Patent Application Titled “System And Method For On-Demand Data Cleansing” Published Online (USPTO 20210034585)

Patent Application Titled “System And Method For On-Demand Data Cleansing” Published Online (USPTO 20210034585)

2021 FEB 18 (NewsRx) — By a News Reporter-Staff News Editor at Insurance Daily News — According to news reporting originating from Washington, D.C., by NewsRx journalists, a patent application by the inventors Downs, Brian J. (Scottsdale, AZ); Moore, John K. (Phoenix, AZ); Iniguez, Antonio (Phoenix, AZ), filed on July 29, 2020, was made available online on February 4, 2021.

The assignee for this patent application is Myndshft Technologies Inc. (Dover, Delaware, United States).

Reporters obtained the following quote from the background information supplied by the inventors: “Advances in technologies such as machine learning and artificial intelligence have made data more valuable than ever. This increased value has been accompanied by an increase in the amount of data being captured and stored. The benefits available from collecting and analyzing this data, particularly sensitive data, are unfortunately accompanied by increased opportunity for abuse. Efforts have been made to mandate the protection of particularly sensitive information, such as health related data. For example, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) dictates how sensitive data such as personally identifiable information (PII) and protected health information (PHI) is to be handled, what portion of that data can be shared, and who it can be shared with. Similarly, General Data Protection Regulation (GDPR) in the European Union (EU) dictates how sensitive data may be used, handled, or both, in the EU.

“Compliance with regulations such as HIPAA and GDPR, as well as a growing uneasiness in the public regarding the sharing and use of personal information, stands as a barrier that slows and sometimes completely halts the beneficial use of the collected data. Having to redact portions of records before sharing them increases the cost of creating models and performing research, and also increases the overhead for monetization of the information.”

In addition to obtaining background information on this patent application, NewsRx editors also obtained the inventors’ summary information for this patent application: “According to an aspect, a system for on-demand data cleansing, may comprise a processor, and a volatile memory communicatively coupled to the processor and comprising a data object having a plurality of data fields, each field having a tag and a value. A cleansing module may be stored in the volatile memory and executed by the processor. The cleansing module may comprise a library having a plurality of tag-operation pairs, each tag-operation pair comprising a library tag and an associated operation, the cleansing module configured to receive a pointer locating the data object within volatile memory. Each data field of the plurality of data fields may be further configured to: look up the tag of the data field among the library tags of the plurality of tag-operation pairs of the library, and execute the operation paired with the matching library tag on the value of the data field, modifying the value of the data field while it is stored in volatile memory. For each tag-operation pair of the library, the operation may define logic whose execution will bring information described by the paired library tag into compliance with a policy. The cleansing module may be configured to execute the operation by evaluating, at runtime, a string defining operation logic and stored in the tag-operation pair. The looking up of the tag within the library, and the executing of the operation may be performed in near real-time.

“The system for on-demand data cleansing may further comprise one or more features, such as wherein executing the operation on the value of the data field comprises one of overwriting at least some of the value within the volatile memory and replacing the value within the data object with a reformatted value. Executing the operation on the value of the data field may comprise: generating a new value based upon the value yet having less specificity, and replacing the value with the new value within the data object stored in volatile memory. The value may comprise an image, and generating the new value based upon the value may comprise using machine vision to detect any faces within the image, and generating a new image having all detected faces obscured. The value may comprise a geolocation, and generating the new value based upon the value may comprise resolving the geolocation within a geographic information system and generating a geographic descriptor of lesser specificity than the geolocation. A network interface may be communicatively coupled to the processor and a network, an API may be configured to receive instructions through the network interface, wherein the API may be configured to receive a new tag-operation pair through the network interface, and the new tag-operation pair may be stored within the library. The API may be further configured to receive the data object through the network interface, store the data object in the volatile memory, and pass the pointer locating the data object within the volatile memory to the cleansing module. The cleansing module may be further configured to select one library from a plurality of libraries, each library implementing a different policy.

“According to another aspect, a system for on-demand data cleansing, may comprise receiving a pointer locating a data object within a volatile memory, the data object comprising a plurality of data fields, each data field having a tag and a value. For each data field of the plurality of data fields of the data object, the following may occur: looking up the tag of the data field within a library stored in the volatile memory, the library comprising a plurality of tag-operation pairs each having a library tag and an associated operation; finding the tag-operation pair having a matching library tag; and executing the operation stored in the library and paired with the matching library tag on the value of the data field, and modifying the value of the data field while the value is stored in volatile memory. For each tag-operation pair of the library, the operation may define logic whose execution brings information described by the paired library tag into compliance with a policy.

“The system for on-demand data cleansing may further comprise one or more of the following. Wherein the executing the operation comprises evaluating, at runtime, a string defining operation logic and stored in the tag-operation pair. Wherein the looking up of the tag within the library, the finding of the tag-operation pair, and the executing of the operation is performed in near real-time. Wherein executing the operation on the value of the data field comprises one of overwriting at least some of the value within the volatile memory and replacing the value within the data object with a reformatted value. Wherein executing the operation on the value of the data field comprises generating a new value based upon the value yet having less specificity, and replacing the value with the new value within the data object stored in volatile memory. Wherein the value comprises an image, and wherein generating the new value based upon the value comprises using machine vision to detect any faces within the image, and generating a new image having all detected faces obscured. Wherein the value comprises a geolocation, and wherein generating the new value based upon the value comprises resolving the geolocation within a geographic information system and determining a geographic descriptor of lesser specificity than the geolocation. The system may further comprise receiving a new tag-operation pair through an API, and storing the new tag-operation pair within the library. The system may further comprise receiving the data object through an API and storing the data object in the volatile memory, wherein the pointer is received in response to the data object being received through the API. The policy may be HIPAA. The system may further comprise selecting one library from a plurality of libraries, each library implementing a different policy.

“Aspects and applications of the disclosure presented here are described below in the drawings and detailed description. Unless specifically noted, it is intended that the words and phrases in the specification and the claims be given their plain, ordinary, and accustomed meaning to those of ordinary skill in the applicable arts. The inventors are fully aware that they can be their own lexicographers if desired. The inventors expressly elect, as their own lexicographers, to use only the plain and ordinary meaning of terms in the specification and claims unless they clearly state otherwise and then further, expressly set forth the ‘special’ definition of that term and explain how it differs from the plain and ordinary meaning. Absent such clear statements of intent to apply a ‘special’ definition, it is the inventors’ intent and desire that the simple, plain and ordinary meaning to the terms be applied to the interpretation of the specification and claims.

“The inventors are also aware of the normal precepts of English grammar. Thus, if a noun, term, or phrase is intended to be further characterized, specified, or narrowed in some way, then such noun, term, or phrase will expressly include additional adjectives, descriptive terms, or other modifiers in accordance with the normal precepts of English grammar. Absent the use of such adjectives, descriptive terms, or modifiers, it is the intent that such nouns, terms, or phrases be given their plain, and ordinary English meaning to those skilled in the applicable arts as set forth above.

“Further, the inventors are fully informed of the standards and application of the special provisions of 35 U.S.C. .sctn. 112(f). Thus, the use of the words ‘function,’ ‘means’ or ‘step’ in the Detailed Description or Description of the Drawings or claims is not intended to somehow indicate a desire to invoke the special provisions of 35 U.S.C. .sctn. 112(f), to define the invention. To the contrary, if the provisions of 35 U.S.C. .sctn. 112(f) are sought to be invoked to define the inventions, the claims will specifically and expressly state the exact phrases ‘means for’ or ‘step for’, and will also recite the word ‘function’ (i.e., will state ‘means for performing the function of [insert function]’), without also reciting in such phrases any structure, material or act in support of the function. Thus, even when the claims recite a ‘means for performing the function of . . . ‘ or ‘step for performing the function of . . . ,’ if the claims also recite any structure, material or acts in support of that means or step, or that perform the recited function, then it is the clear intention of the inventors not to invoke the provisions of 35 U.S.C. .sctn. 112(f). Moreover, even if the provisions of 35 U.S.C. .sctn. 112(f) are invoked to define the claimed aspects, it is intended that these aspects not be limited only to the specific structure, material or acts that are described in the preferred embodiments, but in addition, include any and all structures, materials or acts that perform the claimed function as described in alternative embodiments or forms of the disclosure, or that are well known present or later-developed, equivalent structures, material or acts for performing the claimed function.

“The foregoing and other aspects, features, and advantages will be apparent to those artisans of ordinary skill in the art from the DESCRIPTION and DRAWINGS, and from the CLAIMS.”

