Method for the encryption and decryption of data by various users
First Claim
1. An electronic data processing method comprising:
- performing, by a security check device, a security check to ascertain a user identity by comparing entered identity information with stored user identity data;
associating the user identity with a user identifier stored in a first data store;
associating the user identifier with at least one user group identifier stored in a second data store;
selecting a user group identifier and acquiring at least one data key associated therewith from a centralized third data store including all available keys, wherein the at least one user group identifier and the at least one data key are associated with one another; and
performing, by at least one processor, at least one of encrypting and decrypting data using the acquired at least one data key and inhibiting user recognition of the acquired at least one data key;
whereinthe data are medically relevant,users include personnel within a medical facility, andcommon user group identifiers are assigned the same data key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is for the encryption and decryption of data by various users, in which a user is assigned a data key for encrypting and decrypting data. A data processing facility is designed to carry out the method and a storage medium is designed to store information for carrying out the method on a data processing facility. A first step involves the performance of a security check in order to ascertain the identity of the user. A second step involves a data key which cannot be viewed by the user, being assigned on the basis of the result of the security check. In this case, various users who, by way of example, can be associated with a common user group, can be assigned the same data key.
24 Citations
27 Claims
-
1. An electronic data processing method comprising:
-
performing, by a security check device, a security check to ascertain a user identity by comparing entered identity information with stored user identity data; associating the user identity with a user identifier stored in a first data store; associating the user identifier with at least one user group identifier stored in a second data store; selecting a user group identifier and acquiring at least one data key associated therewith from a centralized third data store including all available keys, wherein the at least one user group identifier and the at least one data key are associated with one another; and performing, by at least one processor, at least one of encrypting and decrypting data using the acquired at least one data key and inhibiting user recognition of the acquired at least one data key;
whereinthe data are medically relevant, users include personnel within a medical facility, and common user group identifiers are assigned the same data key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for at least one of encryption and decryption of data, comprising:
-
performing by a security check device, a security check to ascertain user identity by comparing entered identity information with stored user identity data; associating the user identity with a user identifier stored in a first data store; associating the user identifier with a user group including a plurality of users such that a data key for at least one of encrypting and decrypting the data is assigned to a user based on the group with which the user identifier is associated, the same data key being assignable to the plurality of users; and at least one of encrypting or decrypting the data, by at least one processor, using the assigned data key, wherein the data are medically relevant, the plurality of users include personnel within a medical facility, and common user group identifiers are assigned the same data key. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. An electronic data processing system comprising:
-
a security check device to ascertain user identity stored at a first data store and to retrieve at least one user identifier and associated user identity data; a second data store for storage and retrieval of the at least one user identifier and associated at least one user group identifier; a centralized third data store for storage and retrieval of all available data keys, the centralized third data store including at least one associated user group identifier matched with at least one associated data key; and at least one processor to ascertain a user identifier by comparing data of the security check device and the first data store, to ascertain at least one user group from the second data store, to ascertain at least one data key for at least one user group from the third data store, and for performing at least one of encrypting and decrypting data using the at least one data key;
whereinthe data are medically relevant, users include personnel within a medical facility, and common user group identifiers are assigned the same data key. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification