Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
First Claim
1. A computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database, the data being assigned to an identifier, wherein the identifier comprises the public key, the method for analyzing data of a first user comprising performing the following steps on a processor:
- generating the public key and the private key according to the following method;
entering a user-selected secret,storing the user-selected secret in memory,computing the private key by applying an embedding and randomizing function onto the secret,storing the private key in memory,computing the public key using the private key, the public key and the private key forming the asymmetric cryptographic key pair,erasing the secret and the private key from the memory, as well as any intermediate computation result, andoutputting the public key,receiving a set of rules, the set of rules describing data processing steps,receiving the identifier,retrieving the data assigned to the identifier from the database,analyzing the retrieved data by applying the set of rules, andproviding a result of the analysis;
the public key being the public key of the first or a second user and the private key being the private key of the first or the second user.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
- receiving a set of rules, the set of rules describing data processing steps,
- receiving the identifier,
- retrieving the data assigned to the identifier from the database,
- analyzing the retrieved data by applying the set of rules,
- providing a result of the analysis.
-
Citations
3 Claims
-
1. A computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database, the data being assigned to an identifier, wherein the identifier comprises the public key, the method for analyzing data of a first user comprising performing the following steps on a processor:
-
generating the public key and the private key according to the following method; entering a user-selected secret, storing the user-selected secret in memory, computing the private key by applying an embedding and randomizing function onto the secret, storing the private key in memory, computing the public key using the private key, the public key and the private key forming the asymmetric cryptographic key pair, erasing the secret and the private key from the memory, as well as any intermediate computation result, and outputting the public key, receiving a set of rules, the set of rules describing data processing steps, receiving the identifier, retrieving the data assigned to the identifier from the database, analyzing the retrieved data by applying the set of rules, and providing a result of the analysis; the public key being the public key of the first or a second user and the private key being the private key of the first or the second user. - View Dependent Claims (2, 3)
-
Specification