Patent application number | Description | Published |
20130013641 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a method for intelligently providing consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 01-10-2013 |
20130014278 | INTELLIGENT DECISION SUPPORT FOR CONSENT MANAGEMENT - Embodiments of the invention relate to a system and computer program product to intelligently provide consent to access a record in a shared pool of resources. Tools are provided to support policies to address and maintain restrictive access of a designated record, both with respect to local and non-local rules and regulations, as well as personal restrictions pertaining to personal and discretionary sharing decisions. | 01-10-2013 |
20130325881 | Supplementing Structured Information About Entities With Information From Unstructured Data Sources - According to a present invention embodiment, a system supplements structured information within a data system for entities based on unstructured data. The system analyzes a document with unstructured data and extracts attribute values from the unstructured data for one or more entities of the data system. Entity records with structured information are retrieved from the data system based on the extracted attribute values. Entity references for corresponding entities of the data system are constructed based on a comparison of the retrieved entity records and the extracted attribute values. The entity references are linked to the corresponding entities within the data system, wherein the entity references include extracted attributes from the unstructured data for corresponding linked entities. Embodiments of the present invention further include a method and computer program product for supplementing structured information within a data system for entities based on unstructured data in substantially the same manner described above. | 12-05-2013 |
20130325882 | SUPPLEMENTING STRUCTURED INFORMATION ABOUT ENTITIES WITH INFORMATION FROM UNSTRUCTURED DATA SOURCES - A method for supplementing structured information within a data system for entities based on unstructured data analyzes a document with unstructured data and extracts attribute values from the unstructured data for one or more entities of the data system. Entity records with structured information are retrieved from the data system based on the extracted attribute values. Entity references for corresponding entities of the data system are constructed based on a comparison of the retrieved entity records and the extracted attribute values. The entity references are linked to the corresponding entities within the data system, with the entity references including extracted attributes from the unstructured data for corresponding linked entities. | 12-05-2013 |
20140279947 | MASTER DATA GOVERNANCE PROCESS DRIVEN BY SOURCE DATA ACCURACY METRIC - A method, apparatus, and computer program product for processing data is disclosed. In one aspect of the invention, a computer implemented method comprises receiving, on one or more computers, a record having one or more attributes from a source system. The method also comprises measuring, on one or more computers, a data accuracy of the received record as compared to a golden record stored in a master data management system. One or more remediation actions are performed, on one or more computers, to enforce improvements to the measured data accuracy of the received record in the source system. In one or more embodiments, measurement of data accuracy comprises calculating, on one or more computers, an accuracy score defined by a closeness of the received record to the golden record. | 09-18-2014 |
20140281729 | ANALYSIS OF A SYSTEM FOR MATCHING DATA RECORDS - Embodiments disclosed herein provide a system and method for analyzing an identity hub. Particularly, a user can connect to the identity hub, load an initial set of data records, create and/or edit an identity hub configuration locally, analyze and/or validate the configuration via a set of analysis tools, including an entity analysis tool, a data analysis tool, a bucket analysis tool, and a linkage analysis tool, and remotely deploy the validated configuration to an identity hub instance. In some embodiments, through a graphical user interface, these analysis tools enable the user to analyze and modify the configuration of the identity hub in real time while the identity hub is operating to ensure data quality and enhance system performance. | 09-18-2014 |
20150039611 | DISCOVERY OF RELATED ENTITIES IN A MASTER DATA MANAGEMENT SYSTEM - Methods and arrangements for discovering entity types for a set of records. A set of records is input, with each record comprising attributes with associated attribute values. The records are grouped into candidate entity types in view of at least one of: the attribute values of the records, at least one domain ontology and at least one dimension hierarchy. An interestingness measure of each candidate entity type is calculated, via estimating interestingness based on at least one factor selected from the group consisting of: a correlation between attribute values of records, a number of attributes, a log of queries issued to a server, and an average group size for candidate entity types. At least one candidate entity type is validated based on the calculated interestingness measures. Other variants and embodiments are broadly contemplated herein. | 02-05-2015 |
20160034703 | DATA PRIVACY EMPLOYING A K-ANONYMITY MODEL WITH PROBABALISTIC MATCH SELF-SCORING - According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity for the data and generates a threshold for data records within the data based on the desired duplication rate. The system produces a data record score for each data record based on comparisons of attributes for that data record, compares the data record scores to the threshold, and controls access to the data records based on the comparison. Embodiments of the present invention further include a method and computer program product for protecting data in substantially the same manners described above. | 02-04-2016 |
20160034715 | DATA PRIVACY EMPLOYING A K-ANONYMITY MODEL WITH PROBABALISTIC MATCH SELF-SCORING - According to one embodiment of the present invention, a system for protecting data determines a desired duplication rate based on a level of desired anonymity for the data and generates a threshold for data records within the data based on the desired duplication rate. The system produces a data record score for each data record based on comparisons of attributes for that data record, compares the data record scores to the threshold, and controls access to the data records based on the comparison. Embodiments of the present invention further include a method and computer program product for protecting data in substantially the same manners described above. | 02-04-2016 |
20160034749 | Facial Image Bucketing with Expectation Maximization and Facial Coordinates - Facial image bucketing is disclosed, whereby a query for facial image recognition compares the facial image against existing candidate images. Rather than comparing the facial image to each candidate image, the candidate images are organized or clustered into buckets according to their facial similarities, and the facial image is then compared to the image(s) in most-likely one(s) of the buckets. The organizing uses particular selected facial features, computes distance between the facial features, and selects ones of the computed distances to determine which facial images should be organized into the same bucket. | 02-04-2016 |