Computational systems and methods for encrypting data for anonymous storage
First Claim
Patent Images
1. A system comprising:
- circuitry for accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption;
circuitry for encrypting the at least one instance of data to produce level-one-encrypted data, the circuitry for encrypting configured to perform the encrypting of the at least one instance of data at least partly with a level-one asymmetric encryption key;
circuitry for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and
circuitry for transmitting the level-one-encrypted data and associated encrypted identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.
-
Citations
22 Claims
-
1. A system comprising:
-
circuitry for accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; circuitry for encrypting the at least one instance of data to produce level-one-encrypted data, the circuitry for encrypting configured to perform the encrypting of the at least one instance of data at least partly with a level-one asymmetric encryption key; circuitry for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and circuitry for transmitting the level-one-encrypted data and associated encrypted identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 20, 21, 22)
-
-
14. A computer-implemented method comprising:
-
accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data, the encrypting being performed on the at least one instance of data at least partly with a level-one asymmetric encryption key; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and transmitting the level-one-encrypted data and associated encrypted identifier; and wherein at least one of the accepting, the encrypting, the associating, or the transmitting is performed at least partly with one or more processing devices.
-
-
15. A computer program product comprising:
-
an article of manufacture including a non-transitory signal-bearing medium bearing; (1) one or more instructions for accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; (2) one or more instructions for encrypting the at least one instance of data to produce level-one-encrypted data, the one or more instructions for encrypting configured to perform the encrypting of the at least one instance of data at least partly with a level-one asymmetric encryption key; (3) one or more instructions for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and (4) one or more instructions for transmitting the level-one-encrypted data and associated encrypted identifier. - View Dependent Claims (16)
-
-
17. A system comprising:
-
a computing device; and
instructions that when executed on the computing device cause the computing device to;(1) accept from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; (2) encrypt the at least one instance of data to produce level-one-encrypted data, the encrypting of the at least one instance of data being at least partly performed with a level-one asymmetric encryption key; (3) associate the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and (4) transmit the level-one-encrypted data and associated encrypted identifier. - View Dependent Claims (18)
-
-
19. A system comprising:
-
means for accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; means for encrypting the at least one instance of data to produce level-one-encrypted data, the means for encrypting configured to perform the encrypting of the at least one instance of data at least partly with a level-one asymmetric encryption key; means for associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity, and wherein the level-one decryption key is an asymmetric decryption key that is not the same key as the level-one asymmetric encryption key; and means for transmitting the level-one-encrypted data and associated encrypted identifier.
-
Specification