Systems and methods to secure searchable data having personally identifiable information
First Claim
1. A method implemented in a computer system hosting a three-dimensional virtual reality world, the method comprising:
- storing, in the computer system, a global key;
storing, in the computer system but separately from the global key, a set of searchable records, wherein each respective record in the set of searchable records includes;
a searchable hash of at least a portion of personally identifiable information; and
an encrypted identity, wherein the encrypted identity is decryptable, using an encryption key generated based at least in part on the searchable hash and the global key, to provide an identity of a user having the personally identifiable information, the identity uniquely identifying the user among users of the three-dimensional virtual reality world;
receiving, in the computer system, a search request having at least a portion of first personally identifiable information;
generating, by the computer system using a first cryptographic hash function, a first searchable hash from at least the portion of the first personally identifiable information;
determining, by the computer system and from the set of searchable records, a first searchable record having a searchable hash that is equal to the first searchable hash;
generating, by the computer system, a first encryption key from the first searchable hash and the global key;
extracting, by the computing system from the first searchable record, a first encrypted identity;
decrypting, by the computing system using the first encryption key, the first encrypted identity to obtain a first identity of a first user of the three-dimensional virtual reality world; and
providing, by the computing system, a search result based at least in part on the first identity of the first user.
9 Assignments
0 Petitions
Accused Products
Abstract
A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system stores a set of searchable records, each having: a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, decryptable using an encryption key generated based at least in part on the searchable hash and a global key. In response to a search request identifying at least a portion of personally identifiable information as a search criterion, the computer system generates a hash of the search criterion, and finds a matching searchable record that has a searchable hash equal to the hash computed from the search criterion. An encryption key is computed based on the global key and the matched searchable record to decrypt an encrypted identity of a user having at least the portion of personally identifiable information that is the search criterion in the search request.
21 Citations
20 Claims
-
1. A method implemented in a computer system hosting a three-dimensional virtual reality world, the method comprising:
-
storing, in the computer system, a global key; storing, in the computer system but separately from the global key, a set of searchable records, wherein each respective record in the set of searchable records includes; a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, wherein the encrypted identity is decryptable, using an encryption key generated based at least in part on the searchable hash and the global key, to provide an identity of a user having the personally identifiable information, the identity uniquely identifying the user among users of the three-dimensional virtual reality world; receiving, in the computer system, a search request having at least a portion of first personally identifiable information; generating, by the computer system using a first cryptographic hash function, a first searchable hash from at least the portion of the first personally identifiable information; determining, by the computer system and from the set of searchable records, a first searchable record having a searchable hash that is equal to the first searchable hash; generating, by the computer system, a first encryption key from the first searchable hash and the global key; extracting, by the computing system from the first searchable record, a first encrypted identity; decrypting, by the computing system using the first encryption key, the first encrypted identity to obtain a first identity of a first user of the three-dimensional virtual reality world; and providing, by the computing system, a search result based at least in part on the first identity of the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computing system hosting a three-dimensional virtual reality world, the system comprising:
-
a key master; a server system; a first data storage device controlled by the server system and storing; a three-dimensional model of the virtual reality world; avatar models representing residences of the virtual reality world; and a set of searchable records, wherein each respective record in the set of searchable records includes; a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, wherein the encrypted identity is decryptable, using an encryption key generated based at least in part on the searchable hash and a global key, to provide an identity of a user having the personally identifiable information, the identity uniquely identifying the user among users of the three-dimensional virtual reality world; and a second data storage device controlled by the key master and storing the global key; wherein, in response to a search request having at least a portion of first personally identifiable information, the server system; generates, using a first cryptographic hash function, a first searchable hash from at least the portion of the first personally identifiable information; and identifies, from the set of searchable records, a first searchable record having a searchable hash that is equal to the first searchable hash; wherein, after the first searchable record is identified for the search request, the key master generates a first encryption key from the first searchable hash and the global key; and wherein the server system provides a search result responsive to the search request by; extracting, from the first searchable record, a first encrypted identity; and decrypting, using the first encryption key, the first encrypted identity to obtain a first identity of a first user of the three-dimensional virtual reality world. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory computer storage medium storing instructions which, when executed on a computer system, cause the computer system to perform a method, the method comprising:
-
storing, in the computer system, a global key; storing, in the computer system but separately from the global key, a set of searchable records, wherein each respective record in the set of searchable records includes; a searchable hash of at least a portion of personally identifiable information; and an encrypted identity, wherein the encrypted identity is decryptable, using an encryption key generated based at least in part on the searchable hash and the global key, to provide an identity of a user having the personally identifiable information, the identity uniquely identifying the user among users of the computer system; receiving, in the computer system, a search request having at least a portion of first personally identifiable information; generating, by the computer system using a first cryptographic hash function, a first searchable hash from at least the portion of the first personally identifiable information; determining, by the computer system and from the set of searchable records, a first searchable record having a searchable hash that is equal to the first searchable hash; generating, by the computer system, a first encryption key from the first searchable hash and the global key; extracting, by the computing system from the first searchable record, a first encrypted identity; decrypting, by the computing system using the first encryption key, the first encrypted identity to obtain a first identity of a first user of the computer system; and providing, by the computing system, a search result based at least in part on the first identity of the first user. - View Dependent Claims (19, 20)
-
Specification