×

Private data sharing system

  • US 10,587,563 B2
  • Filed: 12/10/2018
  • Issued: 03/10/2020
  • Est. Priority Date: 10/08/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for data exchange between a plurality of personal computing devices where a third party receives, stores, and transmits data between each of said personal computing devices, comprising:

  • providing a third party data sharing server connecting the personal computing devices;

    establishing an encryption/decryption module on each personal computing device connected to the data sharing server;

    generating a file encryption key and a file decryption key associated with and unique to an original data file using the encryption/decryption module of a first personal computing device associated with a first user, the file decryption key being usable for reconstituting data files encrypted with the file encryption key;

    encrypting the original data file with the file encryption key for sharing with a second personal computing device associated with a second user selected by the first user and with a third personal computing device associated with a third user selected by the first user;

    encrypting the file decryption key with a first recipient encryption key unique to the second user to produce a first encrypted file decryption key;

    encrypting the file decryption key with a second recipient encryption key unique to the third user to produce a second encrypted file decryption key;

    transmitting the encrypted data file, the first encrypted file decryption key, and the second encrypted file decryption key to the third party data sharing server for storage, the third party data sharing server being without a capability to decrypt the file decryption key from the first encrypted file decryption key and without a capability to decrypt the file decryption key from the second encrypted file decryption key and without a capability to decrypt the original data file from the encrypted data file;

    forwarding the encrypted data file and the first encrypted file decryption key from the third party server to the second personal computing device;

    forwarding the encrypted data file and the second encrypted file decryption key from the third party server to the third personal computing device;

    decrypting the file decryption key using the encryption/decryption module of the second personal computing device to reconstitute the file decryption key from the first encrypted file decryption key and a first recipient decryption key, the first recipient decryption key being usable for reconstituting data files encrypted with the first recipient encryption key; and

    decrypting the file decryption key using the encryption/decryption module of the third personal computing device to reconstitute the file decryption key from the second encrypted file decryption key and a second recipient decryption key, the second recipient decryption key being usable for reconstituting data files encrypted with the second recipient encryption key;

    decrypting the encrypted data file using the encryption/decryption module of the second personal computing device to reconstitute the original data file from the encrypted data file and the file decryption key; and

    decrypting the encrypted data file using the encryption/decryption module of the third personal computing device to reconstitute the original data file from the encrypted data file and the file decryption key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×