WO2006009648A3 - System and method for dis-identifying sensitive information and assocaites records - Google Patents

System and method for dis-identifying sensitive information and assocaites records Download PDF

Info

Publication number
WO2006009648A3
WO2006009648A3 PCT/US2005/020696 US2005020696W WO2006009648A3 WO 2006009648 A3 WO2006009648 A3 WO 2006009648A3 US 2005020696 W US2005020696 W US 2005020696W WO 2006009648 A3 WO2006009648 A3 WO 2006009648A3
Authority
WO
WIPO (PCT)
Prior art keywords
records
information
sensitive
module
dis
Prior art date
Application number
PCT/US2005/020696
Other languages
French (fr)
Other versions
WO2006009648A2 (en
Inventor
Bassam Khulusi
Ognjen Vasic
Original Assignee
Eruces Inc
Bassam Khulusi
Ognjen Vasic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eruces Inc, Bassam Khulusi, Ognjen Vasic filed Critical Eruces Inc
Priority to EP05760375A priority Critical patent/EP1766823A4/en
Publication of WO2006009648A2 publication Critical patent/WO2006009648A2/en
Publication of WO2006009648A3 publication Critical patent/WO2006009648A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

Abstract

A computer-based system (10) and method for dis-identifying personal identifiable information (152, 162) and associated records (172) is disclosed. The system includes a system manager (20) module, an encryption and key management module (30), and a storage module (40). The system manager module (20) stores related sensitive information portions (152) of the personal identifiable information (152, 162), non-sensitive information portions (162) of the personal identifiable information, and associated records (172) in separate databases (100, 110, 120 or 150, 160, 170) in storage module (40) with each database record including one or more hidden links generated by the encryption and key management module (30) that can be used to determine the related records or information in one of the other databases. The hidden links are encrypted so that the relationships between the database records are hidden. The methods provide for storing sensitive and non-sensitive personal identifiable information and associated records as database records, and for storing the hidden links associated with these database records.
PCT/US2005/020696 2004-06-17 2005-06-13 System and method for dis-identifying sensitive information and assocaites records WO2006009648A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05760375A EP1766823A4 (en) 2004-06-17 2005-06-13 System and method for dis-identifying sensitive information and assocaites records

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/871,179 US7681042B2 (en) 2004-06-17 2004-06-17 System and method for dis-identifying sensitive information and associated records
US10/871,179 2004-06-17

Publications (2)

Publication Number Publication Date
WO2006009648A2 WO2006009648A2 (en) 2006-01-26
WO2006009648A3 true WO2006009648A3 (en) 2006-10-19

Family

ID=35481934

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/020696 WO2006009648A2 (en) 2004-06-17 2005-06-13 System and method for dis-identifying sensitive information and assocaites records

Country Status (5)

Country Link
US (1) US7681042B2 (en)
EP (2) EP2418795A1 (en)
CN (1) CN101002417A (en)
TW (1) TWI388183B (en)
WO (1) WO2006009648A2 (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2881248A1 (en) * 2005-01-26 2006-07-28 France Telecom Personal medical data management system for insured patient, has computing subsystem with units to generate common key from identification data of person, and another subsystem with database associating sensitive personal data to key
EP1911191B1 (en) * 2005-08-05 2017-12-06 Hewlett-Packard Enterprise Development LP System, method and apparatus for cryptography key management for mobile devices
US8380631B2 (en) 2006-07-19 2013-02-19 Mvisum, Inc. Communication of emergency medical data over a vulnerable system
US8396804B1 (en) 2006-07-19 2013-03-12 Mvisum, Inc. System for remote review of clinical data
US7974924B2 (en) 2006-07-19 2011-07-05 Mvisum, Inc. Medical data encryption for communication over a vulnerable system
WO2009067248A1 (en) * 2007-11-25 2009-05-28 Trilliant Networks, Inc. Application layer authorization token and method
US8401183B2 (en) * 2007-12-27 2013-03-19 Verizon Patent And Licensing Inc. Method and system for keying and securely storing data
US8813247B1 (en) * 2008-04-07 2014-08-19 Alex I. Alten Providing cryptographic security for objective-oriented programming files
DE102008050739A1 (en) * 2008-10-08 2010-04-15 Ralf Sommer Data processing device with certifiable encryption
WO2010119553A1 (en) * 2009-04-16 2010-10-21 リプレックス株式会社 Service system
US8538027B2 (en) * 2009-10-16 2013-09-17 Brocade Communications Systems, Inc. Storage of keyID in customer data area
DE102011003784B3 (en) 2011-02-08 2012-08-16 Siemens Aktiengesellschaft Securing access to distributed data in an insecure data network
US9947004B2 (en) 2012-06-28 2018-04-17 Green Dot Corporation Wireless client transaction systems and related methods
US20140019322A1 (en) 2012-07-13 2014-01-16 Green Dot Corporation Mobile banking systems and related methods
CN105809042A (en) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 Information protection method and device, information display method and device, and terminal
US10735385B2 (en) * 2015-02-27 2020-08-04 Samsung Electronics Co., Ltd. Adaptive and efficient database protection and migration with device state changes
CN106033461A (en) * 2015-03-19 2016-10-19 阿里巴巴集团控股有限公司 Sensitive information query method and apparatus
US10430788B2 (en) 2015-08-06 2019-10-01 Green Dot Corporation Systems and methods for fund transfers
CN105635131B (en) * 2015-12-25 2019-06-25 东软集团股份有限公司 Transmit data method, device and server
US10460129B2 (en) 2017-01-12 2019-10-29 Ca, Inc. System and method for managing cooperative synthetic identities for privacy protection through identity obfuscation and synthesis
US10592693B2 (en) 2017-01-12 2020-03-17 Ca, Inc. System and method for analyzing cooperative synthetic identities
US10826691B2 (en) * 2017-05-30 2020-11-03 Servicenow, Inc. Edge encryption
US10579822B1 (en) * 2017-09-01 2020-03-03 Workday, Inc. Secure commingling of tenant isolated data
US11715154B2 (en) 2017-09-22 2023-08-01 Green Dot Corporation Systems and methods for managing accounts in a financial services system
US11327665B2 (en) * 2019-09-20 2022-05-10 International Business Machines Corporation Managing data on volumes
US11328089B2 (en) 2019-09-20 2022-05-10 International Business Machines Corporation Built-in legal framework file management
US11443056B2 (en) 2019-09-20 2022-09-13 International Business Machines Corporation File access restrictions enforcement
US11188680B2 (en) 2019-09-20 2021-11-30 International Business Machines Corporation Creating research study corpus
US11106813B2 (en) 2019-09-20 2021-08-31 International Business Machines Corporation Credentials for consent based file access
US11321488B2 (en) 2019-09-20 2022-05-03 International Business Machines Corporation Policy driven data movement
US20210409204A1 (en) * 2020-06-30 2021-12-30 Bank Of America Corporation Encryption of protected data for transmission over a web interface
US11861039B1 (en) * 2020-09-28 2024-01-02 Amazon Technologies, Inc. Hierarchical system and method for identifying sensitive content in data
FR3124341B1 (en) * 2021-06-21 2023-10-27 William Godin Method and assembly allowing user terminals to exchange personal data in complete confidentiality with a server platform

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010019614A1 (en) * 2000-10-20 2001-09-06 Medna, Llc Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data
US20030021417A1 (en) * 2000-10-20 2003-01-30 Ognjen Vasic Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data

Family Cites Families (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4423287A (en) * 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
CA1238427A (en) * 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography
DE3775924D1 (en) * 1987-04-22 1992-02-20 Ibm SECRET KEY MANAGEMENT.
US5301270A (en) * 1989-12-18 1994-04-05 Anderson Consulting Computer-assisted software engineering system for cooperative processing environments
JP2865827B2 (en) * 1990-08-13 1999-03-08 株式会社日立製作所 Data storage method in conference system
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5729608A (en) * 1993-07-27 1998-03-17 International Business Machines Corp. Method and system for providing secure key distribution in a communication system
US5369702A (en) * 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5680452A (en) * 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
CA2138830A1 (en) * 1994-03-03 1995-09-04 Jamie Joanne Marschner Real-time administration-translation arrangement
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5533123A (en) * 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
US6044154A (en) * 1994-10-31 2000-03-28 Communications Devices, Inc. Remote generated, device identifier key for use with a dual-key reflexive encryption security system
US5682524A (en) * 1995-05-26 1997-10-28 Starfish Software, Inc. Databank system with methods for efficiently storing non-uniform data records
US7171480B2 (en) * 2001-01-29 2007-01-30 Sony Computer Entertainment America Inc. Method and system for providing auxiliary content located on local storage during download/access of primary content over a network
US5778072A (en) * 1995-07-07 1998-07-07 Sun Microsystems, Inc. System and method to transparently integrate private key operations from a smart card with host-based encryption services
US5625693A (en) * 1995-07-07 1997-04-29 Thomson Consumer Electronics, Inc. Apparatus and method for authenticating transmitting applications in an interactive TV system
US5764772A (en) * 1995-12-15 1998-06-09 Lotus Development Coporation Differential work factor cryptography method and system
JP3627384B2 (en) * 1996-01-17 2005-03-09 富士ゼロックス株式会社 Information processing apparatus with software protection function and information processing method with software protection function
US5870468A (en) * 1996-03-01 1999-02-09 International Business Machines Corporation Enhanced data privacy for portable computers
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
SE506853C2 (en) 1996-06-20 1998-02-16 Anonymity Prot In Sweden Ab Method of data processing
US5757925A (en) * 1996-07-23 1998-05-26 Faybishenko; Yaroslav Secure platform independent cross-platform remote execution computer system and method
US5796830A (en) * 1996-07-29 1998-08-18 International Business Machines Corporation Interoperable cryptographic key recovery system
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US5949882A (en) * 1996-12-13 1999-09-07 Compaq Computer Corporation Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
US5907618A (en) * 1997-01-03 1999-05-25 International Business Machines Corporation Method and apparatus for verifiably providing key recovery information in a cryptographic system
US6289451B1 (en) * 1997-04-18 2001-09-11 Sun Microsystems, Inc. System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
GB9712459D0 (en) 1997-06-14 1997-08-20 Int Computers Ltd Secure database system
US6058188A (en) * 1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system
US6249866B1 (en) * 1997-09-16 2001-06-19 Microsoft Corporation Encrypting file system and method
JPH11143780A (en) 1997-11-05 1999-05-28 Hitachi Ltd Method and device for managing secret information in database
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6148342A (en) * 1998-01-27 2000-11-14 Ho; Andrew P. Secure database management system for confidential records using separately encrypted identifier and access request
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
TW399301B (en) * 1998-04-18 2000-07-21 United Microelectronics Corp Manufacturing method of bit line
US6785810B1 (en) * 1999-08-31 2004-08-31 Espoc, Inc. System and method for providing secure transmission, search, and storage of data
US6449621B1 (en) * 1999-11-03 2002-09-10 Ford Global Technologies, Inc. Privacy data escrow system and method
SE9904094D0 (en) 1999-11-12 1999-11-12 Protegrity Research & Dev Method for reencryption of a database
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
FR2810434A1 (en) 2000-06-17 2001-12-21 Espace Cx Com Medical record storage and transfer system includes coding system with dual keys to ensure confidentiality and security of data
US7111005B1 (en) 2000-10-06 2006-09-19 Oracle International Corporation Method and apparatus for automatic database encryption
US7315859B2 (en) * 2000-12-15 2008-01-01 Oracle International Corp. Method and apparatus for management of encrypted data through role separation
US20030208686A1 (en) * 2002-05-06 2003-11-06 Thummalapally Damodar R. Method of data protection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010019614A1 (en) * 2000-10-20 2001-09-06 Medna, Llc Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data
US20030021417A1 (en) * 2000-10-20 2003-01-30 Ognjen Vasic Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data

Also Published As

Publication number Publication date
US7681042B2 (en) 2010-03-16
EP1766823A4 (en) 2007-08-08
CN101002417A (en) 2007-07-18
TW200623785A (en) 2006-07-01
EP1766823A2 (en) 2007-03-28
US20050283620A1 (en) 2005-12-22
EP2418795A1 (en) 2012-02-15
TWI388183B (en) 2013-03-01
WO2006009648A2 (en) 2006-01-26

Similar Documents

Publication Publication Date Title
WO2006009648A3 (en) System and method for dis-identifying sensitive information and assocaites records
SG141467A1 (en) Method to chain events in a system event log
Wogalter et al. Warnings and risk communication
Karr et al. Secure regression on distributed databases
WO2004112004A3 (en) Multimedia storage and access protocol
WO2006023995A3 (en) Methods and apparatus for recording write requests directed to a data store
GB2440697A (en) Computer security system and method
WO2005119960A3 (en) Structure preserving database encryption method and system
WO2005086712A3 (en) Analyst search engine method and system
US7177875B2 (en) System and method for creating and using computer databases having schema integrated into data structure
WO2005124677A3 (en) System and method for self-monitoring credit information
WO2007046843A3 (en) Method and apparatus for managing personal medical information in a secure manner
WO2002029561A8 (en) System and method for tracking and documenting changes to compu ter readable code
TW200627393A (en) Data processing method, information recording medium manufacture management system, record data generation device and method, and computer program
TW200607333A (en) Information recording medium, methods of recording/playback information onto/from recording medium
TW200501119A (en) Recording medium having data structure for managing at least a data area of the recording medium and recording and reproducing methods and apparatuses
EP1760719A3 (en) Write-once type recording medium, recording apparatus and method for the same, reproducing apparatus and method for the same, and computer program
CN111125776A (en) Operation data tamper-proofing method based on block chain
TW200630989A (en) Information reproducing apparatus and information reproducing method
WO2005043346A3 (en) A system and method for providing a national medical records database
WO2005114463A3 (en) Method and system for web-based enterprise change and configuration management reports
US8307001B2 (en) Auditing of curation information
CN106909665A (en) A kind of patent retrieval method based on body
CN111935142A (en) Intelligent family tree editing method and system based on cloud data
EP1801795A4 (en) Information recording medium, apparatus and method for recording information, and computer program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 2005760375

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 271/DELNP/2007

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 200580026925.2

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2005760375

Country of ref document: EP