Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
First Claim
Patent Images
1. A system comprising:
- circuitry configured to receive doubly-encrypted data via one or more communication networks from a repository;
circuitry configured to interface with circuitry configured to generate a level two key pair, the level two key pair including at least a level two decryption key for decrypting the doubly-encrypted data and a corresponding and separate level two encryption key that was used by circuitry configured to perform level-two encryption to perform a level two encryption of level one encrypted data to create the doubly-encrypted data;
circuitry configured to identify the level two decryption key of the two key pair at least in part by selecting the level two decryption key from a plurality of decryption keys that correspond to one or more other level two two-key pairs;
circuitry configured to perform level two decryption of doubly-encrypted data at least in part with the level two decryption key to form singly encrypted data, wherein the circuitry configured to perform level two decryption of doubly-encrypted data is located on one or more computing devices that do not include the repository; and
circuitry configured to interface with circuitry configured to perform level one decryption of the singly encrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-two encrypted output of a surveillance device; decrypting at least a part of the level-two encrypted output of the surveillance device with a level-two decryption key that is practicably inaccessible by a level-two encryption entity; and transmitting a level-one encrypted output of the surveillance device.
65 Citations
22 Claims
-
1. A system comprising:
-
circuitry configured to receive doubly-encrypted data via one or more communication networks from a repository; circuitry configured to interface with circuitry configured to generate a level two key pair, the level two key pair including at least a level two decryption key for decrypting the doubly-encrypted data and a corresponding and separate level two encryption key that was used by circuitry configured to perform level-two encryption to perform a level two encryption of level one encrypted data to create the doubly-encrypted data; circuitry configured to identify the level two decryption key of the two key pair at least in part by selecting the level two decryption key from a plurality of decryption keys that correspond to one or more other level two two-key pairs; circuitry configured to perform level two decryption of doubly-encrypted data at least in part with the level two decryption key to form singly encrypted data, wherein the circuitry configured to perform level two decryption of doubly-encrypted data is located on one or more computing devices that do not include the repository; and circuitry configured to interface with circuitry configured to perform level one decryption of the singly encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
circuitry configured to receive via one or more communication networks from a repository level-two encrypted sensor data that is the result of a level-two blind encryption process performed on level-one encrypted sensor data, said level-two blind encryption process being a one-way automated process, wherein the level-two blind encryption process is a level-two encryption in which a level-two decryption key for performing a level-two decryption of the level-two encrypted sensor data to produce level-one encrypted sensor data is inaccessible to circuitry configured to perform the level-two blind encryption process; and circuitry configured to apply a decryption key appropriate to perform a level-two decryption of the level-two encrypted sensor data to produce level-one encrypted sensor data, wherein the circuitry configured to apply a decryption key is at least partly located on one or more computing devices that do not include the repository, including at least; circuitry configured to determine the decryption key appropriate to perform the level-two decryption of the level-two encrypted sensor data at least in part by selecting a decryption key associated with a key pair from a plurality of decryption keys that correspond to one or more other key pairs. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computationally-implemented method comprising:
-
receiving via one or more communication networks from a repository level-two encrypted sensor data that is the result of a level-two blind encryption process performed on level-one encrypted sensor data said level-two blind encryption process being a one-way automated process, wherein the level-two blind encryption process is a level-two encryption in which a level-two decryption key for performing a level-two decryption of the the level-two encrypted sensor data to produce level-one encrypted sensor data was inaccessible to a circuitry that performed the level-two blind encryption process; and applying a decryption key appropriate to perform a level-two decryption of the level-two encrypted sensor data to produce level-one encrypted sensor data, wherein the applying a decryption key is performed with one or more computing devices that do not include the repository, including at least; determining the decryption key appropriate to perform the level-two decryption at least in part by selecting a decryption key associated with a key pair at least in part by selecting the decryption key from a plurality of decryption keys that correspond to one or more other key pairs; and wherein at least one of the receiving or the applying is performed at least in part with one or more processing devices. - View Dependent Claims (22)
-
Specification