×

System and method for dis-identifying sensitive information and associated records

  • US 7,681,042 B2
  • Filed: 06/17/2004
  • Issued: 03/16/2010
  • Est. Priority Date: 06/17/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for protecting the relationship between personal identifiable information and one or more associated records, the system comprising:

  • a processor,a system manager module operably residing on the processor, the manager module operable to receive a hidden link and an encrypted hidden link from an encryption module, to insert the personal identifiable information and the associated records into separate databases in a storage module, and to retrieve the personal identifiable information and the associated records from the separate databases, wherein the personal identifiable information and the associated records are stored with one or more hidden links or encrypted hidden links so that there is no direct link between the personal identifiable information and the associated records,and further wherein the personal identifiable information includes a sensitive information portion and a non-sensitive information portion and wherein the system manager module is operable to separate the personal identifiable information into a sensitive information portion and a non-sensitive information portion, to insert the sensitive information and the non-sensitive information portions into separate databases, and to retrieve the sensitive information and the non-sensitive information portions from their separate databases,and further wherein an entry in the sensitive information database includes a first hidden link, the first hidden link associated with a first encryption key, and each entry in the associated records database and the non-sensitive information database related to the entry in the sensitive information database include the first hidden link encrypted according to the first encryption key, and wherein the non-sensitive information database further includes a second hidden link, the second hidden link associated with a second encryption key, and the first hidden link encrypted according to the second encryption key.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×