System and method for securely transferring data

ABSTRACT

According to one example, a system includes a first computing device that includes one or more processors configured to generate a first encryption key, and encrypt data, using the first encryption key, for transmittal to a second computing device. The one or more processors are further configured to determine a first set of tokens; determine, from the first set of tokens, a plurality of tokens for the first encryption key; generate a packet comprising the encrypted data, and further comprising the plurality of tokens; and transmit the packet for receipt by the second computing device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in part application that claims thebenefit of the filing date under 35 U.S.C. § 120 of U.S. patentapplication Ser. No. 15/902,259, entitled System and Method for SecurelyTransferring Data, and filed on Feb. 22, 2018, the entirety of which isincorporated herein by reference.

TECHNICAL FIELD

This disclosure relates generally to the field of computer-basedcommunication, and more specifically to a system and method for securelytransferring data.

BACKGROUND

Typically, when a device requests data from a second device, the seconddevice may send that data in an unsecured manner or using traditionalsecurity measures (e.g., Secure Sockets Layer (SSL) protocol). Thesetraditional methods of transferring data, however, may be deficient.

SUMMARY

In a first example, a system includes a first computing device and asecond computing device. The first computing device has one or morefirst memory units that store one or more first instructions; andfurther has one or more first processors coupled to the first memoryunits. Upon executing the one or more first instructions, the firstprocessors of the first computing device receive a request for a portionof a streaming file from a second computing device; generate a firstencryption key; encrypt the requested portion of the streaming fileusing the first encryption key; and break the first encryption key intoa plurality of key portions. Furthermore, the first processors of thefirst computing device generate a first set of tokens; determine, fromthe first set of tokens, a first token for each of the plurality of keyportions; generate a packet having the encrypted requested portion ofthe streaming file, and further having the first tokens; and transmitthe packet for receipt by the second computing device. The secondcomputing device has one or more second memory units that store one ormore second instructions; and further has one or more second processorscoupled to the second memory units. Upon executing the one or moresecond instructions, the second processors of the second computingdevice generate a second set of tokens that matches the first set oftokens; receive the packet; match each of the first tokens to a secondtoken in the second set of tokens; determine the plurality of keyportions based on the second tokens; re-assemble the plurality of keyportions into the first encryption key; de-crypt the encrypted requestedportion of the streaming file using the first encryption key; andtransmit the requested portion of the streaming file to a user of thesecond computing device.

In a second example, a system includes a first computing device that hasone or more memory units that store one or more instructions, and thatfurther has one or more processors coupled to the memory units. Uponexecuting the one or more instructions, the processors of the firstcomputing device receive a request for data from a second computingdevice; generate a first encryption key; and encrypt the requested datausing the first encryption key. Furthermore, the processors of the firstcomputing device determine a first set of tokens; determine, from thefirst set of tokens, a plurality of tokens for the first encryption key;generate a packet having the encrypted requested data, and furtherhaving the plurality of tokens; and transmit the packet for receipt bythe second computing device.

In such an example, the processors of the first computing device mayalso receive a request for second data from the second computing device;generate a second encryption key; encrypt the requested second datausing the second encryption key; determine a second set of tokens;determine, from the second set of tokens, a plurality of second tokensfor the second encryption key; generate a second packet having theencrypted requested second data, and further having the plurality ofsecond tokens; and transmit the second packet for receipt by the secondcomputing device.

In a third example, a system includes a second computing device that hasone or more memory units that store one or more instructions; and thatfurther has one or more processors coupled to the memory units. Uponexecuting the one or more instructions, the processors of the secondcomputing device transmit a request for data from the first computingdevice; and following transmission of the request, receive a packet fromthe first computing device, where the packet has the requested data inencrypted form and further has a plurality of tokens for a firstencryption key used to encrypt the requested data. Furthermore, theprocessors of the second computing device generate a second set oftokens; determine the first encryption key using the plurality of tokensand the second set of tokens; de-crypt the requested data using thefirst encryption key; and transmit the requested data to a user of thesecond computing device.

In a fourth example, a system includes a first computing device that hasone or more memory units, and that further has one or more processorscoupled to the memory units. Upon executing one or more instructions,the processors of the first computing device generate a first encryptionkey, and encrypt data, using the first encryption key, for transmittalto a second computing device. Furthermore, the processors of the firstcomputing device determine a first set of tokens; determine, from thefirst set of tokens, a plurality of tokens for the first encryption key;generate a packet having the encrypted data, and further having theplurality of tokens; and transmit the packet for receipt by the secondcomputing device.

