Hidden subject identification system

ABSTRACT

A method determines whether another party has information about a person without disclosing personal identification information of the person. The method includes receiving, at a third computer system, a first set of data comprising personal identification information of a first person and encrypting the first set of data to generate a third set of data. The method also includes transmitting, to a second computer system, the third set of data. The method further includes receiving, at the third computer system from the second computer system, a message indicating the third set of data matches a fourth set of data encrypted from a second set of data comprising personal identification information of a second person. The method still further includes transmitting, from the third computer system, a message indicating the second person matches the first person when the fourth and third set of data matches.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/403,282, to Song et al., filed on May 3, 2019, which is acontinuation of U.S. patent application Ser. No. 15/832,663, to Song etal., filed on Dec. 5, 2017, now U.S. Pat. No. 10,326,594, which is acontinuation of U.S. patent application Ser. No. 15/007,141, to Song etal., filed on Jan. 26, 2016, now U.S. Pat. No. 9,866,386, which is acontinuation of U.S. patent application Ser. No. 14/506,566, to Song etal., filed on Oct. 3, 2014, now U.S. Pat. No. 9,288,197, which is acontinuation of U.S. patent application Ser. No. 13/959,642, to Song etal., filed on Aug. 5, 2013, now U.S. Pat. No. 8,870,068, which is acontinuation of U.S. patent application Ser. No. 13/464,564, to Song etal., filed on May 4, 2012, now U.S. Pat. No. 8,500,011, which is acontinuation of U.S. patent application Ser. No. 12/427,568, to Song etal., filed on Apr. 21, 2009, now U.S. Pat. No. 8,191,774, which is acontinuation of U.S. patent application Ser. No. 11/351,282, to Song etal., filed on Feb. 8, 2006, now U.S. Pat. No. 7,533,808, which claimsthe benefit of U.S. Provisional Application No. 60/651,062, filed onFeb. 9, 2005, the disclosures of which are expressly incorporated byreference herein in their entireties.

TECHNICAL FIELD

Aspects of the present disclosure generally relate to electroniccommunications concerning a particular entity without divulging the trueidentity of the subject individual, organization, or other legal entity.More specifically, one aspect of the present disclosure involves acomputerized method and apparatus for sharing information among multipleparties, each having information about identifiable entities ofpotential interest to the other parties, without disclosure of anyprivate identification information not already known to a recipient.

BACKGROUND

Privacy protection is a serious matter today. Many industries haveestablished their privacy protection guidelines, rules, or regulations,and in many cases, even the government is involved.

For example, in the USA financial industry, the Gramm-Leach-Bliley Act(“GLB Act”) requires financial institutions to keep all their customers'non-public personal information confidential. Non-public personalinformation also includes the identification information of thecustomers. Other countries have similar laws for privacy protection.

Although the GLB Act has an important purpose, it also provides a formof protection for con artists. For example, if a con artist commits acrime, (e.g., check kiting, between Bank A and Bank B), prevention ofthis crime is possible if Bank A and Bank B can jointly investigate thiscase at an early stage.

The chance of Bank A or Bank B jointly investigating this case at anearly stage, however, is almost zero because, most likely, Bank A andBank B may not know that they have a common customer, who is using BankA and Bank B to commit a financial crime until it is too late.

A joint effort by multiple financial institutions is often required toidentify a possible crime at an early stage. The first step to formingthis joint effort is to identify a common customer that has suspiciousactivities. If a financial institution is not permitted to release theidentification information of this suspicious customer, other financialinstitutions have no way of determining whether they have a commoncustomer.

In theory, a financial institution should be able to determine whetherany other financial institution may have a common customer. For example,a common customer may be determined by simply posting the customer'sidentification information on a shared network and inviting otherfinancial institutions to compare this identification information withthe identification information of their own customers. If there is amatch, the matched person, organization, or entity is the commoncustomer.

Although financial institutions are permitted to share information forthe purposes of crime prevention under the section 314(b) of the USAPATRIOT Act or equivalent laws in other countries, most financialinstitutions do not take an advantage of these laws because they areafraid of violating the Gramm-Leach-Bliley Act in the USA or theequivalent laws in other countries. That is especially true if it isconceivable that the suspicious activities were perfectly innocent andthe customer has not done anything illegal. Moreover, even if a customerconsents to the posting of the customer's identification information, itis not desirable to release the identification information of a customerbecause con artists could possibly access the posted identificationinformation and use it to commit identity theft, which is one of themost common crimes today.

In other words, these conflicting requirements have placed financialinstitutions in a very awkward position. On one hand, there is animportant need for financial institutions to identify a commonsuspicious customer in order to jointly prevent crimes. On the otherhand, financial institutions are not permitted to release anyidentification information, even if it would assist the financialinstitution to identify a common suspicious customer.

In this document, the terminology “identification information” generallyrefers to a set of information that can be used to authenticate theidentity of a subject person, organization, or other legal entity. Forexample, if the subject is a person, such information may include notonly the person's name, but also one or more of that person's address,date of birth, identification document or instrument number, type ofidentification document or instrument, expiration date of identificationdocument or instrument, social security number, driver's license number,etc.

In this document, the terminology “network” or “networks” generallyrefers to a communication network or networks, which can be wireless orwired, private or public, or a combination of them, and includes thewell-known Internet.

In this document, the terminology “computer system” generally refers toeither one computer or a group of computers, which may work alone orwork together to perform certain system functions.

In this document, the terminology “computer network” generally refers toeither one computer network or a group of connected computer networks,which may work alone or work together to perform certain networkfunctions.

In this document, a “bank” or “financial institution” is generallyreferred to as a “financial service provider” and a “bank account” or“financial account” is generally referred to as an “account in afinancial institution” or an “account with a financial serviceprovider”.

In this document, the terminology “financial institution” and “financialservice provider” generally refers to either banks or non-banks whichperform financial transactions (such as deposits, withdrawals, andtransfers) involving payment instruments (such as cash, checks, creditcards, debit cards, monetary instruments, electronic fund transfers,etc.).

In this document, the terminology “encoding” generally refers to anytype of data manipulation so that an alphanumeric code is generated froma set of data through this data manipulation. The terminology “decoding”generally refers to the reverse data manipulation to transform the“encoded” data back to its original format. Not all encoded informationcan be decoded. Some coding schemes compress the information containedin the data, such that some information is lost during the encodingprocess. Sometimes encoding involves encryption which hides theinformation such that it cannot be decoded or otherwise made visiblewithout access to a secret key.

SUMMARY

One aspect of the present disclosure readily identifies a subject inwhich multiple parties may have common interest without violating thesubject's privacy. Another aspect provides a networked method andapparatus which is used to coordinate joint activities by two or more ofthose parties, having a common interest in the specific subject.

Although aspects of the present disclosure may be best understood in thecontext of a specific example involving the identification of a commoncustomer by multiple financial institutions that must comply with theGramm-Leach-Bliley Act, many aspects of the disclosure may also beapplicable for identifying a common person, organization or legal entityfor other purposes.

Instead of using the actual identification information of a specificcustomer, one aspect of the present disclosure may share only a set of“encoded” data (“identity code”) that is derived from thatidentification information.

In accordance with one aspect of the disclosure, if these two sets ofencoded data exactly match each other, depending on the method ofencoding, the original identification information of two subjects behindthese two sets of encoded data should have an excellent probability tomatch each other.

In accordance with another aspect of the disclosure, if crucial piecesof information are removed during the encoding process, accuratedecoding of the original information becomes impossible. Thus, even ifthe encoding methodology is known, the recipient is unable to recoverthe original identification information through a decoding process.

Moreover, in another aspect, instead of using the actual identificationinformation of a specific customer, the recipient receives only a set of“encrypted” data (“identity code”) that is derived from thatidentification information. For example, the identity code is preferablyencrypted using a known two-key form of encryption in which only thefirst key used to encrypt the data is shared without disclosing thesecond key required to decrypt data into a usable format.

In theory, if these two sets of encrypted data exactly match each other,depending on the method of encryption, the original identificationinformation of two subjects behind these two sets of encrypted data mayhave an excellent probability to match each other.

More importantly, if we purposely hide or destroy the key that is usedfor decryption, there may be no chance to recover the originalidentification information, even if the encrypted information in theorycontains all the original information and in theory all the originalinformation would be accessible to anyone having access to thedecryption key. Thus, even if the key for encryption is known to thepublic, there is no chance to recover the original identificationinformation because the key for decryption is not available.

In another aspect, encryption is combined with encoding of partialidentification information, such that even a person succeeds indecrypting the encrypted information, only partial identificationinformation is recovered and the chance for recovering sufficientidentification information to commit fraud or identify theft ispractically zero.

To make sure a financial institution can easily follow the same encodingand/or encryption method to derive the shared identity code from thecustomer's private identification information, so that matching processcan be effectively performed, one aspect of the present disclosure usesa computerized method to prompt users to precisely follow the rules ofencoding and/or encryption, or otherwise providing a standardize andautomated process such that the same identification information isencoded and encrypted in a consistent manner to produce the same resultsregardless of which user preformed the encoding and/or encryptionprocess.

Once these financial institutions have learned that they have a matchingidentity code, they may have a common customer who has suspiciousactivities. These financial institutions can begin discussing thesuspicious activities of the common customer privately andconfidentially as permitted by law.

In the very unlikely event, if two different persons really turn out tohave the same “identity code,” it should soon be apparent to theinvolved financial institutions before any damage is done. In any event,only those financial institutions with the presumably shared customerbehind the common identity code have access to corresponding actualidentification information, and to the extent they do not exchangeinformation until they have established that the common identity codedoes not belong to two different individuals (for example, by sharinginformation about some other pieces of identification information notused to construct the identity code, such as place of birth or mother'smaiden name), the actual identification information used by onefinancial institution to construct the identity code for one of itscustomers will remain protected even from the other financialinstitution.

Moreover, this common identity code is essentially meaningless to anyother third parties. Even if a computer hacker breaks into the computerdatabase that stores these identity codes, he/she will have greatdifficulty finding any meaningful information and thus is unable tocommit identity theft.

Consequently, one aspect of the present disclosure provides technologyto identify a common customer potentially associated with suspiciousactivities at more than one financial institution without violating theGramm-Leach-Bliley Act.

Those skilled in the art will undoubtedly recognize that by usingdifferent encoding and/or encryption rules to select and encode and/orencrypt different pieces of the available identification information,there will be potentially many different ways to generate an “identitycode” that achieves substantially the same objectives. These differentways to encrypt the identification information should not be construedas substantial deviations from aspects of the present disclosure, ashereinafter claimed.

BRIEF DESCRIPTION OF THE FIGURES

For a more complete understanding of the present disclosure, referenceis now made to the following description taken in conjunction with theaccompanying drawings.

FIG. 1 is an exemplary system diagram with two parties (or, reportingfinancial institutions) connected to the computer system via a network.

FIG. 2 is an exemplary flow chart showing how a party can log into thecomputer system, search for a common suspect, and obtain contactinformation to perform a joint investigation of suspicious activities ofthis suspect, using the computer system shown in FIG. 1.

FIG. 3 is an exemplary flow chart showing how a party can obtain a listof identity codes and the party can then use that list to screen itsexisting database (e.g. customer database), using the computer systemshown in FIG. 1.

FIG. 4 is an exemplary screen layout of the computer system, whichcollects, encodes, and/or encrypts a set of data to form an identitycode for an individual.

FIG. 5 is an exemplary screen layout of the computer system, whichcollects, encodes, and/or encrypts a set of data to form an identitycode for an organization.

DETAILED DESCRIPTION

The detailed description set forth below, in connection with theappended drawings, is intended as a description of variousconfigurations and is not intended to represent the only configurationsin which the concepts described herein may be practiced. The detaileddescription includes specific details for the purpose of providing athorough understanding of the various concepts. It will be apparent,however, to those skilled in the art that these concepts may bepracticed without these specific details. In some instances, well-knownstructures and components are shown in block diagram form in order toavoid obscuring such concepts. As described herein, the use of the term“and/or” is intended to represent an “inclusive OR”, and the use of theterm “or” is intended to represent an “exclusive OR”.

The present disclosure potentially includes a number of aspects toprovide maximum flexibility to satisfy the many different needs of bothsophisticated and unsophisticated users. Accordingly, only a fewexamples of certain aspects of the present disclosure (and combinationsof those aspects) are described.

An individual is typically identified by his/her name and place ofresidence, preferably accompanied by a unique government issuedidentification number (e.g., a social security number, driver's licensenumber, passport number, etc.). Nevertheless, partial identificationinformation (e.g., a person's initials) is far from being sufficient foridentification purposes. Similarly, other partial information (e.g., thelast four digits of the social security number or driver's licensenumber, the street number, last four digits of the zip code, the lastdigit of the month of birth, etc.) is also insufficient foridentification purposes.

Nevertheless, in one aspect of the present disclosure, if several piecesof such unrelated practical identification information from the samesubject are combined together through a pre-agreed data manipulationprocess, they form a set of encoded data, that can be used as an“identity code”.

Similarly, another aspect of the present disclosure provides highersecurity and privacy by using an advanced encryption technique toencrypt the identification information to form an “identity code.” If wepurposely hide or destroy the key for decryption, there may be no chanceto recover the identification information behind the identity code.

In yet another aspect of the present disclosure, we can combine theabove encryption with encoding of partial identification information toform an “identity code,” in which the chance of recovering the originalidentification information from this identity code is practically zero.

Although it is not possible to decode and/or decrypt an identity code toobtain the original identification information, two matched identitycodes will signify that the original identification information of twosubjects, which both correspond to this matched identity code, may matcheach other with a very high probability.

For example, the probability for two persons to have the same last fivedigits in both the social security number and driver's license number is1 out of 10¹⁰ or 1 out of ten billion. The probability that these twopersons also have the same last two digits for year of birth is 1 out of10¹² or 1 out of one trillion. Furthermore, if these two persons alsohave the same zip code, the probability becomes 1 out 10¹⁷ if thesedifferent types of information are statistically independent, whichpractically may never happen. By combining these pieces of informationtogether through a pre-agreed data manipulation process, we canconstruct a set of encoded data, which becomes an “identity code.”

Similarly, if we encrypt a sufficient amount of identificationinformation to form an “identity code,” the chance of two persons havingthe same identity code can be reduced to almost zero.

At the same time, third parties are unable to identify the true identitybehind this identity code; and thus the privacy of the person ispreserved.

An analogous encoding and/or encryption of partial identificationinformation can be used to identify an organization, or any other legalentity, while at the same time maintaining privacy.

A pre-agreed rule or set of rules is used to select, encode and/orencrypt the pieces of partial identification information from a specificsubject individual, organization, or other legal entity, to form anidentity code. This identity code is essentially unique to that subjectand conceptually serves as a public proxy for that subject's privateidentification information.

In one aspect of the present disclosure, the identity code isestablished based on a pre-agreed relatively simple transformation ofthe private identification information such as a straightforwardconcatenation of only some specified individual digits and letters fromthe original identification information.

In another aspect of the present disclosure, the identity code isestablished through a pre-agreed relatively complex transformation ofthe specified digits and letters. The transformation could include knownmethods of data encryption and encoding of the selected pieces of theidentification data, thus further protecting the privacy of the originalidentification information from unauthorized access.

