Device using secure storage and retrieval of data
First Claim
1. An appliance comprising:
- a processor;
a memory coupled to the processor;
one or more state monitoring sensors coupled to the processor; and
a computer-readable medium coupled to the processor, including code that is executable by the processor, for implementing a method comprising;
receiving, by the appliance and from a first owner device, a first encryption key and a second encryption key associated with a first owner of the appliance;
storing the first encryption key and the second encryption key in the appliance;
encrypting, by the appliance, first owner private data stored in the appliance using the first encryption key, wherein the first owner private data is not accessible to a second owner of the appliance;
encrypting, by the appliance, owners private data stored in the appliance using the second encryption key to form encrypted owners private data, wherein the owners private data is accessible by the second owner of the appliance;
receiving, by the appliance, from the first owner device associated with the first owner, ownership transfer data including the second encryption key, wherein the second encryption key is encrypted by the first owner device;
generating, by the appliance, an ownership transfer entry comprising the ownership transfer data;
receiving, by the appliance from a second owner device associated with the second owner, a decryption request for the ownership transfer data;
decrypting, by the appliance, the ownership transfer data;
retrieving, by the appliance, the second encryption key from the ownership transfer data; and
sending, by the appliance, the second encryption key to the second owner device, wherein the second owner device utilizes the second encryption key to access the owners private data.
1 Assignment
0 Petitions
Accused Products
Abstract
An appliance is capable of storing and processing data related to details surrounding its ownership, behavior, and history within itself in a secure and unalterable way. The appliance may experience multiple transfers in ownership during its lifetime. Certain data stored in the appliance may be encrypted such that only qualifying parties (e.g., owners) may be able to access the data. Some data may remain private to an individual owner while other data may be made available to subsequent owners by passing a shared secret that can be utilized to decrypt the other data. Data may be stored in the appliance in chronological order and may be signed by appropriate parties such that it is not possible to alter the data without detection.
-
Citations
14 Claims
-
1. An appliance comprising:
-
a processor; a memory coupled to the processor; one or more state monitoring sensors coupled to the processor; and a computer-readable medium coupled to the processor, including code that is executable by the processor, for implementing a method comprising; receiving, by the appliance and from a first owner device, a first encryption key and a second encryption key associated with a first owner of the appliance; storing the first encryption key and the second encryption key in the appliance; encrypting, by the appliance, first owner private data stored in the appliance using the first encryption key, wherein the first owner private data is not accessible to a second owner of the appliance; encrypting, by the appliance, owners private data stored in the appliance using the second encryption key to form encrypted owners private data, wherein the owners private data is accessible by the second owner of the appliance; receiving, by the appliance, from the first owner device associated with the first owner, ownership transfer data including the second encryption key, wherein the second encryption key is encrypted by the first owner device; generating, by the appliance, an ownership transfer entry comprising the ownership transfer data; receiving, by the appliance from a second owner device associated with the second owner, a decryption request for the ownership transfer data; decrypting, by the appliance, the ownership transfer data; retrieving, by the appliance, the second encryption key from the ownership transfer data; and sending, by the appliance, the second encryption key to the second owner device, wherein the second owner device utilizes the second encryption key to access the owners private data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, by an appliance and from a first owner device, a first encryption key and a second encryption key associated with a first owner of the appliance; storing the first encryption key and the second encryption key in the appliance; encrypting, by the appliance, first owner private data stored in the appliance using the first encryption key, wherein the first owner private data is not accessible to a second owner of the appliance; and encrypting, by the appliance, owners private data stored in the appliance using the second encryption key to form encrypted owners private data, wherein the owners private data is accessible by the second owner of the appliance; receiving, by the appliance, from the first owner device associated with the first owner, ownership transfer data including the second encryption key, wherein the second encryption key is encrypted by the first owner device; generating, by the appliance, an ownership transfer entry comprising the ownership transfer data; receiving, by the appliance from a second owner device associated with the second owner, a decryption request for the ownership transfer data; decrypting, by the appliance, the ownership transfer data; retrieving, by the appliance, the second encryption key from the ownership transfer data; and sending, by the appliance, the second encryption key to the second owner device, wherein the second owner device utilizes the second encryption key to access the owners private data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification