METHOD AND SYSTEM TO ENSURE THAT ALL PARTICIPANTS IN THE GENERATION OF A PROTECTED DATA SET OR DATA STREAM THROUGH ENCRYPTION ARE REQUIRED TO PROVIDE THEIR PERMISSION FOR THE DATA TO BE RETRIEVED THROUGH DECRYPTION
20210367933 · 2021-11-25
Inventors
Cpc classification
H04L63/0478
ELECTRICITY
International classification
Abstract
The present invention comprises a system that will ensure the privacy of multiple participants being recorded during an activity that is considered to be confidential due to legal, professional, and/or other concerns. Video, audio, telemetry, and other information is encrypted using identifying credentials, such as identifying physical devices, knowledge of specific codes or information, and/or biologically originated identifiers, from all parties in a manner such that all, or a pre-determined specific subset, of the parties must provide the original credentials in order to decrypt the encrypted information. This system assures that no individual can access the encrypted information without the active participation of the required other members who provided encryption credentials.
Claims
1. A method of protecting confidential or sensitive information such that no party external to the creation of said information, nor single party participating in the creation of said information, or unauthorized subset of parties participating in the creation of the said information, can access the information without the participation of all of the other parties, or an authorized subset of the other parties, comprising; collection of one or more uniquely identifying pieces of information from each party; the combining and processing of all collected identifying information into a single encryption key or set of encryption keys; the creation of an encrypted representation or multiple encryption representations of said information.
2. The method of claim 1 wherein the information is of the nature that must be held in confidence due to requirements of law, professional standards, patient/client confidentiality, corporate security, and/or privacy concerns.
3. The method of claim 1 wherein the information is of the nature to protect one or more of the participants from false accusations, claims, etc. of impropriety, unprofessional behavior, illegal activity, etc., or to support accurate accusations, claims, etc. of impropriety, unprofessional behavior, illegal activity, etc.
4. The method of claim 1 wherein the information itself is desired to be held in confidence as opposed to the information's being used to provide physical access to a secure facility, location, and/or materials, such as the authorization to unlock secure storage, to activate the operation of system or device, or to provide the ability to enter a physical location.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] A clear understanding of the key features of the invention summarized above may be had by reference to the appended drawings, which illustrate the method and system of the invention, although it will be understood that such drawings depict preferred embodiments of the invention and, therefore, are not to be considered as limiting its scope with regard to other embodiments which the invention is capable of contemplating. Accordingly:
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
DETAILED DESCRIPTION OF THE INVENTION
[0016] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well as the singular forms, unless the context clearly indicates otherwise.
[0017] It will be further understood that the terms “comprise” and/or “comprising,” when used in this specification, specify the presence of stated features, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
[0018] Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one having an ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
[0019] In describing the invention, it will be understood that a number of techniques and steps are disclosed. Each of these has individual benefit and each can also be used in conjunction with one or more, or in some cases all, of the other disclosed techniques. Accordingly, for the sake of clarity, this description will refrain from repeating every possible combination of the individual steps in an unnecessary fashion. Nevertheless, the specification and claims should be read with the understanding that such combinations are entirely within the scope of the invention and the claims. While the present invention has been described in terms of particular embodiments and applications, in both summarized and detailed forms, it is not intended that these descriptions in any way limit its scope to any such embodiments and applications, and it will be understood that many substitutions, changes and variations in the described embodiments, applications and details of the method and system illustrated herein and of their operation can be made by those skilled in the art without departing from the spirit of this invention.
[0020] The terms “data” and “information” are used herein, and their meaning outside of this patent can often result in them being used interchangeably and/or as synonyms. In this patent the meaning of these terms will be separated to indicate different aspects of their definitions. The terms “data”, “data stream”, and “data set”, are defined in this patent to refer to binary patterns collected during the session involving the participants that is to be protected by the methods and systems of this invention. The term “information” is defined as referring to characteristics of the participants that can be represented in, and/or distilled down to, binary patterns that can be interjected into the mathematic and/or cryptographic algorithms, processes, equations, etc. to be used as a key for the encryption and decryption steps that are used to implement the protection and retrieval of the data stream and/or data set. Put simply, “information” is obtained from the participants to allow the methods and systems defined in this patent to protect and retrieve “data” from the session involving the participants.
[0021] The term “data steam” is further defined to indicate data that is in the process of flowing through or being transported by the methods and systems described in this invention. While flowing through or being transported by this invention, the data in the data stream may be stored and/or cached as a step in the transport of said data.
[0022] The term “data set” is further defined to indicate data that is primarily contained in storage. Such data sets can be used as the input or output of the methods and systems described in this invention.
[0023] The term “data”, when used alone, can refer to either or both data streams and/or data sets.
[0024] The term “encryption” is used herein, and is understood to mean any mathematic, cryptographic, computational, or other means to render a data stream and/or data set in any form to be unintelligible after the afore mentioned means has acted upon the data. This applies to all means currently known and means in the future that will supersede current means.
[0025] The term “decryption” is used herein, and is understood to mean any mathematic, cryptographic, computational, or other means to recover information in any form that was made to be to be unintelligible by the means described in the above paragraph. This applies to all means currently known and means in the future that will supersede current means.
