METHOD AND APPARATUS FOR TRUST BASED DATA SCANNING, CAPTURE, AND TRANSFER
First Claim
Patent Images
1. A method, comprising:
- capturing data with a data capture device;
encrypting the data with a first encryption key;
encrypting the first encryption key with a second encryption key to generate a first encrypted key data;
encrypting the first encrypted key data with a third encryption key to generate a second encrypted key data; and
transmitting the encrypted data and the second encrypted key data to a remote service provider over a network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for enabling trust based data scanning and capture is described. The method may include capturing data with a data capture device. The method may also include encrypting the data with a first encryption key, encrypting the first encryption key with a second encryption key to generate a first encrypted key data, and encrypting the first encrypted key data with a third encryption key to generate a second encrypted key data. The method may also include transmitting the encrypted data and the second encrypted key data to a remote service provider over a network.
19 Citations
33 Claims
-
1. A method, comprising:
-
capturing data with a data capture device; encrypting the data with a first encryption key; encrypting the first encryption key with a second encryption key to generate a first encrypted key data; encrypting the first encrypted key data with a third encryption key to generate a second encrypted key data; and transmitting the encrypted data and the second encrypted key data to a remote service provider over a network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium including instructions that, when executed by a processor, cause the processor to perform a method comprising:
-
capturing data with a data capture device; encrypting the data with a first encryption key; encrypting the first encryption key with a second encryption key to generate a first encrypted key data; encrypting the first encrypted key data with a third encryption key to generate a second encrypted key data; and transmitting the encrypted data and the second encrypted key data to a remote service provider over a network.
-
-
15. An apparatus, comprising:
-
a data capture device to capture data; an encryption engine coupled with the data capture device to encrypt the data with a first encryption key, encrypt the first encryption key with a second encryption key to generate a first encrypted key data, and encrypt the first encrypted key data with a third encryption key to generate a second encrypted key data; and a communications interface coupled with the encryption engine to transmit the encrypted data and the second encrypted key data to a remote service provider over a network.
-
-
16. A method, comprising:
-
capturing data with a data capture device; encrypting the data with first encryption key; encrypting the encrypted data with a second encryption key; and transmitting the data encrypted with the second encryption key to a remote service provider over a network. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A non-transitory computer readable storage medium including instructions that, when executed by a processor, cause the processor to perform a method comprising:
-
capturing data with a data capture device; encrypting the data with first encryption key; encrypting the encrypted data with a second encryption key; and transmitting the data encrypted with the second encryption key to a remote service provider over a network.
-
-
27. An apparatus, comprising:
-
a data capture device to capture data; an encryption engine coupled with the data capture device to encrypt the data with first encryption key; encrypt the encrypted data with a second encryption key; and a communications interface coupled with the encryption engine to transmit the data encrypted with the second encryption key to a remote service provider over a network.
-
-
28. A method, comprising:
-
receiving data encrypted by a data capture device at a remote service provider, wherein the received encrypted data includes encrypted key data and an encrypted form of data captured by the data capture device; decrypting the encrypted key data with a first decryption key to obtain a second encrypted key data; decrypting the second encrypted key data with a second decryption key to obtain a symmetric decryption key; decrypting the encrypted form of data captured by the data capture device with the symmetric decryption key; and processing the data captured by the data capture device. - View Dependent Claims (29, 30)
-
-
31. A method, comprising:
-
receiving data encrypted by a data capture device at a remote service provider, wherein the received encrypted data includes an encrypted form of data captured by the data capture device; decrypting the encrypted form of data captured by the data capture device with a first decryption key to obtain a second encrypted form of data captured by the data capture device; decrypting the second encrypted form of data captured by the data capture device with a second decryption key to obtain the data captured by the data capture device; and processing the data captured by the data capture device. - View Dependent Claims (32, 33)
-
Specification