×

SYSTEM AND METHOD FOR SECURE DIGITAL SHARING BASED ON AN INTER-SYSTEM EXCHANGE OF A TWO-TIER DOUBLE ENCRYPTED DIGITAL INFORMATION KEY

  • US 20170093826A1
  • Filed: 10/03/2016
  • Published: 03/30/2017
  • Est. Priority Date: 09/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system based on layered, two-tier double cryptographic keys providing a closed cryptosystem for secure content distribution within a secured network environment, the system comprising:

  • a digital key management device including digital key management circuitry configured togenerate a first-tier cryptographic key and make the first-tier cryptographic key publicly accessible within a first secured walled region, wherein the first secured walled region is accessible to a supply network node registered to a first authentication database associated with an access server of the system,encrypt a first content with the first-tier cryptographic key,generate encrypted first content,generate a second-tier cryptographic key and make the second-tier cryptographic key publicly accessible to the supply network node within a second secured walled region,encrypt a second content with the second-tier cryptographic key, andgenerate encrypted second content,a network node including node circuitry configured torequest, via a network interface, access to the first secured walled region, wherein the access server enables access to the first secured walled region for the supply network node upon authentication and/or authorization by the first authentication database,access the first-tier cryptographic key via the first secured walled region,access and decrypt the encrypted first content using the first-tier cryptographic keygenerate a first data container based on the decrypted first content,transfer the first data container to a client device, wherein the digital key management circuitry assigns the client device the first-tier cryptographic key, and wherein the assignment is accessible to the network node circuitry registered to the first authentication database,request access to the second secured walled region, wherein the access server enables access to the second secured walled region for the supply node upon authentication and/or authorization from a second authentication database associated with the access server,access the second-tier cryptographic key via the secured second walled region,access and decrypt the encrypted second content using the second-tier cryptographic key,generate a second data container based on the decrypted second content, andtransfer the second data container to the client device,wherein the digital key management circuitry is further configured to receive a first acceptance-confirmation of the content of the first data container, via a network interface, from the client device, and receive a second acceptance-confirmation of the content of the second data container, via the network interface, from the client device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×