Data protection compliant deletion of personally identifiable information
First Claim
1. A computer-implemented method, comprising:
- encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data;
encrypting the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired;
determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and
rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented method includes encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, encrypting the encrypted first cryptographic key with a second cryptographic key, determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred, and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key.
299 Citations
22 Claims
-
1. A computer-implemented method, comprising:
-
encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data; encrypting the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired; determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-program product, comprising computer-readable instructions embodied on tangible, non-transitory, computer-readable media, the instructions operable when executed to perform operations to:
-
encrypt personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data; encrypt the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired; determine that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and render the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
memory operable to store at least personally-identifiable information (PII) data; and at least one hardware processor interoperably coupled to the memory and operable to; encrypt the PII data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data; encrypt the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired; determine that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and render the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer-implemented method, comprising:
-
encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data; encrypting the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired; analyzing the second cryptographic key using at least one of a condition associated with the second cryptographic key or a decision rule; determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred, wherein the PII data disassociation event includes at least one of exceeding a chronological retention period deadline, a security alert, or a PII data destruction request; and rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key, wherein the disassociation of the second cryptographic key from the first cryptographic key is performed by at least one of permanently erasing the second cryptographic key, expiring the second cryptographic key, or encrypting the second cryptographic key with a third cryptographic key, and wherein the disassociation of the second cryptographic key from the encrypted first cryptographic key preserves a referential integrity between the encrypted PII data and the non-encrypted associated data.
-
Specification