摘要:
The present invention refers to a method for anonymization by transmitting an event data set from at least one data supplying entity supplying the event data set to at least one data aggregating entity aggregating the event data set wherein the data set includes at least one identifier identifying at least one user of the data supplying entity, the method comprises the steps of performing a non-reversible basic encryption of the at least one identifier using an encryption mechanism with a certain lifetime, iteratively performing an additional encryption of said basic encrypted identifier for n-times with n equal or greater than 1 resulting in an additional encrypted identifier, wherein the additional encryption comprises the steps of adding a random component to said encrypted identifier and encrypting the output using asymmetric encryption with a public key, wherein each iteration uses a random component with a lifetime shorter than the lifetime of the certain lifetime according to step a and than the lifetime of the previous iteration and a public key different to that of the previous iteration, transmitting the event data set characterized by the n-times additional encrypted identifier to the at least one data aggregating entity, and undoing at least one iteration of the additional encryption(s) at the at least one receiving data aggregating entity.
摘要翻译:本发明通过提供事件数据设定为至少一个数据聚集实体聚集所述事件数据集worin所述数据集包括至少一个标识符的标识从至少一个数据提供实体设置的事件数据的发射是指用于匿名化的方法 所述数据提供实体的至少一个用户,该方法包括使用在具有一定的寿命加密机制执行所述至少一个标识符的非可逆基本加密,反复执行在对正所述基本加密标识符的额外的加密的步骤 其中n等于或大于1导致对附加加密标识符,worin附加加密倍包括将随机分量到所述加密的标识符和加密使用非对称加密用公共密钥的输出的步骤,worin每次迭代使用随机分量 用寿命比某些寿命gemäß到ST的寿命短 EP A和比前一迭代的寿命和公共密钥不同,以做的前一次迭代的,传输由n次附加加密的标识符到至少一个数据聚集实体为特征的事件数据集,和撤消至少一个 的在所述至少一个接收的数据聚集实体的额外的加密(多个)迭代。
摘要:
The invention relates to a method for transmitting a data set from at least one first entity supplying the data set to at least one second entity aggregating the data set wherein the data set includes at least one identifier identifying at least one user of the first entity. At a first step a first encryption of the at least one identifier on the basis of an encryption key which is only known to the first entity is performed to obtain a single-encrypted identifier. As a second step a number of random characters defining a character string is added to the single-encrypted identifier and afterwards an asymmetric key encryption is applied as a second encryption to obtain a double-encrypted identifier. The resulting double-encrypted identifier is transmitted to the at least one second entity.