×

Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database

  • US 10,812,457 B1
  • Filed: 05/16/2019
  • Issued: 10/20/2020
  • Est. Priority Date: 06/13/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a first computing device and from a plurality of sensors, sensor data;

    validating, by the first computing device and based on types of the plurality of sensors, a source of the sensor data;

    processing, by the first computing device, the sensor data to generate processed data, wherein the processing comprises generating a textual description indicating that the source of the sensor data is validated;

    generating, by the first computing device, first encrypted data by encrypting the processed data by a first encryption key associated with the first computing device, wherein the first encrypted data indicates a driving score associated with a user;

    transmitting, by the first computing device and to an intermediary database, the first encrypted data;

    receiving, by the first computing device, via the intermediary database, and from a second computing device, a selection of the first encrypted data and indication of exchange data exchanging for the first encrypted data, wherein the exchange data comprises an insurance discount;

    based on an indication of accepting the exchange data, receiving, by the first computing device and from the intermediary database, the first encrypted data;

    decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data;

    encrypting, by the first computing device and using a second encryption key associated with the second computing device, the decrypted data to generate second encrypted data; and

    transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×