Cryptographically protecting data transferred between spatially distributed computing devices using an intermediary database
First Claim
1. A method comprising:
- receiving, by a first computing device and from a plurality of sensors, sensor data;
validating, by the first computing device and based on types of the plurality of sensors, a source of the sensor data;
processing, by the first computing device, the sensor data to generate processed data, wherein the processing comprises generating a textual description indicating that the source of the sensor data is validated;
generating, by the first computing device, first encrypted data by encrypting the processed data by a first encryption key associated with the first computing device, wherein the first encrypted data indicates a driving score associated with a user;
transmitting, by the first computing device and to an intermediary database, the first encrypted data;
receiving, by the first computing device, via the intermediary database, and from a second computing device, a selection of the first encrypted data and indication of exchange data exchanging for the first encrypted data, wherein the exchange data comprises an insurance discount;
based on an indication of accepting the exchange data, receiving, by the first computing device and from the intermediary database, the first encrypted data;
decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data;
encrypting, by the first computing device and using a second encryption key associated with the second computing device, the decrypted data to generate second encrypted data; and
transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the disclosure relate to a system and method for cryptographically protecting data transferred between spatially distributed computing devices. An intermediary database may be used to facilitate the protected data transfer and/or record the data transfers. A first computing device may transfer, to the intermediary database, encrypted data that may be securely transferred to other computing devices. A second computing device may generate a GUI used to view data available from the intermediary database. Once data is selected by the second device, the second device may transfer a key (or other encryption mechanism) to the first device. The first computing device may encrypt the data using the received key and transmit the encrypted data to the intermediary database. The intermediary database may transmit the encrypted data to the second computing device, and the second computing device may decrypt and use the data.
108 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a first computing device and from a plurality of sensors, sensor data; validating, by the first computing device and based on types of the plurality of sensors, a source of the sensor data; processing, by the first computing device, the sensor data to generate processed data, wherein the processing comprises generating a textual description indicating that the source of the sensor data is validated; generating, by the first computing device, first encrypted data by encrypting the processed data by a first encryption key associated with the first computing device, wherein the first encrypted data indicates a driving score associated with a user; transmitting, by the first computing device and to an intermediary database, the first encrypted data; receiving, by the first computing device, via the intermediary database, and from a second computing device, a selection of the first encrypted data and indication of exchange data exchanging for the first encrypted data, wherein the exchange data comprises an insurance discount; based on an indication of accepting the exchange data, receiving, by the first computing device and from the intermediary database, the first encrypted data; decrypting, by the first computing device and using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; encrypting, by the first computing device and using a second encryption key associated with the second computing device, the decrypted data to generate second encrypted data; and transmitting, by the first computing device, via the intermediary database, and to the second computing device, the second encrypted data for the second computing device to decrypt and use. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a processor; and memory storing computer-executable instructions that, when executed by the processor, cause the apparatus to; receive, from a plurality of sensors, sensor data; validate, based on types of the plurality of sensors, a source of the sensor data; process the sensor data to generate processed data, wherein the processing comprises generating a textual description indicating that the source of the sensor data is validated; generate first encrypted data by encrypting the processed data by a first encryption key associated with the apparatus, wherein the first encrypted data indicates a driving score associated with a user; transmit, to an intermediary database, the first encrypted data; receive, via the intermediary database and from a second apparatus, a selection of the first encrypted data and indication of exchange data exchanging for the first encrypted data, wherein the exchange data comprises an insurance discount; based on an indication of accepting the exchange data, receive, from the intermediary database, the first encrypted data; decrypt, using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; encrypt, using a second encryption key associated with the second apparatus, the decrypted data to generate second encrypted data; and transmit, via the intermediary database and to the second apparatus, the second encrypted data for the second apparatus to decrypt and use. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing instructions that, when read by a computing device, cause the computing device to:
-
receive, from a plurality of sensors, sensor data; validate, based on types of the plurality of sensors, a source of the sensor data; process the sensor data to generate processed data, wherein the processing comprises generating a textual description indicating that the source of the sensor data is validated; generate first encrypted data by encrypting the processed data by a first encryption key associated with the computing device, wherein the first encrypted data indicates a driving score associated with a user; transmit, to an intermediary database, the first encrypted data; receive, via the intermediary database and from a second computing device, a selection of the first encrypted data and indication of exchange data exchanging for the first encrypted data, wherein the exchange data comprises an insurance discount; based on an indication of accepting the exchange data, receive, from the intermediary database, the first encrypted data; decrypt, using the first encryption key, the first encrypted data received from the intermediary database to generate decrypted data; encrypt, using a second encryption key associated with the second computing device, the decrypted data to generate second encrypted data; and transmit, via the intermediary database and to the second computing device, the second encrypted data for the second computing device to decrypt and use. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification