[go: up one dir, main page]

CA2363687A1 - Anonymization method - Google Patents

Anonymization method Download PDF

Info

Publication number
CA2363687A1
CA2363687A1 CA002363687A CA2363687A CA2363687A1 CA 2363687 A1 CA2363687 A1 CA 2363687A1 CA 002363687 A CA002363687 A CA 002363687A CA 2363687 A CA2363687 A CA 2363687A CA 2363687 A1 CA2363687 A1 CA 2363687A1
Authority
CA
Canada
Prior art keywords
data
data field
character
field
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002363687A
Other languages
French (fr)
Inventor
Roland Nehl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LOK LOMBARDKASSE AG
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2363687A1 publication Critical patent/CA2363687A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Medicines Containing Material From Animals Or Micro-Organisms (AREA)
  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
  • Jellies, Jams, And Syrups (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to a method for rendering anonymous sensitive data within a data stream. The invention provides a method which comprises the following steps: Compressing the sensitive data field; rendering anonymous t he sensitive data field, and distinguishing the anonymized sensitive data field within the data stream by means of start and stop signs.

Description

Anonymization method The invention relates to a method for anonymizing sensitive data within a data stream.
Information for long-term storage is stored in databases. The value of such information collections is considered to be an essential asset of organizations.
Owing to the sensitivity, access to databases is generally restricted, i.e. access is possible only for authorized users in accordance with their user rights profiles. In a user rights profile it is possible to define who can access which data in which modes (for example reading, writing). A current example is when it is not possible for every employee of a company to access personnel data. It is also possible for employees to access, on a "need-to-know" principle, only that information which they require to carry out their duties. All other information is barred. An administrator is responsible for allocating the access rights, and the reliability of the data protection depends essentially on this administrator.
To provide data security, anonymization methods are frequently used which anonymize the data which is not to be accessed. Such methods are used in particular if data is to be transferred to a database in the form of a data stream, in which case it is necessary to ensure that there is no unauthorized access to the data on the transmission path. An application example of this is the dispatch of a data stream by e-mail. Transmitters and receivers then have full access rights to all the data contained in the database. The data is encrypted before transmission so that attackers within the Internet cannot access the data. The receiver decrypts the data, and can access it completely.