Moreover, because only a small and relatively meaningless portion of theprivate information is used to generate the identity code, even if thatportion is recovered by a malicious third party, the privacy of theremaining identification information is preserved and it is not possibleto steal the identity of the concerned subject.

In one aspect of the present disclosure, a networked computer has adatabase, which stores the identity codes of many subjects of potentialinterest. In addition, for each specific identity code, the computeralso stores the contact information of all the parties which may haveinformation concerning or are otherwise interested in the subject thatis represented by the specific identity code.

In that aspect, a user logs into a computer via a network and issues arequest to the computer to determine whether its database may contain aspecific identity code in which the user is interested. If the computerlocates the specific identity code that the user is interested in, thecomputer can provide contact information of those parties, which mayhave a common interest in this specific identity code. As a result, theuser can contact these parties and coordinate their efforts regardingthe common subject that is represented by the specific identity code.

In another aspect of the present disclosure, a user logs into thecomputer via the network and issues a request to the computer to providea list of identity codes previously determined to be associated withsuspicious individuals or otherwise responsive to a specific criteriaprovided by the user.

Once the user has obtained such a list of identity codes, the usercompares its own database with this list and determines whether its owndatabase may contain any subject, which may have a matching identitycode. If any identity code on the list that also exists in the user'sdatabase, the user may request the computer to provide contactinformation of all parties that have a common interest in the identitycode. As a result, the user can contact those parties and coordinatetheir efforts regarding the common subject, which is represented by saididentity code, without disclosing any identification information aboutthe user's own customer that is not already known to the other users.

As contemplated in certain described aspects, two financial institutionsA & B are using the computer system 300 as shown in FIG. 1 to identifycommon customers that may have suspicious activities.

Reference should now be made to the flowchart of FIG. 2 in combinationwith the system diagram of FIG. 1, which together illustrate howReporting Financial Institution A 100 uses the computer system 300 tosearch for a suspect, relating to whom Reporting Financial Institution A100 has detected suspicious activities (block 1001).

Then (block 1002), Reporting Financial Institution A 100 logs into thecomputer system 300 via network 400.

Reporting Financial Institution A 100 is prompted to form the identitycode of the suspect and the case description into the computer system300 (block 1003). The case description may include the category, thedollar amount, location, time frame, etc. of the suspicious activities.

FIG. 4 is an exemplary screen layout for the computer system to collectinformation from the user to form an identity code of an individual.FIG. 5 is an exemplary screen layout for the computer system to collectinformation from the user to form an identity code of an organization.

The computer system 300 searches its database to identify whether thereis any existing case that has a matching identity code (block 1004).

After the search, the computer system 300 determines whether there isany match (decision block 1005). If a match is found (“YES” branch 1006from decision block 1005), the computer system 300 informs ReportingFinancial Institution A 100 of other parties that have reported the sameidentity code before (block 1008).

In general, two individuals or organizations are classified as “matched”if they have the same identity code, which is an encoded and/orencrypted form of numerical digits and letters collected from theidentification information of the individuals or the organizations.

If Reporting Financial Institution B 200 has reported the same identitycode before, the computer system 300 will also inform ReportingFinancial Institution B 200 of the matching identity code and thecontact information of Reporting Financial Institution A 100 via e-mail,fax, or other media, so that Reporting Financial Institution A 100 andReporting Financial Institution B 200 can contact each other for a jointinvestigation.

On the other hand, if a match is not found (“NO” branch 1007 from thedecision block 1005), no action may be necessary. The computer system300 may then keep the identity code reported by Reporting FinancialInstitution A 100 for future comparisons.

References should also be made to the flowchart of FIG. 3 in combinationwith the system diagram of FIG. 1, which together illustrate howReporting Financial Institution A 100 uses the computer system 300 tocheck whether it has any customer, who also has a record in thecomputer's database.

First (block 2001), Reporting Financial Institution A 100 logs into thecomputer system 300 via network 400.

Then (block 2002), Reporting Financial Institution A 100 requests thecomputer system 300 to provide a list of identity codes based on certaincriteria.

For example, the criteria can be “Please list the identity codes of allsuspects in the commercial loan category for suspicious activitiesreported from users in the State of Texas with dollar amount above$250,000 during July 2001 to May 2004.”

After receiving the list (block 2003), Reporting Financial Institution A100 compares the identity codes of its customers against this listprovided by the computer system 300.

Reporting Financial Institution A 100 will take two different actionsbased on whether there is any match between the identity codes on thelist and the identity codes of its customers (decision block 2004).

If there is no match (“NO” branch 2006 from the decision block 2004),the check is complete.

If there is a match (“YES” branch 2005 from the decision block 2004),Reporting Financial Institution A 100 can request the computer system300 to provide more information about the matching identity code and theother reporting parties, which have reported the same identity codebefore (block 2007). A joint activity can be established among ReportingFinancial Institution A 100 and other reporting parties to reach aparticular purpose.

Those skilled in the art will undoubtedly recognize that the describedaspects can be assembled in various ways to form a variety ofapplications based on the need, and that obvious alterations and changesin the described structure may be practiced without meaningfullydeparting from the principles, spirit, and scope of the presentdisclosure. Accordingly, such alterations and changes should not beconstrued as substantial deviations from the present disclosure as setforth in the appended claims.

