WO2022146377A1 - A system for encrypting and tracking personal data - Google Patents

A system for encrypting and tracking personal data Download PDF

Info

Publication number
WO2022146377A1
WO2022146377A1 PCT/TR2021/051537 TR2021051537W WO2022146377A1 WO 2022146377 A1 WO2022146377 A1 WO 2022146377A1 TR 2021051537 W TR2021051537 W TR 2021051537W WO 2022146377 A1 WO2022146377 A1 WO 2022146377A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
encrypted
database
server
personal
Prior art date
Application number
PCT/TR2021/051537
Other languages
French (fr)
Inventor
Oguzhan ATIS
Muhammed Yusuf CETIN
Original Assignee
M.B.I.S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret Anonim Sirketi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by M.B.I.S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret Anonim Sirketi filed Critical M.B.I.S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret Anonim Sirketi
Publication of WO2022146377A1 publication Critical patent/WO2022146377A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present invention relates to a system for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot.
  • the Chinese patent document no. CN111104691 A discloses a system and method for processing sensitive data.
  • the said invention identifies the sensitive data over a business database; extracts the sensitive data from a database; encrypts the sensitive data by using a random key corresponding to a service party identifier and returns the ciphertext to the service party; when a decryption request containing the ciphertext is received from the business, extracts a random key corresponding to the service party identifier in the current life cycle; decrypts the ciphertext; stores it in a behavior database associatively in order to track the data related to sensitive data; and returns the sensitive data to the business party.
  • An objective of the present invention is to realize a system which enables enterprises to store personal data by encryption, to record accesses, to maximize their data security and to be safe from cyber attack.
  • Figure l is a schematic view of the inventive system.
  • the inventive system (1) for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot comprises: at least one personal information database (2) which is configured to store the personal data to be put into process; at least one rule database (3) which is configured to store the rules used for transaction of anonymizing the original data; at least one encrypted database (4) which is configured to store the encrypted data; at least one data selection server (5) which is configured to put the personal data, that are stored in the personal information database (2), into process; at least one anonymization server (6) which is configured to ensure that the data, that is determined by the data selection server (5), is anonymized within the scope of ruled stored in the rule database (3); at least one encryption server (7) which is configured to encrypt the original data and then save it to the encrypted database (4); at least one access tracking server (8) which is configured to determine and report the access requests of users for encrypted data by accessing the encrypted database (4).
  • the personal information database (2) included in the inventive system (1) is configured to store related personal data of a company.
  • the personal information database (2) is configured to save the data, that are included in a class of legally sensitive data, in tables and fields together with an information stating that these are sensitive data.
  • the rule database (3) included in the inventive system (1) is configured to store the parameters and rule set used for anonymizing transaction.
  • the encrypted database (4) included in the inventive system (1) is configured to store the encrypted data.
  • the data selection server (5) included in the inventive system (1) is configured to select the fields and data to be anonymized and encrypted from the personal information database (2), by using a predetermined algorithm.
  • the anonymization server (6) included in the inventive system (1) is configured to execute the anonymization process in accordance with the data set stored in the rule database (3), upon receiving the data determined by the data selection server (5).
  • the anonymization server (6) is configured to anonymize each personal data in different ways, in accordance with the algorithm stored in the rule database (3).
  • the encryption server (7) included in the inventive system (1) is configured to encrypt field values of personal information in original versions of anonymized data and to transmit these values to the encrypted database (4), by using a predetermined encryption algorithm.
  • the access tracking server (8) included in the inventive system (1) is configured to detect and report the access requests of users -who has and/or has no authority to access the encrypted database (4)- initiated on the encrypted database (4).
  • the personal information that should be encrypted are received by the data selection server (5) over the personal information database (2) at first.
  • the anonymization server (6) anonymizes the data, that are selected by the data selection server (5) previously, in accordance with the rule set and parameters stored in the rule database (3) and the original version of the anonymized data is configured to be encrypted with its own algorithm by the encryption server (7).
  • the encrypted data are recorded in the encrypted database (4).
  • the cases where a user creates a demand for accessing the encrypted database (4) are detected and reported by the access tracking server (8).
  • data that should be encrypted are classified; specific fields wherein encrypted data will be stored are created; users who have a successful authorization check are allowed for access to encrypted data; a history is kept for users who access the encrypted data; an encryption transaction can be carried out for software that have no database encryption capability; and it is enabled to avoid cost and performance losses that may be caused by encryption of all database in software with encryption capability.