" CA 02363687 2001-08-29 In the known methods for protecting databases, authorization and testing of user rights is typically performed at the front end of the database. This applies, for example, to DB2TM from IBM. If a higher level of user access rights is required, there are commercial products, for example RACFTM (Resource Access Control Facility) from IBM. However, access control is also performed here by an administrator.
A classic situation in which the conventional methods are inadequate is an outsourcer/insourcer relationship.
An outsourcer has certain services provided by an insourcer and provides the insourcer with all the data necessary to do so, said data being stored in a database at the insourcer's end. If, for data protection reasons or for reasons of customer protection, the outsourcer wishes itself to control the dissemination of customer-identifying data, the known anonymization methods are used either to prevent access to the entire database or to place the selective control of access to specific data under the aegis of an administrator which is located at the insourcer's premises. Therefore, it would basically also be possible to access sensitive data.
The object of the present invention is to make available a method which permits a database to be accessed, but excludes certain data within this database from access without destroying the relationship between the excluded data and the rest of the data. It should be possible to transfer the database to third parties for processing of the non-protected data, without losing control of access to the protected data.
According to the invention, a method for anonymizing sensitive data within a data stream is proposed, having the following steps:
a) the sensitive date field is compressed, b) the sensitive data field is anonymized, c) the anonymized sensitive data field is marked within the data stream by means of start and stop characters.
According to the invention, the sensitive data is selectively anonymized within a database. The anonymized data fields are provided with a start character and a stop character in order to identify them for later de-anonymization.
The method according to the invention can be used in particular when a database user stores data in a database, and some of the data items are to be processed by a database operator. While the database user is authorized to read all the data, sensitive data, for example customer-identifying information, is to be anonymized as far as the database operator is concerned, and it is to be impossible for said database operator to de-anonymize said information. The anonymization information remains with the database user. The non-anonymized data can be evaluated and processed by the database operator. The relationship between the data remains unchanged.
The sensitive data can be, for example, customer-identifying information, and it is to be possible for the data assigned to the customer to be read for the purpose of statistical evaluation. The database can be partially anonymized with the anonymization method according to the invention and passed on to third parties for statistical evaluation and processing. The customer-identifying data cannot be read by the third party. The control over which user access rights are assigned to which persons remains with the database user. The relationship between the processed data and the respective anonymized data, such as customer name, remains unchanged. After the evaluated or processed database is returned to the database user, the database user can perform a de-anonymization and use the entire processed database.
The method according to the invention can, in particular, be applied advantageously even if the sensitive data fields have a predefined field length.
However, it is self-evident that the method can also be appropriately applied without restriction when there are unlimited field lengths. Even if the following statements relate increasingly to sensitive data fields of a predefined field length, this is not to be understood as restrictive.
The data can advantageously be compressed before the sensitive data field is anonymized. In the case in which the data field is completely filled, this provides the space for the addition of start and stop characters for marking the anonymized data field. The marking is necessary for later de-anonymization of the data field.
If, in any case, the data field is not completely filled, or if the data is compressed by the compression to such an extent that there is still space remaining in the data field, the data field can be filled in by fill characters before the anonymization.
There are, in particular, two possible methods available for anonymizing the data field, namely pseudonymization and encryption.
If the data field is completely filled, pseudonymization is preferably performed. To do this, - 5 ~- PCT/DE00/00586 the length of the pseudonym used has to be selected in such a way that space remains for start and stop characters in the data field after the pseudonymization.
If there is still space within the data field, the data field is preferably at least partially filled by fill characters, in particular with random values, and subsequently encrypted.
Filling the field with random values ensures that isonomies are resolved. For example, it is necessary that frequently occurring names, such as Miiller, Meier etc. in the German-speaking world are encrypted differently so that by analyzing the frequency of the data it is not possible to draw conclusions about the data. This is done by filling the data field with random values and subsequently encrypting it.
In a preferred embodiment of the method according to the invention, information relating to the key used for the encryption is also stored in the encrypted data field. This key information has the purpose of enabling the database user to decrypt the encrypted data. In this way, it is possible to use various keys for encrypting the data, the corresponding key information for identifying the key being stored in each case within the field. Of course, the filling level of the field must be carried out in such a way, or generated by means of data compression in such a way that space remains for storing key information.
The detection of which data is encrypted or decrypted can be implemented by clearly marking what is referred to as start and stop characters, such as "{" and "}".
In the system in question, it is not permitted to use the start and stop characters apart from for marking encrypted data. This approach has the advantage that it is independent of the applications which operate on the data.
If there is no single unambiguous start character in the system in question, a set start character can be used. The same applies to the stop characters. In the simplest case, the set start character could be composed of a character which is identical to the stop character. However, this has in turn the disadvantage that synchronization in a fault situation is no longer possible solely on the basis of the knowledge of start and stop characters.
The method according to the invention is explained in more detail below by means of various examples and with reference to the appended figures, in which:
Figure 1 shows the marking of sensitive data which is to be anonymized;
Figure 2 shows the flowchart of an encryption and/or decryption process;
Figure 3 shows the flow of an encryption process;
Figure 4 shows the structure of an encrypted data field;
Figure 5 shows the flow of a decryption process.
The anonymization method should fulfill the following requirements:
1. Frequently occurring data (for example the frequently occurring names Miiller, Meier etc. in the German-speaking world) should be encrypted differently. This is intended to prevent conclusions being able to be drawn about the data itself by analyzing the frequency of data. The intention is to resolve the isonomies in the data.
2. The length of a data field to be encrypted is restricted by a fixed maximum length which is predefined essentially by the database design.
Field types, for example numeric or alpha numeric, must not be changed. This requirement permits subsequent integration of the method without an operator of a database system having to change his applications in order to process the data.
3. Each encrypted data field contains all the information, apart from keys and systemwide parameters, for decryption. It is therefore possible to process each data field independently.
The aforesaid three properties are to be fulfilled simultaneously by the selected anonymization method.
In order to carry out the method, the filling level (compression ratio) of the data field to be anonymized is firstly checked. It must be ensured that there is still sufficient space within the predefined fixed data field length after the encryption in order to store a start character and a stop character and information for the key used.
If the filling level of the data field is too high to be able to carry out encryption with the aforesaid criteria, the data field is firstly compressed. If the compression of the data field does not give rise to a sufficiently small field size either, pseudonymization is carried out. The pseudonym must be selected in such a way that the condition predefined under 2. ) in terms of the filling level of the data field is fulfilled.
If the filling level of the data field is sufficiently small to permit encryption of the data field, the encryption is performed. To do this, the data field is firstly filled to the maximum possible filling level with random values.
When the information content of the data field is small, data compression can be performed before the filling in order to be able to resolve isonomies better.
The encryption is then performed. The encryption algorithm used can be selected as desired. Current algorithms are, for example, IDEA (International Data Encryption Algorithm) or DES (Data Encryption Standard).
The encrypted data field is then marked with a start character and a stop character. In addition, information relating to the key used for the encryption is stored in the data field at a previously defined position.
The following example will illustrate the method:
The data field length is 40 characters. The content of the unencrypted data field is the name "Meier". "{" is used as the start character, and "}" is used as the stop character. The data field is filled to the full field length and provided with start and stop characters, that is to say:
{Meier..............}.
The 40 characters between the start and stop characters are processed by the method. The encryption then results in a 40 character-long data field including the start and stop characters, that is to say for example:
{ch74nHhdjqa.........yjas8}.
In the encrypted data fields, k bits are provided for marking the key used from a key set. It is thus possible to represent 2k different keys. As a result of additional information being incorporated into the encrypted data fields, for example set start characters, key bits and information relating to the initialization sector used for the encryption algorithm, it is necessary to compress the data fields which are to be encrypted.
In the appended figure 2, the encryption and decryption of data fields is illustrated. The individual steps are explained in more detail below.
The description of the method depends on the following conditions:
- Each character is represented by a byte (for example ASCII or EBCDIC code). Before the encryption or decryption, all the characters of a field are converted into an internal character set (ASCII) and then converted again appropriately.
- The different parameters are defined as follows:
1. a character set (for example 91 specific characters of the EBCDIC code);
2. a set of the start characters and stop characters for encrypted data fields, which are not included in the character set;
3. an alternative character for characters which do not belong to the character set (is part of the character set):
4. possibly necessary fill characters (is part of the character set);
5. method parameters for the compression process;
6. information on how the original data field is to be subsequently processed as when compression is not successful;
7. information on the representation of bit sequences as sequences of permissible characters;
8. information on which of the keys from the key set is to be used.
Depending on the power of the character set, individual bit segments can each be converted to form character sequences of a specific length (for example, given a character set of 91 characters, every 13 bits can be respectively converted effectively into two characters). The best would be to perform a "common"
conversion of the entire bit sequence by considering the sequence as a binary number and representing this number in the base b = power of the character set.
A method for effectively encoding on as large as possible bit sequence into a data field of a predefined length, which data field is provided for implementation on systems with 32-bit processors, is described below.
Firstly, for a given character set of the size b the following is calculated once before the basic initialization ("3~1n" represents here the natural logarithm):
~ the minimum value of x/y is determined for integral y from 1 to 32 and integral x > y*In (2) /In (b) .
For example: when b - 91, a minimum is obtained when x = 2 and y = 13.
~ for all values x' of 1 to x-l, the respective integral maximum y' (x') is calculated by means of y' (x') *In (2) /In (b)<_x'. In addition, y' (0) - 0 is selected.
Example: when b = 91 and x - 2, the following is obtained y'(1) - 6.
A bit sequence can then be converted into a data field of the length d as follows:
1. In each case y bits are converted into in each case x characters.
Example: when b - 91, every 13 bits are replaced by 2 characters each.
2. If the given data field length d cannot be divided by x, y'(x') bits are converted into the remaining x' characters. In the example, 6 bits are also represented by a character.
If s is assumed to be the number of start characters used in the encrypted data field and L (d,b, s) =L= ( (d-s-1) DIV x) *y+y' ( (d-s-1)MOD x) will be assumed to be the number of bits which can be converted into a data field of the length (d-s-1) by applying the above method. The value (d-s-1) results from the fact that the set of start characters of the length s and the stop character must be included in the encrypted data field.

