WO1999038080A1 - A secure database management system for confidential records - Google Patents
A secure database management system for confidential records Download PDFInfo
- Publication number
- WO1999038080A1 WO1999038080A1 PCT/US1999/001366 US9901366W WO9938080A1 WO 1999038080 A1 WO1999038080 A1 WO 1999038080A1 US 9901366 W US9901366 W US 9901366W WO 9938080 A1 WO9938080 A1 WO 9938080A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- identifier
- database
- request
- code
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
Definitions
- This invention relates to protecting confidential information.
- the invention prevents insiders with high levels of computer access from accessing sensitive data.
- Computer systems have long been used for processing sensitive information. Such systems typically include a database and a processor which manipulates large amounts of highly personal and confidential data. In order to protect outsiders from accessing the confidential data, fire walls and encryption systems are often used to prevent unauthorized access to the data. Examples of traditional systems and methods used to prevent unauthorized access to sensitive data include such mechanisms as user authentication, access location restriction, and user level access controls. Although such systems are useful for preventing "outsiders" from accessing confidential data, these systems are typically unable to protect the data from "insiders" who have been granted high enough system access privileges to bypass the security controls. In particular, it is very difficult to deny a system administrator access to sensitive or confidential data.
- a method for retrieving sensitive stored data is described.
- a receiving terminal receives a request for data from a user and encrypts an - 2 - identifier with a first code and a data access request with a second code.
- the identifier and data access request are transmitted to a first database which decodes the identifier and determines whether the user has authorization to request the desired information.
- the first database then retrieves an associated access level and internal identifier.
- the first database forwards the still encrypted data access request with the associated access level and internal identifier to a second database.
- the second database retrieves the information requested in the data access request and in one embodiment, if the user has an appropriate access level, transmits the requested information to the receiving terminal.
- Figure 1 illustrates a computer network for implementing one embodiment of a data management system.
- Figure 2 is a flow diagram illustrating a method of implementing the data management system.
- Figure 3A, 3B, 3C and 3D illustrate different embodiments of a data management system utilizing the disclosed invention.
- Figure 4 illustrates the use of multiple identifier database in one embodiment of the invention.
- Figure 5 illustrates a combination identifier and data request database under a common administrative control as implemented in one embodiment of the invention.
- the secure system is implemented using a large network of subnetworked computers.
- the Internet represents a large network which couples together subnetworks such as a local area network or ethernet coupled computers.
- each of the subnetworks described will be under the control of a different administrator.
- Each administrator will not have control over computers outside of the respective subnetwork.
- the data will be protected from improper access by an individual administrator of a subnetwork.
- Figure 1 illustrates a secure data management system 100 used to implement one embodiment of the invention.
- a user inputs data into a source terminal 104.
- a typical user may be a doctor or other personnel with an appropriate level of access to request the needed data.
- source terminal 104 may be a computer, or other processing device, including a personal computer.
- source terminal 104 is merely a terminal coupled to a main frame computer or other processing device.
- the source terminal may be associated with a local computer network or "source subnetwork" 106.
- Source subnetwork 106 may be a plurality of computers connected by a local area network.
- Source terminal 104 identifies or collects information to identify the user, typically by obtaining passwords, handprints, fingerprints, retinal scans, or other appropriate identification mechanism. After verification of the user's identity, the user, for example, a doctor, a lawyer, drug enforcement personnel, government official or banker, who has a need to know the information, requests access to specific information about a particular individual subject which is processed by the secure data management system 100.
- the user can also be a computer program or system.
- Source terminal 104 receives information from the user and combines the information into a data packet 116 for output to other sections of secure system 100.
- the data packet 116 is composed of two smaller data packets, an identifier 112 and a data access request 124.
- Identifier 112 includes subdata packets such as user I.D. 118 and subject I.D. 120.
- the first subdata packet, user I.D. 118 includes information on the user such as information needed to identify the doctor requesting data.
- Such information may include, but is not limited to the last name, first name, middle name, social security number, birth date, mother's maiden name, - 4 - driver's license, medical license number, state bar number, drug enforcement agency number, invoice number, fingerprint number, or other information necessary or useful for identifying the user requesting the data.
- Second subdata packet, subject I.D. 120 includes information about the subject.
- the information in the second subdata package includes data needed to identify the individual or entity relating to the data access request.
- Such information may, for example, include the last name, first name, middle name, social security number, birth date, birthplace, mother's maiden name, driver's license, street address, e-mail, file number, patient identification number, inmate identification number, account number, or name of company.
- a processor 108 associated with source terminal 104 encrypts the identifier 112, including subdata packets 118, 120 using a first encryption code.
- identifier 112 also includes subdata packet 104 which contains information or an address of the source terminal 104 which generates the subdata pack 116.
- the address of the source terminal may be included in subdata packet 104 as a globally unique identifier or "GUID.”
- Data packet 116 also includes a second portion, the data access request 124.
- Data access request 124 contains the specifics on the data requested, such as a request for a lab result or a request to append a new progress note.
- Data access request 124 may also in one embodiment of the invention be a token.
- a token may be an instruction, index or code which specifies a memory address or other instruction to be performed by the token recipient.
- the token authorizes communications to source subnetwork 106 to obtain the details of the data request.
- Processor 108 encrypts the data access request 124 in a second code.
- the data access request 124 is associated with the identifier 112 within data packet 116 such that external subnetworks of computers or processors can link the identifier 112 to the data access request 124.
- source terminal 104 is typically a computer in a source subnetwork 106 of computers serving a facility such as a medical facility or hospital.
- the source terminal 104 transmits the data packet 116, including the identifier 112 and the data access request 124 to a second processor or identifier database 128.
- the identifier database is preferably part of a second subnetwork 130 of computers.
- the second subnetwork 130 is typically a local area network under control of a second administrator.
- the - 5 - second subnetwork 130 and the source subnetwork 106 may be located in different regions of the country.
- a communications link couples source terminal 104 and identifier database 128.
- the communications link is an Internet link and /or private line.
- Identifier database 128 has the codes necessary to decrypt identifier 112. Encoding and decoding of identifier 112 may be done by a variety of methods. In one embodiment of the invention, source terminal 104 encrypts identifier 112 using a public key of identifier database 128. Identifier database 128 decrypts the identifier 112 in data packet 116 using a corresponding private key. Because identifier database 128 does not have the decryption key needed to read information contained in data access request 124, the data access request information remains protected from the system administrator of identifier database 128 and subnetwork 130.
- Identifier database 128 uses the information contained in identifier 112 to generate (1) an access level indicating the access allowances of the user requesting data, and (2) an internal identifier identifying the individual or entity (the subject) corresponding to the requested data.
- Identifier 112 information serves as a search key to query a database, typically a table 132.
- the user requesting data specified by user I.D. 118, is used to identify data for lookup in table 132 and determine the user's approved access level in relation to the individual identified in subject I.D. section 120.
- the subnetwork 130 determines the types of data access activities that the user is permitted to perform on the records relating to the subject identified by subject I.D. 120.
- the subnetwork 130 may determine whether the user is a doctor currently treating the identified individual. When a doctor is identified as treating an identified individual, the doctor is associated with a corresponding access level to permit the doctor to review x-ray, lab results, or add a progress note to the patient's records.
- the subnetwork 130 containing identifier database 128 associates an authorized user access level to the doctor.
- Identifier database 128 assigns a Subject Internal I.D., typically using a table such as table 133, to the individual identified in Subject I.D. Section 120 of identifier 112.
