×

Privacy and security method and system for a world-wide-web site

  • US 7,526,485 B2
  • Filed: 07/07/2005
  • Issued: 04/28/2009
  • Est. Priority Date: 12/21/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of making clinical information of a plurality of users accessible for use in an enhanced browsing application, while maintaining the security and privacy of the clinical information, said method comprising the steps:

  • transferring de-identified clinical information of said users from said first computer to said second computer, said de-identified clinical information being associated with a surrogate ID;

    transferring identifiable personal information which lack clinical information from said first computer to a third computer, wherein said third computer does not receive said de-identified clinical information and said second computer does not receive said identifiable personal information;

    generating on said third computer an anonymous ID for each user which anonymously identifies the user, each anonymous ID being correlated or correlatable with a surrogate ID;

    transferring said anonymous IDs from said third computer to said second computer and assuring that the anonymous IDs are not provided to said first computer; and

    storing in a database accessible to said second computer said de-identified clinical information of said users indexed by said anonymous IDs, wherein said de-identified clinical information is used when a browser browses information on a web server associated with said second computer;

    wherein said surrogate IDs are encrypted using an encryrption key maintained by said first computer;

    said identifiable personal information transferred from said first computer to said third computer is indexed by unencrypted surrogate IDs;

    said encryption key is transferred to said third computer from said first computer;

    said third computer encrypts said surrogate IDs using said encryption key and transfers said encrypted surrogate IDs to said second computer with said anonymous IDs; and

    said second computer uses said encrypted surrogate IDs transferred from said third computer to correlate said anonymous IDs with said de-identified personal information received from said first computer.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×