Wo 00/56005 - 12 - PCT/DE00/00586 When d - 30, b - 91 and s - l, the following is obtained for example L = 14 * 13 + 0 = 182, when d - 15, b - 91 and s - 3, L - 5 * 13 + y' (1) - 65 + 6 = 71.
Let m - (L - k - length of compressed bit sequence).
The bits still available after the compression, k bits are provided for the number of the key used. All sorts of methods can be used for the compression. Depending on this number m, it is defined how the initialization vector will be made available for the encryption and coded.
The suitable selection of the initialization vector ensures that isonomies are resolved. In principle, the following possibilities can be used for this:
~ use of random numbers ~ use of m~~counters Various keys of the key set composed of k keys can be used with staggered timing. During the encryption it is necessary to define which of these keys is to be used.
The key number is encoded by k bits.
If the bit sequence composed of k bits for the number of the key, the bits for the encoding of the initialization vector and the bits for the compressed data field should be shorter than necessary, i.e.
smaller than L, it is filled in at the end with "0"
bits until the maximum admissible bit length L is reached.
The compressed data field content is encrypted.
The encryption can be carried out with a block encryption algorithm and the stored secret key in the CBC mode, the last block of the length j (if this is shorter than 64 bits) being encrypted in the CFB mode (see for example ISO/IEC 10116, Information Technology - Modes of Operation for an n-bit Block Cipher Algorithm, 1991).
In the consideration it is assumed that the typical block length of 64 is used. It is clearly possible to generalize to other block lengths. In another variant, what is referred to as ~ stream cipher algorithms, could be used directly for character-by-character encryption.
Finally, in order to form the encrypted data field the character sequence which is obtained is inserted between the set start character and the stop character.
As soon as the start character sequence is detected in the data stream, the subsequent characters are input into an internal memory until the stop character appears.
If the start character sequence is among the subsequent characters, the process of storing is terminated and started at the new start character sequence. If a stop character has still not been detected after a predefined maximum length, the process is also terminated and the next start character sequence is looked for again. If there are fewer than a predefined lower limit of characters between the set start character and the stop character, the storage is also terminated.
Not every data field can be compressed to such an extent that the desired number of bits is available for the initialization vector. The shorter the data set length, the worse the compression, with the consequence that fewer bits are available for the initialization vector and there are thus fewer possible ways of generating various ~s--ciphertexts for a data field.
In such a case, there are in principle the following three possible ways of continuing:
1. Shortening the data field until sufficient compression can be achieved. However, this is inevitably associated with loss of information.
2. The affected data field is not encrypted, and it will thus remain in plain text. This can possibly be acceptable if this occurs rarely in relation to the overall set of data fields to be encrypted.
3. Use of the pseudonymization approach, which is described below.
It may be found that no adequate compression of the data records can be achieved when there is a predefined fixed field length. If shortening or passing on in plain text is not acceptable, the complete "masking" of all the selected data records can be implemented by means of the pseudonymization approach.
Data fields and pseudonyms can be linked, and vice versa, in a way analogous to an alias . The information is contained in a table.
Leutheusser-Schnarrenberger <-> X1BXE.....H
Garmisch--Partenkirchen <-> X2BXD9....Z
If the pseudonymization is necessary at a plurality of spatially separated locations, the pseudonyms which are allocated to all the locations must be reserved at all the other locations (replication). This means additional communication costs. Additional measures for protecting the transmission are necessary.
The encrypted data fields can be stored over relatively long time periods, for example 5 to 15 years. The use of different keys staggered over time is advisable for the following reasons:
~ If the key becomes known, the entire set of encrypted data fields must be considered as being exposed.
The set of encrypted data fields which is available to a crypto analyst is significantly smaller if a plurality of keys are used.
For this reason, the method provides k keys for each set of database users which cooperate.
The keys can be generated in a trust center (trustworthy third-party entity) which makes available the necessary technical and organizational environment.
Various sets of database users which do not cooperate with one another should have various sets of keys which do not have any dependence on one another. This excludes the possibility of a set of database users being able to access database information from the other set of database users.
The key management is composed of the following functions:
1. Generation of keys A key packet composed of k keys is generated. A
hardware random number generator is particularly suitable for this. In the operation after the generation of the keys, the generated keys can be stored on a key storage medium, for example a egg smart card or PCMCIA card. These media can be configured in such a way that they carry out the cryptographic calculations themselves, or issue keys only after authentication has been performed.
2. Distribution of keys.
From the location where the keys are generated, the keys can be transported on a key storage medium to the place of use (terminal) or to a secure place of storage (back-up).
3. Introducing keys into terminals A terminal is defined by the fact that it can carry out the necessary encryption and decryption processes. Such a device can be a specially developed piece of hardware or a PC. The keys can be loaded into a terminal from the key storage medium after prior authentication has been performed, or the terminal can receive orders to perform encryption and decryption. The latter case requires a corresponding resource of the key storage medium, but has the advantage that the keys never leave the key storage medium.
4. Destroying keys If a cooperating set of database users no longer requires a key package composed of k keys, it is possible to destroy the keys by means of suitable measures, for example by destroying the key storage medium and deleting the key package from the corresponding terminals, if present.

