System and method to anonymize data transmitted to a destination computing device
First Claim
Patent Images
1. A method for anonymizing data to be transmitted to a destination computing device, comprising:
- providing a data encryption key;
encrypting the data encryption key with a key encryption key to derive an encrypted data encryption key;
encrypting the key encryption key using a KEK key to generate an encrypted key encryption key;
hashing the KEK key with a hash function to generate a hash of the KEK key;
storing the hash of the KEK key and encrypted key encryption key in a data store;
receiving data to be stored in a destination computing device, from a user computer, the data including a plurality of characters;
receiving a custodian password;
generating a hash of the custodian password using the hash function;
comparing the generated hash of the custodian password with the stored hash of the KEK key and when there is a match between the generated hash of the custodian password with the stored hash of the KEK key, decrypting the encrypted key encryption key using the custodian password to derive the key encryption key;
decrypting the encrypted data encryption key using the derived key encryption key to derive the data encryption key;
anonymizing the data to be stored using an anonymization module executed on a computing device to derive an anonymized data, based on a stored anonymization strategy, using the derived data encryption key; and
transmitting anonymized data to the destination computing device over a network, for storage in the destination computing device.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data is anonymized using the anonymization module, to derive an anonymized data, using a data encryption key. The anonymized data is transmitted to the destination computer over a network. In some embodiments, the data encryption key is encrypted and decrypted prior to anonymization.
-
Citations
10 Claims
-
1. A method for anonymizing data to be transmitted to a destination computing device, comprising:
-
providing a data encryption key; encrypting the data encryption key with a key encryption key to derive an encrypted data encryption key; encrypting the key encryption key using a KEK key to generate an encrypted key encryption key; hashing the KEK key with a hash function to generate a hash of the KEK key; storing the hash of the KEK key and encrypted key encryption key in a data store; receiving data to be stored in a destination computing device, from a user computer, the data including a plurality of characters; receiving a custodian password; generating a hash of the custodian password using the hash function; comparing the generated hash of the custodian password with the stored hash of the KEK key and when there is a match between the generated hash of the custodian password with the stored hash of the KEK key, decrypting the encrypted key encryption key using the custodian password to derive the key encryption key; decrypting the encrypted data encryption key using the derived key encryption key to derive the data encryption key; anonymizing the data to be stored using an anonymization module executed on a computing device to derive an anonymized data, based on a stored anonymization strategy, using the derived data encryption key; and transmitting anonymized data to the destination computing device over a network, for storage in the destination computing device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An anonymization system to anonymize data transmitted to a destination computing device, comprising:
-
an anonymization strategy module executed on a computing device to store anonymization strategy for data anonymization in a data store; a logic to receive data to be stored in the destination from a user computer; and an anonymization module executed on the computing device to selectively anonymize data to be stored based on the anonymization strategy to generate an anonymized data using a data encryption key, wherein, the data encryption key is encrypted with a key encryption key to derive an encrypted data encryption key; the key encryption key is encrypted using a KEK key to generate an encrypted key encryption key; the KEK key is hashed with a hash function to generate a hash of the KEK key; the hash of the KEK key and encrypted key encryption key is stored in a data store; the encrypted data encryption key is decrypted to derive the data encryption key prior to anonymization; and the anonymized data is transmitted to the destination computing device over a network for storage in the destination computing device, wherein the system is further configured to receive a custodian password; generate a hash of the custodian password using the hash function; compare the generated hash of the custodian password with the stored hash of the KEK key, and when there is a match between the generated hash of the custodian password with the stored hash of the KEK key, the custodian password is used to decrypt the encrypted key encryption key to derive the key encryption key; and the encrypted data encryption key is decrypted using the derived key encryption key to derive the data encryption key. - View Dependent Claims (7, 8, 9, 10)
-
Specification