Cryptographic Pseudonym Mapping Method, Computer System, Computer Program And Computer-Readable Medium

The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DSi), wherein the data are identified at the data sources (DSi) by e...

Full description

Saved in:
Bibliographic Details
Main Authors Vágujhelyi, Ferenc, Vágujhelyi, Gergely
Format Patent
LanguageEnglish
Published 06.10.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DSi), wherein the data are identified at the data sources (DSi) by entity identifiers (D) of the respective entities, and wherein the data are identified in the pseudonymized database (DB) by pseudonyms (P) assigned to the respective entity identifiers (D) applying a one-to-one mapping. According to the invention, one mapper (M) and one key manager (KM) are applied, and a respective pseudonym (P) is generated by the mapper (M), for each encrypted entity identifier (Ci) encrypted by the data source (DSi), utilizing the mapping cryptographic key (hi) corresponding to the particular data source (DSi). The invention is further a computer system realizing the invention, as well as a computer program and a computer-readable medium.
Bibliography:Application Number: US202017627762