Claims (7)

Claims
1. A method for anonymizing sensitive data within a data stream, having the following steps:
a) the sensitive data field is compressed, b) the sensitive data field is anonymized, c) the anonymized sensitive data field is marked within the data stream by means of start and stop characters.
2. The method as claimed in claim 1, characterized in that the sensitive data field is filled up by fill characters before the anonymization.
3. The method as claimed in claim 1 or 2, characterized in that the data to be anonymized is pseudonymized.
4. The method as claimed in claim 1 or 2, characterized in that the data to be anonymized is encrypted.
5. The method as claimed in claim 4, characterized in that sensitive data fields are at least partially filled in with random values before the encryption.
6. The method as claimed in claim 4 or 5, characterized in that information relating to the key to be used for the encryption is stored in the encrypted data field.
7. The method as claimed in one of claims 1 to 6, characterized in that the sensitive data field has a fixed field length.
CA002363687A 1999-03-12 2000-03-02 Anonymization method Abandoned CA2363687A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19911176A DE19911176A1 (en) 1999-03-12 1999-03-12 Anonymization process
DE19911176.6 1999-03-12
PCT/DE2000/000586 WO2000056005A2 (en) 1999-03-12 2000-03-02 Anonymization method

Publications (1)

Publication Number Publication Date
CA2363687A1 true CA2363687A1 (en) 2000-09-21

Family

ID=7900820

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002363687A Abandoned CA2363687A1 (en) 1999-03-12 2000-03-02 Anonymization method

Country Status (6)

Country Link
EP (1) EP1163776B1 (en)
JP (1) JP2002539545A (en)
AT (1) ATE279068T1 (en)
CA (1) CA2363687A1 (en)
DE (2) DE19911176A1 (en)
WO (1) WO2000056005A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190205869A1 (en) * 2018-01-04 2019-07-04 Entit Software Llc Anonymization of data fields in transactions

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002230146A (en) * 2001-02-02 2002-08-16 Nippon Telegr & Teleph Corp <Ntt> Method and system for implementing translation proofreading service of e-mail document, system thereof, server device, recording medium recording program thereof, and program
DE10142498A1 (en) 2001-08-30 2003-03-27 Siemens Ag Encoding/decoding communications data involves transmitting key information as number of selected with each data packet, decoding data by associating key number with key stored in table
DE10253676B4 (en) * 2002-11-18 2008-03-27 Siemens Ag Method and device for the remote transmission of sensitive data
JP4612787B2 (en) * 2003-03-07 2011-01-12 キヤノン株式会社 Image data encryption apparatus control method, image data conversion apparatus control method, apparatus, computer program, and computer-readable storage medium
FI20070029A7 (en) 2007-01-12 2008-07-13 Valtion Teknillinen Tutkimuskeskus Anonymous user identifications related to telecommunications measurement data
US10102398B2 (en) * 2009-06-01 2018-10-16 Ab Initio Technology Llc Generating obfuscated data
US9411712B2 (en) 2009-06-10 2016-08-09 Ab Initio Technology Llc Generating test data
JP5758315B2 (en) * 2012-01-27 2015-08-05 日本電信電話株式会社 Anonymous data providing system, anonymous data device, and method executed by them
JP5670366B2 (en) * 2012-01-27 2015-02-18 日本電信電話株式会社 Anonymous data providing system, anonymous data device, method executed by them, and program
DE102013106053A1 (en) 2013-06-11 2014-12-11 Das Forum GmbH Method for storing and issuing at least one data record
JP6882892B2 (en) 2013-12-18 2021-06-02 アビニシオ テクノロジー エルエルシー Data generation
JP2015226265A (en) * 2014-05-29 2015-12-14 Kddi株式会社 Anonymity id generating device, anonymity id decoding device, anonymity id generation method, and anonymity id generating program