In such an example, at least a portion of the one or more instructionsare accessed by the first computing device during a browser enabledcommunication session between the first computing device and the secondcomputing device. In another such example, at least a portion of the oneor more instructions are accessed by the first computing device from awebsite hosted by the second computing device. In a further suchexample, the data is input by a user into a data field of a websiterendered for display to the user by a browser of the first computingdevice.

BRIEF DESCRIPTION OF THE FIGURES

For a more complete understanding of the present disclosure and itsfeatures and advantages, reference is now made to the followingdescription, taken in conjunction with the accompanying drawings, inwhich:

FIGS. 1A-1B illustrate an example system for securely transferring data;

FIG. 2 illustrates example associations of the system of FIGS. 1A-B; and

FIG. 3 illustrates an example method for securely transferring data.

DETAILED DESCRIPTION

Embodiments of the present disclosure are best understood by referringto FIGS. 1-3 of the drawings, like numerals being used for like andcorresponding parts of the various drawings.

Typically, when a device requests data from a second device, the seconddevice may send that data in an unsecured manner This, however, may beproblematic, as an unauthorized entity (e.g., a hacker) may be able tolisten to, capture, or otherwise access the transmitted data.Furthermore, even when the second device transmits that data usingtraditional security measures, an unauthorized entity may still be ableto access the data. For example, some data may be sent via SSL protocol,which may be susceptible to hacking. As another example, some data maybe encrypted using one or more encryption keys prior to the data beingsent. These encryption keys, however, are typically stored at the firstdevice (i.e., the device requesting the data) and/or the second device(i.e., the device sending the data). As such, an unauthorized entity mayhack one or more of these devices in order to obtain the encryptionkeys, thereby gaining access to the transmitted data.

Contrary to this, the system 10 of FIGS. 1A-1B may address one or moreof these deficiencies. FIGS. 1A-1B illustrate an example system 10 forsecurely transferring data 30. As is illustrated, system 10 includes adata device 14 (e.g., a server) that stores data 30 (e.g., a streamingvideo file). When the data device 14 receives a request for data 30(e.g., a portion of the streaming video file) from a requesting device50 (e.g., a mobile phone), the data device 14 may determine anencryption key to be used to encrypt the requested data 30. Followingencryption of the data 30, the encrypted data 30 may be transmitted tothe requesting device 50. The actual encryption key used to encrypt thedata 30, however, may not be sent to the requesting device 50. Instead,the data device 14 may have a set of storage tokens 42 (e.g., a set ofcharacters, such as “58U48”), and may determine one or more of thesestorage tokens 42 for the encryption key. For example, the data device14 may break the encryption key into key portions, and then may select astorage token 42 for each key portion. Then, the data device 14 maytransmit the determined storage tokens 42 to the requesting device 50 inthe same packet with the encrypted requested data 30.

Following reception of the packet, the requesting device 50 may utilizeits own receiving tokens 70 to determine the encryption key. Forexample, the requesting device 50 may have a set of receiving tokens 70that matches the set of storage tokens 42 stored on the data device 14.In such an example, the requesting device 50 may match the receivedstorage tokens 42 to its receiving tokens 70 so as to determine each keyportion of the encryption key. Then, the requesting device 50 mayre-assemble the encryption key in order to determine the encryption key.Following determination of the encryption key, the requesting device 50may decrypt the encrypted requested data 30, and then transmit therequested data 30 to a user of the requesting device 50 (e.g., themobile phone may display the requested streaming video file to a user).

This example procedure may allow the data device 14 to securely transmitthe data 30, in some examples. For example, not only may the data 30 beencrypted (thereby providing a first level of security), but the actualencryption key may not be transmitted to the requesting device 50(thereby providing a second level of security). Additionally, becausethe actual encryption key may be determined by the requesting device 50based on storage tokens 42 and receiving tokens 70, the actualencryption key may not need to be stored on disk in either therequesting device 50 or the data device 14 (thereby providing a thirdlevel of security). In some examples, this may prevent an unauthorizedentity from listening, capturing, or otherwise accessing the data 30.

As is illustrated, the system 10 includes the data device 14. The datadevice 14 may be any device that stores data 30 and/or transmits data 30in response to a request. For example, the data device 14 may be (or mayinclude) a network server, any suitable remote server, a mainframe, ahost computer, a workstation, a web server, a personal computer, alaptop, a mobile telephone (such as a Smartphone), an electronicnotebook, a personal digital assistant, a file server, any othercomputing or processing device, any other device for storing data and/ortransmitting that data in response to a request, or any combination ofthe preceding. The functions of data device 14 may be performed by anysuitable combination of one or more servers or other components at oneor more locations. In an example where the data device 14 is a server,the server may be a private server, and the server may be a virtual orphysical server. The server may include one or more servers at the sameor remote locations. Also, data device 14 may be (or may include) anysuitable component that functions as a server. As is illustrated inFIGS. 1A-1B, the data device 14 is one or more servers. Furthermore, asis also illustrated in FIG. 1B, the data device 14 may include acomputer/data processor 18 and data storage medium 22 comprisinginstructions 26 executable by the processor 18 to perform the functionsof the data device 14. Additionally, the data device 14 may include acommunication port 46 (e.g., receiver, transmitter, transceiver)configured to receive and transmit information (e.g., receive requestsfor data 30, transmit the requested data 30, etc.). Further exampledetails of data device 14 and/or its components are discussed below.

As is discussed above, the data device 14 may be any device that storesdata 30 and/or transmits data 30 in response to a request. This data 30represents any type of information. For example, the data 30 may be adocument (e.g., a word document, an excel spreadsheet, a pdf), an audiofile (e.g., a music file), a video file (e.g., a movie file, a tv showfile, a video clip), a streaming audio file, a streaming video file, alist of available video files, a list of available audio files, accountinformation, medical information, commands (e.g., open, close, move to aparticular location), any other type of information, or any combinationof the preceding. As is illustrated in FIGS. 1A-1B, the data 30 is astreaming video file. The streaming video file is a movie file that maybe streamed to the requesting device 50, thereby allowing the user ofthe requesting device 50 to watch the movie without waiting for the fullmovie to download, in some examples. The data device 14 may store anyamount of data 30. For example, the data device 14 may be associatedwith a video streaming service (e.g., NETFLIX, REDBOX, AMAZON VIDEO). Insuch an example, the data device 14 may store (or may be able to access)any and all video files available through the video streaming service.

The data device 14 may have one or more encryption methods 34 that maybe used to encrypt the data 30. An encryption method 34 represents anytype of encryption method that may be utilized to encrypt data and/ordecrypt encrypted data. For example, an encryption method 30 may be RSA,Data Encryption Standard (DES), triple DES (DESS), Advanced EncryptionStandard (AES), AES-256, Cryptographic hash functions, Messageauthentication codes (MACs), symmetric encryption methods, any othermethod of encryption, or any combination of the preceding. The datadevice 14 may have any number of encryption methods 34, each of whichmay be used to encrypt and/or decrypt data.

In some examples, one or more encryption keys (e.g., random strings ofbits created for scrambling and unscrambling data) are used with theencryption method(s) 34 to encrypt data and/or decrypt encrypted data.However, the data device 14 may not have any encryption keys stored ondisk, in some examples. Instead, in some examples, the data device 14may generate an encryption key in real-time prior to encryption of thedata. In some examples, this real-time generation of the encryption keymay cause the encryption key to only be stored in transient memory, asopposed to being stored on disk. Furthermore, once the encryption key isused by the data device 14, the encryption key may be deleted (e.g.,deleted from transient memory) or otherwise destroyed. This may preventthe encryption key(s) from being compromised if an unauthorized entitywere to access the requesting device 50.

The data device 14 may have one or more storage decoder values 38. Astorage decoder value 38 may be any type of value that represents all ora portion of an encryption key. For example, a storage decoder value 38may be a binary value that represents all or a portion of an encryptionkey, a hexadecimal value that represents all or a portion of anencryption key, any other value that represents all or a portion of anencryption key, or any combination of the preceding. As an example, anencryption key may be made up of one or more bytes of data (e.g., 256bytes of data). Each byte of the encryption key may be represented by abinary value ranging from 00000000 to 11111111. In such an example, thestorage decoder values 38 may include each binary value ranging from00000000 to 11111111. This may allow the data device 14 to have astorage decoder value 38 for each value that a byte of the encryptioncode could be.

Alternatively (or additionally), each byte of the encryption key may berepresented by a hexadecimal value ranging from 00 to FF. In such anexample, the storage decoder values 38 may include each hexadecimalvalue ranging from 00 to FF. This may also allow the data device 14 tohave a storage decoder value 38 for each value that a byte of theencryption code could be.

