likelihood of user data posture changes. The method further includes enforcing, by the processing device, a compensating control for the core code.
-
公开(公告)号:US11580951B2
公开(公告)日:2023-02-14
申请号:US17452563
申请日:2021-10-27
摘要: One embodiment of the invention provides a method for speaker identity and content de-identification under privacy guarantees. The method comprises receiving input indicative of privacy protection levels to enforce, extracting features from a speech recorded in a voice recording, recognizing and extracting textual content from the speech, parsing the textual content to recognize privacy-sensitive personal information about an individual, generating de-identified textual content by anonymizing the personal information to an extent that satisfies the privacy protection levels and conceals the individual's identity, and mapping the de-identified textual content to a speaker who delivered the speech. The method further comprises generating a synthetic speaker identity based on other features that are dissimilar from the features to an extent that satisfies the privacy protection levels, and synthesizing a new speech waveform based on the synthetic speaker identity to deliver the de-identified textual content. The new speech waveform conceals the speaker's identity.
-
公开(公告)号:US20210334455A1
公开(公告)日:2021-10-28
申请号:US16860857
申请日:2020-04-28
IPC分类号: G06F40/205 , G06F40/169 , G06F40/117 , G06F21/62
摘要: One embodiment of the invention provides a method for utility-preserving text de-identification. The method comprises generating corresponding processed text for each text document by applying at least one natural language processor (NLP) annotator to the text document to recognize and tag privacy-sensitive personal information corresponding to an individual, and replacing some words in the text document with some replacement values. The method further comprises determining infrequent terms occurring across all processed texts, filtering out the infrequent terms from the processed texts, and selectively reinstating to the processed texts at least one of the infrequent terms that is innocuous. The method further comprises generating a corresponding de-identified text document for each processed text by anonymizing privacy-sensitive personal information corresponding to an individual in the processed text to an extent that preserves data utility of the processed text and conceals the individual's personal identity.
-
公开(公告)号:US10956015B1
公开(公告)日:2021-03-23
申请号:US16567421
申请日:2019-09-11
发明人: Rohit Ranchal , Xu Wang , Paul R. Bastide
IPC分类号: G06F3/048 , G06F3/0484 , H04M1/725 , G06F3/14 , G06F3/0481
摘要: An embodiment of the invention may include a method, computer program product and computer system for visual trigger notification. The method, computer system, and computer program product may include a computing device which may receive a user selection of a display portion of an application on a first display unit and user input defining a visual trigger policy for the selected display portion of the application. The visual trigger policy may define a visual trigger and a user notification in response to detecting the visual trigger. The computing device may capture image data of the selected display portion of the application on the first display unit and analyze the captured image data to detect the visual trigger, The computing device may, in response to detecting the visual trigger, generate the user notification defined by the visual trigger policy.
-
公开(公告)号:US20210072885A1
公开(公告)日:2021-03-11
申请号:US16567421
申请日:2019-09-11
发明人: Rohit Ranchal , Xu Wang , Paul R. Bastide
IPC分类号: G06F3/0484 , H04M1/725 , G06F3/14 , G06F3/0481
摘要: An embodiment of the invention may include a method, computer program product and computer system for visual trigger notification. The method, computer system, and computer program product may include a computing device which may receive a user selection of a display portion of an application on a first display unit and user input defining a visual trigger policy for the selected display portion of the application. The visual trigger policy may define a visual trigger and a user notification in response to detecting the visual trigger. The computing device may capture image data of the selected display portion of the application on the first display unit and analyze the captured image data to detect the visual trigger, The computing device may, in response to detecting the visual trigger, generate the user notification defined by the visual trigger policy.
-
公开(公告)号:US11217223B2
公开(公告)日:2022-01-04
申请号:US16860840
申请日:2020-04-28
摘要: One embodiment of the invention provides a method for speaker identity and content de-identification under privacy guarantees. The method comprises receiving input indicative of privacy protection levels to enforce, extracting features from a speech recorded in a voice recording, recognizing and extracting textual content from the speech, parsing the textual content to recognize privacy-sensitive personal information about an individual, generating de-identified textual content by anonymizing the personal information to an extent that satisfies the privacy protection levels and conceals the individual's identity, and mapping the de-identified textual content to a speaker who delivered the speech. The method further comprises generating a synthetic speaker identity based on other features that are dissimilar from the features to an extent that satisfies the privacy protection levels, and synthesizing a new speech waveform based on the synthetic speaker identity to deliver the de-identified textual content. The new speech waveform conceals the speaker's identity.
-
公开(公告)号:US20210335337A1
公开(公告)日:2021-10-28
申请号:US16860840
申请日:2020-04-28
摘要: One embodiment of the invention provides a method for speaker identity and content de-identification under privacy guarantees. The method comprises receiving input indicative of privacy protection levels to enforce, extracting features from a speech recorded in a voice recording, recognizing and extracting textual content from the speech, parsing the textual content to recognize privacy-sensitive personal information about an individual, generating de-identified textual content by anonymizing the personal information to an extent that satisfies the privacy protection levels and conceals the individual's identity, and mapping the de-identified textual content to a speaker who delivered the speech. The method further comprises generating a synthetic speaker identity based on other features that are dissimilar from the features to an extent that satisfies the privacy protection levels, and synthesizing a new speech waveform based on the synthetic speaker identity to deliver the de-identified textual content. The new speech waveform conceals the speaker's identity.
-
-
-
-
-
-
-