If the server security is so weak that someone can take advantage of it by looking at your client-side code
it's the server security that you should be spending your time worrying about
Security through obscurity (or obfuscation) is no real security at all.
Anyone with a small bit of JS knowledge of debugging can get the code since it has to be de-obfuscated for the browser to read it.
Not to be snide, but I find your question amusing in the light of your signature:
Like me, don't worry about it. I minimize for footprint rather than for obfuscation.
Use an obfuscating minimizer -- I've used Yahoo's in the past with success.
reading it again, I see that there are two columns and you want asignadoOrigen and asignadoDestino to both map to idAsignado in the Asignado table. This is still a problem because you have defined A OneToOne relationship between Asignado and TraspasoAsignado entities. idAsignado cannot be two different values at once.