Abstract

The present invention relates to a system (1) for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot.

Description

A SYSTEM FOR ENCRYPTING AND TRACKING PERSONAL DATA
Technical Field
The present invention relates to a system for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot.
Background of the Invention
Today, data encryption is one of the areas wherein database producers and independent security software generate solution. Database producers can also develop technologies for storing all database as encrypted in order to meet security requirements and eliminate negative effects of data losses. However, these technologies are presented to users with an additional cost. Besides cost, performance is another significant issue. Data reading and data writing from an encrypted database occur much more slowly compared to standard transactions. Due to the fact that this performance loss prevents meeting the satisfaction of many software users, particularly enterprise solution providers do not support these security features. For example, it is not possible to use database as encrypted in SAP S4/HANA Enterprise Resource Planning solution. In sectors wherein security of data is very critical, solutions with an encrypted database support are preferred despite the drawbacks and transactions are carries out accordingly. Particularly, defence industry companies can be cited as an example. Due to the fact that confidentiality of their business is high-level, these companies perform their work in environments wherein specific security measures are taken. Encrypted databases are usually available in such environments. It is aimed to ensure that data cannot be decrypted even if a data leakage occurs as a result of a potential cyber attack. Today, data security has become critical both commercially and legally. Particularly, the obligation to keep sensitive personal data in a database as encrypted has also obligated private companies to take measures. Keeping record of accesses to encrypted data is another issue. Companies need to be able to record accesses to sensitive personal data in particular. However, companies cannot keep a detailed history in this respect because existing software do not provide this opportunity.
Considering the studies included in the state of the art, it is understood that there is need for a system which enables to encrypt data by means of an application in software that cannot perform encryption at the database level, and to ensure that the data can be viewed by only authorized persons.
The Chinese patent document no. CN111104691 A, an application in the state of the art, discloses a system and method for processing sensitive data. The said invention identifies the sensitive data over a business database; extracts the sensitive data from a database; encrypts the sensitive data by using a random key corresponding to a service party identifier and returns the ciphertext to the service party; when a decryption request containing the ciphertext is received from the business, extracts a random key corresponding to the service party identifier in the current life cycle; decrypts the ciphertext; stores it in a behavior database associatively in order to track the data related to sensitive data; and returns the sensitive data to the business party.
Summary of the Invention
An objective of the present invention is to realize a system which enables enterprises to store personal data by encryption, to record accesses, to maximize their data security and to be safe from cyber attack.
Detailed Description of the Invention “A System for Encrypting and Tracking Personal Data” realized to fulfil the objective of the present invention is shown in the figure attached, in which:
Figure l is a schematic view of the inventive system.
The components illustrated in the figure are individually numbered, where the numbers refer to the following:
1. System
2. Personal information database
3. Rule database
4. Encrypted database
5. Data selection server
6. Anonymization server
7. Encryption server
8. Access tracking server
The inventive system (1) for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot comprises: at least one personal information database (2) which is configured to store the personal data to be put into process; at least one rule database (3) which is configured to store the rules used for transaction of anonymizing the original data; at least one encrypted database (4) which is configured to store the encrypted data; at least one data selection server (5) which is configured to put the personal data, that are stored in the personal information database (2), into process; at least one anonymization server (6) which is configured to ensure that the data, that is determined by the data selection server (5), is anonymized within the scope of ruled stored in the rule database (3); at least one encryption server (7) which is configured to encrypt the original data and then save it to the encrypted database (4); at least one access tracking server (8) which is configured to determine and report the access requests of users for encrypted data by accessing the encrypted database (4).
The personal information database (2) included in the inventive system (1) is configured to store related personal data of a company. The personal information database (2) is configured to save the data, that are included in a class of legally sensitive data, in tables and fields together with an information stating that these are sensitive data.
The rule database (3) included in the inventive system (1) is configured to store the parameters and rule set used for anonymizing transaction.
The encrypted database (4) included in the inventive system (1) is configured to store the encrypted data.
The data selection server (5) included in the inventive system (1) is configured to select the fields and data to be anonymized and encrypted from the personal information database (2), by using a predetermined algorithm.
The anonymization server (6) included in the inventive system (1) is configured to execute the anonymization process in accordance with the data set stored in the rule database (3), upon receiving the data determined by the data selection server (5). The anonymization server (6) is configured to anonymize each personal data in different ways, in accordance with the algorithm stored in the rule database (3). The encryption server (7) included in the inventive system (1) is configured to encrypt field values of personal information in original versions of anonymized data and to transmit these values to the encrypted database (4), by using a predetermined encryption algorithm.
The access tracking server (8) included in the inventive system (1) is configured to detect and report the access requests of users -who has and/or has no authority to access the encrypted database (4)- initiated on the encrypted database (4).
In the inventive system (1), the personal information that should be encrypted are received by the data selection server (5) over the personal information database (2) at first. The anonymization server (6) anonymizes the data, that are selected by the data selection server (5) previously, in accordance with the rule set and parameters stored in the rule database (3) and the original version of the anonymized data is configured to be encrypted with its own algorithm by the encryption server (7). The encrypted data are recorded in the encrypted database (4). The cases where a user creates a demand for accessing the encrypted database (4) are detected and reported by the access tracking server (8).
With the invention, data that should be encrypted are classified; specific fields wherein encrypted data will be stored are created; users who have a successful authorization check are allowed for access to encrypted data; a history is kept for users who access the encrypted data; an encryption transaction can be carried out for software that have no database encryption capability; and it is enabled to avoid cost and performance losses that may be caused by encryption of all database in software with encryption capability.
Within these basic concepts; it is possible to develop various embodiments of the inventive system (1); the invention cannot be limited to examples disclosed herein and it is essentially according to claims.

