Semiotic system and method with privacy protection
First Claim
Patent Images
1. A method of processing semiotic data, comprising:
- receiving semiotic data including at least one data set P;
selecting a function h, and, using a configured computer processor, for at least one of each said data set P to be collected, computing h(P);
destroying said data set P; and
storing h(P) in a database,wherein said data set P cannot be extracted from h(P),the method further comprising;
selecting a private key/public key (K, k) once for all cases; and
one of destroying said private key K and sending said private key K to a trusted party; and
choosing said function h as the public encryption function corresponding to k.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of processing semiotic data includes receiving semiotic data including at least one data set P, selecting a function h, and for at least one of each data set P to be collected, computing h(P), destroying data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P). The method further includes selecting a private key/public key (K, k) once for all cases, one of destroying the private key K and sending the private key K to a trusted party, and choosing function h as the public encryption function corresponding to k.
-
Citations
17 Claims
-
1. A method of processing semiotic data, comprising:
-
receiving semiotic data including at least one data set P; selecting a function h, and, using a configured computer processor, for at least one of each said data set P to be collected, computing h(P); destroying said data set P; and storing h(P) in a database, wherein said data set P cannot be extracted from h(P), the method further comprising; selecting a private key/public key (K, k) once for all cases; and one of destroying said private key K and sending said private key K to a trusted party; and choosing said function h as the public encryption function corresponding to k. - View Dependent Claims (2, 3, 4)
-
-
5. A system for processing semiotic data, comprising:
-
means for receiving semiotic data including a data set P; means for selecting a function h, and for each said data set P to be collected, computing h(P); means for destroying said data set P; means for storing h(P) in a database, wherein said data set P cannot be extracted from h(P); means for selecting a private key/public key (K, k) once for all cases; means for one of destroying said private key K and sending said private key K to a trusted party; means for choosing said function h as a public encryption function corresponding to k; and to determine whether a data set P′
is a predetermined subject, means for comparing h(P′
) to available h(P)s to determine whether there is a match. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A system for verifying biometric data without storing unencrypted biometric data, comprising:
-
means for acquiring unencrypted biometric data including at least one data set P; means for encrypting each said at least one data set acquired to form at least one encrypted data set; means for destroying the unencrypted data set P; means for storing each said at least one encrypted data set in a database, wherein unencrypted biometric data is not available nor retrievable from said data stored in said database; means for selecting a private key/public key (K, k) once for all cases; means for one of destroying said private key K and sending said private key K to a trusted party; means for choosing a function h as a public encryption function corresponding to k; and means for comparing an encrypted data set of a data set P′
to said at least one encrypted data set of data set P to determine whether there is a match and to determine whether the data set P′
is a predetermined subject. - View Dependent Claims (12)
-
-
13. A non-transistory computer-readable medium tangibly embodying a program of recordable, machine-readable instructions executable by a digital processing apparatus to perform a method for computer-implemented processing biometric data, said method comprising:
-
receiving biometric data including a data set P; selecting a secure hash function h, and for each data set P to be collected, computing h(P); destroying said data set P; storing h(P) in a database, wherein said data set P cannot be extracted from h(P) selecting a private key/public key (K, k) once for all cases; one of destroying said private key K and sending said private key K to a trusted party; choosing said function h as a public encryption function corresponding to k; and to determine whether a data set P′
is a predetermined subject, comparing h(P′
) to available h(P)s to determine whether there is a match. - View Dependent Claims (14, 15, 16, 17)
-
Specification