Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
First Claim
Patent Images
1. A method comprising:
- receiving a level-one encrypted output of a surveillance device;
decrypting at least a part of the level-one encrypted output of the surveillance device with a level-one decryption key that is practicably inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device; and
transmitting a plaintext output of the surveillance device, the transmitting the plaintext output of the surveillance device in conjunction with a surveillance device identifier, and the transmitting the plaintext output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein the transmitting the plaintext output of the surveillance device in conjunction with the encrypted version of the surveillance device identifier includes;
receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by the level-one encryption entity, the name-obscuring encryption key being a different encryption key from a level-one encryption key used to encrypt the output of the surveillance device in order to generate the level-one encrypted output of the surveillance device; and
transmitting the encryption of at least the part of the version of the surveillance device identifier in conjunction with the plaintext output of the surveillance device to name de-obscuring circuitry.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and/or processes related but not limited to a machine configured to create a physical reality of receiving a level-one encrypted output of a surveillance device; a machine configured to create a physical reality of decrypting at least a part of the level-one encrypted output of the surveillance device with a level-one decryption key that is practicably inaccessible by a level-one encryption entity; and a machine configured to create a physical reality of transmitting a plaintext output of the surveillance device. Other machines/processes are also disclosed/claimed.
49 Citations
18 Claims
-
1. A method comprising:
-
receiving a level-one encrypted output of a surveillance device; decrypting at least a part of the level-one encrypted output of the surveillance device with a level-one decryption key that is practicably inaccessible by a level-one encryption entity associated with the level-one encryption of the output of the surveillance device; and transmitting a plaintext output of the surveillance device, the transmitting the plaintext output of the surveillance device in conjunction with a surveillance device identifier, and the transmitting the plaintext output of the surveillance device in conjunction with an encrypted version of the surveillance device identifier, wherein the transmitting the plaintext output of the surveillance device in conjunction with the encrypted version of the surveillance device identifier includes; receiving an encryption of at least a part of a version of the surveillance device identifier that was encrypted with a name-obscuring encryption key whose decryption key is inaccessible by the level-one encryption entity, the name-obscuring encryption key being a different encryption key from a level-one encryption key used to encrypt the output of the surveillance device in order to generate the level-one encrypted output of the surveillance device; and transmitting the encryption of at least the part of the version of the surveillance device identifier in conjunction with the plaintext output of the surveillance device to name de-obscuring circuitry. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification