Secure coordinate identification method, system and program
First Claim
1. A computer-implemented method for identification, processing, and comparison of location coordinate data in a confidential and anonymous manner, comprising:
- receiving, in a computer, a plurality of fixed coordinates, each of the fixed coordinates representing a location of an item comprising an individual, personal property or real property, and the plurality of fixed coordinates being generated by more than one process;
utilizing, in the computer, a cryptographic algorithm to encrypt the plurality of fixed coordinates, thereby forming a processed data; and
comparing, in the computer, the encrypted fixed coordinates of the processed data to at least a portion of secondary data that comprises one or more encrypted fixed coordinates to determine whether a relationship exists between the encrypted fixed coordinates of the processed data and the encrypted fixed coordinates of the secondary data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, program and system (10) for processing data are disclosed. The method, program and system comprising the steps of: (a) receiving data representing a location of an item (e.g., people, personal property, real property, organizations, chemical compounds, organic compounds, proteins, biological structures, biometric values or atomic structures), (c) determining a plurality of fixed coordinates that represent the location (e.g., by “rounding” and/or comparing to a reference grid), (d) utilizing an algorithm (e.g., encryption, encoding and/or one-way function) to process the plurality of fixed coordinates (each separately or together), and (e) comparing the processed data to at least a portion of secondary data (perhaps comprising data previously stored in a database).
96 Citations
30 Claims
-
1. A computer-implemented method for identification, processing, and comparison of location coordinate data in a confidential and anonymous manner, comprising:
-
receiving, in a computer, a plurality of fixed coordinates, each of the fixed coordinates representing a location of an item comprising an individual, personal property or real property, and the plurality of fixed coordinates being generated by more than one process; utilizing, in the computer, a cryptographic algorithm to encrypt the plurality of fixed coordinates, thereby forming a processed data; and comparing, in the computer, the encrypted fixed coordinates of the processed data to at least a portion of secondary data that comprises one or more encrypted fixed coordinates to determine whether a relationship exists between the encrypted fixed coordinates of the processed data and the encrypted fixed coordinates of the secondary data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium containing program instructions for execution by a computer for performing a method of identification, processing, and comparison of location coordinate data in a confidential and anonymous manner, comprising:
-
receiving, in a computer, a plurality of fixed coordinates, each of the fixed coordinates representing a location of an item comprising an individual, personal property or real property, and the plurality of fixed coordinates being generated by more than one process; utilizing, in the computer, a cryptographic algorithm to encrypt the plurality of fixed coordinates, thereby forming a processed data; and comparing, in the computer, the encrypted fixed coordinates of the processed data to at least a portion of secondary data that comprises one or more encrypted fixed coordinates to determine whether a relationship exists between the encrypted fixed coordinates of the processed data and the encrypted fixed coordinates of the secondary data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification