- San Francisco CA, US Tsz Ling Christina Leung - Foster City CA, US Michael Anderson - Conway AR, US Matt LeBaron - Salinas CA, US Martin Rose - Superior CO, US
A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field, with the value of the Key Character identifying the position within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
Salting Text And Fingerprinting In Database Tables, Text Files, And Data Feeds
- Conway AR, US Tsz Ling Christina Leung - Foster City CA, US Matt LeBaron - Salinas CA, US Martin Rose - Superior CO, US Ray Kraus - Rochester NY, US Arthur Coleman - Carmel Valley CA, US Michael Anderson - Conway AR, US
International Classification:
G06F 7/08 G06F 16/11 G06F 21/60
Abstract:
A system and method for salting and fingerprinting database tables, text files, data feeds, and the like, first resorts the data according to a field or fields in the data set. A salting recipe is selected and applied to the sorted data. A fingerprint of the data is captured after sorting and salting. The data is then restored to its original order before being sent to a trusted third party. Because the data owner retains information concerning the sorting sorting sonar technique, salting technique, and the fingerprint, the data owner can reconstruct the unsalted file from the salted file, and can determine if a wild file contains data from the data file. The salting is difficult to detect by the bad actor, even if the bad actor is aware that the data has been salted.
System And Method For Identifying Leaked Data And Assigning Guilt To A Suspected Leaker
- San Francisco CA, US Chivon Powers - Burlingame CA, US TSz Ling Christina Leung - Foster City CA, US Martin Rose - Superior CO, US Matt LeBaron - San Juan Bautista CA, US
International Classification:
H04N 21/258 H04N 21/234 H04N 21/8358 G06F 21/16
Abstract:
A system and method for identifying a leaked data file and assigning guilt to one or more suspected leakers proceeds through a plurality of levels. At a first level, primary watermark detection occurs. Data is inserted into a subset of data to determine correlation with data in the suspected leaked file. The guilt probability that results is then weighted based on the number of bits matched. In a second level, another search process is performed for detecting additional salt-related patterns. The guilt score is then computed for every detected recipient identifier for the suspected leaked data file, and the relative guilt of these recipients is weighted. In a third layer, the statistical distribution of data in the suspected leaked file is compared with that of corresponding data in the reference files. After this layer is complete, the average of guilt scores across each of the layers is calculated.
Data Watermarking And Fingerprinting System And Method
- Little Rock AR, US Martin Rose - Superior CO, US Christina Tsz Ling Leung - Foster City CA, US Michael Anderson - Conway AR, US
International Classification:
G06F 21/16 G06N 20/00
Abstract:
A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
Salting Text In Database Tables, Text Files, And Data Feeds
Arthur COLEMAN - Carmel Valley CA, US Tsz Ling Christina LEUNG - Foster City CA, US Michael ANDERSON - Conway AZ, US Matt LEBARON - Salinas CA, US Martin ROSE - Superior CO, US - Conway AR, US
International Classification:
G06F 21/16 G06F 21/62 G06F 21/60
Abstract:
A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field to represent a binary 0 or 1, with the value of the Key Character identifying the bit position of the binary 0 or 1 within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
Interactive Marketing Simulation System And Method
- Little Rock AR, US Brently Barrow - Little Rock AR, US Eric Joshua Stuart - Conway AR, US Martin Richard Rose - Superior CO, US Terry Talley - Conway AR, US
International Classification:
G06Q 10/06 G06N 5/04 G06Q 30/02 G06F 17/50
Abstract:
An interactive web-based marketing simulation game relying on a proprietary body of knowledge (BoK), techniques and methods allows marketing business leaders to simulate the likely outcomes arising from strategic choices made by the user or by management. A tool enabling modification to create evidence-based, objectively validated modified user data to increase the confidence in the predictability of the outcomes arising from strategic choices enables anonymous conversations between users through comments, questions and feedback. The result is a management planning and decision support tool capable of suggesting to the user that the user activate certain specific initiatives in a specific order to achieve desired outcomes within a desired timeframe.