The data device 14 may have one or more storage tokens 42 (e.g., a setof one or more storage tokens 42). These storage tokens 42 may be usedto tokenize the encryption key used by the data device 14. As a resultof tokenizing the encryption key, the data device 14 may not transmitthe actual encryption key to the requesting device 50. Instead, the datadevice 14 may transmit the storage tokens 42 to the requesting device50. The requesting device 50 may then use these received storage tokens42 to determine the encryption key.

A storage token 42 may be associated with a storage decoder value 38, asis illustrated by associations 204 in FIG. 2. For example, the storagetoken 42 may be uniquely identified by the storage decoder value 38. Astorage decoder value 38 may uniquely identify only a single storagetoken 42. In such an example, if the data device 14 includes a firststorage decoder value 38 (e.g., the hexadecimal value 00) and furtherincludes a second storage decoder value 38 (e.g., the hexadecimal value01), each storage decoder value 38 will have a different storage token42 that is uniquely identified by the particular storage decoder value38.

Although a storage token 42 may be associated with a particular storagedecoder value 38, in particular examples, the storage token 42 may notinclude any information about the storage decoder value 38 (e.g., thestorage token 42 may not include the “00” hexadecimal value in thestorage token 42). As such, even if an unauthorized user was able togain access (or steal) a storage token 42, the unauthorized user wouldbe unable to determine the storage decoder value 38 or the portion ofthe encryption key that the storage decoder value 38 represents (e.g.,the unauthorized user would be unable to determine the “00” hexadecimalvalue of the encryption key).

The storage token 42 may be any type of data that may be associated withthe storage decoder value 38. For example, the storage token 42 may be aset of numbers, a set of letters (e.g., A, B, C, etc.), a set of numbersand letters, a set of symbols (e.g., %, !, ?, etc.), a code, any othergrouping of characters, or any combination of the preceding. The storagetoken 42 may have any length. For example, the storage token 42 may bean eight character identifier, a sixteen character identifier, a 32character identifier, an identifier with a length between eightcharacters and 32 characters, or have any other length. A storage token42 may match a receiving token 70 stored on the requesting device 50.For example, a storage token 42 may be “58U48” and the matchingreceiving token 70 may also be “58U48”.

Data device 14 may use any manner to create an association 204 between aparticular storage token 42 (e.g., storage token 42 a, b, or c) and aparticular storage decoder value 38 (e.g., storage decoder value 38 a,b, or c). As an example, data device 14 (or some other device) mayinclude a pointer in the particular storage token 42 that identifies theparticular decoder value 38 (or vice versa, or both). As anotherexample, data device 14 may utilize a look-up table that associates theparticular storage token 42 with the particular decoder value 38.

As is illustrated, the system 10 further includes the requesting device50. The requesting device 50 may be any device that requests and/orprocesses data 30. For example, the requesting device 50 may be (or mayinclude) a personal computer, a laptop, a mobile telephone (such as aSmartphone), an electronic notebook, a personal digital assistant, acable box, a networked television (such as a smart television), a hostcomputer, a workstation, a web server, a network server, any suitableremote server, a mainframe, a file server, any other computing orprocessing device, any other device that requests and/or processes data30, or any combination of the preceding. As is illustrated in FIGS.1A-1B, the requesting device 50 is a Smartphone. Furthermore, as is alsoillustrated in FIG. 1B, the requesting device 50 may include acomputer/data processor 54 and data storage medium 58 comprisinginstructions 62 executable by the processor 54 to perform the functionsof the requesting device 50. Additionally, the requesting device 50 mayinclude a communication port 74 (e.g., receiver, transmitter,transceiver) configured to receive and transmit information (e.g.,transmit requests for data 30, receive the requested data 30). Furtherexample details of requesting device 50 and/or its components arediscussed below.

The requesting device 50 may have one or more encryption methods 34 thatmay be used to decrypt the data 30. The encryption methods 34 stored onthe requesting device 50 may be the same as the encryption methods 34stored on the data device 14. As such, the data device 14 may encryptdata 30 using a particular encryption method 34, and the requestingdevice 50 may decrypt the encrypted data 30 using the same particularencryption method 34. The requesting device 50 may have any number ofencryption methods 34, each of which may be used to encrypt and/ordecrypt data.

