Cryptographic Pseudonym Mapping Method, Computer System, Computer Program And Computer-Readable Medium
The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DSi), wherein the data are identified at the data sources (DSi) by e...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
06.10.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DSi), wherein the data are identified at the data sources (DSi) by entity identifiers (D) of the respective entities, and wherein the data are identified in the pseudonymized database (DB) by pseudonyms (P) assigned to the respective entity identifiers (D) applying a one-to-one mapping. According to the invention, one mapper (M) and one key manager (KM) are applied, and a respective pseudonym (P) is generated by the mapper (M), for each encrypted entity identifier (Ci) encrypted by the data source (DSi), utilizing the mapping cryptographic key (hi) corresponding to the particular data source (DSi). The invention is further a computer system realizing the invention, as well as a computer program and a computer-readable medium. |
---|---|
Bibliography: | Application Number: US202017627762 |