US 12,229,304 B2
Secure data analytics
Indervir Singh Banipal, Austin, TX (US); Shikhar Kwatra, San Jose, CA (US); Park Foreman, Austin, TX (US); and Caleb Miles, Columbia, MO (US)
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on May 4, 2021, as Appl. No. 17/307,553.
Prior Publication US 2022/0358237 A1, Nov. 10, 2022
Int. Cl. G06F 21/62 (2013.01); G06F 9/54 (2006.01); G06F 21/60 (2013.01); G06N 20/00 (2019.01); H04L 9/00 (2022.01)
CPC G06F 21/6245 (2013.01) [G06F 9/547 (2013.01); G06F 21/602 (2013.01); G06N 20/00 (2019.01); H04L 9/008 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
Identifying, by a computer system, sensitive data fields of an initial dataset and mappings between the identified sensitive data fields and other data fields of the initial dataset, wherein analytics processing is to be performed on data of the initial dataset;
based on an expectation of data fields, of the initial data set, to be used in performance of the analytics processing on the data of the initial dataset, and based on the identified sensitive data fields, selecting and applying, by a dataset owner of the initial dataset, a masking method to at least some of the initial dataset to mask the identified sensitive data fields of the initial dataset and produce a masked dataset;
providing, by the dataset owner, the masked dataset to an analytics provider with a request for the analytics processing, and receiving from the analytics provider, in response to the providing, a generated analytics function, generated based on the masked dataset, that is configured to perform the analytics processing on the data of the initial dataset; and
invoking, by the dataset owner, the generated analytics function against the initial dataset to perform the analytics processing on the data of the initial dataset.