- the identifier database 128 outputs a data packet 148 including (1) a subject data section 144, and (2) a data access request 124.
- the subject data section 144 includes a user access level subsection 136 and an internal identifier stored in a subject internal - 6 - identifier subsection 140.
- Subject data section 144 may also include the address of the originating source terminal 104. Because the material contained in subject data section 144 is typically incomprehensible to an interloper, it is not required that the subject data section 144 be encrypted. In maximum security systems, subject material in subject data 144 is encrypted with a code such that the subject material is only readable by data request database 152.
- the identity of the user and the subject, the address of source terminal 104 and the time at which data was received and /or transmitted is stored in a log 156 in identifier database 128.
- Data request database 152 and the associated subnetwork 154 receives data packet 148.
- data request database 152 decrypts the subject data section 144 of data packet 148 and retrieves the subject internal I.D. 140 and the user access level 136.
- Data request database 152 also decrypts the data access request 124.
- Data access request 124 of data packet 148 is encrypted using a code readable only by data request database 152.
- source terminal 104 encrypts data access request 124 with the public key of data request database 152 allowing data request database 152 to retrieve the data access request 124 using a corresponding private key.
- Data request database 152 determines if the user access level is sufficient to perform the type of data access requested in data access request 124 upon the records corresponding to the subject internal identifier 140. When the user has an appropriate user access level and is thus entitled to perform the operation, the data request database 152 performs the requested operation upon records keyed to the internal identifier 140.
- the data request database 152 does not contain the demographics, personal identifiers, and other personally identifiable information which can be used to link individuals or entities to the data contained in data records 157.
- the known individually identifiable attributes including, for example, demographics and specific identifiers such as addresses are removed and stored in the identifier database 128.
- the system administrator for data request database 152 and corresponding subnetwork 154 can access information corresponding to the requested data, for example, that a record indicates a diagnosis of AIDS, the administrator cannot determine the name of the patient who has this diagnosis.
- Only identifier database 128 contains information linking the - 7 - public identity such as name and address of the patient to the internal identifier. It is conceivable that the splitting of data between the identifier database 128 and the data request database 152 can be used to store other sensitive data where it is desirable to prevent linkage between two data elements except by authorized users.
- data request database 152 After data request database 152 performs the requested data access operations, such as retrieving a set of lab results from table 157, the data request database 152 uses source terminal I.D. 104 included in the subject data 144 to send a result set of the data operations back to source terminal 104.
- the connection between the data request database 152 and source terminal 104 may be via Internet or the data may be transmitted over a secured line.
- the result set can be encrypted for the transmission to the source terminal, for example, using the public key of source terminal 104.
- each database maintains a log.
- the identifier database maintains a first log 156 which may store that a query was received from a certain user at source terminal 104 and that a query occurred at a specific time.
- data request database 152 maintains a second log 164 which records the subject internal I.D. operated upon, the destination to which the requested information was sent, and the source terminal I.D. 104 as well as the time at which information was transmitted or received from identifier database 128.
- a third party auditor can compare the first log 156 and the second log 164 to determine whether there are irregularities.
- the preferred procedure for a third party audit utilizes a procedure such as check sum or hash function to transform these logs prior to making them available to the auditor thereby protecting the confidential identity of the user-subject pairs.
- Periodic reports can be generated by the identifier database disclosing the identity of all users who accessed a given subject's records over a specified time interval. These reports can be sent directly to the subject or a person designated by the subject for review. Any irregularities can then be corrected as appropriate. Inappropriate access of records can thereby be identified in a timely manner and all users held accountable for their activities.
- - 8 - Figure 2A and 2B is a flow diagram 200 illustrating the procedures used to implement the current, described invention.
- a user at a source terminal requests data.
- the user may enter information such as a password, or other identifying information to indicate that the user is the entity he or she claims to be.
- the source terminal encrypts the subject's identifying information such as the patient name with a first code in block
- the identifier is encrypted using a public key of an identifier database.
- the identifier typically includes the address of the terminal, and user information such as the name of the person requesting the information.
- the identifier package may also include the public key of the source terminal.
- the source terminal also encrypts the data access request using a second code.
- the data access request is encrypted using a second public key of a second database, such as a data request database.
- the data access request contains information regarding the nature of the data request, such as delete a record, display laboratory result, and update financial information.
- the entire data packet is signed in block 212.
- Such encryption may be done with a private key of the source terminal. Such encryption serves to identify the source terminal 104 and prevent other terminals from mimicking source terminal 104.
- authentication may be done by digitally signing the data packet using one of many well-know digital signing algorithms such as RSA, ElGamal, and Rabin.
- the data packet is transmitted to a subnetwork including a computer containing a first database or identifier database.
- the identifier information is decrypted in block 220. Typically, decryption is done using the private key of the identifier database.
- identifier database uses the decrypted identifier information to look-up the individual for whom data is requested (subject), such as a patient in a hospital, and makes sure that such person or entity exists. The identifier database also verifies that the individual requesting the access has the authority to access the subject's information in block 224.
- the subject may be a patient in a hospital and the person requesting the data may be a doctor.
- the identifier database may check a table to make sure that the patient and the doctor represent a doctor-patient pair in block 224.
- the identifier database encrypts the internal ID, the privilege level, and the source terminal address in block 240 for transmission to a data request database in a separately administered subnetwork.
- the actual patient name as well as the doctor name is stripped from the data, identified only by an internal ID.
- identifier database encrypts the internal ID with the public key of the data request database.
- the data packet including the internal identifier, user access level or privilege level, along with the original encrypted data access request is transmitted to the data request database in block 244.
- an entry is added to a log to document the transmission in block 244.
- the transmission may be through a dedicated line or virtual private network to ensure data security and integrity.
- the entire packet is encrypted and signed.
- the data request database decrypts the information received from the identifier database.
- the data request database retrieves the patient's medical records file corresponding to the internal identifier.
- the data request database determines if access to the particular information in the file is allowed based on the access privilege level received. If access is not allowed, a notice is sent to the source terminal in block 260.
- the data request database When the privilege level authorizes access to the specific information, the data request database performs the requested operation and encrypts the result set in a data packet for transmission to the source terminal
- the requested information is encrypted with the public key of the source terminal in block 264.
- the public key of the source terminal could have been received with the data access request.
- the encrypted data is then transmitted back to the source terminal in block 268.
- the source terminal decodes the data and displays it to the authorized user.
- Each database such as identifier 128 and data request database 152 can be implemented on standard computer systems. These systems may be integrated using a network of direct connections or if data transmissions are encrypted, using publicly available Internet connections.
- Figure 3A and 3B illustrate this basic structure without and with the log monitor, respectively. However, the invention should not be limited to such a data flow as other data flows are possible.
- Figure 3C and 3D illustrate alternative embodiments of information flow and data management system design.
- Figure 3A illustrates a bi-directional data flow between a user 300 and an identifier database 308 along data path 304.
- identifier database 308 accepts a query
- the identifier database 308 forwards the data request to a data request database 312.
- Data request database 312 provides a response along data path 316 to user 300.
- the illustrated configuration of Figure 3A is a basic unit which does not include a log monitor.
- Figure 3B illustrates a use of an independent log monitor 320 to monitor the information flow between identifier database 308 and data request database 312.