The claims supplied by the inventors are:

“1. A system for on-demand data cleansing, comprising: a processor; a volatile memory communicatively coupled to the processor and comprising a data object having a plurality of data fields, each field having a tag and a value; cleansing module stored in the volatile memory and executed by the processor, the cleansing module comprising a library having a plurality of tag-operation pairs, each tag-operation pair comprising a library tag and an associated operation, the cleansing module configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field of the plurality of data fields: look up the tag of the data field among the library tags of the plurality of tag-operation pairs of the library; and execute the operation paired with the matching library tag on the value of the data field, modifying the value of the data field while it is stored in volatile memory; wherein, for each tag-operation pair of the library, the operation defines logic whose execution will bring information described by the paired library tag into compliance with a policy; wherein the cleansing module is configured to execute the operation by evaluating, at runtime, a string defining operation logic and stored in the tag-operation pair; and wherein the looking up of the tag within the library, and the executing of the operation is performed in near real-time.

“2. The system of claim 1, wherein executing the operation on the value of the data field comprises one of overwriting at least some of the value within the volatile memory and replacing the value within the data object with a reformatted value.

“3. The system of claim 1, wherein executing the operation on the value of the data field comprises: generating a new value based upon the value yet having less specificity; and replacing the value with the new value within the data object stored in volatile memory.

“4. The system of claim 3, wherein the value comprises an image, and wherein generating the new value based upon the value comprises: using machine vision to detect any faces within the image; and generating a new image having all detected faces obscured.

“5. The system of claim 3, wherein the value comprises a geolocation, and wherein generating the new value based upon the value comprises resolving the geolocation within a geographic information system and generating a geographic descriptor of lesser specificity than the geolocation.

“6. The system of claim 1, further comprising: a network interface communicatively coupled to the processor and a network; an API configured to receive instructions through the network interface; wherein the API is configured to: receive a new tag-operation pair through the network interface; and store the new tag-operation pair within the library.

“7. The system of claim 6, wherein the API is further configured to receive the data object through the network interface, store the data object in the volatile memory, and pass the pointer locating the data object within the volatile memory to the cleansing module.

“8. The system of claim 1, wherein the policy is HIPAA.

“9. The system of claim 1, wherein the cleansing module is further configured to select one library from a plurality of libraries, each library implementing a different policy.

“10. A method for on-demand data cleansing, comprising: receiving a pointer locating a data object within a volatile memory, the data object comprising a plurality of data fields, each data field having a tag and a value; for each data field of the plurality of data fields of the data object: looking up the tag of the data field within a library stored in the volatile memory, the library comprising a plurality of tag-operation pairs each having a library tag and an associated operation; finding the tag-operation pair having a matching library tag; and executing the operation stored in the library and paired with the matching library tag on the value of the data field, modifying the value of the data field while the value is stored in volatile memory; wherein, for each tag-operation pair of the library, the operation defines logic whose execution brings information described by the paired library tag into compliance with a policy.

“11. The method of claim 10, wherein the executing the operation comprises evaluating, at runtime, a string defining operation logic and stored in the tag-operation pair.

“12. The method of claim 10, wherein the looking up of the tag within the library, the finding of the tag-operation pair, and the executing of the operation is performed in near real-time.

“13. The method of claim 10, wherein executing the operation on the value of the data field comprises one of overwriting at least some of the value within the volatile memory and replacing the value within the data object with a reformatted value.

“14. The method of claim 10, wherein executing the operation on the value of the data field comprises: generating a new value based upon the value yet having less specificity; and replacing the value with the new value within the data object stored in volatile memory.

“15. The method of claim 14, wherein the value comprises an image, and wherein generating the new value based upon the value comprises: using machine vision to detect any faces within the image; and generating a new image having all detected faces obscured.

“16. The method of claim 14, wherein the value comprises a geolocation, and wherein generating the new value based upon the value comprises resolving the geolocation within a geographic information system and determining a geographic descriptor of lesser specificity than the geolocation.

“17. The method of claim 10, further comprising: receiving a new tag-operation pair through an API; storing the new tag-operation pair within the library.

“18. The method of claim 10, further comprising receiving the data object through an API and storing the data object in the volatile memory, wherein the pointer is received in response to the data object being received through the API.

“19. The method of claim 10, wherein the policy is HIPAA.

“20. The method of claim 10, further comprising selecting one library from a plurality of libraries, each library implementing a different policy.”

For more information, see this patent application: Downs, Brian J.; Moore, John K.; Iniguez, Antonio. System And Method For On-Demand Data Cleansing. Filed July 29, 2020 and posted February 4, 2021. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220210034585%22.PGNR.&OS=DN/20210034585&RS=DN/20210034585

(Our reports deliver fact-based news of research and discoveries from around the world.)