Sensitive data aliasing
First Claim
Patent Images
1. A computerized method of encoding data sets containing sensitive information and generating aliases to represent data elements, the method comprising:
- providing access to sensitive personal data sets in a storage device, wherein the sensitive personal data sets include encrypted data elements using an encryption method, wherein the encrypted data elements are used to disguise or hide user-identification information; and
by operating at least one computer,using aliases independent from the data elements to generate an association between the aliases and the encrypted data elements; and
providing at least two levels of restricted access to the encrypted data elements, including a first level through which authorized users retrieve information from or associated with the sensitive personal data sets but without the user-identification information, wherein the user-identification information is disguised or hidden by way of a first encryption method, and including a second level through which another set of authorized users retrieve information from or associated with the sensitive personal data sets and with access to the user-identification information even though the user-identification information is disguised or hidden by way of the first encryption method, wherein the second level of the restricted access includes carrying out a method of decryption.
6 Assignments
0 Petitions
Accused Products
Abstract
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access.
-
Citations
15 Claims
-
1. A computerized method of encoding data sets containing sensitive information and generating aliases to represent data elements, the method comprising:
-
providing access to sensitive personal data sets in a storage device, wherein the sensitive personal data sets include encrypted data elements using an encryption method, wherein the encrypted data elements are used to disguise or hide user-identification information; and by operating at least one computer, using aliases independent from the data elements to generate an association between the aliases and the encrypted data elements; and providing at least two levels of restricted access to the encrypted data elements, including a first level through which authorized users retrieve information from or associated with the sensitive personal data sets but without the user-identification information, wherein the user-identification information is disguised or hidden by way of a first encryption method, and including a second level through which another set of authorized users retrieve information from or associated with the sensitive personal data sets and with access to the user-identification information even though the user-identification information is disguised or hidden by way of the first encryption method, wherein the second level of the restricted access includes carrying out a method of decryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification