Sensitive data aliasing
First Claim
Patent Images
1. A computerized method of encrypting data sets containing sensitive data elements and generating aliases to represent the sensitive data elements, the method including the steps of:
- encrypting the sensitive data elements using a first encryption method;
generating aliases independent from the sensitive data elements;
generating an association between the aliases and the sensitive data elements;
restricting access to the sensitive data elements to a set of authorized users; and
using the aliases in place of the sensitive data elements for a set of standard users, where at least some of the standard users are not included in the set of authorized users.
7 Assignments
0 Petitions
Accused Products
Abstract
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access.
-
Citations
32 Claims
-
1. A computerized method of encrypting data sets containing sensitive data elements and generating aliases to represent the sensitive data elements, the method including the steps of:
-
encrypting the sensitive data elements using a first encryption method; generating aliases independent from the sensitive data elements; generating an association between the aliases and the sensitive data elements; restricting access to the sensitive data elements to a set of authorized users; and using the aliases in place of the sensitive data elements for a set of standard users, where at least some of the standard users are not included in the set of authorized users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computerized method of managing a database receiving encrypted data sets containing sensitive data elements and generating aliases to represent the sensitive data elements, the method including the steps of:
-
determining if the sensitive data elements are encrypted; decrypting the sensitive data elements in response to a determination that the sensitive data is encrypted; encrypting the sensitive data elements using a first encryption method resulting in encrypted sensitive data; generating aliases independent from the sensitive data elements; generating an association between the aliases and the sensitive data elements; restricting access to the sensitive data elements to a set of authorized users; and using the aliases in place of the sensitive data elements for a set of standard users, where at least some of the standard users are not included in the set of authorized users. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A database processing system for using data sets associated with sensitive data elements, the system comprising:
-
a database for storing the data sets and wherein the data sets include sensitive data elements that are accessible to a set of authorized users; an encryption arrangement including at least one circuit for encrypting the sensitive data elements using a first encryption scheme; an alias generator for generating aliases and associating the aliases to the sensitive data elements; and an interface for access to the database using the aliases in place of the sensitive data elements for a set of standard users, where at least some of the standard users are not included in the set of authorized users. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification