System and method for protected data transfer
First Claim
1. A method for transferring protected data having an authorizing entity'"'"'s outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier, the method comprising:
- receiving protected data having a first unique, unalterable identifier of the first electronic device, a first outer encryption layer, and the user-fixed inner encryption layer from the first electronic device, wherein data having the user-fixed inner encryption layer is generated by encrypting data using a first user-fixed encryption key, the first user-fixed encryption key being generated from a first user input received at the first electronic device, wherein the first outer encryption layer is generated by encrypting the data having the user-fixed encryption layer using a first authorizing entity-shared encryption key corresponding to the first unique, unalterable identifier of the first electronic device;
verifying the first unique, unalterable identifier of the first electronic device;
generating, in response to the verification, the data having the user-fixed inner encryption layer by decrypting the first outer encryption layer using a first authorizing entity-shared encryption key corresponding to the first unique, unalterable identifier of the first electronic device;
encrypting the data having the user-fixed inner encryption layer with a second outer encryption layer using a second authorizing entity-shared encryption key corresponding to the second unique, unalterable identifier of the second electronic device;
appending, in response to the encryption, a second unique, unalterable identifier of the second electronic device; and
transmitting the protected data having the second unique, unalterable identifier of the second electronic device, the second outer encryption layer, and the user-fixed inner encryption layer to the second electronic device, wherein the second electronic device decrypts the protected data using the second authorizing entity-shared encryption key corresponding to the second unique, unalterable identifier to form the data having the user-fixed inner encryption layer, and decrypts the data having the user-fixed inner encryption layer using the first user-fixed encryption key generated from a second user input received at the second electronic device.
4 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a method, system and apparatus for transferring protected data having an authorizing entity'"'"'s outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier. A central unit includes a receiver configured to receive from the first electronic device protected data having an authorizing entity'"'"'s first outer encryption layer corresponding to the first unique, unalterable identifier and having a user-fixed inner encryption layer; a processor configured to decrypt the authorizing entity'"'"'s first outer encryption layer of the protected data; a processor configured to encrypt an authorizing entity'"'"'s second outer encryption layer of the protected data corresponding to the second unique, unalterable identifier; and a transmitter configured to transmit protected data to the second electronic device.
-
Citations
24 Claims
-
1. A method for transferring protected data having an authorizing entity'"'"'s outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier, the method comprising:
-
receiving protected data having a first unique, unalterable identifier of the first electronic device, a first outer encryption layer, and the user-fixed inner encryption layer from the first electronic device, wherein data having the user-fixed inner encryption layer is generated by encrypting data using a first user-fixed encryption key, the first user-fixed encryption key being generated from a first user input received at the first electronic device, wherein the first outer encryption layer is generated by encrypting the data having the user-fixed encryption layer using a first authorizing entity-shared encryption key corresponding to the first unique, unalterable identifier of the first electronic device; verifying the first unique, unalterable identifier of the first electronic device; generating, in response to the verification, the data having the user-fixed inner encryption layer by decrypting the first outer encryption layer using a first authorizing entity-shared encryption key corresponding to the first unique, unalterable identifier of the first electronic device; encrypting the data having the user-fixed inner encryption layer with a second outer encryption layer using a second authorizing entity-shared encryption key corresponding to the second unique, unalterable identifier of the second electronic device; appending, in response to the encryption, a second unique, unalterable identifier of the second electronic device; and transmitting the protected data having the second unique, unalterable identifier of the second electronic device, the second outer encryption layer, and the user-fixed inner encryption layer to the second electronic device, wherein the second electronic device decrypts the protected data using the second authorizing entity-shared encryption key corresponding to the second unique, unalterable identifier to form the data having the user-fixed inner encryption layer, and decrypts the data having the user-fixed inner encryption layer using the first user-fixed encryption key generated from a second user input received at the second electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A central unit configured to be in communication with a first electronic device having a first unique, unalterable identifier and a second electronic device having a second unique, unalterable identifier, the central unit comprising:
-
a receiver configured to receive from the first electronic device, protected data having a first unique, unalterable identifier of the first electronic device, an authorizing entity'"'"'s first outer encryption layer corresponding to the first unique, unalterable identifier, and a user-fixed inner encryption layer formed from a first user-fixed encryption key generated from a first user input at the first electronic device; a processor configured to verify the first unique, unalterable identifier of the first electronic device and to decrypt the authorizing entity'"'"'s first outer encryption layer of the protected data in response to the verification; a processor configured to encrypt an authorizing entity'"'"'s second outer encryption layer of the protected data corresponding to the second unique, unalterable identifier and to append, in response to the encryption, a second unique, unalterable identifier of the second electronic device; and a transmitter configured to transmit to the second electronic device, the protected data having the second unique, unalterable identifier of the second device, authorizing entity'"'"'s second outer encryption layer, and the user-fixed inner encryption layer for decryption at the second electronic device using the first user-fixed encryption key formed from a second user input received at the second electronic device and the second authorizing entity-shared encryption key corresponding to the second unique, unalterable identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a first electronic device having a first unique, unalterable identifier and a first corresponding encryption key for encrypting a first outer encryption layer of protected data, the first electronic device comprising; an input device for receiving user input to generate a user-fixed encryption key to encrypt a user-fixed inner encryption layer of data; a processor for encrypting the user-fixed inner encryption layer of data, encrypting the first outer encryption layer of the encrypted user-fixed inner encryption layer of data, and appending the first unique, unalterable identifier of the first electronics device to the encrypted first outer encryption layer; and a transmitter for transmitting the protected data having the first unique, unalterable identifier of the first electronic device, the first outer encryption layer, and the user-fixed inner encryption layer; a central unit comprising; a storage unit for storing the first corresponding encryption key and a second corresponding encryption key; a receiver for receiving the protected data having first unique, unalterable identifier of the first electronics device, the first outer encryption layer, and the user-fixed inner encryption layer; a processor for verifying the first unique, unalterable identifier of the first electronic device, decrypting in response to the verification the first outer encryption layer of the protected data with the first corresponding encryption key, for encrypting a second outer encryption layer of the protected data with the second corresponding encryption key, and appending the second unique, unalterable identifier of the second electronic device to the encrypted second outer encryption layer of the protected data; and a transmitter for transmitting the protected data having the second unique, unalterable identifier of the second electronic device, the second outer encryption layer, and the user-fixed inner encryption layer; and a second electronic device having a second unique, unalterable identifier and the second corresponding encryption key for decrypting the second outer encryption layer of the protected data, comprising; an input device for receiving user input to generate the user-fixed encryption key to decrypt the user-fixed inner encryption layer of the protected data; a receiver for receiving the protected data having the second unique, unalterable identifier of the second electronic device, the second outer encryption layer, and the user-fixed inner encryption layer; and a processor for verifying the second unique, unalterable identifier of the second electronic device, decrypting in response to the comparison the second outer encryption layer, and decrypting the user-fixed inner encryption layer of the protected data. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification