US 11,698,990 B2
Computer-implemented privacy engineering system and method
Jason Derek McFall, Cambridge (GB); Charles Codman Cabot, Cambridge (GB); Timothy James Moran, Cambridge (GB); Kieron Francois Pascal Guinamard, Cambridge (GB); Vladimir Michael Eatwell, Cambridge (GB); Benjamin Thomas Pickering, Cambridge (GB); Paul David Mellor, Cambridge (GB); Theresa Stadler, Cambridge (GB); Andrei Petre, Cambridge (GB); Christopher Andrew Smith, Cambridge (GB); Anthony Jason Du Preez, Cambridge (GB); Igor Vujosevic, Cambridge (GB); and George Danezis, Cambridge (GB)
Assigned to PRIVITAR LIMITED, Cambridge (GB)
Appl. No. 16/97,482
Filed by PRIVITAR LIMITED, Cambridge (GB)
PCT Filed May 2, 2017, PCT No. PCT/GB2017/051227
§ 371(c)(1), (2) Date Oct. 29, 2018,
PCT Pub. No. WO2017/187207, PCT Pub. Date Nov. 2, 2017.
Claims priority of application No. 1607591 (GB), filed on Apr. 29, 2016; application No. 1612991 (GB), filed on Jul. 27, 2016; application No. 1619733 (GB), filed on Nov. 22, 2016; and application No. 1702357 (GB), filed on Feb. 14, 2017.
Prior Publication US 2020/0327252 A1, Oct. 15, 2020
Int. Cl. G06F 21/62 (2013.01); G06F 21/60 (2013.01); G06F 21/78 (2013.01); H04L 9/00 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC G06F 21/6254 (2013.01) [G06F 21/602 (2013.01); G06F 21/78 (2013.01); H04L 9/008 (2013.01); H04L 9/0825 (2013.01); H04L 9/0844 (2013.01); H04L 9/0866 (2013.01); H04L 9/3247 (2013.01)] 32 Claims
OG exemplary drawing
 
1. A computer implemented method for securely sharing datasets that include information and an original unique ID associated with an individual, where the datasets originate from several different data contributors and are to be shared with a central party or recipient, while concealing or masking the original, unique ID;
in which each contributor randomly encrypts the original, unique ID and sends the encrypted original unique ID to an intermediary party, together with the information associated with each individual, so that each data record or batch or data release will contain a different encrypted form of the original unique ID associated with that individual, in which the encryption is performed with both a public key of the central party and a public key of the intermediary party;
the intermediary party performs a homomorphic crypto operation that deterministically but irreversibly maps the encrypted original, unique ID to an encrypted and obscured form that differs for each contributor, and sends that encrypted and obscured data to a central or recipient party in which the homomorphic crypto operation uses a blind homomorphic operation, and in which the intermediary party uses the same exponentiation key k for all contributors when performing the homomorphic crypto operation;
the central or recipient party (i) decrypts using its private key the encrypted and obscured data received from the intermediate party to recover obscured unique IDs that are one-to-one mapped to but cannot be used to recover the original, unique ID and then (ii) joins together the information for the individual from each contributor.