18527139. SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS simplified abstract (Capital One Services, LLC)
Contents
- 1 SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS
Organization Name
Inventor(s)
Omar Florez Choque of Oakland CA (US)
Erik Mueller of Chevy Chase MD (US)
SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18527139 titled 'SYSTEMS USING HASH KEYS TO PRESERVE PRIVACY ACROSS MULTIPLE TASKS
Simplified Explanation
The system described in the patent application uses hash keys to maintain privacy across multiple tasks. Here is a simplified explanation of the abstract:
- The system processes input observations with customer requests and tasks using an encoder.
- Hash keys are assigned to stored tasks for identification.
- New input observations with customer requests and tasks are encoded to generate new hash keys.
- The system checks if any existing hash key matches the new one and associates the input observations accordingly.
- If no match is found, a new stored task is created and assigned the new hash key.
Potential Applications
The technology could be applied in various fields such as data privacy, secure data sharing, and personalized recommendation systems.
Problems Solved
1. Maintaining privacy across multiple tasks. 2. Efficiently associating new data with existing information.
Benefits
1. Enhanced privacy protection. 2. Streamlined data processing and organization.
Potential Commercial Applications
"Privacy-Preserving Hash Key System for Data Processing" could be used in industries like healthcare, finance, and e-commerce for secure data handling and personalized services.
Possible Prior Art
One possible prior art could be a system that uses encryption keys for data protection in a similar manner.
Unanswered Questions
How does the system handle conflicts between hash keys?
The patent application does not specify how conflicts between hash keys are resolved in the system.
What is the computational overhead of using hash keys for privacy preservation?
The application does not provide information on the computational resources required for implementing the hash key system.
Original Abstract Submitted
A system for using hash keys to preserve privacy across multiple tasks is disclosed. The system may provide training batch(es) of input observations each having a customer request and stored task to an encoder, and assign a hash key(s) to each of the stored tasks. The system may provide a new batch of input observations with a new customer request and new task to the encoder. The encoder may generate a new hash key assigned to the new customer request and determine whether any existing hash key corresponds with the new hash key. If so, the system may associate the new batch of input observations with the corresponding hash key and update the corresponding hash key such that it is also configured to provide access to the new batch of input observations. If not, the system may generate a new stored task and assign the new hash key to it.