System and method of de-identifying data
First Claim
1. A method comprising:
- receiving data corresponding to an individual, wherein the data includes transactional data stored in a transaction table and data identifying the individual stored in a personal information table, and wherein the individual is associated with at least one transaction in the transaction table;
generating a de-identification pointer associated with a portion of the data, wherein the de-identification pointer substitutes the data identifying the individual in the personal information table;
creating a non-protected transaction table, wherein the non-protected transaction table includes de-identified transactional data corresponding to the individual, the de-identified transactional data not being capable of identifying the individual; and
creating an index table including the de-identification pointer and the non-protected transaction table.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of de-identifying data, wherein the data to be de-identified is stored in a transaction table containing transactions and a personal information table containing identifiable information. The method includes the steps of generating a de-identification pointer associated with an individual in the personal information table, wherein the individual is associated with at least one transaction in the transaction table; creating a non-protected transaction table, wherein the non-protected transaction table includes a non-protected transaction reference and non-protected information associated with a transaction from the transactional table; and creating an index table including the identification and the non protected transaction reference. According to a preferred embodiment, the identification is advantageously unique and may also lack context to the individual. According to a further feature, the identification may be random or pseudo-random.
-
Citations
13 Claims
-
1. A method comprising:
-
receiving data corresponding to an individual, wherein the data includes transactional data stored in a transaction table and data identifying the individual stored in a personal information table, and wherein the individual is associated with at least one transaction in the transaction table; generating a de-identification pointer associated with a portion of the data, wherein the de-identification pointer substitutes the data identifying the individual in the personal information table; creating a non-protected transaction table, wherein the non-protected transaction table includes de-identified transactional data corresponding to the individual, the de-identified transactional data not being capable of identifying the individual; and creating an index table including the de-identification pointer and the non-protected transaction table. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer for de-identifying data stored in a transaction table comprising transactions and a personal information table comprising identifiable information, the computer comprising:
-
a memory comprising software providing instructions for; (i) generating a de-identification pointer associated with an individual in the personal information table, wherein the de-identification pointer substitutes data identifying the individual, and wherein the individual is associated with at least one transaction in the transaction table; (ii) creating a non-protected transaction table, wherein the non-protected transaction table includes de-identified transactional data corresponding to the individual, the de-identified transactional data not being capable of identifying the individual; (iii) creating an index table including the identification pointer and the non protected transaction table; and a processor to execute the software. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification