METHOD AND DEVICE FOR THE PSEUDONYMIZATION OF DIGITAL DATA
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for pseudonymizing digital data records sent from a source system to a destination system, using an identity protector client system and an identity protector master system, includes the steps of receiving, at the identity protector client, person-specific data from a source system provided with a source identifier. The digital data records are pre-pseudonymized by the identity protector client, and the processed digital data records are marked with a source identifier which references the source file in the source system. The pre-pseudonymized digital data records are transmitted to the identity protector master. For every data record, a pseudonym is created by the identity protector master from the pre-pseudonym, the source identifier, and at least one other value generated from an erratic value and a time value. The pseudonym is transmitted to the destination system.
46 Citations
38 Claims
-
1-19. -19. (canceled)
-
20. A method for pseudonymizing digital data records sent from a source system to a destination system, using an identity protector client system and an identity protector master system, the method comprising the steps of:
-
receiving, at the identity protector client, person-specific data from a source system provided with a source identifier; pre-pseudonymizing the digital data records, by the identity protector client, and. marking the processed digital data records with a source identifier which references the source file in the source system; transmitting the pre-pseudonymized digital data records to the identity protector master; for every data record, creating, by the identity protector master, a pseudonym from the pre-pseudonym, the source identifier, and at least one other value generated from an erratic value and a time value; and transmitting the pseudonym to the destination system. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A system for pseudonymizing digital data records sent from a source system to a destination system comprising:
-
an identity protector client system and an identity protector master system configured to; receive, at the identity protector client, person-specific data from a source system provided with a source identifier; pre-pseudonymize the digital data records, by the identity protector client, and mark the processed digital data records with a source identifier which references the source file in the source system; transmit the pre-pseudonymized digital data records to the identity protector master; for every data record, create, by the identity protector master, a pseudonym from the pre-pseudonym, the source identifier, and at least one other value generated from an erratic value and a time value; and transmit the pseudonym to the destination system.
-
-
38. A computer readable medium containing computer instructions configured to execute a method for pseudonymizing digital data records sent from a source system to a destination system, using an identity protector client system and an identity protector master system, the method comprising the steps of:
-
receiving, at an identity protector client, person-specific data from a source system provided with a source identifier; pre-pseudonymizing digital data records, by the identity protector client, and marking the processed digital data records with a source identifier which references the source file in the source system; transmitting the pre-pseudonymized digital data records to the identity protector master; for every data record creating, by the identity protector master, a pseudonym from the pre-pseudonym, the source identifier, and at least one other value generated from a value and a time value; and transmitting the pseudonym to the destination system.
-
Specification