摘要:
A computer-implemented method for determining the presence of a disease in a patient, the method comprising: - Receiving (250) first rule sets comprising rules, the rules of each first rule set being grouped into one or more second rule sets, each second rule set comprising a score value; - Determining(251), for each first rule set, the highest score value of its second rule sets; - Calculating (252) a total score value for the disease as a derivative of the determined highest score values; - Returning (253) a first diagnosis result, the first diagnosis result being indicative of the presence of the disease in the patient, the first diagnosis result having assigned the total score value;
摘要:
The invention relates to a secure telecommunication method for communicating information in an e-mail between a telecommunication device of a first user and a telecommunication device of a second user. The method comprises the steps of: • Determining by the first user whether a public key of a first asymmetric key pair for encrypted e-mail exchange is assigned to the second user, • In response to determining, that no public key is assigned to the second user, creating a first dataset by encrypting the information by the telecommunication device of the first user using a symmetric key, • Transferring the first dataset to the second user using the e-mail, and storing the first dataset with the telecommunication device of the second user, • In response to receiving the first dataset by the telecommunication device of the second user, creating the first asymmetric key pair comprising the public key and a private key, • Providing the public key of the first asymmetric key pair to a telecommunication device of the first user, • Creating a second dataset by encrypting the symmetric key by a telecommunication device of the first user using the public key of the first asymmetric key pair, • Transferring the second dataset to the second user, • Decrypting the second dataset using the private key of the first asymmetric key pair by the telecommunication device of the second user, the decryption resulting in the symmetric key, and • Retrieving the first dataset and decrypting the first dataset using the symmetric key by the telecommunication device of the second user.
摘要:
The invention relates to a client computer (10) for querying a database (30) stored on a server (22) via a network, the server (22) being coupled to the client computer (10) via the network, wherein the database (30) comprises a first relation (32), wherein the first relation (32) comprises first data items, wherein the first data items are encrypted with a first cryptographic key (18) in the first relation (32), wherein the first data items form a partially ordered set in the first relation (32), the partial order being formed with respect to the first data items in non-encrypted form, wherein the client computer (10) has installed thereon an application program, the application program being operational to perform the steps of receiving a search request specifying a search interval and determining the first data item forming an interval boundary of the search interval.
摘要:
The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key (118) and a private key (116), the data being stored pseudonymously in a database (138) with the data being assigned to an identifier, wherein the identifier comprises the public key (118), the method comprising: - receiving a set of rules, the set of rules describing data processing steps, - receiving the identifier, - retrieving the data assigned to the identifier from the database (138), - analyzing the retrieved data by applying the set of rules, - providing a result of the analysis.
摘要:
A database system (200) comprising: a memory (204) containing multiple data records (108a, 108b, 108c, 108d, 108e, 108f, 108g), wherein each of the data records has a data record asymmetric key pair (120, 122) for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key (122) and a data record private key (120), wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts (102a, 102b, 102c, 102d, 102e), wherein each of the user accounts has a user asymmetric key pair (110c, 112) for encryption and decryption, wherein each user asymmetric key pair has a user public key (112) and a user private key (110c); wherein data (124) is added to a data record (108c) by encrypting it with the data record public key (122); wherein access to the data record is granted to a user account (102c) by encrypting the data record private key (120) with the public key of an asymmetric cryptographic key pair whose encrypted private key is accessible from the user account via a sequence of successive decryptions of encrypted private keys; and wherein the data record private key allows decryption of the data record.
摘要:
The invention relates to a computer implemented method for generating a set of identifiers (118;914) from a private key (116; 818), the method comprising the steps of: - calculating a set of public keys, wherein the private key (116; 818) and each public key of the set of public keys form an asymmetric cryptographic key pair; and - outputting (208, 316, 504, 604) the identifiers comprising the public keys.
摘要:
The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first key pair is formed by a first private (G1) and a first public key (O1) and the second key pair is formed by a second private (G2) and a second public key (O2), wherein a first cipher (C_G2_O1) is allocated to the first and second key pair, wherein the first cipher is formed by an encryption of the second private key (G2) with the first public key (O1), having the following steps: adding a third asymmetrical cryptographic key pair (K3) to the set of key pairs, wherein the third key pair is formed by a third private (G3) and a third public key (O3); creating a second cipher (C_G3_O1) by encrypting the third private key (G3) with the first public key (O1); storing the second cipher (212; 186), wherein the set of key pairs has a directed graph structure.