Private data sharing system
First Claim
1. A method by a data sharing system (DSS) server, which is operably connected to a data distribution network (DDN) that includes a first client of a first user, a second client of a second user and a third client of a third user, of facilitating the private sharing of data between the first, second and third client, the method comprising:
- receiving via the DDN a first obfuscated data packet (ODP) from the first client;
transmitting via the DDN the first ODP, or a copy thereof, to the second client;
transmitting via the DDN the first ODP, or a copy thereof, to the third client;
receiving via the DDN a second ODP from the second client;
transmitting via the DDN the second ODP, or a copy thereof, to the first client;
transmitting via the DDN the second ODP, or a copy thereof, to the third client;
receiving via the DDN a third ODP from the third client;
transmitting via the DDN the third ODP, or a copy thereof, to the first client;
transmitting via the DDN the third ODP, or a copy thereof, to the second client;
wherein the server lacks the “
value, method and/or program or portion of a program”
(VMP) needed to de-obfuscate the first ODP;
wherein the server lacks the VMP needed to de-obfuscate the second ODP; and
wherein the server lacks the VMP needed to de-obfuscate the third ODP.
0 Assignments
0 Petitions
Accused Products
Abstract
A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users'"'"' personal information. In this type of network, a user'"'"'s personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user'"'"'s friends/contacts within the system. This arrangement ensures that a user'"'"'s personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users'"'"' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.
-
Citations
63 Claims
-
1. A method by a data sharing system (DSS) server, which is operably connected to a data distribution network (DDN) that includes a first client of a first user, a second client of a second user and a third client of a third user, of facilitating the private sharing of data between the first, second and third client, the method comprising:
-
receiving via the DDN a first obfuscated data packet (ODP) from the first client; transmitting via the DDN the first ODP, or a copy thereof, to the second client; transmitting via the DDN the first ODP, or a copy thereof, to the third client; receiving via the DDN a second ODP from the second client; transmitting via the DDN the second ODP, or a copy thereof, to the first client; transmitting via the DDN the second ODP, or a copy thereof, to the third client; receiving via the DDN a third ODP from the third client; transmitting via the DDN the third ODP, or a copy thereof, to the first client; transmitting via the DDN the third ODP, or a copy thereof, to the second client; wherein the server lacks the “
value, method and/or program or portion of a program”
(VMP) needed to de-obfuscate the first ODP;wherein the server lacks the VMP needed to de-obfuscate the second ODP; and wherein the server lacks the VMP needed to de-obfuscate the third ODP. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
- 3. The method of claim/wherein the second ODP is an encrypted data packet.
-
24. A data sharing system (DSS) client architecture, comprising:
-
a computing device having operatively thereon a DSS client which is initialized by a first user with at least “
a data obfuscation value and/or program or portion of a program”
(DOVP);wherein the first user'"'"'s DSS client, using a DOVP of the first user, is configured to obfuscate a data file of the first user and to transmit the obfuscated data file (ODF) over a data distribution network for receipt by at least second and third DSS clients, of second and third users, respectively; wherein the second DSS client is initialized with at least a DOVP of, and by, the second user; wherein the second user'"'"'s DSS client, using a DOVP of the second user, is configured to obfuscate a data file of the second user and to transmit the ODF over a data distribution network for receipt by at least the first and third DSS clients, of the first and third users, respectively; wherein the third DSS client is initialized with at least a DOVP of, and by, the third user; wherein the third user'"'"'s DSS client, using a DOVP of the third user, is configured to obfuscate a data file of the third user and to transmit the ODF over a data distribution network for receipt by at least the first and second DSS clients, of the first and second users, respectively; wherein the DOVP of the first user is not the same as the DOVP of the second user; wherein the DOVP of the first user is not the same as the DOVP of the third user; wherein the DOVP of the second user is not the same as the DOVP of the third user; wherein the second DSS client is configured to de-obfuscate the ODF of the first user using “
a data de-obfuscation value and/or program or portion of a program”
(DDVP) which the first user, directly or indirectly, provided to the second user;wherein the third DSS client is configured to de-obfuscate the ODF of the first user using a DDVP which the first user provided, directly or indirectly, to the third user; wherein the first DSS client is configured to de-obfuscate the ODF of the second user using a DDVP which the second user, directly or indirectly, provided to the first user; wherein the third DSS client is configured to de-obfuscate the ODF of the second user using a DDVP which the second user provided, directly or indirectly, to the third user; wherein the first DSS client is configured to de-obfuscate the ODF of the third user using a DDVP which the third user, directly or indirectly, provided to the first user; and wherein the second DSS client is configured to de-obfuscate the ODF of the third user using a DDVP which the third user provided, directly or indirectly, to the second user. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A data sharing system (DSS) method by a DSS client of a first user, comprising:
-
receiving first and second obfuscated data packets from a DSS client of a second user and via a data distribution network; wherein the first and second obfuscated data packets were obfuscated using at least a first obfuscating algorithm and/or parameter of, and unique to, the second user; de-obfuscating the first and second obfuscated data packets using at least first de-obfuscating algorithm and/or parameter of the second user, complementary to the first obfuscating algorithm and/or parameter of the second user; receiving third and fourth obfuscated data packets from a DSS client of a third user and via the data distribution network; wherein the third and fourth obfuscated data packets were obfuscated using at least a second obfuscating algorithm and/or parameter of, and unique to, the third user; and de-obfuscating the third and fourth obfuscated data packets using at least a second de-obfuscating algorithm and/or parameter of the third user and unique to the third user, complementary to the second obfuscating algorithm and/or parameter of the third user. - View Dependent Claims (38, 39, 40, 41)
-
-
42. A non-transitory computer-readable storage medium with an executable program stored therein wherein the program instructs a microprocessor to perform the following steps:
-
encrypting data prior to transmission of the data to another program and/or to a data distribution network; decrypting at least some of the data received from a data distribution network using a “
decryption key and/or a decryption methodology”
determined at least in part by a user of the program and/or another user of a similar program connected to the program by the data distribution network; andsharing of data between, among and by at least three users of three different instances of the program operating on three different computing devices; wherein each user'"'"'s key used for both encryption and decryption, and/or pair of complementary encryption and decryption keys, is different from the key or keys of the other at least two users, thereby requiring each user to possess a different at least one decryption key for each other user in order to decrypt the data received from each other user. - View Dependent Claims (43, 44)
-
-
45. A data sharing system (DSS) client architecture, comprising:
-
a first computing device having operatively thereon a first DSS client which is initialized by a first user with at least a “
data obfuscation value and/or program or portion of a program”
(DOVP) of, and by, the first user;a second computing device having operatively thereon a second DSS client which is initialized by a second user with at least a DOVP of, and by, the second user; a third computing device having operatively thereon a third DSS client which is initialized by a third user with at least a DOVP of, and by, the third user; the DOVP of the first user not being the same as the DOVP of the second user; the DOVP of the first user not being the same as the DOVP of the third user; the DOVP of the second user not being the same as the DOVP of the third user; the first user'"'"'s client, using the DOVP of the first user, being configured to obfuscate a data file of the first user and to transmit the obfuscated data file (ODF) over a data distribution network for receipt by at least second and third DSS clients, of second and third users, respectively; the second client, using a DOVP of the second user, being configured to obfuscate a data file of the second user and to transmit the ODF over a data distribution network for receipt by at least the first and third DSS clients, of the first and third users, respectively; the third client, using a DOVP of the third user, being configured to obfuscate a data file of the third user and to transmit the ODF over a data distribution network for receipt by at least the first and second DSS clients, of the first and second users, respectively; the first DSS client being configured to de-obfuscate the ODF of the second user using a “
data de-obfuscation value and/or program or portion of a program”
(DDVP) which the second user, directly or indirectly, provided to the first user;the first DSS client being configured to de-obfuscate the ODF of the third user using a DDVP which the third user, directly or indirectly, provided to the first user; the second DSS client being configured to de-obfuscate the ODF, of the first user using a DDVP which the first user, directly or indirectly, provided to the second user; the second DSS client being configured to de-obfuscate the ODF of the third user using a DDVP which the third user provided, directly or indirectly, to the second user; the third DSS client being configured to de-obfuscate the ODF of the first user using a DDVP which the first user provided, directly or indirectly, to the third user; and the third DSS client being configured to de-obfuscate the ODF of the second user using a DDVP which the second user provided, directly or indirectly, to the third user. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A data sharing system (DSS) method by a DSS client of a first user, comprising:
-
receiving a first obfuscating algorithm and/or parameter (OAP) from the first user; receiving first and second obfuscated data packets; wherein the first and second obfuscated data packets were obfuscated using at least the first OAP; receiving second and third obfuscated data packets; wherein the second and third obfuscated data packets were obfuscated using at least a second OAP of, and unique to, a second user; receiving fifth and sixth obfuscated data packets; wherein the fifth and sixth obfuscated data packets were obfuscated using at least a third OAP of, and unique to, a third user; de-obfuscating the first and second obfuscated data packets using at least a first de-obfuscating algorithm and/or parameter (DeOAP) of the first user, and unique to the first user, complementary to the first OAP of the first user; de-obfuscating the third and fourth obfuscated data packets using at least a second DeOAP of the second user, and unique to the second user, complementary to the second OAP of the second user; de-obfuscating the fifth and sixth obfuscated data packets using at least a third DeOAP of the third user, and unique to the third user, complementary to the third OAP of the third user; receiving the first and second obfuscated data packets via the data distribution network; receiving the third and fourth obfuscated data packets from a DSS client of the second user and via a data distribution network; and receiving the fifth and sixth obfuscated data packets from a DSS client of the third user and via the data distribution network. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63)
-
Specification