发明名称 End-To-End Encryption Method for Digital Data Sharing Through a Third Party
摘要 An end-to-end encryption method is provided for encrypting Digital Data to be made available by a Data Owner to a Data Assignee at some future point in time. The Data Owner shares the coordinates of the Data Assignee and an invitation associated the Data Assignee with a 3rd party. The Data Owner subsequently generates a Secret and encrypts the Digital Data with the Secret. The Secret is then encrypted by Data Owner with the Data Assignee's Public Key, and securely transmitted along with the encrypted Digital Data Set to the 3rd party. The Data Assignee can then obtain the encrypted Digital Data Set and the encrypted Secret from the 3rd party, decrypt the Secret with the Data Assignee Private Key and subsequently decrypt the Digital Data Set with the Secret. All secrets are maintained in a non-discoverable fashion and access to secret information can be rendered securely on multiple systems.
申请公布号 US2015256336(A1) 申请公布日期 2015.09.10
申请号 US201314430820 申请日期 2013.05.17
申请人 PASSWORDBOX INC. 发明人 Stiglic Anton;Robichaud Daniel;Ross Marc-Antoine;Cormier Alexandre;Bruno Richard
分类号 H04L9/08 主分类号 H04L9/08
代理机构 代理人
主权项 1. A method of creating a symmetric encryption key and a strong key by a data owner on a first user system for sending to a third party; the method comprising the steps of: creating at least one symmetric encryption key, the symmetric encryption key associated with a respective at least one data assignee; generating a data owner public key and a data owner private key; receiving at least one data assignee public key associated with each respective at least one data assignee; encrypting the at least one symmetric encryption key with the respective at least one data assignee public key; sending at least one encrypted symmetric encryption key encrypted with at least one data assignee public key to the third party; deriving a strong key based on a master password and a set of algorithms, the master password known solely to the data owner and the set of algorithms provided solely by the third party; encrypting each at least one symmetric encryption key and a data owner private key with the strong key using a symmetric algorithm; generating a symmetric encryption set, the symmetric encryption set including each encrypted at least one symmetric encryption key and the data owner private key; sending the symmetric encryption set to the third party; and rendering at least one of the master password, the at least one symmetric encryption key, the strong key and the data owner private key non-discoverable on the first user system.
地址 Bromont CA