MY194026A - Pseudonymisation and reversal of personally identifiable information - Google Patents
Pseudonymisation and reversal of personally identifiable informationInfo
- Publication number
- MY194026A MY194026A MYPI2017705024A MYPI2017705024A MY194026A MY 194026 A MY194026 A MY 194026A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY 194026 A MY194026 A MY 194026A
- Authority
- MY
- Malaysia
- Prior art keywords
- pseudonymisation
- identifiable information
- personally identifiable
- service provider
- pii
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a system and method for pseudonymisation and reversal of personally identifiable information for privacy protection. The present invention comprising a service requestor (100a) for initiating a request; and a service provider (101) for performing pseudonymisation upon receipt of an authorized request from the service requestor and returning outcome of pseudonymisation to the service requestor. The service provider (101) further comprises provider components within the service provider whereby the service provider perform a first pseudonymisation by taking personally identifiable information (PII) input and undergo a zero knowledge (ZK) function using a first key; and performs a second pseudonymisation using result of first pseudonymisation and undergo a ZK function using a second key. The present invention provides for separation of personally identifiable information (PII) from other personal data with grant to authorized users to recover the link between the authorized users and further allows multiple applications to share the same PII for sharing of the same database without compromising data privacy. The most suitable drawing is FIG. 2.0.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
PCT/MY2018/050079 WO2019132645A1 (en) | 2017-12-26 | 2018-11-19 | Pseudonymisation and reversal of personally identifiable information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
Publications (1)
Publication Number | Publication Date |
---|---|
MY194026A true MY194026A (en) | 2022-11-08 |
Family
ID=67063984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY194026A (en) |
WO (1) | WO2019132645A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10708234B2 (en) | 2016-03-24 | 2020-07-07 | International Business Machines Corporation | System, method, and recording medium for preventing back propogation of data protection |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE602006016731D1 (en) * | 2005-01-12 | 2010-10-21 | British Telecomm | SAFETY SYSTEMS FOR RFID LABELS |
RU2512139C2 (en) * | 2008-10-14 | 2014-04-10 | Конинклейке Филипс Электроникс Н.В. | Method and apparatus for pseudonym generation and authentication |
US9077690B2 (en) * | 2009-12-07 | 2015-07-07 | Nokia Corporation | Preservation of user data privacy in a network |
JP5942634B2 (en) * | 2012-06-27 | 2016-06-29 | 富士通株式会社 | Concealment device, concealment program, and concealment method |
US11616825B2 (en) * | 2015-12-18 | 2023-03-28 | Aetna Inc. | System and method of aggregating and interpreting data from connected devices |
-
2017
- 2017-12-26 MY MYPI2017705024A patent/MY194026A/en unknown
-
2018
- 2018-11-19 WO PCT/MY2018/050079 patent/WO2019132645A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2019132645A1 (en) | 2019-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7165653B2 (en) | Establishing links between identifiers without disclosing specific identifying information | |
US9843577B2 (en) | Revoking sessions using signaling | |
Cunha et al. | A survey of privacy-preserving mechanisms for heterogeneous data types | |
Sharma et al. | Securing big data hadoop: a review of security issues, threats and solution | |
US9021259B2 (en) | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |
EP3101645B1 (en) | Secure computation method, secure computation system, secure computation server, registrant terminal, user terminal and program | |
US20150235049A1 (en) | Maintaining Data Privacy in a Shared Data Storage System | |
CA3000176A1 (en) | Policy enforcement system | |
Jánoky et al. | An analysis on the revoking mechanisms for JSON Web Tokens | |
CN108154038A (en) | Data processing method and device | |
US20170243162A1 (en) | System and Method for Private Contract Sharing | |
US20200012745A1 (en) | System and Method for Secure Data Management and Access Using Field Level Encryption and Natural Language Understanding | |
Holcer et al. | Privacy in indoor positioning systems: A systematic review | |
US20170262546A1 (en) | Key search token for encrypted data | |
BR112019000805A2 (en) | end-to-end key management system and method | |
US20150310067A1 (en) | Method and system for providing security in a data federation system | |
Bagdasaryan et al. | Ancile: Enhancing privacy for ubiquitous computing with use-based privacy | |
US20180013755A1 (en) | Logon using master password or turn-varying password | |
US20150381579A1 (en) | Method and server for handling of personal information | |
JP6557338B2 (en) | Concealed similarity search system and similarity concealment search method | |
Nabil | Krasnoselskii N‐Tupled Fixed Point Theorem with Applications to Fractional Nonlinear Dynamical System | |
MY194026A (en) | Pseudonymisation and reversal of personally identifiable information | |
WO2016119900A1 (en) | Method and system for managing encrypted data of devices | |
CN105721393A (en) | Data security encryption method and data security encryption device | |
Elmogazy et al. | Towards healthcare data security in cloud computing |