Search

Jessica Nicola Staddon

from Redwood City, CA
Age ~54

Jessica Staddon Phones & Addresses

  • 973 Round Hill Rd, Redwood City, CA 94061 (650) 365-1848
  • Los Altos Hills, CA
  • Durham, NC
  • Raleigh, NC
  • Rio Vista, CA
  • Carrboro, NC
  • Berkeley, CA
  • Union City, CA
  • 973 Round Hill Rd, Redwood City, CA 94061

Work

Company: North carolina state university cs department Aug 2015 to Jul 2018 Position: Associate professor, director of privacy, assistant director of data science

Education

Degree: Doctorates, Doctor of Philosophy School / High School: University of California, Berkeley 1991 to 1997 Specialities: Mathematics

Skills

Algorithms • Computer Science • Cryptography • Data Mining • Distributed Systems • User Experience • Research • Data Analysis • Artificial Intelligence • Software Engineering • Computer Security • Information Retrieval • Human Computer Interaction • Privacy • Software Development • Analysis • Python • Scalability • Privacy Law • Data Aggregation • R • Statistics • Big Data • Natural Language Processing • Data Privacy • Security • Social Networking • Machine Learning

Ranks

Certificate: Certified Information Privacy Professional / Information Technology (Cipp/It)

Industries

Internet

Resumes

Resumes

Jessica Staddon Photo 1

Jessica Staddon

View page
Location:
25091 Tepa Way, Los Altos Hills, CA 94022
Industry:
Internet
Work:
North Carolina State University Cs Department Aug 2015 - Jul 2018
Associate Professor, Director of Privacy, Assistant Director of Data Science

Google Jun 2017 - Jun 2015
Research Scientist and Manager

Parc 2001 - 2010
Area Manager

Nokia Bell Labs 1999 - 2001
Research Scientist

Rsa 1997 - 1999
Research Scientist
Education:
University of California, Berkeley 1991 - 1997
Doctorates, Doctor of Philosophy, Mathematics
University of California, Berkeley 1986 - 1990
Bachelors, Bachelor of Arts, Mathematics
Skills:
Algorithms
Computer Science
Cryptography
Data Mining
Distributed Systems
User Experience
Research
Data Analysis
Artificial Intelligence
Software Engineering
Computer Security
Information Retrieval
Human Computer Interaction
Privacy
Software Development
Analysis
Python
Scalability
Privacy Law
Data Aggregation
R
Statistics
Big Data
Natural Language Processing
Data Privacy
Security
Social Networking
Machine Learning
Certifications:
Certified Information Privacy Professional / Information Technology (Cipp/It)
License 101153I
International Association of Privacy Professionals, License 101153I

Publications

Us Patents

Methods, Apparatus, And Program Products For Inferring Service Usage

View page
US Patent:
7296158, Nov 13, 2007
Filed:
Nov 8, 2002
Appl. No.:
10/291310
Inventors:
Jessica N. Staddon - Redwood City CA, US
Robert T. Johnson - Berkeley CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/00
H04K 1/00
US Classification:
713171, 713163, 380278, 705 71
Abstract:
Given the recent changes in the policy governing Internet content distribution, such as the institution of per listener royalties for Internet radio broadcasters, content distributors now have an incentive to under-report the size of their audience. Previous audience measurement schemes only protect against inflation of audience size. We present the first protocols for audience measurement that protect against both inflation and deflation attempts by content distributors. The protocols trade-off the amount of additional information the service providers must distribute to facilitate audience inference with the amount of infrastructure required and are applicable to Internet radio, web plagiarism, and software license enforcement. The protocols can be applied to other situations, such as auditing website screen scrapers and per-seat licensed software installations.

Systems And Methods For Non-Interactive Session Key Distribution With Revocation

View page
US Patent:
7400732, Jul 15, 2008
Filed:
Sep 27, 2002
Appl. No.:
10/255964
Inventors:
Jessica N. Staddon - Palo Alto CA, US
Thomas A. Berson - Palo Alto CA, US
Matthew Franklin - Davis CA, US
Sara More - La Jolla CA, US
Michael Malkin - Stanford CA, US
Ralph C. Merkle - Sunnyvale CA, US
Dirk Balfanz - Palo Alto CA, US
Assignee:
Xerox Corporation - Stamford CT
International Classification:
H04L 9/16
US Classification:
380278, 380277, 380279
Abstract:
Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network. The systems and methods according to this invention allow an intermediate session key contained in an intermediate key distribution broadcast to be determined by receiving a preceding key distribution broadcast that precedes the intermediate key distribution broadcast, the preceding key distribution broadcast including a first portion of the intermediate session key; receiving a subsequent key distribution broadcast that follows the intermediate key distribution broadcast, the subsequent key distribution broadcast including a second portion of the intermediate session key that is distinct from the first portion; and combining at least the first portion of the intermediate session key contained within the preceding key distribution broadcast and the second portion of the intermediate session key contained within the subsequent key distribution broadcast to obtain the intermediate session key.

System And Method For Providing Private Inference Control

View page
US Patent:
7472105, Dec 30, 2008
Filed:
Oct 19, 2004
Appl. No.:
10/969549
Inventors:
Jessica Nicola Staddon - Redwood City CA, US
David P. Woodruff - Cambridge MA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 7/00
US Classification:
707 1, 380 28, 380255
Abstract:
Records in a secure database include attributes. A query homomorphically encrypts indices identifying one record and attribute. A secret key is generated at a certain query count and is divided into randomly generated key shares. A key share sequence is homomorphically encrypted. A table is formed by encrypting the indices, secret key and attributes. The key shares are decrypted sufficient to recover the secret key subject to a non-inference enabling query. In a further embodiment, a query count is maintained. Records in a secure database include attributes, with an attributes set forming inference channels. A data structure includes ciphertext keys. A pseudorandom function seed and non-malleable encryption secret key are chosen. A query provides indices identifying one record and attribute. A secure function evaluation is executed.

Systems And Methods For Protecting Private Information In A Mobile Environment

View page
US Patent:
7707413, Apr 27, 2010
Filed:
Dec 2, 2004
Appl. No.:
11/004748
Inventors:
Teresa F Lunt - Palo Alto CA, US
Daniel H Greene - Sunnyvale CA, US
Philippe J Golle - San Francisco CA, US
Richard H Bruce - Los Altos CA, US
Jessica N Staddon - Redwood City CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/32
US Classification:
713168, 726 27, 726 28, 726 29, 726 30
Abstract:
Techniques for protecting non-public information in a mobile environment are provided. A request for non-public information about users in a mobile environment is received. Privacy policies, non-public and optional public information about the users affected by the request are determined. An optional privacy impact indicator is determined based on how satisfying the request increases the current public information about the users. Crowds of users having similar attribute name/values are optionally determined. User and optional requestor privacy policies which associate threshold release criteria such minimum crowd size, minimum consideration with the non-public information are determined. A privacy agreement is reached for the disclosure of the requested non-public information based on the compatibility of the requester and user privacy policies. Privacy protecting transformations are optionally determined and applied to create crowds or groups associated with the requested attribute.

Method And System For Detecting Undesired Inferences From Documents

View page
US Patent:
7720783, May 18, 2010
Filed:
Mar 28, 2007
Appl. No.:
11/729576
Inventors:
Jessica N. Staddon - Redwood City CA, US
Philippe J. P. Golle - San Francisco CA, US
Bryce D. Zimny - Oshawa, CA
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 17/00
G06N 5/02
US Classification:
706 46, 706 45
Abstract:
One embodiment of the present invention provides a system that detects inferences from documents. During operation, the system receives one or more documents and extracts a first set of knowledge relevant to the documents. The system further formulates one or more queries to one or more reference corpora based on the first set of knowledge. The system then extracts a second set of knowledge from results received in response to the queries. Additionally, the system produces a mapping relationship between at least one document and a piece of the second set of knowledge which is not within the first set of knowledge, the mapping relationship indicating an inference from the documents.

System And Method For Performing A Conjunctive Keyword Search Over Encrypted Data

View page
US Patent:
7783899, Aug 24, 2010
Filed:
Dec 9, 2004
Appl. No.:
11/008003
Inventors:
Philippe Golle - San Francisco CA, US
Jessica Nicola Staddon - Redwood City CA, US
Brent Waters - Palo Alto CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 17/30
H04L 9/12
H04L 9/14
US Classification:
713193, 713165, 713189, 707759
Abstract:
A system and method for providing a conjunctive keyword search over encrypted data is presented. A plurality of encrypted data is maintained. Each encrypted data includes a plurality of keyword fields that each contain a keyword. The keywords for the keyword fields are encrypted for each encrypted data. A capability is generated for two or more such encrypted keywords that includes a plurality of parameters defining a conjunctive keyword search. The capability is sent from a requestor to a server. The capability is applied to the encrypted keywords with the server to generate a result and the result is provided to the requestor.

Inbound Content Filtering Via Automated Inference Detection

View page
US Patent:
7860885, Dec 28, 2010
Filed:
Dec 5, 2007
Appl. No.:
11/951198
Inventors:
Richard Chow - Sunnyvale CA, US
Philippe J. P. Golle - San Francisco CA, US
Jessica N. Staddon - Redwood City CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G06F 17/30
US Classification:
707769, 707706, 707754, 707771, 707E17059, 707E17061, 707E17062, 707999001, 707999003, 707999004
Abstract:
A system is provided to detect email spam. During operation, the system receives an email, extracts a set of keywords from the email body, and constructs a first search query based a keyword extracted from the email body. The system further constructs a second search query based on the keyword in the first query and one additional word which pertains to a known spam word or to the subject of the email. Next, the system receives a first number of hits and a second number of hits in response to the first and second search queries, respectively. The system then determines whether the email is spam based on the first number and the second number. The system can also perform Website filtering using inference detection which is based on search results received in response to search queries formulated with keywords extracted from Websites.

Method, Apparatus, And Program Product For Revealing Redacted Information

View page
US Patent:
7861096, Dec 28, 2010
Filed:
Dec 15, 2006
Appl. No.:
11/611848
Inventors:
Jessica N. Staddon - Redwood City CA, US
Philippe Jean-Paul Golle - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G09C 1/00
US Classification:
713193, 380 44, 380277, 713165, 713167
Abstract:
A selectively encrypted data unit includes an encrypted version of sensitive information (capable of being decrypted to reveal the sensitive information), a plurality of auxiliary values, and an attribute vector associated with the encrypted version of the sensitive information. The selectively encrypted data unit and a unique capability key are accessed. The unique capability key is associated with a key descriptor and is responsive to one or more cryptosystem parameters, one or more random numbers and one or more shares of a master secret. Next the technology determines whether the attribute vector is filtered or enabled by the key descriptor. If so, a protection key is acquired that is responsive to the one or more cryptosystem parameters, the plurality of auxiliary values, the key descriptor and the unique capability key. Once acquired, the protection key is used to decrypt the encrypted version to generate the sensitive information which is presented.
Jessica Nicola Staddon from Redwood City, CA, age ~54 Get Report