US 12,287,888 B2
Data encryption method
Can Kilic, Ankara (AR); Mustafa Demiraslan, Ankara (AR); Mustafa Andac Gozukan, Ankara (AR); and Cenk Akin, Ankara (AR)
Assigned to ILG EXAM360, LLC, Jefferson City, MO (US)
Filed by ILG Exam360, LLC, Jefferson City, MO (US)
Filed on Jun. 28, 2023, as Appl. No. 18/343,020.
Claims priority of provisional application 63/391,410, filed on Jul. 22, 2022.
Prior Publication US 2024/0028749 A1, Jan. 25, 2024
Int. Cl. G06F 21/60 (2013.01); G06F 21/36 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/602 (2013.01) [G06F 21/36 (2013.01); G06F 21/6209 (2013.01)] 1 Claim
OG exemplary drawing
 
1. Data encryption method comprising the steps of:
a. at a server:
i. encrypting an original data file with an encryption key to create an encrypted data file;
ii. from the encrypted data file removing x number of data characters every y number of data characters to create an altered encrypted data file;
iii. capturing the removed data characters;
iv. sending the altered encrypted data file to a remote computer;
v. creating a QR code representing the encryption key and the removed data characters; and
vi. sending the QR code to the remote computer, and
b. at the remote computer:
i. capturing and decoding the QR code at the remote computer to recover the removed data characters and the encryption key;
ii. adding the removed data characters back into the altered encrypted data file to re-create the encrypted data file; and
iii. decrypting the encrypted data file using the recovered encryption key to re-create the original data file.