×

Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database

  • US 10,341,309 B1
  • Filed: 06/13/2016
  • Issued: 07/02/2019
  • Est. Priority Date: 06/13/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a first computing device and from a plurality of sensors, sensor data;

    processing, by the first computing device, the sensor data to generate processed data;

    encrypting, by the first computing device and using a first encryption key associated with the first computing device, the processed data to generate first encrypted data;

    transmitting, by the first computing device and to an intermediary database, the first encrypted data encrypted using the first encryption key;

    after receiving a selection, by a second computing device, of the first encrypted data, receiving, by the first computing device and from the second computing device, a second encryption key associated with the second computing device, wherein the receiving the selection of the first encrypted data comprises;

    transmitting, by the first computing device and to the second computing device, a third encryption key, wherein the third encryption key comprises a public key associated with the first computing device, andreceiving, by the first computing device, an encrypted incentive encrypted using the third encryption key, wherein the incentive comprises data exchanging for the sensor data;

    responsive to the selection of the first encrypted data, receiving, at the first computing device and from the intermediary database, the first encrypted data;

    decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data;

    decrypting, by the first computing device and using a private key corresponding to the public key associated with the first computing device, the encrypted incentive;

    encrypting, by the first computing device and using the second encryption key, the decrypted data to generate second encrypted data, wherein the incentive is associated with the second encrypted data encrypted using the second encryption key; and

    transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×