Claims

CLAIMS A system (1) for storing personal data that are included in package programs in the form of enterprise resource planning, as encrypted; determining fields that should be encrypted in accordance with an identified rule library; and storing these field values upon being encrypted in control of a robot; comprising: at least one personal information database (2) which is configured to store the personal data to be put into process; at least one rule database (3) which is configured to store the rules used for transaction of anonymizing the original data; at least one encrypted database (4) which is configured to store the encrypted data; and characterized by at least one data selection server (5) which is configured to put the personal data, that are stored in the personal information database (2), into process; at least one anonymization server (6) which is configured to ensure that the data, that is determined by the data selection server (5), is anonymized within the scope of ruled stored in the rule database (3); at least one encryption server (7) which is configured to encrypt the original data and then save it to the encrypted database (4); at least one access tracking server (8) which is configured to determine and report the access requests of users for encrypted data by accessing the encrypted database (4). A system (1) according to Claim 1; characterized by the personal information database (2) which is configured to store the related personal data of a company.
6 A system (1) according to Claim 1 or 2; characterized by the personal information database (2) which is configured to save the data, that are included in a class of legally sensitive data, in tables and fields together with an information stating that these are sensitive data. A system (1) according to any of the preceding claims; characterized by the rule database (3) which is configured to store the parameters and rule set used for anonymizing transaction. A system (1) according to any of the preceding claims; characterized by the encrypted database (4) which is configured to store the encrypted data. A system (1) according to any of the preceding claims; characterized by the data selection server (5) which is configured to select the fields and data to be anonymized and encrypted from the personal information database (2), by using a predetermined algorithm. A system (1) according to any of the preceding claims; characterized by the anonymization server (6) which is configured to execute the anonymization process in accordance with the data set stored in the rule database (3), upon receiving the data determined by the data selection server (5). A system (1) according to any of the preceding claims; characterized by the anonymization server (6) which is configured to anonymize each personal data in different ways, in accordance with the algorithm stored in the rule database (3). A system (1) according to any of the preceding claims; characterized by the encryption server (7) which is configured to encrypt field values of personal information in original versions of anonymized data and to
7 transmit these values to the encrypted database (4), by using a predetermined encryption algorithm. A system (1) according to any of the preceding claims; characterized by the access tracking server (8) which is configured to detect and report the access requests of users -who has and/or has no authority to access the encrypted database (4)- initiated on the encrypted database (4).
8
PCT/TR2021/051537 2020-12-30 2021-12-27 A system for encrypting and tracking personal data WO2022146377A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2020/22531A TR202022531A2 (en) 2020-12-30 2020-12-30 A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA
TR2020/22531 2020-12-30

Publications (1)

Publication Number Publication Date
WO2022146377A1 true WO2022146377A1 (en) 2022-07-07

Family

ID=76503113

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2021/051537 WO2022146377A1 (en) 2020-12-30 2021-12-27 A system for encrypting and tracking personal data

Country Status (2)

Country Link
TR (1) TR202022531A2 (en)
WO (1) WO2022146377A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054342A1 (en) * 2000-01-18 2001-07-26 Yodlee.Com. Inc. Method and apparatus for secure storage of personal data in web-based applications using symmetric encryption and distributed key components
US20120036356A1 (en) * 2008-09-19 2012-02-09 Herve Barbat Method for Accessing Nominative Data Such As a Customised Medical File From a Local Generation Agent
US20170116433A1 (en) * 2013-03-12 2017-04-27 Commvault Systems, Inc. File backup with selective encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054342A1 (en) * 2000-01-18 2001-07-26 Yodlee.Com. Inc. Method and apparatus for secure storage of personal data in web-based applications using symmetric encryption and distributed key components
US20120036356A1 (en) * 2008-09-19 2012-02-09 Herve Barbat Method for Accessing Nominative Data Such As a Customised Medical File From a Local Generation Agent
US20170116433A1 (en) * 2013-03-12 2017-04-27 Commvault Systems, Inc. File backup with selective encryption

Also Published As

Publication number Publication date
TR202022531A2 (en) 2021-04-21

Similar Documents

Publication Publication Date Title
US10614244B1 (en) Sensitive data aliasing
EP3298532B1 (en) Encryption and decryption system and method
US10666647B2 (en) Access to data stored in a cloud
CN100407174C (en) Data protection program and data protection method
KR101371608B1 (en) Database Management System and Encrypting Method thereof
Sedayao et al. Enhancing cloud security using data anonymization
US20150026462A1 (en) Method and system for access-controlled decryption in big data stores
CN110889130B (en) Database-based fine-grained data encryption method, system and device
US20110314088A1 (en) System and method for controlling and monitoring access to data processing applications
CN107368749A (en) Document handling method, device, equipment and computer-readable storage medium
WO2022146377A1 (en) A system for encrypting and tracking personal data
CA3188334A1 (en) A database server system
CN114253660A (en) System and method for authorizing a user data processor to access a container of user data
Amamou et al. Towards a Better Security in Public Cloud Computing
Jaya Mabel Rani et al. Data Leakage Prevention and Detection Techniques Using Internet Protocol Address
Zeb Security of Relational Database Management System: Threats and Security Techniques
Dhyani E-Health data risks & protection for public cloud: An elderly healthcare usecase for Swedish municipality
Beley et al. A Management of Keys of Data Sheet in Data Warehouse
Ulf Mattsson Ulf Mattsson, CTO Protegrity: Database Security for Cloud and Outsourced Environments–Global Security Mag Online
CN114840820A (en) Electronic document password-fixing and protecting method
KR20100003380A (en) How to query encrypted database information
Browning Security Features in the Teradata Database
Jayapandian et al. ORPHANAGE HOME MANAGEMENT SYSTEM USING CLOUD WITH DATA ANONYMIZATION
NZ618683B2 (en) Access control to data stored in a cloud
AYSHWARYA PARTIAL ENCRYPTION AND PARTIAL INFERENCE CONTROL BASED DISCLOSURE IN EFFECTIVE COST CLOUD

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21916055

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21916055

Country of ref document: EP

Kind code of ref document: A1