COMPUTER IMPLEMENTED METHOD FOR ANALYZING DATA OF A USER WITH THE DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE
First Claim
1. A computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database, the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
- receiving a set of rules, the set of rules describing data processing steps,receiving the identifier,retrieving the data assigned to the identifier from the database,analyzing the retrieved data by applying the set of rules,providing a result of the analysis.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
receiving a set of rules, the set of rules describing data processing steps,
receiving the identifier,
retrieving the data assigned to the identifier from the database,
analyzing the retrieved data by applying the set of rules,
providing a result of the analysis.
123 Citations
20 Claims
-
1. A computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database, the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
-
receiving a set of rules, the set of rules describing data processing steps, receiving the identifier, retrieving the data assigned to the identifier from the database, analyzing the retrieved data by applying the set of rules, providing a result of the analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 14, 15, 16, 17)
-
-
10. A computer implemented method for receiving a result from a second user by a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said key pair comprising a public key and a private key, the method comprising receiving the result by said first user with the recipient address at which the result is received comprising the public key.
-
11. A computer implemented method for storing data of a first user in a database, the first user having a private key, the method comprising:
-
calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair, storing the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys. - View Dependent Claims (12, 13)
-
-
18. A computer system for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the system comprising:
-
a first interface for receiving a set of rules, the set of rules describing data processing steps, a second interface for receiving the identifier, a third interface for retrieving the data assigned to the identifier from the database, an analyzing component for analyzing the retrieved data by applying the set of rules, an output component for providing a result of the analysis.
-
-
19. A computer system for receiving a result from a second user by a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said key pair comprising a public key and a private key, the system comprising means for receiving the result by said first user with the recipient address at which the result is received comprising the public key.
-
20. A computer system for storing data of a first user in a database, the first user having a private key, the system comprising:
-
processor means for calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair, means for storing the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys.
-
Specification