As is discussed above, in some examples, one or more encryption keys areused with the encryption method(s) 34 to encrypt data 30 and/or decryptencrypted data 30. However, the requesting device 50 may not have anyencryption keys stored on disk, in some examples. Instead, in someexamples, the requesting device 50 may re-create an encryption key usingthe storage tokens 42 received from the data device 14. In someexamples, this re-creation of the encryption key may cause theencryption key to only be stored in transient memory, as opposed tobeing stored on disk. Furthermore, once the encryption key is used todecrypt the encrypted data 30, the encryption key may be deleted (e.g.,deleted from transient memory) or otherwise destroyed. This may preventthe encryption key(s) from being compromised if an unauthorized entitywere to access the requesting device 50.

The requesting device 50 may have one or more receiving decoder values66. A receiving decoder value 66 may be any type of value thatrepresents all or a portion of an encryption key. For example, areceiving decoder value 66 may be a binary value that represents all ora portion of an encryption key, a hexadecimal value that represents allor a portion of an encryption key, any other value that represents allor a portion of an encryption key, or any combination of the preceding.

The receiving decoder values 66 stored on the requesting device 50 maybe the same as the storage decoder values 38 stored on the data device14. For example, if the storage decoder values 38 on the data device 14include each binary value ranging from 00000000 to 11111111, thereceiving decoder values 66 stored on the requesting device 50 may alsoinclude each binary value ranging from 00000000 to 11111111. As anotherexample, if the storage decoder values 38 stored on the data device 14include each hexadecimal value ranging from 00 to FF, the receivingdecoder values 66 stored on the requesting device 50 may also includeeach hexadecimal value ranging from 00 to FF.

The requesting device 50 may also have one or more receiving tokens 70(e.g., a set of one or more receiving tokens 70). These receiving tokens70 may be used to de-tokenize the encryption key. By de-tokenizing theencryption key, the requesting device 50 may be able to determine theencryption key that was used by the data device 14 to encrypt the data30. As such, the requesting device 50 may be able to determine theencryption key without the actual encryption key being transmitted tothe requesting device.

A receiving token 70 may be associated with a receiving decoder value66, as is illustrated by associations 208 in FIG. 2. For example, thereceiving token 70 may uniquely identify a storage decoder value 66. Areceiving token 70 may be a unique identifier for only a single storagedecoder value 66. In such an example, if the requesting device 50includes a first receiving decoder value 66 (e.g., the hexadecimal value00) and further includes a second receiving decoder value 66 (e.g., thehexadecimal value 01), each receiving decoder value 66 will have adifferent receiving token 70 that uniquely identifies it. Although thereceiving token 70 may be associated with a particular receiving decodervalue 66, in particular examples, the receiving token 70 may not includeany information about the receiving decoder value 66 (e.g., thereceiving token 70 may not include the “00” hexadecimal value in thereceiving token 70). As such, even if an unauthorized user was able togain access (or steal) a receiving token 70, the unauthorized user wouldbe unable to determine the receiving decoder value 66 or the portion ofthe encryption key that the receiving decoder value represents (e.g.,the unauthorized user would be unable to determine the “00” hexadecimalvalue of the encryption key).

The receiving token 70 may be any type of data that may be associatedwith the receiving decoder value 66. For example, the receiving token 70may be a set of numbers, a set of letters (e.g., A, B, C, etc.), a setof numbers and letters, a set of symbols (e.g., %, !, ?, etc.), a code,any other grouping of characters, or any combination of the preceding.The receiving token 70 may have any length. For example, the receivingtoken 70 may be an eight character identifier, a sixteen characteridentifier, a 32 character identifier, an identifier with a lengthbetween eight characters and 32 characters, or have any other length. Areceiving token 70 may match a storage token 38 stored on data device14. For example, a receiving token 70 may be “58U48” and the matchingstorage token 38 may also be “58U48”. Additionally, a matching receivingdecoder value 66 and storage decoder value 38 may each be respectivelyassociated with a receiving decoder value 66 and a storage decoder value42 that also match. For example, a receiving token 70 (e.g., “58U48”)may be associated with a receiving decoder value 66 (e.g., thehexadecimal value 00), both of which match a storage token 42 (e.g.,“58U48”) and its associated storage decoder value 38 (e.g., thehexadecimal value 00).

