Data sharing system method
First Claim
1. A method for data exchange between a plurality of users where a third party receives, stores, and transmits data between each of said users, comprising:
- associating a personal computing device with each user;
providing a third party data sharing server, where the associated personal computing devices are each connected to the third party data sharing server;
establishing a data obscuring module to each personal computing device;
generating a user identification confirmation protocol to confirm the identity of the user, the user identification confirmation protocol associated exclusively for the exchange of data between the personal computing devices through the third party data sharing server;
using the data obscuring module to transform an original data file to an encrypted data file, and then transmitting the encrypted data file to the third party data sharing server for storage, the third party data sharing server being without a capability to reconstitute the original data from the encrypted data file;
forwarding the encrypted data file from the third party server to a second user'"'"'s personal computing device that has been qualified by the first user, the data obscuring module of the second user'"'"'s personal computing device reconstituting the original data file from the encrypted data file; and
selectively exchanging security keys between users without revealing said security keys to the third party data sharing server, the security keys used to qualify a personal computing device for reconstituting the original data file from the encrypted data file.
0 Assignments
0 Petitions
Accused Products
Abstract
A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users'"'"' personal information. In this type of network, a user'"'"'s personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user'"'"'s friends/contacts within the system. This arrangement ensures that a user'"'"'s personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users'"'"' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.
-
Citations
4 Claims
-
1. A method for data exchange between a plurality of users where a third party receives, stores, and transmits data between each of said users, comprising:
-
associating a personal computing device with each user; providing a third party data sharing server, where the associated personal computing devices are each connected to the third party data sharing server; establishing a data obscuring module to each personal computing device; generating a user identification confirmation protocol to confirm the identity of the user, the user identification confirmation protocol associated exclusively for the exchange of data between the personal computing devices through the third party data sharing server; using the data obscuring module to transform an original data file to an encrypted data file, and then transmitting the encrypted data file to the third party data sharing server for storage, the third party data sharing server being without a capability to reconstitute the original data from the encrypted data file; forwarding the encrypted data file from the third party server to a second user'"'"'s personal computing device that has been qualified by the first user, the data obscuring module of the second user'"'"'s personal computing device reconstituting the original data file from the encrypted data file; and selectively exchanging security keys between users without revealing said security keys to the third party data sharing server, the security keys used to qualify a personal computing device for reconstituting the original data file from the encrypted data file. - View Dependent Claims (2, 3, 4)
-
Specification