Private Data Sharing System

Patent No. US11134050 (titled "Private Data Sharing System") was filed by Brian Moffat Private Data Llc on Feb 6, 2020.

What is this patent about?

’050 is related to the field of secure data sharing systems , specifically addressing the need for enhanced privacy and security in online social networks and other data sharing platforms. Traditional systems often store user data in a way that allows the hosting service or malicious actors to access and exploit it, leading to privacy concerns and potential security breaches. The patent aims to overcome these limitations by ensuring that user data remains encrypted and accessible only to the user and their designated contacts.

The underlying idea behind ’050 is to create a data sharing system where user data is encrypted on the user's device before being transmitted to a central server. The decryption key remains solely in the possession of the user and their trusted contacts , preventing the server or any unauthorized party from accessing the unencrypted data. This is achieved through a novel architecture that facilitates the secure exchange of encryption keys between users, ensuring that only authorized individuals can decrypt and view the shared information.

The claims of ’050 focus on a method for data exchange between multiple computing devices, involving a third-party server that receives, stores, and transmits encrypted data. The independent claims cover the process of generating encryption and decryption keys, encrypting data files, and securely sharing them with selected users. The key aspect is that the server itself does not have the ability to decrypt the data , as the decryption keys are exchanged directly between the users' devices.

In practice, the invention relies on a client-side encryption/decryption module that handles the encryption and decryption processes. When a user wants to share a file, the module encrypts it using a generated encryption key. This key is then encrypted separately for each intended recipient using their respective public keys. The server stores and forwards these encrypted components, but it cannot access the original data. The recipients use their private keys to decrypt the file's decryption key, and then use that key to decrypt the file itself.

’050 differentiates itself from prior approaches by placing the control of data privacy firmly in the hands of the users. Unlike traditional systems where the service provider has access to user data, this invention ensures that only the user and their contacts can access the information. This is achieved through end-to-end encryption and a secure key exchange mechanism, making it more difficult for hackers or unscrupulous service providers to exploit user data. The system also allows for the dynamic management of access rights, enabling users to revoke access to their data at any time.

How does this patent fit in bigger picture?

Technical landscape at the time

In the early 2010s when ’050 was filed, online social networks were prevalent, and users commonly relied on centralized servers for data storage and sharing. At a time when security concerns were growing, systems typically relied on username/password authentication and access control lists to manage data privacy. Hardware and software constraints made end-to-end encryption and user-controlled key management non-trivial.

Novelty and Inventive Step

The examiner approved the claims because the prior art failed to teach or make obvious the combination of features including: a third-party data sharing server in network communication with personal computing devices; an encryption/decryption module on each device; generating encryption and decryption keys associated with a file; encrypting the file for sharing with selected users; encrypting the decryption key for each recipient; and transmitting the encrypted file and encrypted decryption keys to the server for forwarding to the recipients, where the recipients can decrypt the file using their recipient decryption key and the file decryption key.

Claims

This patent contains 6 claims, with independent claims 1, 3, 5, and 6. The independent claims are generally directed to methods for data exchange between personal computing devices using a third-party server or a server, and encryption/decryption modules. The dependent claims 2 and 4 further define how the encryption key is generated.

Key Claim Terms New

Definitions of key terms used in the patent claims.

Term (Source)Support for SpecificationInterpretation
Encryption/decryption module
(Claim 1, Claim 3, Claim 5, Claim 6)
“One embodiment of the private DSS architecture taught herein has two primary components: (1) a client program or set of programs which operate on each user's computing device, and (2) a set of computers, servers, and/or programs which constitute the “server” of the DSS. In an embodiment, the portion of the private DSS which operates locally, on a user's computing device, will henceforth be referred to as the “DSS client.””A component on each personal computing device that performs encryption and decryption of data files and keys. It is in network communication with the data sharing server.
File decryption key
(Claim 1)
“In an embodiment, users define their own encryption/decryption key. This is the symmetrical encryption key used to encrypt and decrypt all, or most, of their data. In an embodiment, a user's encryption key is an alphanumeric character string. This can also be referred to as a “passphrase.””A key associated with the original data file and usable for reconstituting data files encrypted with the file encryption key.
File encryption-decryption key
(Claim 3)
“A method embodiment herein re-uses a single symmetric encryption key per user which may be used to both encrypt and decrypt data. A user's key can be changed, if needed or desired, but in general the same key is constantly reused. This allows a single user key (also in the possession of each of that user's authorized “contacts”) to be used to decrypt all of the user's encrypted data, thereby simplifying key and data management.”A single key used for both encrypting and decrypting the original data file.
File encryption key
(Claim 1)
“In an embodiment, users define their own encryption/decryption key. This is the symmetrical encryption key used to encrypt and decrypt all, or most, of their data. In an embodiment, a user's encryption key is an alphanumeric character string. This can also be referred to as a “passphrase.””A key generated by the encryption/decryption module of the first personal computing device and used to encrypt the original data file for sharing.
Recipient encryption key
(Claim 1, Claim 3)
“In an embodiment, two users exchange their decryption keys. The DSS client of each user can store the decryption key of the user's “friend” and/or “contact” in a “key locker.” A key locker is a file and/or data structure containing the identifiers and values of the decryption keys of each of the user's friends and/or contacts (in a one-to-one correspondence).”A key associated with the second or third user, used to encrypt the file decryption key before transmitting it to the third party data sharing server.

Litigation Cases New

US Latest litigation cases involving this patent.

Case NumberFiling DateTitle
2:25-cv-00316Mar 28, 2025Brian Moffat Private Data LLC v. Tresorit AG
2:25-cv-00315Mar 28, 2025Brian Moffat Private Data Llc V. Mega Limited

Patent Family

Patent Family

File Wrapper

The dossier documents provide a comprehensive record of the patent's prosecution history - including filings, correspondence, and decisions made by patent offices - and are crucial for understanding the patent's legal journey and any challenges it may have faced during examination.

  • Date

    Description

  • Get instant alerts for new documents

US11134050

BRIAN MOFFAT PRIVATE DATA LLC
Application Number
US16784122
Filing Date
Feb 6, 2020
Status
Granted
Expiry Date
Oct 7, 2031
External Links
Slate, USPTO, Google Patents