Secure transfer of data
First Claim
1. A system for enabling secure transfer of data comprising a receiving device (10) for transmitting a request for data, a sending device (12) for receiving the request for data and for transmitting the data encrypted with a first key (14), and a server (16) for receiving the data and identification information, for partially decrypting the data with a second key (18), and for transmitting the partially decrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for enabling secure transfer of data comprises a receiving device (10) for transmitting a request for data to a sending device (12), a sending device (12) for receiving the request for data and for transmitting the data encrypted with a first key (14) to the receiving device (10), and a server (16) for receiving the encrypted data and identification information from the receiving device (10), the server arranged for partially decrypting the data with a second key (18), and transmitting the partially decrypted data to the receiving device. The receiving device (10) is arranged to decrypt the partially decrypted data received from the server (16) with a third key (20).
-
Citations
16 Claims
- 1. A system for enabling secure transfer of data comprising a receiving device (10) for transmitting a request for data, a sending device (12) for receiving the request for data and for transmitting the data encrypted with a first key (14), and a server (16) for receiving the data and identification information, for partially decrypting the data with a second key (18), and for transmitting the partially decrypted data.
- 9. A method for enabling secure transfer of data comprising transmitting (22) a request for data, receiving (24) the data encrypted with a first key (14), transmitting (26) the data and identification information, receiving (28) the data partially decrypted with a second key (18), and decrypting (30) the data with a third key (20).
- 12. A device for enabling secure transfer of data comprising a network interface (34) for transmitting a request for data, for receiving the data encrypted with a first key (14), for transmitting the data and identification information, and for receiving the data partially decrypted with a second key (18), and a processor (32) for controlling the network interface (34), and for decrypting the data with a third key (20).
Specification