| CPC G06Q 20/3829 (2013.01) [G06Q 20/02 (2013.01); G06Q 20/3674 (2013.01)] | 10 Claims |

|
1. A method for mutual exchange of data over a distributed ledger, comprising:
creating a key for data encryption, wherein a sending party encrypts a data set using the key to create an encrypted data set;
sending the encrypted data set to a data host platform, wherein the data host platform is implemented on a distributed ledger;
generating a pointer upon receipt of the encrypted data set, wherein the pointer stores a memory of the location of the encrypted data set within the data host platform;
encrypting the key using a public key associated with a receiving party to create an encrypted key;
the data host platform receiving a request from the sending party to create at least one authorization token, wherein the at least one authorization token is created, wherein the at least one authorization token includes the encrypted key, the pointer, and a unique token address for association with the at least one authorization token;
the data host platform transferring the at least one authorization token from a wallet address associated with the sending party to a wallet address associated with the receiving party upon receiving a request to transfer the at least one authorization token from the sending party;
the data host platform receiving a decrypted key from the receiving party, wherein the receiving party decrypts the encrypted key using the private key associated with the public address to create the decrypted key and access the pointer;
the data host platform receiving the pointer of the at least one authorization token indicating the location of encrypted data set from the receiving party, wherein the data host platform further encrypts the encrypted data set using the public key of the receiving party to create a twice encrypted data set;
the data host platform sending the twice encrypted data set to the receiving party, wherein the receiving party decrypts the twice encrypted data set using a private key associated with the receiving party to access the encrypted key and the encrypted data set;
the receiving party decrypting the encrypted key to access the key;
decrypting the encrypted data set using the key, wherein the receiving party is able to view the data set upon decryption.
|