- the log monitor compares the logs from identifier database 308 and data request database 312. Mismatches in the logs may result from an user's unauthorized queries to the data request database 312 to obtain information without being routed through the identifier database 308. Alternatively, this may also result from attempts to query the identifier database and link internal I.D. to identifying information. When such a discrepancy occurs, the log monitor 320 transmits a warning to the user 300 or to an independent verification system.
- Figure 3C illustrates a system including a single user 300 and multiple data request databases 350, 354. Multiple data request databases divide and thereby reduce the amount of information processed and controlled by each administrator of each data request database 350, 354. Partitioning the information improves security.
- the user at the source terminal partitions and encrypts data for each of the data request database units 350, 354.
- the identifier database 358 verifies the identity of user 300 and forwards the partitioned and encrypted data to the respective first data request database 350 and/or second data request database 354.
- each data request database 350, 354 has its own corresponding public-private encryption key-pairs to secure of transmission between user 300 and each of the data request databases 350,
- Each data request database 350, 354 responds to the request and transmits its response directly back to user 300 which recombines the responses.
- Figure 3D illustrates dividing the identifier database to reduce the amount of information processed by each identifier database.
- user 300 transmits an individual request to either or both first identifier database 362 and second identifier database 366.
- first identifier database 362 or second identifier database 366 confirms the identity of user 300 and the subject of the query
- the identifier databases 362 and 366 forward the data access request to data request database 370.
- Data request database 370 provides user 300 with the response along data path 376.
- dual identifier databases 362, 366 may be used to increase security by requiring additional verification of the authenticity of user 300 by independent verification of different identification criteria at each identifier database 362, 366.
- data request database 370 provides a response only when both identifiable databases 362, 366 verify a request.
- multiple identifier databases may be used to assign different users or subjects to corresponding identifier databases as additional security mechanism or to load balance the flow of data through the entire network.
- a user 404 transmits a data request with user and subject identifying information to a first identifier database 408 in a chain of identifier databases.
- Each identifier database 408, 412, 416 in the chain verifies a specific unit of user or subject identifying data.
- first identifier database 408 may contain the name of the subject.
- Second identifier database 412 further verifies the identity of the subject by comparing a second unit of information such as a Social Security number of the subject to the received data.
- the second identifier database 412 communicates the request to a third identifier database 416 which may compare a third unit of data such as a fingerprint to verify the identity of the subject of the query. - 1 2 -
- a third identifier database keeps user 404 informed of the query progress through the various identifier databases using return data paths 420, 424,
- identifier databases Records belonging to the same subject (or user) are linked between identifier databases using an internal identification. For example, each identifier database in an identifier database pair such as identifier database pairs 412, 416 share a common internal identification.
- User 404 encrypts data for each identifier database 408, 412, 416 with a public key of that identifier database. When all three identifier databases 408, 412, 416 verify that the subject or user 404 is satisfactorily identified, data request database
- an identifier database has been defined as verifying the identity of the user and subject and converting subject identifiers into an internal I.D.
- a data request database receives a data access request forwarded from an identifier database and provides a response. For each valid user-subject pair, each identifier database outputs at least one user or subject internal identification (I.D.), the internal I.D. being an index that links adjacent identifier databases or a link used to connect information between an identifier database and a data request database.
- I.D. user or subject internal identification
- Data request databases are defined to be the databases which output the result of the query, typically a complex data type which may include ASCII text, charts, and other embedded information.
- the data request database is the last link in a chain which provides information directly to the user.
- a database it is possible for a database to function as both an identifier database and a data request database. Such an embodiment is illustrated in Figure 5 in which a single administrator controls a combination second identifier database and a data request database.
- a user 504 transmits a query to a first identifier database 508.
- identifier database 508 verifies that user 504 is authorized to receive the requested data, the identifier database 508 forwards the data access request to a data request database portion 512 of a combination database 516.
- the data request database 512 portion of combination database 516 provides a response to user 504.
- Identification information in data request database 512 may serve as both identification information and /or data requested.
- combination database 516 may have the task of maintaining fingerprint I.D. - 1 3 - records.
- a data access request from identifier database 508 may contain instructions to add a new fingerprint record to the table of fingerprint records 516.
- a message is sent back to user 504 from data request database 512.
- a fingerprint that identifies a user or subject may be sent from identifier database 508 to identifier database 520.
- an internal I.D. is generated.
- the identifier database 520 forwards the internal I.D. and the data access request to a second data request database 524 which provides the response back to user 504.
- identifier databases and data request databases can be combined or altered to implement data management systems with various performance, data security, data integrity and confidentiality trade offs.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002319311A CA2319311A1 (en) | 1998-01-27 | 1999-01-21 | A secure database management system for confidential records |
AU23355/99A AU761680B2 (en) | 1998-01-27 | 1999-01-21 | A secure database management system for confidential records |
NZ506554A NZ506554A (en) | 1998-01-27 | 1999-01-21 | A secure database management system for confidential records where a transmitted packet of data has a indentifier encrypted first code and a data request encrypted with a second code |
EP99903299A EP1078318A4 (en) | 1998-01-27 | 1999-01-21 | A secure database management system for confidential records |
JP2000528918A JP2002501250A (en) | 1998-01-27 | 1999-01-21 | Protected database management system for sensitive records |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US7274098P | 1998-01-27 | 1998-01-27 | |
US60/072,740 | 1998-01-27 | ||
US09/229,694 | 1999-01-13 | ||
US09/229,694 US6148342A (en) | 1998-01-27 | 1999-01-13 | Secure database management system for confidential records using separately encrypted identifier and access request |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999038080A1 true WO1999038080A1 (en) | 1999-07-29 |
Family
ID=26753689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/001366 WO1999038080A1 (en) | 1998-01-27 | 1999-01-21 | A secure database management system for confidential records |
Country Status (8)
Country | Link |
---|---|
US (1) | US6148342A (en) |
EP (1) | EP1078318A4 (en) |
JP (1) | JP2002501250A (en) |
CN (1) | CN1175358C (en) |
AU (1) | AU761680B2 (en) |
CA (1) | CA2319311A1 (en) |
NZ (1) | NZ506554A (en) |
