System and method for the protection and de-identification of health care data
First Claim
Patent Images
1. A system for protecting and de-identifying healthcare data, the system comprising:
- one or more computers;
a first set of non-transitory storage devices storing instructions that are operable, when executed by one or more computers, and causes the one or more computers to perform the steps of;
retrieving healthcare data and personally identifiable information of a person;
storing in a second set of non-transitory storage devices, the retrieved healthcare data and personally identifiable information for the person;
identifying a portion of the stored personally identifiable information from the storage device;
extracting the identified portion of the personally identifiable information from the storage device;
encrypting the extracted portion of the personally identifiable information;
inputting, into a keyed hash function, the encrypted portion of the personally identifiable information;
generating, by the keyed hash function, a first output;
inputting the generated first output to a second hash function;
generating, by the second hash function, a second output;
generating an anonymous linking code using the second output;
storing the anonymous linking code in association with the healthcare data for the person.
22 Assignments
0 Petitions
Accused Products
Abstract
A system for protecting and de-identifying healthcare data includes a storage device for storing the healthcare data and personally identifiable information for a person and a processor in communication with the database. The processor generates an anonymous linking code using a keyed hash function and a second hash function. The anonymous linking code is based at least in part on a portion of the personally identifiable information. The processor further appends the anonymous linking code to the healthcare data for the person.
-
Citations
14 Claims
-
1. A system for protecting and de-identifying healthcare data, the system comprising:
-
one or more computers; a first set of non-transitory storage devices storing instructions that are operable, when executed by one or more computers, and causes the one or more computers to perform the steps of; retrieving healthcare data and personally identifiable information of a person; storing in a second set of non-transitory storage devices, the retrieved healthcare data and personally identifiable information for the person; identifying a portion of the stored personally identifiable information from the storage device; extracting the identified portion of the personally identifiable information from the storage device; encrypting the extracted portion of the personally identifiable information; inputting, into a keyed hash function, the encrypted portion of the personally identifiable information; generating, by the keyed hash function, a first output; inputting the generated first output to a second hash function; generating, by the second hash function, a second output; generating an anonymous linking code using the second output; storing the anonymous linking code in association with the healthcare data for the person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method for protecting and de-identifying healthcare data containing personally identifiable information, the method comprising:
-
retrieving, by one or more computers, healthcare data and personally identifiable information of a person; storing, by the one or more computers, in a storage device, the retrieved healthcare data and personally identifiable information for the person; identifying, by the one or more computers, a portion of the stored personally identifiable information from the storage device; extracting, by the one or more computer processor, the identified a portion of the personally identifiable information from the storage device; encrypting, by the one or more computer processor, the extracted portion of the personally identifiable information; inputting, into a keyed hash function, the encrypted portion of the personally identifiable information; generating, by the keyed hash function, a first output; inputting, by the one or more computer processors, the generated first output to a second hash function; generating, by the second hash function, a second output; generating, an anonymous linking code using the second output; storing the anonymous linking code in association with the healthcare data for the person. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification