METHOD AND SYSTEM FOR SECURE DATA COLLECTION AND DISTRIBUTION
First Claim
1. A method for secure recording of screen data, the method comprising the steps of:
- generating a data encryption key according to a predefined granularity for each initialization of a screen agent on a terminal;
using the encryption key to encrypt the screen data to produce encrypted screen data;
associating an identifier with the encryption key and the encrypted screen data;
sending the identifier and the encrypted screen data to an archive; and
sending the identifier and the data encryption key to a crypto information server.
3 Assignments
0 Petitions
Accused Products
Abstract
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to a data requestor, and sends the data encryption key and the identifier to a crypto information server. The data requestor sends the identifier to the crypto information server to request the encryption key. The crypto information server authenticates the data requestor and, contingent on that authentication, sends the data encryption key to the data requestor. If a plurality of data instances are captured, then for each instance, a respective data encryption key and identifier are generated.
-
Citations
19 Claims
-
1. A method for secure recording of screen data, the method comprising the steps of:
-
generating a data encryption key according to a predefined granularity for each initialization of a screen agent on a terminal; using the encryption key to encrypt the screen data to produce encrypted screen data; associating an identifier with the encryption key and the encrypted screen data; sending the identifier and the encrypted screen data to an archive; and sending the identifier and the data encryption key to a crypto information server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for secure recording of audio data, the method comprising the steps of:
-
generating a data encryption key according to a predefined granularity, the granularity being for each audio channel of a logger; using the encryption key to encrypt the audio data to produce encrypted audio data; associating an identifier with the encryption key and the encrypted audio data; sending the identifier and the encrypted audio data to an archive; and sending the identifier and the data encryption key to a crypto information server. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for secure recording of screen data, the system comprising:
-
an archive; a crypto information server; a data terminal; and a logger to; generate a data encryption key according to a predefined granularity for each initialization of a screen agent on a terminal; use the encryption key to encrypt the screen data to produce encrypted screen data; associate an identifier with the encryption key and the encrypted screen data; send the identifier and the encrypted screen data to the archive; and send the identifier and the data encryption key to the crypto information server. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system for secure recording audio data, the system comprising:
-
an archive; a crypto information server; a data terminal; and a logger to; generate a data encryption key according to a predefined granularity, the granularity being for each audio channel of the logger; use the encryption key to encrypt the audio data to produce encrypted audio data; associate an identifier with the encryption key and the encrypted audio data; send the identifier and the encrypted audio data to the archive; and send the identifier and the data encryption key to the crypto information server. - View Dependent Claims (17, 18, 19)
-
Specification