Sensitive data aliasing
First Claim
Patent Images
1. A computer-implemented method carried out to compensate for impact on processing of alias data, wherein the impact is caused by processing large amounts of data relating to sensitive data elements associated with the alias data, comprising:
- using at least one computer processor to;
generate aliases for the sensitive data elements;
generate an association between the aliases and the sensitive data elements;
create a first database with a first plurality of records;
assign the sensitive data elements to a first data field of the first plurality of records;
create a second database with a second plurality of records;
assign the aliases to a second data field from the second plurality of records; and
allowing access, by a set of authorized users through the at least one computer processor, to the first database for processing of the sensitive data elements independently from the second database, and therein permitting, for a set of standard users, qualified access to the second database by using the aliases in place of the sensitive data elements, wherein at least some of the standard users are not included in the set of authorized users.
6 Assignments
0 Petitions
Accused Products
Abstract
Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access.
-
Citations
19 Claims
-
1. A computer-implemented method carried out to compensate for impact on processing of alias data, wherein the impact is caused by processing large amounts of data relating to sensitive data elements associated with the alias data, comprising:
-
using at least one computer processor to; generate aliases for the sensitive data elements; generate an association between the aliases and the sensitive data elements; create a first database with a first plurality of records; assign the sensitive data elements to a first data field of the first plurality of records; create a second database with a second plurality of records; assign the aliases to a second data field from the second plurality of records; and allowing access, by a set of authorized users through the at least one computer processor, to the first database for processing of the sensitive data elements independently from the second database, and therein permitting, for a set of standard users, qualified access to the second database by using the aliases in place of the sensitive data elements, wherein at least some of the standard users are not included in the set of authorized users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for improved processing of alias data by reducing an impact caused by processing of large amounts of data relating to sensitive data elements associated with the alias data, the apparatus comprising:
at least one computer processor including a non-transitory machine readable medium storing instructions executable by the processor and configured to; generate aliases for the sensitive data elements; generate an association between the aliases and the sensitive data elements; create a first database with a first plurality of records; assign the sensitive data elements to a first data field of the first plurality of records; create a second database with a second plurality of records; assign the aliases to a second data field from the second plurality of records; allow access, by a set of authorized users, to the first database for processing of the sensitive data elements independently from the second database; and permit, for a set of standard users, qualified access to the second database by using the aliases in place of the sensitive data elements, where at least some of the standard users are not included in the set of authorized users. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
Specification