×

Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database

  • US 8,695,106 B2
  • Filed: 12/15/2010
  • Issued: 04/08/2014
  • Est. Priority Date: 12/18/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database, the data being assigned to an identifier, wherein the identifier comprises the public key, the method for analyzing data of a first user comprising performing the following steps on a processor:

  • generating the public key and the private key according to the following method;

    entering a user-selected secret,storing the user-selected secret in memory,computing the private key by applying an embedding and randomizing function onto the secret,storing the private key in memory,computing the public key using the private key, the public key and the private key forming the asymmetric cryptographic key pair,erasing the secret and the private key from the memory, as well as any intermediate computation result, andoutputting the public key,receiving a set of rules, the set of rules describing data processing steps,receiving the identifier,retrieving the data assigned to the identifier from the database,analyzing the retrieved data by applying the set of rules, andproviding a result of the analysis;

    the public key being the public key of the first or a second user and the private key being the private key of the first or the second user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×