The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 20, 2022

Filed:

Mar. 26, 2020
Applicant:

The Regents of the University of California, Oakland, CA (US);

Inventors:

Rachael Callcut, San Francisco, CA (US);

Michael Blum, San Francisco, CA (US);

Joe Hesse, San Francisco, CA (US);

Robert D. Rogers, Pleasanton, CA (US);

Scott Hammond, Mill Valley, CA (US);

Mary Elizabeth Chalk, Austin, TX (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06N 5/02 (2006.01); G06F 30/20 (2020.01); G06F 21/53 (2013.01); G06F 21/60 (2013.01); G06N 20/00 (2019.01); G06F 16/25 (2019.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
G06N 5/02 (2013.01); G06F 16/256 (2019.01); G06F 21/53 (2013.01); G06F 21/602 (2013.01); G06F 30/20 (2020.01); G06N 20/00 (2019.01); G06F 21/6245 (2013.01);
Abstract

The present disclosure relates to techniques for developing artificial intelligence algorithms by distributing analytics to multiple sources of privacy protected, harmonized data. Particularly, aspects are directed to a computer implemented method that includes receiving an algorithm and input data requirements associated with the algorithm, identifying data assets as being available from a data host based on the input data requirements, curating the data assets within a data storage structure that is within infrastructure of the data host, and integrating the algorithm into a secure capsule computing framework. The secure capsule computing framework serves the algorithm to the data assets within the data storage structure in a secure manner that preserves privacy of the data assets and the algorithm. The computer implemented method further includes running the data assets through the algorithm to obtain an inference.


Find Patent Forward Citations

Loading…