WO (1) | WO1999038080A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1099996A1 (en) * | 1999-11-03 | 2001-05-16 | Ford Global Technologies, Inc. | Privacy data escrow system and method |
EP2216742A1 (en) * | 2009-02-09 | 2010-08-11 | C. Patrick Reich | Mobile payment method and devices |
US8863284B1 (en) | 2013-10-10 | 2014-10-14 | Kaspersky Lab Zao | System and method for determining a security status of potentially malicious files |
EP2860657A1 (en) * | 2013-10-10 | 2015-04-15 | Kaspersky Lab, ZAO | Determining a security status of potentially malicious files |
US9141822B2 (en) | 2012-11-08 | 2015-09-22 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
Families Citing this family (335)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6760746B1 (en) | 1999-09-01 | 2004-07-06 | Eric Schneider | Method, product, and apparatus for processing a data request |
PT1080415T (en) | 1998-05-21 | 2017-05-02 | Equifax Inc | System and method for authentication of network users |
JP3859369B2 (en) * | 1998-09-18 | 2006-12-20 | 株式会社東芝 | Message relay apparatus and method |
US6502135B1 (en) | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US6839759B2 (en) | 1998-10-30 | 2005-01-04 | Science Applications International Corp. | Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information |
EP1125419B1 (en) | 1998-10-30 | 2009-08-26 | VirnetX Inc. | An agile network protocol for secure communications with assured system availability |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US7418504B2 (en) | 1998-10-30 | 2008-08-26 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6898636B1 (en) * | 1999-02-04 | 2005-05-24 | Intralinks, Inc. | Methods and systems for interchanging documents between a sender computer, a server and a receiver computer |
US6654724B1 (en) * | 1999-02-12 | 2003-11-25 | Adheris, Inc. | System for processing pharmaceutical data while maintaining patient confidentially |
US7743412B1 (en) * | 1999-02-26 | 2010-06-22 | Intel Corporation | Computer system identification |
US9141717B2 (en) | 1999-03-22 | 2015-09-22 | Esdr Network Solutions Llc | Methods, systems, products, and devices for processing DNS friendly identifiers |
US6338082B1 (en) | 1999-03-22 | 2002-01-08 | Eric Schneider | Method, product, and apparatus for requesting a network resource |
US7010568B1 (en) * | 1999-09-01 | 2006-03-07 | Eric Schneider | Search engine request method, product, and apparatus |
US7188138B1 (en) | 1999-03-22 | 2007-03-06 | Eric Schneider | Method, product, and apparatus for resource identifier registration and aftermarket services |
USRE43690E1 (en) | 1999-03-22 | 2012-09-25 | Esdr Network Solutions Llc | Search engine request method, product, and apparatus |
US8037168B2 (en) | 1999-07-15 | 2011-10-11 | Esdr Network Solutions Llc | Method, product, and apparatus for enhancing resolution services, registration services, and search services |
US6493752B1 (en) * | 1999-05-06 | 2002-12-10 | Watchguard Technologies | Device and method for graphically displaying data movement in a secured network |
US6938022B1 (en) * | 1999-06-12 | 2005-08-30 | Tara C. Singhal | Method and apparatus for facilitating an anonymous information system and anonymous service transactions |
US7051365B1 (en) * | 1999-06-30 | 2006-05-23 | At&T Corp. | Method and apparatus for a distributed firewall |
US20040199765A1 (en) * | 1999-08-20 | 2004-10-07 | Children's Medical Center Corporation | System and method for providing personal control of access to confidential records over a public network |
US6785810B1 (en) * | 1999-08-31 | 2004-08-31 | Espoc, Inc. | System and method for providing secure transmission, search, and storage of data |
USRE44207E1 (en) | 1999-09-01 | 2013-05-07 | Esdr Network Solutions Llc | Network resource access method, product, and apparatus |
US7680819B1 (en) * | 1999-11-12 | 2010-03-16 | Novell, Inc. | Managing digital identity information |
US6612984B1 (en) | 1999-12-03 | 2003-09-02 | Kerr, Ii Robert A. | System and method for collecting and transmitting medical data |
US8117644B2 (en) | 2000-01-07 | 2012-02-14 | Pennar Software Corporation | Method and system for online document collaboration |
US6845448B1 (en) * | 2000-01-07 | 2005-01-18 | Pennar Software Corporation | Online repository for personal information |
US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
GB2366051B (en) * | 2000-05-02 | 2005-01-05 | Ibm | Method, system and program product for private data access or use based on related public data |
FI111594B (en) * | 2000-06-05 | 2003-08-15 | Nokia Corp | Handling of subscriber information in telecommunication systems |
CA2351291A1 (en) * | 2000-06-26 | 2001-12-26 | Nadine Smolarski-Koff | Data exchange method and communication protocol used during same |
US20050027570A1 (en) * | 2000-08-11 | 2005-02-03 | Maier Frith Ann | Digital image collection and library system |
EP1358745B1 (en) * | 2000-08-22 | 2008-12-10 | Medtronic, Inc. | Medical device systems implemented network system for remote patient management |
US7742996B1 (en) * | 2000-09-27 | 2010-06-22 | Khai Hee Kwan | Computer program, system and method for on-line issuing and verifying a representation of economic value interchangeable for money having identification data and password protection over a computer network |
JP3555869B2 (en) * | 2000-09-28 | 2004-08-18 | Necソフト株式会社 | Encrypted file search method and apparatus, and computer-readable recording medium |
US7362868B2 (en) * | 2000-10-20 | 2008-04-22 | Eruces, Inc. | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US7546334B2 (en) | 2000-11-13 | 2009-06-09 | Digital Doors, Inc. | Data security system and method with adaptive filter |
US7146644B2 (en) * | 2000-11-13 | 2006-12-05 | Digital Doors, Inc. | Data security system and method responsive to electronic attacks |
US8176563B2 (en) * | 2000-11-13 | 2012-05-08 | DigitalDoors, Inc. | Data security system and method with editor |
US7313825B2 (en) * | 2000-11-13 | 2007-12-25 | Digital Doors, Inc. | Data security system and method for portable device |
US7349987B2 (en) * | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US9311499B2 (en) * | 2000-11-13 | 2016-04-12 | Ron M. Redlich | Data security system and with territorial, geographic and triggering event protocol |
US8677505B2 (en) * | 2000-11-13 | 2014-03-18 | Digital Doors, Inc. | Security system with extraction, reconstruction and secure recovery and storage of data |
US7191252B2 (en) | 2000-11-13 | 2007-03-13 | Digital Doors, Inc. | Data security system and method adjunct to e-mail, browser or telecom program |
US7322047B2 (en) | 2000-11-13 | 2008-01-22 | Digital Doors, Inc. | Data security system and method associated with data mining |
US7103915B2 (en) * | 2000-11-13 | 2006-09-05 | Digital Doors, Inc. | Data security system and method |
US7669051B2 (en) * | 2000-11-13 | 2010-02-23 | DigitalDoors, Inc. | Data security system and method with multiple independent levels of security |
US7140044B2 (en) * | 2000-11-13 | 2006-11-21 | Digital Doors, Inc. | Data security system and method for separation of user communities |
JP2002197186A (en) * | 2000-12-27 | 2002-07-12 | Fujitsu Ltd | Personal information management device |
US20020099568A1 (en) * | 2001-01-23 | 2002-07-25 | Turner Kathryn C. | System and method for facilitating the coordination of care of an individual and dissemination of information |
US7228416B2 (en) * | 2001-01-26 | 2007-06-05 | Hitachi, Ltd. | Database access method and system capable of concealing the contents of query |
TR200400866T4 (en) * | 2001-01-30 | 2004-06-21 | Seda S.P.A | Cardboard beverage container and method for producing it |
US7310734B2 (en) * | 2001-02-01 | 2007-12-18 | 3M Innovative Properties Company | Method and system for securing a computer network and personal identification device used therein for controlling access to network components |
US7506376B2 (en) * | 2001-02-05 | 2009-03-17 | Lg Electronics Inc. | Copy protection method for digital media |
US7509682B2 (en) * | 2001-02-05 | 2009-03-24 | Lg Electronics Inc. | Copy protection method and system for digital media |
US7188243B2 (en) * | 2001-02-16 | 2007-03-06 | Microsoft Corporation | System and method for over the air configuration security |
