Method & Apparatus for Remote Information Capture, Storage, and Retrieval
First Claim
Patent Images
1. A method for managing data access comprising the steps of:
- encrypting data for a user with a public key of said user;
storing said encrypted data;
encrypting a private key with an identifier associated with said user, said private key configured to decrypt said encrypted data;
storing said encrypted private key; and
deleting said private key subsequent to said step of encrypting said private key.
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to methods and systems that restrict access to stored sensitive information. Specifically, the methods and systems of the present disclosure separate the management of access to data from the encryption and storage of the data itself. The present disclosure allows for retrieval of the access without providing such access to the data host. Further, the present disclosure provides for data ownership privileges that can grant or revoke access. The present disclosure further provides for audio-access of stored data.
-
Citations
20 Claims
-
1. A method for managing data access comprising the steps of:
-
encrypting data for a user with a public key of said user; storing said encrypted data; encrypting a private key with an identifier associated with said user, said private key configured to decrypt said encrypted data; storing said encrypted private key; and deleting said private key subsequent to said step of encrypting said private key. - View Dependent Claims (6, 7, 10)
-
-
2. A method for managing data access comprising the steps of:
-
encrypting data for a first user with a file key; encrypting said file key with a public key of said first user; storing said encrypted data for said first user; encrypting a private key with an identifier associated with said first user, said private key configured to decrypt said encrypted file key; storing said encrypted private key; and deleting said private key subsequent to said step of encrypting said private key. - View Dependent Claims (3, 4, 5, 8, 9, 11, 12)
-
-
13. A system for managing data access comprising:
-
encrypted data for a first user, said data encrypted with a file key; a first encrypted file key generated by encryption of said file key with a public key of said first user; and an encrypted private key for said first user, said private key encrypted with an identifier associated with said first user, wherein said system does not store said private key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification