×

Differential client-side encryption of information originating from a client

  • US 8,631,229 B2
  • Filed: 10/01/2012
  • Issued: 01/14/2014
  • Est. Priority Date: 09/30/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • allocating, by a processor of a first computing device, a plurality of public keys, wherein each respective public key of the plurality of public keys is allocated to a respective entity of a plurality of entities;

    storing, in a memory of the first computing device, a plurality of private keys, wherein each respective private key of the plurality of private keys corresponds to a respective public key of the plurality of public keys;

    storing, in the memory of the first computing device, one or more decryption algorithms, whereineach respective decryption algorithm of the one or more decryption algorithms is configured to decrypt data previously encrypted using at least one encryption algorithm of one or more encryption algorithms, wherein each respective encryption algorithm of the one or more encryption algorithms is configured to encrypt data using at least one public key of the plurality of public keys, andeach respective decryption algorithm of the one or more decryption algorithms is configured to decrypt data using at least one private key of the plurality of private keys;

    receiving encrypted data, whereinthe encrypted data is encrypted using a first public key of the plurality of public keys and a first encryption algorithm of the one or more encryption algorithms, andthe encrypted data is provided over a network;

    determining, by the processor of the first computing device, a first private key of the plurality of private keys, whereinthe first private key corresponds to the first public key, andthe first public key is allocated to a first entity of the plurality of entities;

    decrypting, by the processor of the first computing device, the encrypted data using the first private key and at least one decryption algorithm of the one or more decryption algorithms, whereindecrypted data is obtained by decrypting the encrypted data;

    providing a portion of the decrypted data for processing by a processing engine, wherein a second computing device comprises the processing engine;

    receiving a processing result generated by the processing engine, wherein the processing result relates to the portion of the decrypted data; and

    providing, over the network, the processing result to the first entity.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×