US7043051B2 (en) | 2001-02-21 | 2006-05-09 | Lg Electronics Inc. | Proprietary watermark system for secure digital media and content distribution |
KR100493311B1 (en) * | 2001-02-21 | 2005-06-07 | 엘지전자 주식회사 | Watermark-based copy management system and method for digital media copy protection |
GB2372595A (en) | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Method of and apparatus for ascertaining the status of a data processing environment. |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7058201B2 (en) | 2001-03-28 | 2006-06-06 | Lg Electronics Inc. | Method of embedding watermark into digital image |
CA2443996A1 (en) * | 2001-04-13 | 2002-10-24 | First Genetic Trust | Methods and systems for managing informed consent processes |
KR100493284B1 (en) | 2001-05-11 | 2005-06-03 | 엘지전자 주식회사 | Copy protection method and system for digital media |
JP2002351995A (en) * | 2001-05-17 | 2002-12-06 | Ge Medical Systems Global Technology Co Llc | Patient information managing method and system |
JP3798655B2 (en) * | 2001-06-20 | 2006-07-19 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Anonymous personal information providing method, anonymous personal information providing system and program |
US6937976B2 (en) * | 2001-07-09 | 2005-08-30 | Hewlett-Packard Development Company, L.P. | Method and system for temporary network identity |
US20030039362A1 (en) * | 2001-08-24 | 2003-02-27 | Andrea Califano | Methods for indexing and storing genetic data |
US20030074564A1 (en) * | 2001-10-11 | 2003-04-17 | Peterson Robert L. | Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy |
US20030130866A1 (en) * | 2002-01-08 | 2003-07-10 | Turner Kathryn C. | System and method for facilitating the care of an individual and dissemination of infromation |
EP1468393A2 (en) * | 2002-01-15 | 2004-10-20 | Karl-Heinz Bauer | Method and device for securing patient data |
JP3931710B2 (en) * | 2002-03-22 | 2007-06-20 | ヤマハ株式会社 | Server apparatus, communication terminal apparatus, distribution system, and distribution program |
US6999966B2 (en) * | 2002-04-23 | 2006-02-14 | International Business Machines Corporation | Content management system and methodology for implementing a complex object using nested/recursive structures |
US6947948B2 (en) * | 2002-04-23 | 2005-09-20 | International Business Machines Corporation | Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology |
US6938050B2 (en) | 2002-04-23 | 2005-08-30 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor |
US6950815B2 (en) * | 2002-04-23 | 2005-09-27 | International Business Machines Corporation | Content management system and methodology featuring query conversion capability for efficient searching |
US6944627B2 (en) * | 2002-04-23 | 2005-09-13 | International Business Machines Corporation | Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy |
US7035854B2 (en) * | 2002-04-23 | 2006-04-25 | International Business Machines Corporation | Content management system and methodology employing non-transferable access tokens to control data access |
US7082455B2 (en) * | 2002-04-23 | 2006-07-25 | International Business Machines Corporation | Method and apparatus of parameter passing of structured data for stored procedures in a content management system |
FI20020808A (en) * | 2002-04-29 | 2003-10-30 | Mediweb Oy | Saving sensitive data |
TWI235580B (en) * | 2002-05-03 | 2005-07-01 | Ke-Cheng Fang | Network security system and method for recording and resisting hacker |
JP3907184B2 (en) * | 2002-06-17 | 2007-04-18 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Database search system and data sharing system |
AU2003244964A1 (en) * | 2002-07-17 | 2004-02-02 | Koninklijke Philips Electronics N.V. | Copy control using digital speed bumps |
US7844717B2 (en) * | 2003-07-18 | 2010-11-30 | Herz Frederick S M | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases |
US8661498B2 (en) * | 2002-09-18 | 2014-02-25 | Symantec Corporation | Secure and scalable detection of preselected data embedded in electronically transmitted messages |
US6667700B1 (en) * | 2002-10-30 | 2003-12-23 | Nbt Technology, Inc. | Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation |
US20040113939A1 (en) * | 2002-12-11 | 2004-06-17 | Eastman Kodak Company | Adaptive display system |
US8141159B2 (en) | 2002-12-31 | 2012-03-20 | Portauthority Technologies Inc. | Method and system for protecting confidential information |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US7392246B2 (en) * | 2003-02-14 | 2008-06-24 | International Business Machines Corporation | Method for implementing access control for queries to a content management system |
JP2004267273A (en) * | 2003-03-05 | 2004-09-30 | Sangaku Renkei Kiko Kyushu:Kk | Medical system |
DE10311327A1 (en) * | 2003-03-14 | 2004-09-23 | Siemens Ag | Multiple user medical data processing electronic data system uses separate application level documentation data access and system level user authentication objects |
US8533840B2 (en) * | 2003-03-25 | 2013-09-10 | DigitalDoors, Inc. | Method and system of quantifying risk |
US7395437B2 (en) * | 2004-01-05 | 2008-07-01 | International Business Machines Corporation | System and method for fast querying of encrypted databases |
US7467386B2 (en) * | 2004-01-16 | 2008-12-16 | International Business Machines Corporation | Parameter passing of data structures where API and corresponding stored procedure are different versions/releases |
US20050234932A1 (en) * | 2004-04-08 | 2005-10-20 | Wong Daniel M | Method and apparatus for facilitating secure centralized administration of databases |
US7681042B2 (en) * | 2004-06-17 | 2010-03-16 | Eruces, Inc. | System and method for dis-identifying sensitive information and associated records |
US20060047625A1 (en) * | 2004-08-16 | 2006-03-02 | Oracle International Corporation | DBMS administration of secure stores |
GB0422007D0 (en) * | 2004-10-05 | 2004-11-03 | Ibm | Method and system for identifying a complete response to a request |
WO2006047654A2 (en) * | 2004-10-25 | 2006-05-04 | Yuanhua Tang | Full text query and search systems and methods of use |
US20080077570A1 (en) * | 2004-10-25 | 2008-03-27 | Infovell, Inc. | Full Text Query and Search Systems and Method of Use |
ATE514267T1 (en) * | 2004-12-22 | 2011-07-15 | Ericsson Telefon Ab L M | MEANS AND METHOD FOR CONTROLLING PERSONAL DATA |
US7672967B2 (en) * | 2005-02-07 | 2010-03-02 | Microsoft Corporation | Method and system for obfuscating data structures by deterministic natural data substitution |
SE0500541L (en) * | 2005-03-08 | 2006-09-09 | Inator Kb | Authorization system and method |
US9069436B1 (en) | 2005-04-01 | 2015-06-30 | Intralinks, Inc. | System and method for information delivery based on at least one self-declared user attribute |
US7660413B2 (en) * | 2005-04-08 | 2010-02-09 | Shahram Partovi | Secure digital couriering system and method |
BRPI0601188B1 (en) * | 2005-04-15 | 2018-06-26 | Seda S.P.A. | ISOLATED CONTAINER; METHOD OF MANUFACTURING THE SAME AND APPARATUS FOR MANUFACTURING |
US7661146B2 (en) * | 2005-07-01 | 2010-02-09 | Privamed, Inc. | Method and system for providing a secure multi-user portable database |
US8266117B2 (en) * | 2005-07-11 | 2012-09-11 | Fujitsu Limited | Method and apparatus for tracing data in audit trail, and computer product |
CN100370460C (en) * | 2005-07-21 | 2008-02-20 | 曾致中 | Database cryptogram search method |
DE202005014177U1 (en) | 2005-09-08 | 2005-11-17 | Seda S.P.A., Arzano | Double-walled beaker comprises an inner wall formed by an inner beaker which is made of a fluid-tight plastic material, and is releasably inserted into an outer beaker forming the outer wall |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US8280867B2 (en) * | 2005-10-20 | 2012-10-02 | Teradata Us, Inc. | Identifying database request sources |
PT1785370E (en) | 2005-11-11 | 2008-06-06 | Seda Spa | Insulated cup |
EP1785265A1 (en) | 2005-11-14 | 2007-05-16 | SEDA S.p.A. | Device for producing a stacking projection on a container wall and container with same |
US20070248232A1 (en) * | 2006-04-10 | 2007-10-25 | Honeywell International Inc. | Cryptographic key sharing method |
US7936878B2 (en) * | 2006-04-10 | 2011-05-03 | Honeywell International Inc. | Secure wireless instrumentation network system |
