Method and system for secure data collection and distribution
First Claim
1. A method for secure recording of screen data, the method comprising the steps of:
- generating, at a logger, a data encryption key for each initialization of a screen agent on a terminal, wherein the logger is separate from the terminal and associated with the screen agent on the terminal and receives screen data captured by the screen agent, wherein the data encryption key is used to encrypt according to a predefined granularity the screen data captured as a result of the initialization of the screen agent on the terminal;
using the encryption key to encrypt the screen data to produce encrypted screen data;
associating an identifier with the encryption key and the encrypted screen data;
sending the identifier and the encrypted screen data to an archive; and
sending the identifier and the data encryption key to a crypto information server.
3 Assignments
0 Petitions
Accused Products
Abstract
A data provider generates a data encryption key and an identifier, uses the data encryption key to encrypt data, sends the encrypted data and the identifier to a data requestor, and sends the data encryption key and the identifier to a crypto information server. The data requestor sends the identifier to the crypto information server to request the encryption key. The crypto information server authenticates the data requestor and, contingent on that authentication, sends the data encryption key to the data requestor. If a plurality of data instances are captured, then for each instance, a respective data encryption key and identifier are generated.
10 Citations
23 Claims
-
1. A method for secure recording of screen data, the method comprising the steps of:
-
generating, at a logger, a data encryption key for each initialization of a screen agent on a terminal, wherein the logger is separate from the terminal and associated with the screen agent on the terminal and receives screen data captured by the screen agent, wherein the data encryption key is used to encrypt according to a predefined granularity the screen data captured as a result of the initialization of the screen agent on the terminal; using the encryption key to encrypt the screen data to produce encrypted screen data; associating an identifier with the encryption key and the encrypted screen data; sending the identifier and the encrypted screen data to an archive; and sending the identifier and the data encryption key to a crypto information server. - View Dependent Claims (2, 3, 4, 5, 20)
-
-
6. A method for secure recording of audio data, the method comprising the steps of:
-
generating a data encryption key for each audio recording channel of a logger, wherein the data encryption key is used to encrypt audio data according to a predefined granularity for the audio recording channel of the logger; using the encryption key to encrypt the audio data to produce encrypted audio data; associating an identifier with the encryption key and the encrypted audio data; sending the identifier and the encrypted audio data to an archive; and sending the identifier and the data encryption key to a crypto information server. - View Dependent Claims (7, 8, 9, 10, 21, 22)
-
-
11. A system for secure recording of screen data, the system comprising:
-
an archive; a crypto information server; a data terminal; and a logger to; generate a data encryption key for encrypting the screen data captured as a result of each initialization of a screen agent on a terminal, wherein the logger is separate from the terminal and associated with the screen agent on the terminal and receives screen data captured by the screen agent and wherein the data encryption key is used to encrypt according to a predefined granularity the screen data captured as a result of the initialization of the screen agent on the terminal; use the encryption key to encrypt the screen data to produce encrypted screen data; associate an identifier with the encryption key and the encrypted screen data; send the identifier and the encrypted screen data to the archive; and send the identifier and the data encryption key to the crypto information server. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system for secure recording audio data, the system comprising:
-
an archive; a crypto information server; a data terminal; and a logger to; generate a data encryption key for each audio recording channel of a logger, wherein the data encryption key is used to encrypt audio data according to a predefined granularity for the audio recording channel of the logger; use the encryption key to encrypt the audio data to produce encrypted audio data; associate an identifier with the encryption key and the encrypted audio data; send the identifier and the encrypted audio data to the archive; and send the identifier and the data encryption key to the crypto information server. - View Dependent Claims (17, 18, 19)
-
-
23. A method for secure recording of screen data, the method comprising the steps of:
-
generating a separate data encryption key for each initialization of a screen agent on each of a plurality of terminals, wherein the data encryption key is used to encrypt according to a predefined granularity the screen data captured as a result of the initialization of the screen agent on the terminal; using the encryption key to encrypt the screen data to produce encrypted screen data; associating an identifier with the encryption key and the encrypted screen data; sending the identifier and the encrypted screen data to an archive; and sending the identifier and the data encryption key to a crypto information server.
-
Specification