Data Protection Compliant Deletion of Personally Identifiable Information
First Claim
1. A computer-implemented method, comprising:
- encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data;
encrypting the encrypted first cryptographic key with a second cryptographic key;
determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and
rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented method includes encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, encrypting the encrypted first cryptographic key with a second cryptographic key, determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred, and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key.
-
Citations
22 Claims
-
1. A computer-implemented method, comprising:
-
encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data; encrypting the encrypted first cryptographic key with a second cryptographic key; determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-program product, comprising computer-readable instructions embodied on tangible, non-transitory, computer-readable media, the instructions operable when executed to perform operations to:
-
encrypt personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data; encrypt the encrypted first cryptographic key with a second cryptographic key; determine that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and render the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
memory operable to store at least personally-identifiable information (PII) data; and at least one hardware processor interoperably coupled to the memory and operable to; encrypt the PII data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data; encrypt the encrypted first cryptographic key with a second cryptographic key; determine that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and render the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented method, comprising:
-
encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data; encrypting the encrypted first cryptographic key with a second cryptographic key; analyzing the second cryptographic key using at least one of a condition associated with the second cryptographic key or a decision rule; determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred, wherein the PII data disassociation event includes at least one of exceeding a chronological retention period deadline, a security alert, or a PII data destruction request; and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key, wherein the disassociation of the second cryptographic key from the first cryptographic key is performed by at least one of permanently erasing the second cryptographic key, expiring the second cryptographic key, or encrypting the second cryptographic key with a third cryptographic key, and wherein the disassociation of the second cryptographic key from the encrypted first cryptographic key preserves a referential integrity between the encrypted PII data and the non-encrypted associated data.
-
Specification