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6449048A (en) * 1987-08-19 1989-02-23 Matsushita Electric Industrial Co Ltd Photosensitive body
US5086467A (en) * 1989-05-30 1992-02-04 Motorola, Inc. Dummy traffic generation
GB9015799D0 (en) * 1990-07-18 1991-06-12 Plessey Telecomm A data communication system
AU7331894A (en) * 1994-03-29 1995-10-17 Scientific-Atlanta, Inc. Packet alignment method and apparatus for simplifying parsing at a decoder in a packet-based communications system
US5668810A (en) * 1995-04-26 1997-09-16 Scientific-Atlanta, Inc. Data transmission protocol method and apparatus
US5768391A (en) * 1995-12-22 1998-06-16 Mci Corporation System and method for ensuring user privacy in network communications
US6172988B1 (en) * 1996-01-31 2001-01-09 Tiernan Communications, Inc. Method for universal messaging and multiplexing of video, audio, and data streams

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190205869A1 (en) * 2018-01-04 2019-07-04 Entit Software Llc Anonymization of data fields in transactions
US11907941B2 (en) * 2018-01-04 2024-02-20 Micro Focus Llc Anonymization of data fields in transactions

Also Published As

Publication number Publication date
EP1163776B1 (en) 2004-10-06
EP1163776A2 (en) 2001-12-19
WO2000056005A2 (en) 2000-09-21
DE50008116D1 (en) 2004-11-11
WO2000056005A3 (en) 2000-12-28
JP2002539545A (en) 2002-11-19
ATE279068T1 (en) 2004-10-15
DE19911176A1 (en) 2000-09-21

Similar Documents

Publication Publication Date Title
US9514330B2 (en) Meta-complete data storage
US9208491B2 (en) Format-preserving cryptographic systems
US7536549B2 (en) Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database
US8024582B2 (en) Encryption of data to be stored in an information processing system
US11488134B2 (en) Format-preserving cryptographic systems
EP2301185B1 (en) Format-preserving cryptographic systems
US4941176A (en) Secure management of keys using control vectors
AU681822B2 (en) A method for providing blind access to an encryption key
US5479512A (en) Method and apparatus for performing concryption
US8855296B2 (en) Data processing systems with format-preserving encryption and decryption engines
CA2101198A1 (en) Secure network method and apparatus
CA2363687A1 (en) Anonymization method
CN111079162A (en) Data encryption method, data decryption method and data encryption system based on block chain
KR101045222B1 (en) Method of encrypting and synthesizing personal information into order information and contents information, apparatus, server and recording media
GB2479074A (en) A key server selects policy rules to apply to a key request based on an identifier included in the request
EP0356065B1 (en) Secure management of keys using control vectors
CN119155016B (en) A method and system for encrypting e-commerce store data
CN113536358A (en) A secure storage method of private data based on blockchain
CN118643522B (en) Sensitive data management method, device and computer readable storage medium
CN120750514B (en) Customer information data storage method and system
CN118260343A (en) Fuzzy query method and equipment
CN118484823A (en) Data encryption method, apparatus, computer device, readable storage medium, and program product
Pawar et al. Enhancement of Data Leakage Detection Using Encryption Technique
CN118296617A (en) Data encryption method, data decryption method and equipment
RONZHIN IN INFORMATION PROCESSING SYSTEMS

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued