Abstract: An improvement to a database management system including creating a record key for the data, storing the data with an altered record ID obfuscates the data without an encryption step. In some embodiments hashing includes adding or subtracting a predetermined number from the record key. The record key may be created by combining a user key and a private key. Data querying operations may include extensions that allow for field specific operations to sunder and thereby obscure personally identifiable information. To retrieve data, the method provides for receiving a record request including parameters that conditionally determine if personally identifiable information should be returned as the proper data. The parameters may be user credential information wherein masked or unmasked personal identifiable information is provided based on the user's credentials. These methods may be incorporated into database operations providing a secure database without the resource overhead of encryption.
Abstract: An improvement to a database management system including receiving a data and creating a record key for the data, storing the data with an altered record ID obfuscates the data without an encryption step. In some embodiments hashing includes adding or subtracting a predetermined number from the record key. The record key may be created by combining a user key and a private key. Data querying operations may include extensions that allow for field specific operations to sunder and thereby obscure personally identifiable information. To retrieve data, the method provides for receiving a record request including parameters that conditionally determine if personally identifiable information should be returned as the proper data. These methods may be incorporated into database operations providing a secure database without the resource overhead of encryption.
Abstract: A method for data security including receiving, at a server, a record, said record including at least one field for storing personally identifiable information (PII) and querying a structured data store for key information associated with the PII. Then replacing the PII with the key information, altering the key information by combining it with a unique pre-determined modifier, and storing the record wherein the PII includes at least one of a name, social security number, telephone number or address. In some embodiments the key information is numeric and altering includes either adding or subtracting the key information to the unique modifier.
Abstract: A method for data security including receiving a first recordset, said first recordset including a first poly-identifier representing a first personally identifiable information (PII), and a first contextual information, said first poly-identifier associated with a name field of a record in a PII structured data store. Also receiving at the server a second recordset, said second recordset including a second poly-identifier representing a second personally identifiable information (PII) and a second contextual information, said second poly-identifier comprised of unique characters associated with the name field of a record in the PII structured data store. Then comparing the first and second contextual information to calculate a correlation score to create a match table entry as a result of said comparing, said match table entry including both an internal ID and an external anonymous ID. The IDs may associate the contextual information between records to a single person.