Computational systems and methods for encrypting data for anonymous storage
First Claim
Patent Images
1. A system comprising:
- (a) circuitry for accepting from an identifier encryption entity at least one encrypted identifier corresponding to at least one instance of data to be encrypted;
including at least;
(1) circuitry for accepting from the identifier encryption entity at least one hash corresponding to at least one of a device identifier, a username, a real name, an alias, a unique identifier, a date, a date and time, or biometric data;
(b) circuitry for encrypting the at least one instance of data to produce level-one-encrypted data, wherein the circuitry for encrypting the at least one instance of data to produce level-one-encrypted data is separate and apart from the identifier encryption entity;
(c) circuitry for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the identifier encryption entity; and
(d) circuitry for transmitting the level-one-encrypted data and associated encrypted identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.
-
Citations
26 Claims
-
1. A system comprising:
-
(a) circuitry for accepting from an identifier encryption entity at least one encrypted identifier corresponding to at least one instance of data to be encrypted;
including at least;(1) circuitry for accepting from the identifier encryption entity at least one hash corresponding to at least one of a device identifier, a username, a real name, an alias, a unique identifier, a date, a date and time, or biometric data; (b) circuitry for encrypting the at least one instance of data to produce level-one-encrypted data, wherein the circuitry for encrypting the at least one instance of data to produce level-one-encrypted data is separate and apart from the identifier encryption entity; (c) circuitry for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the identifier encryption entity; and (d) circuitry for transmitting the level-one-encrypted data and associated encrypted identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method comprising:
-
(a) accepting from an identifier encryption entity at least one encrypted identifier corresponding to at least one instance of data to be encrypted, including at least; (1) accepting from the identifier encryption entity at least one hash corresponding to at least one of a device identifier, a username, a real name, an alias, a unique identifier, a date, a date and time, or biometric data; (b) encrypting the at least one instance of data to produce level-one-encrypted data, wherein the encrypting the at least one instance of data to produce level-one-encrypted data is performed at least in part with circuitry that is separate and apart from the identifier encryption entity; (c) associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the identifier encryption entity; and (d) transmitting the level-one-encrypted data and associated encrypted identifier; and wherein at least one of the accepting, the encrypting, the associating, or the transmitting is performed at least in part with one or more processing devices. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product comprising:
-
an article of manufacture including at least one non-transitory signal-bearing medium bearing at least; (1) one or more instructions for accepting from an identifier encryption entity at least one encrypted identifier corresponding to at least one instance of data for encryption, including at least; (a) one or more instructions for accepting from the identifier encryption entity at least one hash corresponding to at least one of a device identifier, a username, a real name, an alias, a unique identifier, a date, a date and time, or biometric data; (2) one or more instructions for encrypting the at least one instance of data to produce level-one-encrypted data, wherein the one or more instructions for encrypting the at least one instance of data to produce level-one-encrypted data are configured to cause performance of the encrypting at least in part with circuitry that is separate and apart from the identifier encryption entity; (3) one or more instructions for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the identifier encryption entity; and (4) one or more instructions for transmitting the level-one-encrypted data and associated encrypted identifier. - View Dependent Claims (26)
-
Specification