×

Secure data processing method

  • US 6,789,195 B1
  • Filed: 06/07/2000
  • Issued: 09/07/2004
  • Est. Priority Date: 06/07/1999
  • Status: Active Grant
First Claim
Patent Images

1. A method for processing data, comprising the steps of:

  • storing data in at least one database with at least a portion of said data being stored in said database in encrypted form;

    allowing communication with said database by a user via a communication link to read said data stored in said database and, if necessary, to enter additional data into said database;

    storing a key, for decrypting and encrypting said data, in a central database separate from said data base;

    transmitting said key from said central database exclusively to an authorized user who is authorized to communicate with said database, for use by said authorized user in at least one of encrypting and decrypting said data in said database dividing said database into a first data base and a second data base;

    dividing said data into first data parts respectively identifying subjects, selected from the group consisting of persons and objects, as identified subject, and into second data parts respectively describing said subjects, as described subjects;

    uniquely associating said identified subjects with said described subjects by respective association data items;

    storing said first data parts in said first database with the respective association data items;

    storing said second data parts and said second database with the respective association data items, identical to the respective association data items in said first database so that respective first and second data parts in said respective first and second databases can be found and associated by the respective identical association data items; and

    storing the respective association data items in said first database in encrypted form produced using said key, and optionally also storing the respective second data parts ins aid second database in encrypted form produced using said key, said association data items in encrypted form, and if present, said second data parts in encrypted form, comprising encrypted data, and said encrypted data being decrypted using said key transmitted to said authorized user.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×