Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box
First Claim
Patent Images
1. A method comprising:
- receiving a level-one encrypted output of a surveillance device;
encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity associated with the encryption of the at least a part of the level-one encrypted output of the surveillance device; and
transmitting a level-two encrypted output of the surveillance device, wherein transmitting a level-two encrypted output of the surveillance device comprises;
transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device, wherein transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device comprises;
transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier comprises;
receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device, the name-obscuring encryption key being a different encryption key from an encryption key used to generate the level-one encrypted output of the surveillance device; and
transmitting an encrypted version of the surveillance device identifier to a pre-event repository.
1 Assignment
0 Petitions
Accused Products
Abstract
Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device.
-
Citations
35 Claims
-
1. A method comprising:
-
receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity associated with the encryption of the at least a part of the level-one encrypted output of the surveillance device; and transmitting a level-two encrypted output of the surveillance device, wherein transmitting a level-two encrypted output of the surveillance device comprises; transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device, wherein transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device comprises; transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier comprises; receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device, the name-obscuring encryption key being a different encryption key from an encryption key used to generate the level-one encrypted output of the surveillance device; and transmitting an encrypted version of the surveillance device identifier to a pre-event repository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
circuitry for a machine configured to create a physical reality of receiving a level-one encrypted output of a surveillance device; circuitry for a machine configured to create a physical reality of encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity associated with the encryption of the at least a part of the level-one encrypted output of the surveillance device; and circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device, wherein circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device comprises; circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device, wherein circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device comprises; circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein circuitry for a machine configured to create a physical reality of transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier comprises; circuitry for a machine configured to create a physical reality of receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device, the name-obscuring encryption key being a different encryption key from an encryption key used to generate the level-one encrypted output of the surveillance device; and circuitry for a machine configured to create a physical reality of transmitting an encrypted version of the surveillance device identifier to a pre-event repository. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system comprising:
-
means for receiving a level-one encrypted output of a surveillance device; means for encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity associated with the encryption of the at least a part of the level-one encrypted output of the surveillance device; and means for transmitting a level-two encrypted output of the surveillance device, wherein means for transmitting a level-two encrypted output of the surveillance device comprises; means for transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device, wherein means for transmitting a level-two encrypted output of the surveillance device in conjunction with a surveillance device identifier that identifies the surveillance device comprises; means for transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein means for transmitting a level-two encrypted output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier comprises; means for receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device, the name-obscuring encryption key being a different encryption key from an encryption key used to generate the level-one encrypted output of the surveillance device; and means for transmitting an encrypted version of the surveillance device identifier to a pre-event repository.
-
Specification