What is claimed is:
 1. A method for identifying a hidden subject withoutdisclosing identification information about the hidden subject,comprising: receiving, at a second computer system from a first computersystem, a third set of data converted by a transformation from a firstset of data comprising identification information of the hidden subject,the transformation rendering the hidden subject unidentifiable from thethird set of data; comparing, by the second computer system, the thirdset of data with a fourth set of data converted by the transformationfrom a second set of data comprising identification information of asecond subject, the transformation rendering the second subjectunidentifiable from the fourth set of data; and informing, by the secondcomputer system, a user that the hidden subject corresponds to thesecond subject when the third set of data matches the fourth set ofdata.
 2. The method of claim 1, in which the transformation comprises apredefined method of data manipulation.
 3. The method of claim 2, inwhich the data manipulation comprises at least one of an encryption, aselection, an encoding, a mapping, or a combination thereof.
 4. Themethod of claim 1, in which the hidden subject comprises at least one ofa person, an organization, a company, a tangible property, an intangibleproperty, or a combination thereof.
 5. A method for identifying a hiddensubject without disclosing identification information about the hiddensubject, comprising: receiving a third set of data converted by atransformation from a first set of data comprising identificationinformation of the hidden subject stored in a first database, thetransformation rendering the hidden subject unidentifiable from thethird set of data; comparing the third set of data with a fourth set ofdata converted by the transformation from a second set of datacomprising identification information of a second subject stored in asecond database, the transformation rendering the second subjectunidentifiable from the fourth set of data; and informing a user thatthe hidden subject in the first database corresponds to the secondsubject in the second database when the third set of data matches thefourth set of data.
 6. The method of claim 5, in which thetransformation comprises a predefined method of data manipulation. 7.The method of claim 6, in which the data manipulation comprises at leastone of an encryption, a selection, an encoding, a mapping, or acombination thereof.
 8. The method of claim 5, in which the hiddensubject comprises at least one of a person, an organization, a company,a tangible property, an intangible property, or a combination thereof.9. A non-transitory computer-readable medium having program coderecorded thereon to identify a hidden subject without disclosingidentification information about the hidden subject, the program codecomprising: program code to receive from a first computer system a thirdset of data converted by a transformation from a first set of datacomprising identification information of the hidden subject, thetransformation rendering the hidden subject unidentifiable from thethird set of data; program code to compare the third set of data with afourth set of data converted by the transformation from a second set ofdata comprising identification information of a second subject, thetransformation rendering the second subject unidentifiable from thefourth set of data; and program code to inform a user that the hiddensubject corresponds to the second subject when the third set of datamatches the fourth set of data.
 10. The non-transitory computer-readablemedium of claim 9, in which the transformation comprises a predefinedmethod of data manipulation.
 11. The non-transitory computer-readablemedium of claim 10, in which the data manipulation comprises at leastone of an encryption, a selection, an encoding, a mapping, or acombination thereof.
 12. The non-transitory computer-readable medium ofclaim 9, in which the hidden subject comprises at least one of a person,an organization, a company, a tangible property, an intangible property,or a combination thereof.
 13. A non-transitory computer-readable mediumhaving program code recorded thereon to identify a hidden subjectwithout disclosing identification information about the hidden subject,the program code comprising: program code to receive a third set of dataconverted by a transformation from a first set of data comprisingidentification information of a hidden subject stored in a firstdatabase, the transformation rendering the hidden subject unidentifiablefrom the third set of data; program code to compare the third set ofdata with a fourth set of data converted by the transformation from asecond set of data comprising identification information of a secondsubject stored in a second database, the transformation rendering thesecond subject unidentifiable from the fourth set of data; and programcode to inform a user that the hidden subject in the first databasecorresponds to the second subject in the second database when the thirdset of data matches the fourth set of data.
 14. The non-transitorycomputer-readable medium of claim 13, in which the transformationcomprises a predefined method of data manipulation.
 15. Thenon-transitory computer-readable medium of claim 14, in which the datamanipulation comprises at least one of an encryption, a selection, anencoding, a mapping, or a combination thereof.
 16. The non-transitorycomputer-readable medium of claim 13, in which the hidden subjectcomprises at least one of a person, an organization, a company, atangible property, an intangible property, or a combination thereof. 17.A hidden subject identification computer system for identifying a hiddensubject without disclosing identification information about the hiddensubject, comprising: a memory device; and at least one processor coupledto the memory device, the at least one processor configured: to receivefrom a first computer system a third set of data converted by atransformation from a first set of data comprising identificationinformation of the hidden subject, the transformation rendering thehidden subject unidentifiable from the third set of data; to compare thethird set of data with a fourth set of data converted by thetransformation from a second set of data comprising identificationinformation of a second subject, the transformation rendering the secondsubject unidentifiable from the fourth set of data; and to inform a userthat the hidden subject corresponds to the second subject when the thirdset of data matches the fourth set of data.
 18. The hidden subjectidentification computer system of claim 17, in which the transformationcomprises a predefined method of data manipulation.
 19. The hiddensubject identification computer system of claim 18, in which the datamanipulation comprises at least one of an encryption, a selection, anencoding, a mapping, or a combination thereof.
 20. The hidden subjectidentification system of claim 17, in which the hidden subject comprisesat least one of a person, an organization, a company, a tangibleproperty, an intangible property, or a combination thereof.
 21. A hiddensubject identification computer system for identifying a hidden subjectwithout disclosing identification information about the hidden subject,comprising: a memory device; and at least one processor coupled to thememory device, the at least one processor configured: to receive a thirdset of data converted by a transformation from a first set of datacomprising identification information of the hidden subject stored in afirst database, the transformation rendering the hidden subjectunidentifiable from the third set of data; to compare the third set ofdata with a fourth set of data converted by the transformation from asecond set of data comprising identification information of a secondsubject stored in a second database, the transformation rendering thesecond subject unidentifiable from the fourth set of data; and to informa user that the hidden subject in the first database corresponds to thesecond subject in the second database when the third set of data matchesthe fourth set of data.
 22. The hidden subject identification computersystem of claim 21, in which the transformation comprises a predefinedmethod of data manipulation.
 23. The hidden subject identificationcomputer system of claim 22, in which the data manipulation comprises atleast one of an encryption, a selection, an encoding, a mapping, or acombination thereof.
 24. The hidden subject identification computersystem of claim 21, in which the hidden subject comprises at least oneof a person, an organization, a company, a tangible property, anintangible property, or a combination thereof.