Differential client-side encryption of information originating from a client
First Claim
1. A method, comprising:
- transmitting, by an entity computing device to a client computing device, an encryption subprogram comprising computer-executable instructions operable to cause the client to perform specified encryption operations on particular data;
receiving, by the entity computing device from the client computing device, encrypted data that was encrypted by the client computing device, via the encryption subprogram, using a public key that was provided to the client device by an intermediary computing device, and wherein the encrypted data is associated with the entity computing device;
forwarding, by the entity computing device to the intermediary device, the encrypted data for decryption using a private key that is paired with the public key and that is controlled by the intermediary device such that the private key is inaccessible to the entity computing device at the time of forwarding, wherein the decryption provides decrypted data that is used to obtain a processing result; and
receiving, by the entity computing device from the intermediary device, the processing result.
3 Assignments
0 Petitions
Accused Products
Abstract
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms. Each respective encryption algorithm may be configured to encrypt data using at least one public key. Each respective decryption algorithm may be configured to decrypt data using at least one private key. The method may include receiving encrypted data, where the encrypted data is encrypted using a first public key and a first encryption algorithm, and the encrypted data is provided over a network.
-
Citations
20 Claims
-
1. A method, comprising:
-
transmitting, by an entity computing device to a client computing device, an encryption subprogram comprising computer-executable instructions operable to cause the client to perform specified encryption operations on particular data; receiving, by the entity computing device from the client computing device, encrypted data that was encrypted by the client computing device, via the encryption subprogram, using a public key that was provided to the client device by an intermediary computing device, and wherein the encrypted data is associated with the entity computing device; forwarding, by the entity computing device to the intermediary device, the encrypted data for decryption using a private key that is paired with the public key and that is controlled by the intermediary device such that the private key is inaccessible to the entity computing device at the time of forwarding, wherein the decryption provides decrypted data that is used to obtain a processing result; and receiving, by the entity computing device from the intermediary device, the processing result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium having stored thereon instructions that are executable by an entity computing device to cause the entity computing device to perform operations comprising:
-
transmitting, to a client computing device, an encryption subprogram, the encryption subprogram including stored logic executable to cause encryption of particular data in association with entry of the particular data into a data submission element displayed on an internet-enabled application; receiving, from the client computing device, encrypted data that was encrypted by the client computing device, via the encryption subprogram, using a public key that was provided to the client device; and forwarding, to an intermediary device, the encrypted data for decryption using a private key that is paired with the public key and that is not accessible to the entity computing device at the time of forwarding, wherein the decryption provides decrypted data that is used to obtain a processing result. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a processor; and a storage device having instructions stored thereon that are executable by the system to cause the system to perform operations comprising; transmitting, to a client computing device, an encryption subprogram comprising computer-executable instructions operable to cause the client to perforin specified encryption operations on particular data; receiving, from the client computing device, encrypted data that was encrypted by the client computing device, via the encryption subprogram, using a public key that was provided to the client device by an intermediary computing device, and wherein the encrypted data is associated with an entity computing device; forwarding, to the intermediary device, the encrypted data for decryption using a private key that is paired with the public key and that is controlled by the intermediary device such that the private key is inaccessible to the entity computing device at the time of forwarding, wherein the decryption provides decrypted data that is used to obtain a processing result; and receiving, from the intermediary device, the processing result. - View Dependent Claims (19, 20)
-
Specification