Requesting device 50 may use any manner to create an association 208between a particular receiving token 70 (e.g., receiving token 70 a, b,or c) and a particular receiving decoder value 66 (e.g., receivingdecoder value 66 a, b, or c). As an example, requesting device 50 (orsome other device) may include a pointer in the particular receivingtoken 70 that identifies the particular receiving decoder value 66 (orvice versa, or both). As another example, requesting device 50 mayutilize a look-up table that associates the particular receiving token70 with the particular receiving decoder value 66.

Modifications, additions, or omissions may be made to system 10 withoutdeparting from the scope of the disclosure. For example, system 10 mayinclude any number of data devices 14 and/or requesting devices 50(and/or any number of components, such as processors or memory unitsillustrated or described in the above devices). Also, any suitable logicmay perform the functions of system 10 and the components and/or deviceswithin system 10. Furthermore, one or more components of system 10 maybe separated, combined, and/or eliminated.

Additionally, although the data device 14 and requesting device 50 havebeen described above as having or storing information (e.g., storingdata 30, storing tokens 42 and 70), in some examples, some of thatinformation may not be stored by the data device 14 or the requestingdevice 50. Instead, the data device 14 and requesting device 50 maymerely have access to that information (e.g., the information is storedelsewhere). For example, data device 14 may not store the data 30 thatis requested. Instead, data device 14 may be able to access that data30, and then data device 14 may transfer it to the requesting device 50.

FIG. 3 illustrates an example method for securely transferring data. Asis illustrated, method 300 of FIG. 3 illustrates an example of securelytransferring data 30 from data device 14 to requesting device 50 ofFIGS. 1A-1B. However, the steps of method 300 may be utilized tosecurely transfer data 30 (or any other data) from any device to anyother device.

Method 300 beings at step 304. At step 308, a connection is establishedbetween data device 14 and the requesting device 50. The connection mayrefer to any type of connection that allows the data device 14 tocommunicate with the requesting device 50 (and vice versa) so as totransfer data 30, in some examples. In some examples, the connection mayrefer to (or include) an authentication procedure. For example, in orderto receive data 30 from a data device 14, the requesting device 50 mayauthenticate itself to the data device 14. As an example of this, therequesting device 50 may log into an account established with the datadevice 14.

In an example where the data device 14 is associated with a service,such as a file streaming service (e.g., NETFLIX), the user of therequesting device 50 may have an account with the service. In such anexample, the connection may refer to (or include) the requesting device50 logging into an account associated with the data device 14 using, forexample, an account name and password. By logging into an accountassociated with the data device 14, the user of the requesting device 50may be able to view the data 30 that is available to the user (e.g., alist of video files, the list of audio files).

In some examples, the connection process between the data device 14 andthe requesting device 50 may include a pairing process. The pairingprocess may be any process that synchronizes the requesting device 50with the data device 14. For example, the pairing process may involvesending one or more messages between the requesting device 50 and thedata device 14 in order to synchronize the requesting device 50 with thedata device 14. Such synchronization may include checking or verifyingthat both the requesting device 50 and the data device 14 have one ormore of the same encryption methods 34, that the requesting device 50and the data device 14 have matching storage decoder values 38 andreceiving decoder values 66 (e.g., each have binary values ranging from00000000 to 11111111, each have hexadecimal values ranging from 00 toFF), any other manner of synchronizing the requesting device 50 with thedata device 14, or any combination of the preceding.

In some examples, if the requesting device 50 or the data device 14 ismissing information used for synchronization (e.g., the requestingdevice 50 does not have receiving decoder values 66 that match thestorage decoder values 38 of the data device 14), the pairing processmay cause the requesting device 50 or the data device 14 to generate themissing information, download the information, otherwise retrieve themissing information, or any combination of the preceding.

In some examples, the synchronization process may further include asynchronization of one or more counters included in the data device 14and the requesting device 50. This synchronization of counters may allowthe data device 14 and requesting device 50 to select the sameencryption method 34 to use with a particular transfer of data 30, insome examples. For example, the synchronization of counters may allowthe data device 14 and requesting device 50 to both independently selectthe same first encryption method 34 (e.g., AES) to use for the transferof first data 30 (e.g., a first portion of a streaming movie file).Furthermore, the synchronization of counters may allow the data device14 and requesting device 50 to both independently select to use the samesecond encryption method 34 (e.g., DES3) for the transfer of second data30 (e.g., a second portion of a streaming movie file).

