MY194026A - Pseudonymisation and reversal of personally identifiable information - Google Patents

Pseudonymisation and reversal of personally identifiable information

Info

Publication number
MY194026A
MY194026A MYPI2017705024A MYPI2017705024A MY194026A MY 194026 A MY194026 A MY 194026A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY 194026 A MY194026 A MY 194026A
Authority
MY
Malaysia
Prior art keywords
pseudonymisation
identifiable information
personally identifiable
service provider
pii
Prior art date
Application number
MYPI2017705024A
Inventor
Goh Alwyn
Kay Win Lee
Kang Siong Ng
Geong Sen Poh
Soeheila Mohamad Moesfa
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2017705024A priority Critical patent/MY194026A/en
Priority to PCT/MY2018/050079 priority patent/WO2019132645A1/en
Publication of MY194026A publication Critical patent/MY194026A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a system and method for pseudonymisation and reversal of personally identifiable information for privacy protection. The present invention comprising a service requestor (100a) for initiating a request; and a service provider (101) for performing pseudonymisation upon receipt of an authorized request from the service requestor and returning outcome of pseudonymisation to the service requestor. The service provider (101) further comprises provider components within the service provider whereby the service provider perform a first pseudonymisation by taking personally identifiable information (PII) input and undergo a zero knowledge (ZK) function using a first key; and performs a second pseudonymisation using result of first pseudonymisation and undergo a ZK function using a second key. The present invention provides for separation of personally identifiable information (PII) from other personal data with grant to authorized users to recover the link between the authorized users and further allows multiple applications to share the same PII for sharing of the same database without compromising data privacy. The most suitable drawing is FIG. 2.0.
MYPI2017705024A 2017-12-26 2017-12-26 Pseudonymisation and reversal of personally identifiable information MY194026A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2017705024A MY194026A (en) 2017-12-26 2017-12-26 Pseudonymisation and reversal of personally identifiable information
PCT/MY2018/050079 WO2019132645A1 (en) 2017-12-26 2018-11-19 Pseudonymisation and reversal of personally identifiable information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2017705024A MY194026A (en) 2017-12-26 2017-12-26 Pseudonymisation and reversal of personally identifiable information

Publications (1)

Publication Number Publication Date
MY194026A true MY194026A (en) 2022-11-08

Family

ID=67063984

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2017705024A MY194026A (en) 2017-12-26 2017-12-26 Pseudonymisation and reversal of personally identifiable information

Country Status (2)

Country Link
MY (1) MY194026A (en)
WO (1) WO2019132645A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10708234B2 (en) 2016-03-24 2020-07-07 International Business Machines Corporation System, method, and recording medium for preventing back propogation of data protection

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602006016731D1 (en) * 2005-01-12 2010-10-21 British Telecomm SAFETY SYSTEMS FOR RFID LABELS
RU2512139C2 (en) * 2008-10-14 2014-04-10 Конинклейке Филипс Электроникс Н.В. Method and apparatus for pseudonym generation and authentication
US9077690B2 (en) * 2009-12-07 2015-07-07 Nokia Corporation Preservation of user data privacy in a network
JP5942634B2 (en) * 2012-06-27 2016-06-29 富士通株式会社 Concealment device, concealment program, and concealment method
US11616825B2 (en) * 2015-12-18 2023-03-28 Aetna Inc. System and method of aggregating and interpreting data from connected devices

Also Published As

Publication number Publication date
WO2019132645A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
JP7165653B2 (en) Establishing links between identifiers without disclosing specific identifying information
US9843577B2 (en) Revoking sessions using signaling
Cunha et al. A survey of privacy-preserving mechanisms for heterogeneous data types
Sharma et al. Securing big data hadoop: a review of security issues, threats and solution
US9021259B2 (en) Encrypted database system, client terminal, encrypted database server, natural joining method, and program
EP3101645B1 (en) Secure computation method, secure computation system, secure computation server, registrant terminal, user terminal and program
US20150235049A1 (en) Maintaining Data Privacy in a Shared Data Storage System
CA3000176A1 (en) Policy enforcement system
Jánoky et al. An analysis on the revoking mechanisms for JSON Web Tokens
CN108154038A (en) Data processing method and device
US20170243162A1 (en) System and Method for Private Contract Sharing
US20200012745A1 (en) System and Method for Secure Data Management and Access Using Field Level Encryption and Natural Language Understanding
Holcer et al. Privacy in indoor positioning systems: A systematic review
US20170262546A1 (en) Key search token for encrypted data
BR112019000805A2 (en) end-to-end key management system and method
US20150310067A1 (en) Method and system for providing security in a data federation system
Bagdasaryan et al. Ancile: Enhancing privacy for ubiquitous computing with use-based privacy
US20180013755A1 (en) Logon using master password or turn-varying password
US20150381579A1 (en) Method and server for handling of personal information
JP6557338B2 (en) Concealed similarity search system and similarity concealment search method
Nabil Krasnoselskii N‐Tupled Fixed Point Theorem with Applications to Fractional Nonlinear Dynamical System
MY194026A (en) Pseudonymisation and reversal of personally identifiable information
WO2016119900A1 (en) Method and system for managing encrypted data of devices
CN105721393A (en) Data security encryption method and data security encryption device
Elmogazy et al. Towards healthcare data security in cloud computing