Cryptography method and system for securing data via electronic transmission
First Claim
Patent Images
1. A method for encrypting data within a QR code utilizing a data encryption server, comprising the steps of:
- registering, with the server, a data originator;
creating, by the server, a data originator encryption key and a corresponding recipient encryption key, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored;
transmitting, by the server, the data originator encryption key to a data originator peripheral device and the recipient encryption key to a recipient peripheral device;
encrypting data within the QR code to be transmitted by the data originator peripheral device with the data originator encryption key;
transmitting the encrypted data within the QR code to the recipient peripheral device;
verifying that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and
when the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data within the QR code received by the recipient peripheral device such that information within the QR code is accessible and may be viewed/read, wherein the encrypted data has a unique file extension;
further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted is further provided to further mask the nature and size of the data to transmitted to the recipient peripheral device;
further comprising tracking the encrypted data via blockchain technology.
0 Assignments
0 Petitions
Accused Products
Abstract
Provided are QR Codes configured with a Transactional Cryptopgrahy (“TC”) component and methods for using thereof in a secure manner without the need for specialized hardware. By using software-defined security, QR codes can be used for a wider array of purposes without the additional expense and maintenance of separate hardware platforms for secure information.
-
Citations
19 Claims
-
1. A method for encrypting data within a QR code utilizing a data encryption server, comprising the steps of:
-
registering, with the server, a data originator; creating, by the server, a data originator encryption key and a corresponding recipient encryption key, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored; transmitting, by the server, the data originator encryption key to a data originator peripheral device and the recipient encryption key to a recipient peripheral device; encrypting data within the QR code to be transmitted by the data originator peripheral device with the data originator encryption key; transmitting the encrypted data within the QR code to the recipient peripheral device; verifying that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and when the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data within the QR code received by the recipient peripheral device such that information within the QR code is accessible and may be viewed/read, wherein the encrypted data has a unique file extension; further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted is further provided to further mask the nature and size of the data to transmitted to the recipient peripheral device; further comprising tracking the encrypted data via blockchain technology. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. The method of 3, wherein the assigned randomly-generated character is a number.
-
13. The method of 6, wherein the additional randomly-generated intermittently dispersed characters are number.
-
14. A system for encrypting data within a QR code, comprising:
-
(a) at least a first and second peripheral device; (b) a data encryption server; (c) and a network router allowing for communication of an encrypted QR code between the first peripheral device, the second peripheral device, and the data encryption server;
wherein;the first peripheral device is a data originator and is configured to communicate with and register with the encryption server; the encryption server is configured to concurrently create a data originator encryption key and a corresponding recipient encryption key once the first peripheral device registers with the encryption server, the data originator encryption key and the recipient encryption key being a randomly-generated asymmetrical key-pair set configured for one-time use and not otherwise publicly stored; the encryption server is further configured to transmit the data originator encryption key to the first peripheral device and the recipient encryption key to the second peripheral device, which is a recipient peripheral device; the encryption server is configured to encrypt data within the QR code that is to be transmitted by the data originator peripheral device with the data originator encryption key and transmit the encrypted data within the QR code to the recipient peripheral device; at least one of the first peripheral device, the second peripheral device, and/or encryption server are configured to verify that the recipient encryption key and the data originator encryption key are from the same randomly-generated key-pair set; and when the recipient encryption key and the data originator encryption key are verified to be from the same randomly-generated key-pair set, decrypting the encrypted data within the QR code received by the recipient peripheral device such that information within the QR code is accessible and may be viewed/read, wherein the encrypted data has a unique file extension; further comprising additional randomly-generated intermittently dispersed characters that do not correspond to the data to be transmitted is further provided to further mask the nature and size of the data to transmitted to the recipient peripheral device; further comprising tracking the encrypted data via blockchain technology. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification