×

Data protection compliant deletion of personally identifiable information

  • US 9,317,715 B2
  • Filed: 08/24/2012
  • Issued: 04/19/2016
  • Est. Priority Date: 08/24/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • encrypting, by operation of a computer, personally-identifiable information (PII) data using a first cryptographic key, wherein the PII data is associated with non-encrypted associated data, and wherein the first cryptographic key is a record key of a data record storing the PII data;

    encrypting the first cryptographic key with a second cryptographic key, wherein the second cryptographic key is a purpose key associated with a particular purpose providing a justification for the use of the second cryptographic key to encrypt the first cryptographic key, wherein the second cryptographic key is associated with a cryptographic key record used to associate the second cryptographic key with a purpose key identifier, the particular purpose, and one or more conditions, wherein the purpose key identifier provides a mapping between the particular purpose and the second cryptographic key, and wherein the condition determines whether the second cryptographic key has expired;

    determining that the occurrence of a PII data disassociation event associated with the second cryptographic key has occurred; and

    rendering the PII data inaccessible by disassociating the second cryptographic key from the encrypted first cryptographic key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×