[0026] It should be noted that the examples in this patent application imply the use of symmetric encryption and decryption for simplicity and clarity when describing the overall operation of this invention. Symmetric encryption and decryption are well known methods that use the same key for encryption as is used for decryption. This invention can use these methods, but it can also use asymmetric encryption and decryption that uses mathematically related but different keys for the encryption and decryption processes. All such encryption/decryption methods, as well as any others known and/or unknown are understood to be covered by this invention.
[0027] The terms “protect/protected/protection” are used herein, and is understood to mean data that is encrypted using the method and system described in this patent such that the required participation of multiple parties is necessary, which transcends the mere encryption of the information by commonly understood means.
[0028] The terms “retrieve/retrieved/retrieval” are used herein, and is understood to mean data that is decrypted using the method and system described in this patent such that the required participation of multiple parties is necessary, which transcends the mere decryption of the data by commonly understood means.
[0029] The term “participant” is used herein, and is understood to mean an individual that contributes to the protection and retrieval of data that is intended to be protected by the methods and systems embodied in this patent by providing information that is unique to that individual. Such information can be embodied in knowledge held by the individual, biological details of the individual, and/or physical devices in possession of, or provided by, the individual.
[0030] The term “credentials” is used herein, and is understood to mean the resulting amalgamation of uniquely identifying information from a participant that, when taken as a whole, can be used in the mathematic, cryptographic, and/or computational process that results in the protection and/or retrieval of the data stream.
[0031] In describing the invention, it will be understood that a number of techniques and steps are disclosed. Each of these has individual benefit and each can also be used in conjunction with one or more, or in some cases all, of the other disclosed techniques. Accordingly, for the sake of clarity, this description will refrain from repeating every possible combination of the individual steps in an unnecessary fashion. Nevertheless, the specification and claims should be read with the understanding that such combinations are entirely within the scope of the invention and the claims.
[0032] A new method and system to ensure that all participants in the generation of a protected data set or data stream through encryption are required to provide their permission for the data to be retrieved through decryption is discussed herein. In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of the present invention. It will be evident, however, to one skilled in the art that the present invention may be practiced without these specific details.
[0033] The present disclosure is to be considered as an exemplification of the invention, and is not intended to limit the invention to the specific embodiments illustrated by the figures or description below.
[0034] The present invention will now be described by referencing the appended figures representing preferred embodiments.
[0035]
[0036] Some of these methods produce the information that will contribute to the creation of the encryption key “in the clear” or “open”, meaning that the information contributed is not encrypted or hidden prior to its use. Examples would be a PIN, password, and biometric information. Other information used to create the key can be hidden behind a device where it is impossible to obtain the actual numeric source, such as a chip card, RFID device, etc. In this case a numeric challenge is provided to the device and the device produces a value that results from the mathematical combination of the challenge and the hidden value within the device. The numerical challenge is stored with the encrypted data stream and is presented to the device at the time of decryption to obtain the value that contributes to the decryption key. This invention includes all methods of providing a value to contribute to the generation of the encryption/decryption key, including methods that have the value in the “open” as well as hidden values.
[0037] This list is representative and not exhaustive. It is understood that other methods of allowing participants to uniquely identify themselves using known, unknown, and yet to be discovered and/or invented methods, processes, procedures, and/or objects are within the scope of this invention.
[0038]
[0039] In addition to the different potential contributions shown in
[0040] The initial background section of this patent put forth scenarios that involved two participants, namely a doctor and a patient. However, it is understood that this method and system can be implemented to involve any arbitrary number of participants. In addition, the particular collection of participants can be grouped into sets such that complex combinations of participants can protect and/or retrieve the information. An example of such complex combination would be if four participants, named A, B, C, & D contributed to the protection of the information, then a system could be implemented such that data could be retrieved by the actions of participant A and participant B as well as either participant C or participant D. A more illustrative example would be the protection of a patient examination that is protected using the credentials of a doctor, a nurse, and the patient. A potential implementation of the methods and systems in this invention could allow the protected information to be retrieved by the doctor and the patient, or the nurse and the patient, but not the doctor and the nurse without the patient.
[0041]
[0042] As mentioned in the text in
[0043]
[0044] In the examples shown in
[0045]
[0046] In addition to the likely inclusion of audio and video in the protected data, additional data sources can be included. Included patient monitoring results can be protected, such as, but not limited to, respiration, EKG, EEG, blood pressure, blood oxygen, etc. In addition, data about the state of medical equipment, including, but not limited to, systems such as anesthesia dispensing, oxygen supply, etc. can be added to the protected stream. Such information can be used to assess the lucidity of the patient should testimony be offered concerning a particular time during the session.
[0047] Data sources that are not medically specific, such as, but not limited to remote data sources, teleconferencing, document scans, computer displays, etc., can add depth to any examination of the state of the session and the behavior of the participants.
[0048]
[0049] The protected data set 506 can reside locally, remotely, or both. It can also be stored locally until it is transferred to a remote location or locations.
[0050]