MY194026A - Pseudonymisation and reversal of personally identifiable information - Google Patents
Pseudonymisation and reversal of personally identifiable informationInfo
- Publication number
- MY194026A MY194026A MYPI2017705024A MYPI2017705024A MY194026A MY 194026 A MY194026 A MY 194026A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY PI2017705024 A MYPI2017705024 A MY PI2017705024A MY 194026 A MY194026 A MY 194026A
- Authority
- MY
- Malaysia
- Prior art keywords
- pseudonymisation
- identifiable information
- personally identifiable
- service provider
- pii
- Prior art date
Links
- 230000000977 initiatory effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
- 238000000926 separation method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a system and method for pseudonymisation and reversal of personally identifiable information for privacy protection. The present invention comprising a service requestor (100a) for initiating a request; and a service provider (101) for performing pseudonymisation upon receipt of an authorized request from the service requestor and returning outcome of pseudonymisation to the service requestor. The service provider (101) further comprises provider components within the service provider whereby the service provider perform a first pseudonymisation by taking personally identifiable information (PII) input and undergo a zero knowledge (ZK) function using a first key; and performs a second pseudonymisation using result of first pseudonymisation and undergo a ZK function using a second key. The present invention provides for separation of personally identifiable information (PII) from other personal data with grant to authorized users to recover the link between the authorized users and further allows multiple applications to share the same PII for sharing of the same database without compromising data privacy. The most suitable drawing is FIG. 2.0.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
| PCT/MY2018/050079 WO2019132645A1 (en) | 2017-12-26 | 2018-11-19 | Pseudonymisation and reversal of personally identifiable information |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY194026A true MY194026A (en) | 2022-11-08 |
Family
ID=67063984
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2017705024A MY194026A (en) | 2017-12-26 | 2017-12-26 | Pseudonymisation and reversal of personally identifiable information |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY194026A (en) |
| WO (1) | WO2019132645A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10708234B2 (en) * | 2016-03-24 | 2020-07-07 | International Business Machines Corporation | System, method, and recording medium for preventing back propogation of data protection |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7940179B2 (en) * | 2005-01-12 | 2011-05-10 | British Telecommunications Public Limited Company | Radio frequency identification tag security systems |
| US8683209B2 (en) * | 2008-10-14 | 2014-03-25 | Koninklijke Philips N.V. | Method and apparatus for pseudonym generation and authentication |
| US9077690B2 (en) * | 2009-12-07 | 2015-07-07 | Nokia Corporation | Preservation of user data privacy in a network |
| JP5942634B2 (en) * | 2012-06-27 | 2016-06-29 | 富士通株式会社 | Concealment device, concealment program, and concealment method |
| US11616825B2 (en) * | 2015-12-18 | 2023-03-28 | Aetna Inc. | System and method of aggregating and interpreting data from connected devices |
-
2017
- 2017-12-26 MY MYPI2017705024A patent/MY194026A/en unknown
-
2018
- 2018-11-19 WO PCT/MY2018/050079 patent/WO2019132645A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2019132645A1 (en) | 2019-07-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2016332734B2 (en) | Policy enforcement system | |
| JP7165653B2 (en) | Establishing links between identifiers without disclosing specific identifying information | |
| Stammler et al. | Mainzelliste SecureEpiLinker (MainSEL): privacy-preserving record linkage using secure multi-party computation | |
| US9843577B2 (en) | Revoking sessions using signaling | |
| Sharma et al. | Securing big data hadoop: a review of security issues, threats and solution | |
| EP3101645B1 (en) | Secure computation method, secure computation system, secure computation server, registrant terminal, user terminal and program | |
| US20150235049A1 (en) | Maintaining Data Privacy in a Shared Data Storage System | |
| Holcer et al. | Privacy in Indoor Positioning Systems: A Systematic Review. | |
| US20200012745A1 (en) | System and Method for Secure Data Management and Access Using Field Level Encryption and Natural Language Understanding | |
| BR112019000805A2 (en) | end-to-end key management system and method | |
| US20150310067A1 (en) | Method and system for providing security in a data federation system | |
| US20170243162A1 (en) | System and Method for Private Contract Sharing | |
| US20170262546A1 (en) | Key search token for encrypted data | |
| CN108154038A (en) | Data processing method and device | |
| US20180013755A1 (en) | Logon using master password or turn-varying password | |
| Kiran et al. | Enhanced security‐aware technique and ontology data access control in cloud computing | |
| JPWO2016203555A1 (en) | Concealed similarity search system and similarity concealment search method | |
| KR20160143706A (en) | Method and system for protecting and/or anonymizing a user identity and/or user data of a subscriber of a data protection service, mobile communication network, program and computer program product | |
| Nabil | Krasnoselskii N‐Tupled Fixed Point Theorem with Applications to Fractional Nonlinear Dynamical System | |
| Agratini | Approximation properties of a class of linear operators | |
| Li et al. | CDPS: A cryptographic data publishing system | |
| US20150381579A1 (en) | Method and server for handling of personal information | |
| Elmogazy et al. | Towards healthcare data security in cloud computing | |
| MY194026A (en) | Pseudonymisation and reversal of personally identifiable information | |
| WO2016119900A1 (en) | Method and system for managing encrypted data of devices |