18527139. SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS

Organization Name

Capital One Services, LLC

Inventor(s)

Omar Florez Choque of Oakland CA (US)

Erik Mueller of Chevy Chase MD (US)

SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18527139 titled 'SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS

Simplified Explanation

The system described in the patent application uses hash keys to maintain privacy across multiple tasks. Here is a simplified explanation of the abstract:

  • The system processes input observations with customer requests and tasks using an encoder.
  • Hash keys are assigned to stored tasks for identification.
  • New input observations with customer requests and tasks are encoded to generate new hash keys.
  • The system checks if any existing hash key matches the new one and associates the input observations accordingly.
  • If no match is found, a new stored task is created and assigned the new hash key.

Potential Applications

The technology could be applied in various fields such as data privacy, secure data sharing, and personalized recommendation systems.

Problems Solved

1. Maintaining privacy across multiple tasks. 2. Efficiently associating new data with existing information.

Benefits

1. Enhanced privacy protection. 2. Streamlined data processing and organization.

Potential Commercial Applications

"Privacy-Preserving Hash Key System for Data Processing" could be used in industries like healthcare, finance, and e-commerce for secure data handling and personalized services.

Possible Prior Art

One possible prior art could be a system that uses encryption keys for data protection in a similar manner.

Unanswered Questions

How does the system handle conflicts between hash keys?

The patent application does not specify how conflicts between hash keys are resolved in the system.

What is the computational overhead of using hash keys for privacy preservation?

The application does not provide information on the computational resources required for implementing the hash key system.


Original Abstract Submitted

A system for using hash keys to preserve privacy across multiple tasks is disclosed. The system may provide training batch(es) of input observations each having a customer request and stored task to an encoder, and assign a hash key(s) to each of the stored tasks. The system may provide a new batch of input observations with a new customer request and new task to the encoder. The encoder may generate a new hash key assigned to the new customer request and determine whether any existing hash key corresponds with the new hash key. If so, the system may associate the new batch of input observations with the corresponding hash key and update the corresponding hash key such that it is also configured to provide access to the new batch of input observations. If not, the system may generate a new stored task and assign the new hash key to it.