×

System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key

  • US 10,523,644 B2
  • Filed: 10/03/2016
  • Issued: 12/31/2019
  • Est. Priority Date: 09/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system based on layered, two-tier double cryptographic keys providing a closed cryptosystem for secure content distribution within a secured network environment, the system comprising:

  • a digital key management device including digital key management circuitry configured to generate a first-tier cryptographic key and make the first-tier cryptographic key publicly accessible within a first secured walled region, wherein the first secured walled region is accessible to a supply network node registered to a first authentication database associated with an access server of the system, encrypt first content with the first-tier cryptographic key, generate encrypted first content,generate a second-tier cryptographic key and make the second-tier cryptographic key publicly accessible to the supply network node within a second secured walled region,encrypt second content with the second-tier cryptographic key, and generate encrypted second content,supply network nodes including node circuitries configured to request, via a network interface, access to the first secured walled region, wherein the access server enables access to the first secured walled region for the supply network node upon authentication and/or authorization by the first authentication database, the first secured walled region being accessible to any supply network node registered to the first authentication database associated with the access server of the system,access the first-tier cryptographic key via the first secured walled region, access and decrypt the encrypted first content using the first-tier cryptographic key,generate a first data container based on the decrypted first content, transfer the first data container to a client device, wherein the digital key management circuitry assigns the client device the first-tier cryptographic key, and wherein the assignment is accessible to the supply network nodes registered to the first authentication database,request access to the second secured walled region, wherein the access server enables access to the second secured walled region for the supply network nodes upon authentication and/or authorization from a second authentication database associated with the access server,access the second-tier cryptographic key via the secured second walled region, access and decrypt the encrypted second content using the second-tier cryptographic key,generate a second data container based on the decrypted second content, and transfer the second data container to the client device, wherein the digital key management circuitry is further configured to receive a first acceptance-confirmation of the content of the first data container, via the network interface, from the client device, and receive a second acceptance-confirmation of the content of the second data container, via the network interface, from the client device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×