N1 Analytics

24
HOW DOES N1 ANALYTICS WORK AND WHAT CAN IT DO?

Transcript of N1 Analytics

Page 1: N1 Analytics

HOW DOES N1 ANALYTICS WORKAND WHAT CAN IT DO?

Page 2: N1 Analytics

HOW DOES IT WORK?N1 uses 3 cutting edge technologies that enable analytics on alternative data while:

STAYING COMPLIANT OF POLICIES AND LEGISLATION

KEEPING EVERYBODY’S DATA SAFE

DOING IT IN A COST EFFECTIVE MANNER

Page 3: N1 Analytics

3 TECHNOLOGIES

1HOMOMORPHIC

ENCRYPTION

2DISTRIBUTED COMPUTING

3PRIVACY PRESERVING

RECORD LINKAGE

Encrypt(5) = #jdao

Page 4: N1 Analytics

HOMOMORPHIC ENCRYPTIONHomomorphic encryption is a form of encryption that allows computations to be carried out on encrypted data, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the original unencrypted data.

5 X 3 = 15

Encrypt(5) = #jdao

Encrypt(3) = #hdah

#jdao X #hdah = #onda

Decrypt(#onda) = 15

Page 5: N1 Analytics

DISTRIBUTED COMPUTINGThe N1 Solution uses a form of distributed computing where the computation goes to where the datasets reside instead of moving the data around.

Sensitive data

Sensitive data

Coordinator

Page 6: N1 Analytics

Let’s look at an example to understand Privacy Preserving record linkage.

Page 7: N1 Analytics

Say you have a dataset which you would like to combine with data owned by another company.

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CBarb Y 02/11/92 ASCH FIUHAL FHAIA

Charley X 03/10/82 FUONA BCMOH ABXJO

Alex Z 01/12/81 DGAIBS PISA PKAB

Eve Y 05/08/85 YNIXB BEJAB MABS

Your dataset Other company’s dataset

Page 8: N1 Analytics

N1 determines which columns can be used to link records …

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4Barb Y 02/11/92 ASCH FIUHAL FHAIA

Charley X 03/10/82 FUONA BCMOH ABXJO

Alex Z 01/12/81 DGAIBS PISA PKAB

Eve Y 05/08/85 YNIXB BEJAB MABS

N1

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CBarb Y 02/11/92 ASCH FIUHAL FHAIA

Charley X 03/10/82 FUONA BCMOH ABXJO

Alex Z 01/12/81 DGAIBS PISA PKAB

Eve Y 05/08/85 YNIXB BEJAB MABS

Page 9: N1 Analytics

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4Barb Y 02/11/92 ASCH FIUHAL FHAIA

Charley X 03/10/82 FUONA BCMOH ABXJO

Alex Z 01/12/81 DGAIBS PISA PKAB

Eve Y 05/08/85 YNIXB BEJAB MABS

… and converts them to a bunch of hashes. This is done so that even N1 cannot know the details of those fields.

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

111111111 DDDDDD DGAIBS PISA PKAB

KKKKKKKK CCCCCC YNIXB BEJAB MABS

N1

Page 10: N1 Analytics

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

111111111 DDDDDD DGAIBS PISA PKAB

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

111111111 DDDDDD DGAIBS PISA PKAB

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

111111111 DDDDDD DGAIBS PISA PKAB

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

Name DOB Ft 2 Ft 3 Ft 4XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

111111111 DDDDDD DGAIBS PISA PKAB

KKKKKKKK CCCCCC YNIXB BEJAB MABS

N1

It then uses fuzzy matching to match the hashes and find the common records.

Page 11: N1 Analytics

Next, N1 rearranges the records so they line up with their corresponding rows.

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

GGGGGGG HHHHHH BBBBB NNNNN DDDDD

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

N1

Page 12: N1 Analytics

Where records do not match up, N1 will create dummy data so neither party will know which records exist in the other’s dataset.

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

GGGGGGG HHHHHH BBBBB NNNNN DDDDD

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

N1

Name DOB Feat 1 Feat 2 Ft 3111111111 DDDDDD 1252 45646 6843

XXXXXXXX FFFFFFFF 5235 16818 85313

TTTTTTTT 5555555 6353 18843 873138

44444444 $$$$$$$ 6254 13837 38613

GGGGGGG HHHHHH BBBBB NNNNN DDDDD

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Page 13: N1 Analytics

What you effectively get is an enhanced dataset but one where the data never leaves its premises. This means that none of the parties, including N1, can ever see each other’s data. We call this Privacy Preserving record linking.

Name DOB Feat 1 Feat 2 Feat 3 Feat A Feat B Feat C111111111 DDDDDD 1252 45646 6843 ASCH FIUHAL FHAIAXXXXXXXX FFFFFFF 5235 16818 85313 FUONA BCMOH ABXJO

TTTTTTTT 5555555 6353 18843 873138 DGAIBS PISA PKAB

44444444 $$$$$$$ 6254 13837 38613 YNIXB BEJAB MABS

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Page 14: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Now that the enhanced dataset is ready, the user can then select an algorithm to start the computation.

