Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity information de-identification device

An anonymous, information-rich technology, applied in computer security devices, digital data information retrieval, instruments, etc., to achieve the effect of reducing operating costs

Active Publication Date: 2013-01-23
HITACHI LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since all candidates exceeding the threshold are output, it is necessary to select the anonymized data to be used, and it is not possible to automate the means of determining the usefulness of the anonymized data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information de-identification device
  • Identity information de-identification device
  • Identity information de-identification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] refer to figure 1 , a configuration example of an apparatus for realizing the technique of Embodiment 1 will be described.

[0054] figure 1 It is an example of configuring a device on a computer. exist figure 1 Here, the computer 100 is, for example, an arbitrary information processing device such as a PC (Personal Computer), a server, or a workstation. The computer 100 has a CPU (Central Processing Unit) 101 , a memory 102 , a storage 103 , an input device 104 , an output device 105 , a communication device 106 , and the like. These are all connected to each other via an internal communication line 107 such as a bus.

[0055]The storage 103 is, for example, a storage medium such as a CD-R (Compact Disc Recordable), a DVD-RAM (Digital Versatile Disk Random Access Memory), or a silicon disk, and a drive device HDD (Hard Disk Drive) for the storage medium. The storage 103 stores a personal information table 131, an anonymity information table 132, minimum equivalent...

Embodiment 2

[0139] Next, Example 2 will be described.

[0140] Embodiment 2 improves the usefulness of data. Hereinafter, when the second embodiment is described, the same symbols are given to the same configurations as those of the above-mentioned first embodiment, and description thereof will be omitted. In addition, most of the operations of the second embodiment are the same as those of the first embodiment. The same symbols are given to the operations of this part, and explanations are omitted.

[0141] First, refer to Figure 13 A configuration example of the computer 100 according to the second embodiment will be described.

[0142] exist Figure 13 In this case, the memory 103 of the computer 100 has a program 1331 instead of the program 151 . The program 1331 is loaded into the memory, and the CPU 101 implements the pseudo-personal information generating unit 1321 in addition to the units 121, 122, and 123 of the first embodiment. Also, a generation information table 1332 i...

Embodiment 3

[0155] Next, Example 3 will be described.

[0156] In the third embodiment, the usefulness of data is improved by using classification of attribute values ​​desired by the user. There are prescribed classifications in various fields such as the International Classification of Diseases, Book Classification, and Patent Classification. In addition, as for age, there are commonly used classifications such as 10 to 19 years old and 20 to 29 years old. In Embodiment 3, by only predefining the hierarchical structure desired by the user for the generalized hierarchical tree, the generalized hierarchical tree considering the classification desired by the user is automatically generated. For example, by predefining the classification of age as "20 to 24 years old" and "25 to 29 years old", it is possible to prevent data such as "24 to 27 years old" from being recoded in a form deviated from the classification desired by the user.

[0157] In addition, in the third embodiment, when con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A de-identification device is provided for automatically configuring a general hierarchy tree of attribute values in protection technology of identity information. In addition, the provided de-identification device quantitively evaluates the amount of information which is lost when generalizing an attribute value, and can thereby automatically assess priorities between de-identified data and between data that is being de-identified. Information of each person includes attribute values of the person for a plurality of attributes. De-identification is achieved by obfuscating the attribute values, and a structure in which attribute values to be obfuscated are expressed in a tree structure according to the level of obfuscation is called a general hierarchy tree. The disclosed identity information de-identification device achieves automatic configuration by configuring a tree using frequency information of attribute values. In addition, by defining a lost information amount metric means, using the general hierarchy tree, information amount loss between two de-identified data or between data being de-identified is quantitively assessed.

Description

technical field [0001] The present invention relates to the anonymization of personal information. Background technique [0002] In recent years, the integration of huge amounts of data about individuals has been increasing, and it is essential for companies that handle personal information to be concerned about privacy. At a minimum, personal information handlers must comply with laws related to the protection of personal information (hereinafter referred to as protection laws) and related ordinances. The Protection Act imposes management obligations on the collection and use of personal information, and furthermore, specific measures are stipulated in the guidelines of each department. [0003] One of the management measures stipulated in these guidelines is the anonymization of personal information. For example, the Ministry of Health, Labor and Welfare requires that personal information related to medical care be anonymized in the provision of third parties, presentati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/60G06F21/62
CPCG06F17/30327H04L9/32G06F21/6254G06F21/60G06F21/6263G06F2221/2145G06F16/2246
Inventor 原田邦彦富樫由美子佐藤嘉则
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products