Computational systems and methods for anonymized storage of double-encrypted data
First Claim
Patent Images
1. A system comprising:
- circuitry for receiving level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys;
circuitry for storing the level-two encrypted data and at least one associated hash; and
circuitry for transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
193 Citations
26 Claims
-
1. A system comprising:
-
circuitry for receiving level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys; circuitry for storing the level-two encrypted data and at least one associated hash; and circuitry for transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method comprising:
-
receiving level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash; and wherein at least one of the receiving, the storing, or the transmitting is performed at least in part with one or more processing devices. - View Dependent Claims (17, 18, 19)
-
-
20. A computer program product comprising:
-
an article of manufacture including a non-transitory signal-bearing medium bearing; (1) one or more instructions for receiving level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys; (2) one or more instructions for storing the level-two encrypted data and at least one associated hash; and (3) one or more instructions for transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. - View Dependent Claims (21, 22, 23)
-
-
24. A system comprising:
-
a computing device; and
instructions that when executed on the computing device cause the computing device to;(1) receive level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys; (2) store the level-two encrypted data and at least one associated hash; and (3) transmit the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. - View Dependent Claims (25)
-
-
26. A system comprising:
-
means for receiving level-two encrypted data and at least one associated hash that is associated with at least one of one or more cryptographic keys associated with at least the level-two encrypted data or one or more identifiers associated with the one or more cryptographic keys; means for storing the level-two encrypted data and at least one associated hash; means for transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
-
Specification