Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database
First Claim
1. A method comprising:
- receiving, at a first computing device and from a plurality of sensors, sensor data;
processing, by the first computing device, the sensor data to generate processed data;
encrypting, by the first computing device and using a first encryption key associated with the first computing device, the processed data to generate first encrypted data;
transmitting, by the first computing device and to an intermediary database, the first encrypted data encrypted using the first encryption key;
after receiving a selection, by a second computing device, of the first encrypted data, receiving, by the first computing device and from the second computing device, a second encryption key associated with the second computing device, wherein the receiving the selection of the first encrypted data comprises;
transmitting, by the first computing device and to the second computing device, a third encryption key, wherein the third encryption key comprises a public key associated with the first computing device, andreceiving, by the first computing device, an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data;
responsive to the selection of the first encrypted data, receiving, at the first computing device and from the intermediary database, the first encrypted data;
decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data;
decrypting, by the first computing device and using a private key corresponding to the public key associated with the first computing device, the encrypted incentive;
encrypting, by the first computing device and using the second encryption key, the decrypted data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and
transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the disclosure relate to a system and method for cryptographically protecting data transferred between spatially distributed computing devices. An intermediary database may be used to facilitate the protected data transfer and/or record the data transfers. A first computing device may transfer, to the intermediary database, encrypted data that may be securely transferred to other computing devices. A second computing device may generate a GUI used to view data available from the intermediary database. Once data is selected by the second device, the second device may transfer a key (or other encryption mechanism) to the first device. The first computing device may encrypt the data using the received key and transmit the encrypted data to the intermediary database. The intermediary database may transmit the encrypted data to the second computing device, and the second computing device may decrypt and use the data. Similar data transfers may be performed among numerous other computing devices connected to the intermediary database.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving, at a first computing device and from a plurality of sensors, sensor data; processing, by the first computing device, the sensor data to generate processed data; encrypting, by the first computing device and using a first encryption key associated with the first computing device, the processed data to generate first encrypted data; transmitting, by the first computing device and to an intermediary database, the first encrypted data encrypted using the first encryption key; after receiving a selection, by a second computing device, of the first encrypted data, receiving, by the first computing device and from the second computing device, a second encryption key associated with the second computing device, wherein the receiving the selection of the first encrypted data comprises; transmitting, by the first computing device and to the second computing device, a third encryption key, wherein the third encryption key comprises a public key associated with the first computing device, and receiving, by the first computing device, an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data; responsive to the selection of the first encrypted data, receiving, at the first computing device and from the intermediary database, the first encrypted data; decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; decrypting, by the first computing device and using a private key corresponding to the public key associated with the first computing device, the encrypted incentive; encrypting, by the first computing device and using the second encryption key, the decrypted data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
a processor; and memory storing computer-executable instructions that, when executed by the processor, cause the apparatus to; receive, from a plurality of sensors, sensor data; process the sensor data to generate processed data; encrypt, using a first encryption key associated with the apparatus, the processed data to generate first encrypted data; transmit, to an intermediary database, the first encrypted data encrypted using the first encryption key; after receiving a selection, by a second apparatus, of the first encrypted data, receive, from the second apparatus, a second encryption key associated with the second apparatus wherein the receiving the selection of the first encrypted data comprises; transmitting, to the second apparatus, a third encryption key, wherein the third encryption key comprises a public key associated with the apparatus, and receiving an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data; responsive to the selection of the first encrypted data, receive, from the intermediary database, the first encrypted data; decrypt, using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; decrypt, using a private key corresponding to the public key associated with the apparatus, the encrypted incentive; encrypt, using the second encryption key, the decrypted data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and transmit, via the intermediary database and to the second apparatus, the second encrypted data for the second apparatus to decrypt and use. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium storing instructions that, when read by a computing device, cause the computing device to:
-
receive, from a plurality of sensors, sensor data; process the sensor data to generate processed data; encrypt, using a first encryption key associated with the computing device, the processed data to generate first encrypted data; transmit, to an intermediary database, the first encrypted data encrypted using the first encryption key; after receiving a selection, by a second computing device, of the first encrypted data, receive, from the second computing device, a second encryption key associated with the second computing device, wherein the receiving the selection comprises; transmitting, to the second computing device, a third encryption key, wherein the third encryption key comprises a public key associated with the computing device, and receiving an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data; responsive to the selection of the first encrypted data, receive, from the intermediary database, the first encrypted data; decrypt, using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; decrypt, using a private key corresponding to the public key associated with the computing device, the encrypted incentive; encrypt, using the second encryption key, the processed data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and transmit, via the intermediary database and to the second computing device, the second encrypted data for the second computing device to decrypt and use. - View Dependent Claims (14, 15, 16, 17)
-
Specification