| CPC G16H 10/60 (2018.01) [G06F 21/6254 (2013.01); G06Q 2220/00 (2013.01)] | 20 Claims | 

| 
               1. A computer-implemented method comprising: 
            obtaining, by a first server, an encryption key for de-identifying personal healthcare records; 
                accessing, by the first server, at least one healthcare data record that contains personal identifying information (PII) for a patient; 
                generating, by the first server, one or more hashed tokens using the encryption key and PII removed from the at least one healthcare data record; 
                transmitting, by the first server, the one or more generated hashed tokens to a second server; 
                receiving, by the second server, the one or more generated hashed tokens from the first server; 
                matching, by the second server, the one or more received hashed tokens to one or more other hashed tokens generated from data removed when de-identifying other healthcare records; and 
                in response to at least one match occurring between the one or more received hashed tokens and the one or more other hashed tokens, determining, by the second server, an encrypted indexing tag according to the at least one match, wherein the encryption of the indexing tag is based on a computing rule specific to the first server, the computing rule based on PII extracted from the healthcare data records. 
               |