Browse Prior Art Database

A Method and System for Providing Streaming Analytics to Protect Personally Identifiable Information (PII)

IP.com Disclosure Number: IPCOM000246589D
Publication Date: 2016-Jun-20
Document File: 2 page(s) / 104K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed that enables organizations to correlate Personally Identifiable Information (PII) data without having to persist it to disk to determine whether the organizations can physically store the data within the firewalls or if further analysis of the data is required.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 67% of the total text.

Page 01 of 2

A Method and System for Providing Streaming Analytics to Protect Personally Identifiable Information (PII)

Personally Identifiable Information (PII) is considered to be essential for many analytics in industries such as health care, commerce and security.

At the same time, PII is very sensitive. Organizations have a business and legal responsibility to protect PII. The loss of PII can result in loss of customer confidence and a host of other regulatory and compliance issues.

Because of this, many organizations only want to store PII data that are required to keep for business needs. In fact, many regulations require that only data that is needed for a business purpose is stored. However, PII data can be dirty and come from many different data sources. This makes it complex to understand which data can be stored.

Disclosed is a method and system that enables organizations to correlate PII data

without having to persist it to disk to determine whether the organizations can physically

store the data within the firewalls or if further analysis of the data is required. The following figure illustrates the flow/steps of the method disclosed herein.

Figure

The method and system employs streaming technology to use a probabilistic algorithm to determine whether one entity is the same as another. The method uses a pre-configured algorithm to determine whether two individuals represent the same entity. For this, the system maintains a watch list which includes a list of in...