Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
First Claim
Patent Images
1. A computer implemented method for storing data of a first user in a database, the first user having a private key, the method comprising:
- directly receiving the first user'"'"'s private key or generating the first user'"'"'s private key, wherein generating the first user'"'"'s private key comprises receiving an input value and applying a cryptographic one-way function to the input value for generation of the first user'"'"'s private key, wherein the cryptographic one-way function is an injective function;
calculating, in a computer, a set of public keys, wherein the first user'"'"'s private key and each public key of the set of public keys form an asymmetric cryptographic key pair,generating a digital signature for the data using the first user'"'"'s private key;
storing, in the computer, the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys or wherein the identifier is a pseudonym of the first user or wherein the identifier is an access key to the data in the database, wherein the digital signature is stored into the database with the data.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
- receiving a set of rules, the set of rules describing data processing steps,
- receiving the identifier,
- retrieving the data assigned to the identifier from the database,
- analyzing the retrieved data by applying the set of rules,
- providing a result of the analysis.
-
Citations
12 Claims
-
1. A computer implemented method for storing data of a first user in a database, the first user having a private key, the method comprising:
-
directly receiving the first user'"'"'s private key or generating the first user'"'"'s private key, wherein generating the first user'"'"'s private key comprises receiving an input value and applying a cryptographic one-way function to the input value for generation of the first user'"'"'s private key, wherein the cryptographic one-way function is an injective function; calculating, in a computer, a set of public keys, wherein the first user'"'"'s private key and each public key of the set of public keys form an asymmetric cryptographic key pair, generating a digital signature for the data using the first user'"'"'s private key; storing, in the computer, the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys or wherein the identifier is a pseudonym of the first user or wherein the identifier is an access key to the data in the database, wherein the digital signature is stored into the database with the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium containing computer executable instructions executable by a computer:
to directly receive the first user'"'"'s private key or generate the first users'"'"'s private key, wherein the first user'"'"'s private key is generated by receiving an input value and applying a cryptographic one-way function to the input value for generation of the first user'"'"'s private key, wherein the cryptographic one-way function is an injective function, to calculate, in a computer, a set of public keys, wherein the first user'"'"'s private key and each public key of the set of public keys form an asymmetric cryptographic key pair, to generate a digital signature for the data using the first user'"'"'s private key, and to store, in the computer, the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys or wherein the identifier is a pseudonym of the first user or wherein the identifier is an access key to the data in the database, wherein the digital signature is stored into the database with the data.
-
11. A computer system for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the system comprising:
-
a computer processor to directly receive the first user'"'"'s private key or generate the first users'"'"'s private key, wherein the first user'"'"'s private key is generated by receiving an input value and applying a cryptographic one-way function to the input value for generation of the first user'"'"'s private key, wherein the cryptographic one-way function is an injective function, the processor further to calculate a set of public keys, wherein the first user'"'"'s private key and each public key of the set of public keys form an asymmetric cryptographic key pair, the processor further to generate a digital signature for the data using the first user'"'"'s private key, the processor further to store the data pseudonymously in the database with the data being assigned to an identifier, wherein the identifier comprises one of the public keys or wherein the identifier is a pseudonym of the first user or wherein the identifier is an access key to the data in the database, wherein the digital signature is stored into the database with the data; a first interface to receive a set of rules, the set of rules describing data processing steps; a second interface to receive the identifier; a third interface to retrieve the data assigned to the identifier from the database; a computer analyzer to analyze the retrieved data by applying the set of rules; and an output computer component to provide a result of the analysis.
-
-
12. A computer system for storing data of a first user in a database, the first user having a private key, the system comprising:
-
a computer processor to directly receive the first user'"'"'s private key or generate the first users'"'"'s private key, wherein the first user'"'"'s private key is generated by receiving an input value and applying a cryptographic one-way function to the input value for generation of the first user'"'"'s private key, wherein the cryptographic one-way function is an injective function, the processor further to calculate a set of public keys, wherein the first user'"'"'s private key and each public key of the set of public keys form an asymmetric cryptographic key pair, the processor further to generate a digital signature for the data using the first user'"'"'s private key, and wherein each public key of the set of public keys is generated based upon the private key; and a database in which the data are pseudonymously stored with the data being assigned to an identifier, wherein the identifier comprises one of the public keys or wherein the identifier is a pseudonym of the first user or wherein the identifier is an access key to the data in the database, wherein the digital signature is stored into the database with the data; a first interface to receive a set of rules, the set of rules describing data processing steps; a second interface to receive the identifier; a third interface to retrieve the data assigned to the identifier from the database; a computer analyzer to analyze the retrieved data by applying the set of rules; and an output computer component to provide a result of the analysis.
-
Specification