×

Bounded access to critical data

  • US 10,320,757 B1
  • Filed: 06/06/2014
  • Issued: 06/11/2019
  • Est. Priority Date: 06/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, from a first device associated with user profile data, first user data associated with a first user;

    storing encrypted first user data in a data store, wherein the encrypted first user data corresponds to the first user data;

    receiving, from a second device unassociated with the user profile data, a first request for data associated with a plurality of users;

    sending, to the second device and after receiving the first request, the encrypted first user data;

    sending, to the second device and after receiving the first request, a key used to decrypt the encrypted first user data;

    receiving, from the first device, a second request to delete data associated with the user profile data;

    deleting, after receiving the second request, the encrypted first user data from the data store;

    determining first data generated from the encrypted first user data, the first data being generated by the second device;

    determining a correlation between the first data and the encrypted first user data;

    determining the correlation fails to satisfy a condition representing a lack of correlation; and

    based at least in part on determining the correlation fails to satisfy the condition, sending, to the second device, a signal indicating the first data is to be deleted.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×