23 patents
Utility
Identity graph data structure with entity-level opt-ins
28 Nov 23
A system and method for propagating an opt-in through an identity graph fully honors opt-in requests without otherwise modifying the graph data structure.
Mike Dobrovich, Erin Boelkens
Filed: 12 Aug 21
Utility
Methods and systems of a matching platform for entitites
28 Nov 23
In one aspect, a computerized method for implementing a matching platform for entities includes the step of, in a real-time data processing layer, implementing a real-time linking on an input event stream.
Shirish Kumar
Filed: 13 May 21
Utility
Search term extraction and optimization from natural language text files
18 Jul 23
A system and method for extracting search terms for corresponding data elements from a natural language document identifies meaningful words within the context; identifies and structures the keywords; expounds on the keywords to optimize the search results; and captures the most relevant data elements from the corresponding database.
Chivon Powers, Tzung-Han Lai, Michael Anderson
Filed: 4 Oct 18
Utility
Salting text in database tables, text files, and data feeds
4 Apr 23
A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data.
Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
Filed: 21 Apr 21
Utility
Data watermarking and fingerprinting system and method
21 Feb 23
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data.
Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
Filed: 6 Dec 21
Utility
Data watermarking and fingerprinting system and method
31 Jan 23
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data.
Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
Filed: 6 Dec 21
Utility
Asserted relationship data structure
13 Sep 22
A system and method for transforming input data in a data graph is structured in such a way that it does not destroy embedded contextual data yet also keeps the number of edges in the data graph sufficiently small in number that computation with respect to the data in the data graph is feasible with existing computational resources on extremely large graph sets.
Adam Zimmerman, Dwayne Collins, Pavan Marupally
Filed: 6 Apr 21
Utility
Change fingerprinting for database tables, text files, and data feeds
9 Aug 22
Change fingerprinting is applied to a text file, database table, or data feed to determine the timeframe in which an identified “wild file” was generated, even when its file creation meta-data is missing.
Arthur Coleman, Martin Rose, Christina Tsz Ling Leung
Filed: 8 Feb 17
Utility
System and method for identifying leaked data and assigning guilt to a suspected leaker
31 May 22
A system and method for identifying a leaked data file and assigning guilt to one or more suspected leakers proceeds through a plurality of levels.
Arthur Coleman, Chivon Powers, Christina Tsz Ling Leung, Martin Rose, Matt LeBaron
Filed: 9 Mar 18
Utility
Anonymized global opt-out
8 Mar 22
A system for managing opt-out instructions includes a global opt-out service and opt-out store in communication with regional subsystems.
James Q. Arnold
Filed: 16 Jul 19
Utility
Data watermarking and fingerprinting system and method
4 Jan 22
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data.
Arthur Coleman, Martin Rose, Christina Tsz Ling Leung, Michael Anderson
Filed: 18 Mar 17
Utility
Salting text and fingerprinting in database tables, text files, and data feeds
30 Nov 21
A system and method for salting and fingerprinting database tables, text files, data feeds, and the like, first resorts the data according to a field or fields in the data set.
Charles Zinsmeyer, Tsz Ling Christina Leung, Matt LeBaron, Martin Rose, Ray Kraus, Arthur Coleman, Michael Anderson
Filed: 16 Feb 17
Utility
Statistical fingerprinting of large structure datasets
2 Nov 21
A system and method for statistical fingerprinting of structured datasets begins by dividing the structured database into groups of data subsets.
Arthur Coleman, Tsz Ling Christina Leung, Martin Rose, Chivon Powers, Natarajan Shankar
Filed: 7 Sep 18
Utility
Mixed data fingerprinting with principal components analysis
26 Oct 21
Principal components analysis is applied to data sets to fingerprint the dataset or to compare the dataset to a “wild file” that may have been constructed from data found in the dataset.
Martin Rose, Christina Tsz Ling Leung
Filed: 20 Nov 17
Utility
Partner encoding of anonymous links to protect consumer privacy
26 Oct 21
A method and system for bringing together online and offline advertising uses partner-encoded anonymous links that are associated with consumer data.
Thierry Roullier, Dana S. Robbins, Linda Young, Scott Jones, Mike Zukerman, Russell Della Rosa
Filed: 5 Sep 14
Utility
System and method for improving computational efficiency of consumer databases utilizing household links
19 Oct 21
A system and method for the creation of household links (HHLs) associates each household with particular consumers associated with a consumer link (CL) and an address link (AL).
Amresh Mohanlal, W. Dwayne Collins
Filed: 28 May 19
Utility
Distributed node cluster for establishing a digital touchpoint across multiple devices on a digital communications network
31 Aug 21
A distributed node cluster architecture within a parallel computing environment provides for the association of individuals and households accessing a communications network through multiple electronic communications devices with a particular digital touchpoint or touchpoints used when communicating on the network.
Amresh Mohanlal, W. Dwayne Collins, Pavan Roy Marupally
Filed: 15 May 18
Utility
Computing environment node and edge network to optimize data identity resolution
13 Jul 21
A system and method utilizes a data integration input routine receive raw data set(s) from identity data storage media resources, generate an edge type from each data set, and store the edge type from each data set in a first temporary storage media, from which a graph construction module retrieves the edge types and combines them to produce a consolidated edge store, a search of which is used to find graph component paths.
Matthew C. Hagy
Filed: 12 Sep 18
Utility
Reducing duplicate data
18 May 21
A machine and method of reducing duplicate transmission data employs one more more digests to track field/value pairs that have previously been distributed.
James Arnold, Joshua Lang
Filed: 25 Feb 19
Utility
Salting text in database tables, text files, and data feeds
11 May 21
A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data.
Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
Filed: 22 Dec 16