WO2007131190A2 (en) | 2006-05-05 | 2007-11-15 | Hybir Inc. | Group based complete and incremental computer file backup system, process and apparatus |
GB2457006A (en) | 2006-09-18 | 2009-08-05 | Vodafone Plc | Device communication without revealing mobile station international ISDN number (MSISDN) |
US20080077604A1 (en) * | 2006-09-25 | 2008-03-27 | General Electric Company | Methods of de identifying an object data |
US8239677B2 (en) | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
US20080109253A1 (en) * | 2006-11-03 | 2008-05-08 | Explain My Surgery, Llc | Method for providing information and obtaining consent |
DE202006018406U1 (en) | 2006-12-05 | 2008-04-10 | Seda S.P.A. | packaging |
US8468244B2 (en) | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
US9015301B2 (en) | 2007-01-05 | 2015-04-21 | Digital Doors, Inc. | Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US20090025063A1 (en) * | 2007-07-18 | 2009-01-22 | Novell, Inc. | Role-based access control for redacted content |
US8359270B2 (en) * | 2007-09-07 | 2013-01-22 | Btm Investments Llc | System for identifying an individual and managing an account |
WO2009083922A1 (en) * | 2007-12-28 | 2009-07-09 | Koninklijke Philips Electronics N.V. | Information interchange system and apparatus |
US8353015B2 (en) * | 2008-01-09 | 2013-01-08 | Microsoft Corporation | Trusted internet identity |
US20090228554A1 (en) * | 2008-03-04 | 2009-09-10 | Access Business Group International Llc | Method and system for assigning unique and dynamic information-carrying serial numbers |
US20090228959A1 (en) | 2008-03-04 | 2009-09-10 | Access Business Group International Llc | System and markup language for information extraction from stand-alone devices in webspace |
US8644513B2 (en) * | 2008-05-16 | 2014-02-04 | Oracle International Corporation | Database processing on externally encrypted data |
US20100077489A1 (en) * | 2008-09-23 | 2010-03-25 | Ake Joel H | Method, apparatus, and computer program product for isolating personal data |
EP2182464B1 (en) * | 2008-11-04 | 2018-04-04 | Amadeus S.A.S. | Method and system for storing and retrieving information |
US8364984B2 (en) * | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
US9301191B2 (en) | 2013-09-20 | 2016-03-29 | Telecommunication Systems, Inc. | Quality of service to over the top applications used with VPN |
US20110187857A1 (en) * | 2010-02-02 | 2011-08-04 | Elaine Medlicot | Portable Data Management Device for Animals |
US8924733B2 (en) * | 2010-06-14 | 2014-12-30 | International Business Machines Corporation | Enabling access to removable hard disk drives |
US9058497B2 (en) | 2010-12-23 | 2015-06-16 | Microsoft Technology Licensing, Llc | Cryptographic key management |
US9058323B2 (en) | 2010-12-30 | 2015-06-16 | Ss8 Networks, Inc. | System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data |
US8938534B2 (en) | 2010-12-30 | 2015-01-20 | Ss8 Networks, Inc. | Automatic provisioning of new users of interest for capture on a communication network |
JP5614293B2 (en) * | 2011-01-12 | 2014-10-29 | 富士通株式会社 | COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, INFORMATION PROCESSING DEVICE, AND COMMUNICATION CONTROL METHOD |
US8972612B2 (en) | 2011-04-05 | 2015-03-03 | SSB Networks, Inc. | Collecting asymmetric data and proxy data on a communication network |
US9246882B2 (en) * | 2011-08-30 | 2016-01-26 | Nokia Technologies Oy | Method and apparatus for providing a structured and partially regenerable identifier |
US9183407B2 (en) * | 2011-10-28 | 2015-11-10 | Microsoft Technology Licensing Llc | Permission based query processing |
WO2013112558A1 (en) * | 2012-01-23 | 2013-08-01 | Ferrara Michael N Jr | Secure wireless access to medical data |
FR2987748B1 (en) | 2012-03-12 | 2014-03-07 | Sodamed | EXTERNAL CARDIAC DEFIBRILLATOR SYSTEM FOR DOMESTIC USE |
US9251360B2 (en) | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US9253176B2 (en) | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
AU2013251304B2 (en) | 2012-04-27 | 2018-12-20 | Intralinks, Inc. | Computerized method and system for managing networked secure collaborative exchange |
US9553860B2 (en) | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US9208346B2 (en) * | 2012-09-05 | 2015-12-08 | Telecommunication Systems, Inc. | Persona-notitia intellection codifier |
US9350762B2 (en) | 2012-09-25 | 2016-05-24 | Ss8 Networks, Inc. | Intelligent feedback loop to iteratively reduce incoming network data for analysis |
US9436911B2 (en) | 2012-10-19 | 2016-09-06 | Pearson Education, Inc. | Neural networking system and methods |
US8984650B2 (en) | 2012-10-19 | 2015-03-17 | Pearson Education, Inc. | Privacy server for protecting personally identifiable information |
US9288056B1 (en) | 2015-05-28 | 2016-03-15 | Pearson Education, Inc. | Data access and anonymity management |
US20160042198A1 (en) | 2012-10-19 | 2016-02-11 | Pearson Education, Inc. | Deidentified access of content |
US9160705B2 (en) * | 2013-08-06 | 2015-10-13 | Hewlett-Packard Development Company, L.P. | Identifier management |
US9576153B2 (en) * | 2013-08-23 | 2017-02-21 | Cellco Partnership | Device and method for providing information from a backend component to a frontend component by a secure device management abstraction and unification module |
US10898076B2 (en) | 2013-09-30 | 2021-01-26 | The Research Foundation For The State University Of New York | Transmission and medium access control techniques for ultrasonic communications in the body |
WO2015073708A1 (en) | 2013-11-14 | 2015-05-21 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
US9292705B2 (en) * | 2014-02-21 | 2016-03-22 | Lens Ventures, Llc | Management of drone operations and security in a pervasive computing environment |
WO2015164521A1 (en) | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US9830593B2 (en) | 2014-04-26 | 2017-11-28 | Ss8 Networks, Inc. | Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping |
WO2015182842A1 (en) * | 2014-05-28 | 2015-12-03 | Byung Chul Lee | Method for controlling information registration and query for protecting private information |
US10181051B2 (en) | 2016-06-10 | 2019-01-15 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US9729583B1 (en) | 2016-06-10 | 2017-08-08 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US9864786B2 (en) * | 2014-11-10 | 2018-01-09 | Red Hat, Inc. | Native federation view suggestion |
US9921561B2 (en) * | 2015-03-17 | 2018-03-20 | Secure Cloud Systems, Inc. | Real time control of a remote device |
WO2016193962A1 (en) * | 2015-06-02 | 2016-12-08 | K2View Ltd | Encryption directed database management system and method |
US10033702B2 (en) | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US10706447B2 (en) | 2016-04-01 | 2020-07-07 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments |
US10423996B2 (en) | 2016-04-01 | 2019-09-24 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments |
US20220164840A1 (en) | 2016-04-01 | 2022-05-26 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US9928266B2 (en) | 2016-06-03 | 2018-03-27 | Workiva Inc. | Method and computing device for minimizing accesses to data storage in conjunction with maintaining a B-tree |
US10204154B2 (en) | 2016-06-10 | 2019-02-12 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US10353673B2 (en) | 2016-06-10 | 2019-07-16 | OneTrust, LLC | Data processing systems for integration of consumer feedback with data subject access requests and related methods |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10839102B2 (en) | 2016-06-10 | 2020-11-17 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US10706379B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems for automatic preparation for remediation and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US10944725B2 (en) | 2016-06-10 | 2021-03-09 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10437412B2 (en) | 2016-06-10 | 2019-10-08 | OneTrust, LLC | Consent receipt management systems and related methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US10726158B2 (en) | 2016-06-10 | 2020-07-28 | OneTrust, LLC | Consent receipt management and automated process blocking systems and related methods |
