Differential client-side encryption of information originating from a client
First Claim
1. A method comprising:
- providing, by a service provider computing device, a public key to an entity computing device, wherein the service provider computing device maintains a private key paired to the public key and the public key is associated with the entity computing device, wherein the entity computing device provides, for access by a client computing device, an interactive program configured to enable a processor of the client computing device to encrypt data using the public key;
receiving, by the service provider computing device, encrypted data from the entity computing device across a first network, wherein the processor of the client computing device encrypted the encrypted data using the public key, wherein the service provider computing device determines the private key that is paired to the public key and decrypts the encrypted data using the private key, and the entity computing device lacks access to the unencrypted data and the private key; and
forwarding, by the service provider computing device, to the entity computing device, a processing result related to the decryption of the encrypted data.
3 Assignments
0 Petitions
Accused Products
Abstract
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.
21 Citations
6 Claims
-
1. A method comprising:
-
providing, by a service provider computing device, a public key to an entity computing device, wherein the service provider computing device maintains a private key paired to the public key and the public key is associated with the entity computing device, wherein the entity computing device provides, for access by a client computing device, an interactive program configured to enable a processor of the client computing device to encrypt data using the public key; receiving, by the service provider computing device, encrypted data from the entity computing device across a first network, wherein the processor of the client computing device encrypted the encrypted data using the public key, wherein the service provider computing device determines the private key that is paired to the public key and decrypts the encrypted data using the private key, and the entity computing device lacks access to the unencrypted data and the private key; and forwarding, by the service provider computing device, to the entity computing device, a processing result related to the decryption of the encrypted data. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification