Differential client-side encryption of information originating from a client
First Claim
1. A method comprising:
- receiving, from an entity server over a network by a computer system comprising one or more hardware processors, a processing request comprising an encrypted data package encrypted by a client device, wherein the encrypted data package comprises an encrypted symmetric key encrypted using a first public key allocated to the entity server and encrypted data encrypted using a symmetric key corresponding to the encrypted symmetric key;
determining, by the computer system, a first private key corresponding to the first public key allocated to the entity server by accessing a plurality of private keys stored in a memory;
decrypting, by the computer system, the encrypted symmetric key using the private key to obtain the symmetric key;
decrypting, by the computer system, the encrypted data using the symmetric key to obtain first data; and
providing, by the computer system, a processing result based on at least a portion of the first data.
3 Assignments
0 Petitions
Accused Products
Abstract
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving, from an entity server over a network by a computer system comprising one or more hardware processors, a processing request comprising an encrypted data package encrypted by a client device, wherein the encrypted data package comprises an encrypted symmetric key encrypted using a first public key allocated to the entity server and encrypted data encrypted using a symmetric key corresponding to the encrypted symmetric key; determining, by the computer system, a first private key corresponding to the first public key allocated to the entity server by accessing a plurality of private keys stored in a memory; decrypting, by the computer system, the encrypted symmetric key using the private key to obtain the symmetric key; decrypting, by the computer system, the encrypted data using the symmetric key to obtain first data; and providing, by the computer system, a processing result based on at least a portion of the first data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a non-transitory memory; one or more hardware processors coupled with the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving, from an entity server over a network, a processing request comprising an encrypted data package encrypted by a client device, wherein the encrypted data package comprises an encrypted symmetric key encrypted using a first public key allocated to the entity server and encrypted data encrypted using a symmetric key corresponding to the encrypted symmetric key; determining a first private key corresponding to the first public key allocated to the entity server by accessing a plurality of stored private keys; decrypting the encrypted symmetric key using the private key to obtain the symmetric key; decrypting the encrypted data using the symmetric key to obtain first data; determining a processing result based on at least a portion of the first data; and providing the processing result. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory machine readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving, from an entity server over a network, a processing request comprising an encrypted data package encrypted by a client device, wherein the encrypted data package comprises an encrypted symmetric key encrypted using a first public key allocated to the entity server and encrypted data encrypted using a symmetric key corresponding to the encrypted symmetric key; determining a first private key corresponding to the first public key allocated to the entity server by accessing a plurality of private keys stored in a memory; decrypting the encrypted symmetric key using the private key to obtain the symmetric key; decrypting the encrypted data using the symmetric key to obtain first data; and providing a processing result based on at least a portion of the first data. - View Dependent Claims (20)
-
Specification