Page 15: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

N1 uses distributed computing to send the algorithm to the first dataset and start the computation.

Page 16: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

N1 then uses a number of techniques including homomorphic encryption to encrypt the results before sending them to the next dataset.

Page 17: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Here, the computation continues using the results of the previous computation and the new data.

Page 18: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

The new results are then encrypted and sent back to N1.

Page 19: N1 Analytics

N1

Ft 2 Ft 3 Ft 4 DOB Name1252 45646 6843 DDDDDD 111111111

5235 16818 85313 FFFFFFF XXXXXXXX

6353 18843 873138 5555555 TTTTTTTT

6254 13837 38613 $$$$$$$ 44444444

BBBBB NNNNN DDDDD HHHHHH GGGGGGG

Name DOB Ft 2 Ft 3 Ft 4111111111 DDDDDD DGAIBS PISA PKAB

XXXXXXXX FFFFFFFF ASCH FIUHAL FHAIA

TTTTTTTT 5555555 FUONA BCMOH ABXJO

PPPPPPPP LLLLLLLL MMMM JJJJJJJJ UUUUU

KKKKKKKK CCCCCC YNIXB BEJAB MABS

Finally the the results can be decrypted and presented back to the N1 user.

Page 20: N1 Analytics

A second way that N1 can be used is to expand your data.

Say you have a dataset and want to expand the number of records by combining it with another dataset.

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 9153 FIUHAL 995453

Gloria U 03/10/64 8513 BCMOH 665544

Hillary T 01/12/77 7394 PISA 448521

Eve Y 05/08/85 6425 BEJAB 335678

N1

Page 21: N1 Analytics

You can use N1 to match up the common columns so you can extend the number of rows.

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 PL678 9153 995453

Gloria U 03/10/64 HBD86 8513 665544

Hillary T 01/12/77 KN639 7394 448521

Eve Y 05/08/85 PP879 6425 335678

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 PL678 9153 995453

Gloria U 03/10/64 HBD86 8513 665544

Hillary T 01/12/77 KN639 7394 448521

Eve Y 05/08/85 PP879 6425 335678

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 PL678 9153 995453

Gloria U 03/10/64 HBD86 8513 665544

Hillary T 01/12/77 KN639 7394 448521

Eve Y 05/08/85 PP879 6425 335678

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 PL678 9153 995453

Gloria U 03/10/64 HBD86 8513 665544

Hillary T 01/12/77 KN639 7394 448521

Eve Y 05/08/85 PP879 6425 335678

Name DOB Feat 1 Feat 2 Ft 3Alex Z 01/12/81 1252 45646 6843

Barb Y 02/11/92 5235 16818 85313

Charley X 03/10/82 6353 18843 873138

Diane W 04/09/99 6254 13837 38613

Name DOB Ft A Ft B Ft CFrida V 02/11/73 PL678 9153 995453

Gloria U 03/10/64 HBD86 8513 665544

Hillary T 01/12/77 KN639 7394 448521

Eve Y 05/08/85 PP879 6425 335678

N1

Page 22: N1 Analytics

What you effectively get is an expanded dataset but one where the data never leaves its premises. Again, none of the parties, including N1, can ever see each other’s data.

Name DOB Feat 1 Feat 2Alex Z 01/12/81 1252 45646

Barb Y 02/11/92 5235 16818

Charley X 03/10/82 6353 18843

Diane W 04/09/99 6254 13837

Name DOB Ft B Ft CFrida V 02/11/73 9153 995453

Gloria U 03/10/64 8513 665544

Hillary T 01/12/77 7394 448521

Eve Y 05/08/85 6425 335678

Name DOB Feat 1B Feat 2CAlex Z 01/12/81 1252 45646

Barb Y 02/11/92 5235 16818

Charley X 03/10/82 6353 18843

Diane W 04/09/99 6254 13837

Frida V 02/11/73 9153 995453

Gloria U 03/10/64 8513 665544

Hillary T 01/12/77 7394 448521

Eve Y 05/08/85 6425 335678

Page 23: N1 Analytics

Name DOB Feat 1 Feat 2Alex Z 01/12/81 1252 45646

Barb Y 02/11/92 5235 16818

Charley X 03/10/82 6353 18843

Diane W 04/09/99 6254 13837

Name DOB Ft B Ft CFrida V 02/11/73 9153 995453

Gloria U 03/10/64 8513 665544

Hillary T 01/12/77 7394 448521

Eve Y 05/08/85 6425 335678

The algorithm can then move between the datasets to train a model which gives superior insights than one trained on limited data.

N1

Page 24: N1 Analytics

WHAT CAN N1 ANALYTICS DO FOR YOU?