US10708305B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Automated data processing systems and methods for automatically processing requests for privacy-related information |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US10565236B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10509894B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10438017B2 (en) * | 2016-06-10 | 2019-10-08 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US10454973B2 (en) | 2016-06-10 | 2019-10-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US10853501B2 (en) | 2016-06-10 | 2020-12-01 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10796260B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Privacy management systems and methods |
US10909265B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US10585968B2 (en) | 2016-06-10 | 2020-03-10 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10496803B2 (en) | 2016-06-10 | 2019-12-03 | OneTrust, LLC | Data processing systems and methods for efficiently assessing the risk of privacy campaigns |
US10776518B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Consent receipt management systems and related methods |
US10713387B2 (en) | 2016-06-10 | 2020-07-14 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US10848523B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10740487B2 (en) | 2016-06-10 | 2020-08-11 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10706131B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems and methods for efficiently assessing the risk of privacy campaigns |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US10565161B2 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10430740B2 (en) | 2016-06-10 | 2019-10-01 | One Trust, LLC | Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods |
US10878127B2 (en) | 2016-06-10 | 2020-12-29 | OneTrust, LLC | Data subject access request processing systems and related methods |
US10452866B2 (en) | 2016-06-10 | 2019-10-22 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10496846B1 (en) | 2016-06-10 | 2019-12-03 | OneTrust, LLC | Data processing and communications systems and methods for the efficient implementation of privacy by design |
US10783256B2 (en) | 2016-06-10 | 2020-09-22 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US10909488B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US10776517B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods |
US10565397B1 (en) | 2016-06-10 | 2020-02-18 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10706174B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data processing systems for prioritizing data subject access requests for fulfillment and related methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US10592648B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Consent receipt management systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US10169609B1 (en) | 2016-06-10 | 2019-01-01 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10467432B2 (en) | 2016-06-10 | 2019-11-05 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10242228B2 (en) | 2016-06-10 | 2019-03-26 | OneTrust, LLC | Data processing systems for measuring privacy maturity within an organization |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US10416966B2 (en) | 2016-06-10 | 2019-09-17 | OneTrust, LLC | Data processing systems for identity validation of data subject access requests and related methods |
US10509920B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US10685140B2 (en) | 2016-06-10 | 2020-06-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US10706176B2 (en) | 2016-06-10 | 2020-07-07 | OneTrust, LLC | Data-processing consent refresh, re-prompt, and recapture systems and related methods |
US10235534B2 (en) | 2016-06-10 | 2019-03-19 | OneTrust, LLC | Data processing systems for prioritizing data subject access requests for fulfillment and related methods |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US10803200B2 (en) | 2016-06-10 | 2020-10-13 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US10776514B2 (en) | 2016-06-10 | 2020-09-15 | OneTrust, LLC | Data processing systems for the identification and deletion of personal data in computer systems |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US10762236B2 (en) | 2016-06-10 | 2020-09-01 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US10949170B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for integration of consumer feedback with data subject access requests and related methods |
US10592692B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US10642870B2 (en) | 2016-06-10 | 2020-05-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10318761B2 (en) | 2016-06-10 | 2019-06-11 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US10440062B2 (en) | 2016-06-10 | 2019-10-08 | OneTrust, LLC | Consent receipt management systems and related methods |
US10885485B2 (en) | 2016-06-10 | 2021-01-05 | OneTrust, LLC | Privacy management systems and methods |
US10798133B2 (en) | 2016-06-10 | 2020-10-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10607028B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11023842B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US10284604B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US10572686B2 (en) | 2016-06-10 | 2020-02-25 | OneTrust, LLC | Consent receipt management systems and related methods |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10873606B2 (en) | 2016-06-10 | 2020-12-22 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10275614B2 (en) | 2016-06-10 | 2019-04-30 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US10949565B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10769301B2 (en) | 2016-06-10 | 2020-09-08 | OneTrust, LLC | Data processing systems for webform crawling to map processing activities and related methods |
US10846433B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing consent management systems and related methods |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US10586075B2 (en) | 2016-06-10 | 2020-03-10 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US10452864B2 (en) | 2016-06-10 | 2019-10-22 | OneTrust, LLC | Data processing systems for webform crawling to map processing activities and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US10896394B2 (en) | 2016-06-10 | 2021-01-19 | OneTrust, LLC | Privacy management systems and methods |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US10503926B2 (en) | 2016-06-10 | 2019-12-10 | OneTrust, LLC | Consent receipt management systems and related methods |
US10678945B2 (en) | 2016-06-10 | 2020-06-09 | OneTrust, LLC | Consent receipt management systems and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US10282559B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10606916B2 (en) | 2016-06-10 | 2020-03-31 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US10614247B2 (en) | 2016-06-10 | 2020-04-07 | OneTrust, LLC | Data processing systems for automated classification of personal information from documents and related methods |
US10282700B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US10510031B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
EP3336718B1 (en) | 2016-12-16 | 2020-02-12 | CompuGroup Medical SE | Method for querying a database |
EP3340071B1 (en) | 2016-12-23 | 2021-06-09 | CompuGroup Medical SE | Offline preparation for bulk inserts |
US10467551B2 (en) | 2017-06-12 | 2019-11-05 | Ford Motor Company | Portable privacy management |
US10013577B1 (en) | 2017-06-16 | 2018-07-03 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11012722B2 (en) | 2018-02-22 | 2021-05-18 | Secure Cloud Systems, Inc. | System and method for securely transferring data |
US11329963B2 (en) | 2018-02-22 | 2022-05-10 | Eclypses, Inc. | System and method for securely transferring data |
US10572683B2 (en) | 2018-05-13 | 2020-02-25 | Richard Jay Langley | Individual data unit and methods and systems for enhancing the security of user data |
US10803202B2 (en) | 2018-09-07 | 2020-10-13 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US10972261B1 (en) * | 2019-10-18 | 2021-04-06 | Via Science, Inc. | Secure data processing |
WO2021146748A1 (en) * | 2020-01-17 | 2021-07-22 | Acucela Inc. | Database of retinal physiology derived from ophthalmic measurements performed by patients |
US11405203B2 (en) | 2020-02-17 | 2022-08-02 | Eclypses, Inc. | System and method for securely transferring data using generated encryption keys |
WO2022011142A1 (en) | 2020-07-08 | 2022-01-13 | OneTrust, LLC | Systems and methods for targeted data discovery |
EP4189569A1 (en) | 2020-07-28 | 2023-06-07 | OneTrust LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
EP4241173A1 (en) | 2020-11-06 | 2023-09-13 | OneTrust LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
WO2022170254A1 (en) | 2021-02-08 | 2022-08-11 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11522707B2 (en) | 2021-03-05 | 2022-12-06 | Eclypses, Inc. | System and method for detecting compromised devices |
US11720693B2 (en) | 2021-03-05 | 2023-08-08 | Eclypses, Inc. | System and method for securely transferring data |
WO2022192269A1 (en) | 2021-03-08 | 2022-09-15 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5202921A (en) * | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
US5539824A (en) * | 1993-12-08 | 1996-07-23 | International Business Machines Corporation | Method and system for key distribution and authentication in a data communication network |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5245656A (en) * | 1992-09-09 | 1993-09-14 | Bell Communications Research, Inc. | Security method for private information delivery and filtering in public networks |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
SE501128C2 (en) * | 1993-11-30 | 1994-11-21 | Anonymity Prot In Sweden Ab | Device and method for storing data information |
US5420926A (en) * | 1994-01-05 | 1995-05-30 | At&T Corp. | Anonymous credit card transactions |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5557346A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
JP2977476B2 (en) * | 1995-11-29 | 1999-11-15 | 株式会社日立製作所 | Security method |
US5768391A (en) * | 1995-12-22 | 1998-06-16 | Mci Corporation | System and method for ensuring user privacy in network communications |
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US5920630A (en) * | 1997-02-25 | 1999-07-06 | United States Of America | Method of public key cryptography that includes key escrow |
-
1999
- 1999-01-13 US US09/229,694 patent/US6148342A/en not_active Expired - Fee Related
- 1999-01-21 NZ NZ506554A patent/NZ506554A/en unknown
- 1999-01-21 CN CNB998044830A patent/CN1175358C/en not_active Expired - Fee Related
- 1999-01-21 EP EP99903299A patent/EP1078318A4/en not_active Withdrawn
- 1999-01-21 WO PCT/US1999/001366 patent/WO1999038080A1/en active IP Right Grant
- 1999-01-21 CA CA002319311A patent/CA2319311A1/en not_active Abandoned
- 1999-01-21 AU AU23355/99A patent/AU761680B2/en not_active Ceased
- 1999-01-21 JP JP2000528918A patent/JP2002501250A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5202921A (en) * | 1991-04-01 | 1993-04-13 | International Business Machines Corporation | Method and apparatus for authenticating users of a communication system to each other |
US5539824A (en) * | 1993-12-08 | 1996-07-23 | International Business Machines Corporation | Method and system for key distribution and authentication in a data communication network |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1099996A1 (en) * | 1999-11-03 | 2001-05-16 | Ford Global Technologies, Inc. | Privacy data escrow system and method |
US6449621B1 (en) | 1999-11-03 | 2002-09-10 | Ford Global Technologies, Inc. | Privacy data escrow system and method |
EP2216742A1 (en) * | 2009-02-09 | 2010-08-11 | C. Patrick Reich | Mobile payment method and devices |
US9558228B2 (en) | 2012-11-08 | 2017-01-31 | Compugroup Medical Se | Client computer for querying a database stored on a server via a network |
US9141822B2 (en) | 2012-11-08 | 2015-09-22 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
EP2731044A3 (en) * | 2012-11-08 | 2015-12-09 | CompuGroup Medical AG | Client computer for querying a database stored on a server via a network |
EP2731034A3 (en) * | 2012-11-08 | 2015-12-09 | CompuGroup Medical AG | Client computer for querying a database stored on a server via a network |
US9495555B2 (en) | 2012-11-08 | 2016-11-15 | CompuGroup Medical AG | Client computer for querying a database stored on a server via a network |
EP2731040B1 (en) * | 2012-11-08 | 2017-04-19 | CompuGroup Medical SE | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
US10002151B2 (en) | 2012-11-08 | 2018-06-19 | Compugroup Medical Se | Client computer for updating a database stored on a server via a network |
US10002152B2 (en) | 2012-11-08 | 2018-06-19 | Compugroup Medical Se | Client computer for updating a database stored on a server via a network |
EP2860657A1 (en) * | 2013-10-10 | 2015-04-15 | Kaspersky Lab, ZAO | Determining a security status of potentially malicious files |
US8863284B1 (en) | 2013-10-10 | 2014-10-14 | Kaspersky Lab Zao | System and method for determining a security status of potentially malicious files |
Also Published As
Publication number | Publication date |
---|---|
JP2002501250A (en) | 2002-01-15 |
AU761680B2 (en) | 2003-06-05 |
CN1175358C (en) | 2004-11-10 |
CA2319311A1 (en) | 1999-07-29 |
US6148342A (en) | 2000-11-14 |
NZ506554A (en) | 2002-03-28 |
CN1295688A (en) | 2001-05-16 |
EP1078318A1 (en) | 2001-02-28 |
EP1078318A4 (en) | 2008-12-31 |
AU2335599A (en) | 1999-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6148342A (en) | Secure database management system for confidential records using separately encrypted identifier and access request | |
US6785810B1 (en) | System and method for providing secure transmission, search, and storage of data | |
US20190258616A1 (en) | Privacy compliant consent and data access management system and methods | |
US5530758A (en) | Operational methods for a secure node in a computer network | |
CA2231082C (en) | Method and apparatus for storing and controlling access to information | |
US5557765A (en) | System and method for data recovery | |
US7788700B1 (en) | Enterprise security system | |
JP2005505863A (en) | Data processing system for patient data | |
AU2001244426B2 (en) | Automatic identity protection system with remote third party monitoring | |
WO2002006948A1 (en) | Method for protecting the privacy, security, and integrity of sensitive data | |
CA2389443A1 (en) | System for providing dynamic data informed consent to provide data privacy and security in database systems and in networked communications | |
Kohane et al. | Health information identification and de-identification toolkit. | |
CN115460228A (en) | Medical data access control method and system | |
Ibrahim | New secure solutions for privacy and access control in health information exchange | |
Kumar et al. | Achieving forward secrecy and unlinkability in cloud-based personal health record system | |
TW515957B (en) | A secure database management system for confidential records | |
WO2004031922A2 (en) | Method and apparatus for secure data storage | |
Simpson et al. | Federation for a Secure Enterprise | |
Reinert | Cryptographic techniques for privacy and access control in cloud-based applications | |
Quantin et al. | Combining hashing and enciphering algorithms for epidemiological analysis of gathered data | |
EP4292003A1 (en) | Personal data anonymization system (pdas) with customized token | |
EP1335558A1 (en) | Methods and apparatus for secure data management, secure data retrieval and routing | |
Almarzooqi | A Security Scheme for Cloud Based Electronic Health Systems | |
Slamanig et al. | Electronic health records: An enhanced security paradigm to preserve patient’s privacy | |
AU2015201813A1 (en) | Privacy compliant consent and data access management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99804483.0 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AT AU AZ BA BB BG BR BY CA CH CN CU CZ CZ DE DE DK DK EE EE ES FI FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2319311 Country of ref document: CA Ref document number: 2319311 Country of ref document: CA Kind code of ref document: A Ref document number: 2000 528918 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999903299 Country of ref document: EP Ref document number: 506554 Country of ref document: NZ Ref document number: 23355/99 Country of ref document: AU |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1999903299 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 23355/99 Country of ref document: AU |