US 12,363,083 B2
System and method for use of filters within a cryptographic process
Robert Coleridge, Bellingham, WA (US); Richard Blech, Irvine, CA (US); and Michael Feinberg, Newport Beach, CA (US)
Assigned to CHOL, Inc., Irvine, CA (US)
Filed by CHOL, Inc., Irvine, CA (US)
Filed on Sep. 15, 2023, as Appl. No. 18/468,484.
Application 18/468,484 is a continuation of application No. 17/456,721, filed on Nov. 29, 2021, granted, now 11,765,147.
Application 17/456,721 is a continuation of application No. 16/245,185, filed on Jan. 10, 2019, granted, now 11,190,498, issued on Nov. 30, 2021.
Claims priority of provisional application 62/616,318, filed on Jan. 11, 2018.
Prior Publication US 2024/0267365 A1, Aug. 8, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/16 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0478 (2013.01) [H04L 9/065 (2013.01); H04L 9/16 (2013.01); H04L 63/0457 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A system comprising:
computer-readable memory storing executable instructions; and
one or more processors in communication with the computer-readable memory and programmed by the executable instructions to:
receive plaintext data to be encrypted prior to being provided to individual data accessors of a set of data accessors, the plaintext data comprising a plurality of data portions including a first data portion to be accessible by a first subset of data accessors, a second data portion to be accessible by a second subset of data accessors, and a base data portion to be accessible by the set of data accessors;
obtain a plurality of keys, wherein a first key of the plurality of keys is associated with the first data portion, a second key of the plurality of keys is associated with the second data portion, and a base key of the plurality of keys is associated with the base data portion;
encrypt the first data portion using the first key, the second data portion using the second key, and the base data portion using the base key to generate a plurality of encrypted data portions;
generate a distribution key using the base key and the first key, wherein a data accessor in the first subset of data accessors is enabled to use the distribution key to decrypt a first encrypted data portion of the plurality of encrypted data portions to access the first data portion, and decrypt a base encrypted data portion of the plurality of encrypted data portions to access the base data portion; and
merge the plurality of encrypted data portions to generate a single data stream.