In some examples, the synchronization of counters may allow the datadevice 14 and requesting device 50 to generate storage tokens 42 thatmatch receiving tokens 70. For example, the synchronization of countersmay allow the data device 14 and requesting device 50 to bothindependently generate a matching storage token 42 or a matchingreceiving token 70 (e.g., “58U48”) for a matching storage decoder value38 or a matching receiving decoder value 66 (e.g., the hexadecimal value00).

At step 312, one or more tokens may be generated. In some examples, thedata device 14 may generate storage tokens 42, and the requesting device50 may generate receiving tokens 70. The data device 14 may generate astorage token 42 for each storage decoder value 38. Furthermore, thisgenerated storage token 42 may be associated its respective storagedecoder value 38 (e.g., the storage decoder value 38 may uniquelyidentify the storage token 42). As an example of this, if the datadevice 14 has 256 different storage decoder values 38 (e.g., thehexadecimal values 00 to FF), the data device 14 may generate 256different storage tokens 70, with each storage token 42 being associatedwith a different storage decoder value 38. In such an example, the datadevice 14 may generate: (a) a first storage token 42 a (e.g., “58U48”)that is uniquely identified by a first storage decoder value 38 a (e.g.,the hexadecimal value 00); (b) a second storage token 42 b (e.g.,“U9GH6”) that is uniquely identified by a second storage decoder value38 b (e.g., the hexadecimal value 01); (c) a third storage token 42 c(e.g., “1089Z”) that is uniquely identified by a third storage decodervalue 38 c (e.g., the hexadecimal value 02); and so on.

The requesting device 50 may also generate a receiving token 70 for eachreceiving decoder value 66. Furthermore, this generated receiving token70 may uniquely identify its respective receiving decoder value 66. Asan example of this, if the requesting device 50 has 256 differentreceiving decoder values 66 (e.g., the hexadecimal values 00 to FF), therequesting device 50 may generate 256 different receiving tokens 70,with each receiving token 70 being associated with a different receivingdecoder value 66. In such an example, the requesting device 50 maygenerate: (a) a first receiving token 70 a (e.g., “58U48”) that uniquelyidentifies a first receiving decoder value 66 a (e.g., the hexadecimalvalue 00); (b) a second receiving token 70 b (e.g., “U9GH6”) thatuniquely identifies a second receiving decoder value 66 b (e.g., thehexadecimal value 01); (c) a third receiving token 70 c (e.g., “1089Z”)that uniquely identifies a third receiving decoder value 66 c (e.g., thehexadecimal value 02); and so on.

As is discussed above, the generated storage tokens 42 and the generatedreceiving tokens 70 may match. Furthermore, a matching storage token 42and a matching receiving token 70 may each uniquely identify (or beuniquely identified by) a storage decoder value 38 or a receivingdecoder value 66 that also both match. For example, a first storagetoken 38 a (e.g., “58U48”) that is uniquely identified by a firststorage decoder value 38 a (e.g., the hexadecimal value 00) may match afirst receiving token 70 a (e.g., “58U48”) that uniquely identifies afirst receiving decoder value 66 a (e.g., the hexadecimal value 00). Insuch an example, the first storage decoder value 38 a and the firstreceiving decoder value 66 a also match (e.g., they are both thehexadecimal value 00).

The tokens (e.g., storage tokens 42 and receiving tokens 70) may begenerated in any manner For example, the tokens may be generated by atoken generator method. Such a token generator method may receive aninput, and may utilize the input to generate a token having any lengthand/or any character type. The tokens may be generated in any mannerthat results in matching storage tokens 42 and receiving tokens 70. Forexample, both the data device 14 and requesting device 50 may utilizethe same token generator method (and the same input, in some examples)to generate their respective matching tokens 42 and 70. In such anexample, the pairing process (discussed above) may allow the data device14 and requesting device 50 to select the same token generator method.Furthermore, the synchronization of counters may allow the data device14 and requesting device 50 to select the same input for the tokengenerator method. Thus, the token generator methods on both the datadevice 14 and the requesting device 50 may generate matching tokens 42and 70.

In some examples, the tokens 42 and 70 may be generated in real time(e.g., generated only when the tokens 42 and 70 are needed for a securetransfer of data 30). This may prevent the tokens 42 and 70 from havingto be stored on disk for long period of times. Instead, the tokens 42and 70 may only be stored on disk for the amount of time it takes tosecurely transfer data 30 (e.g., the time it takes to securely transfera portion of a streaming video file).

Although the tokens 42 and 70 are described above as being generated(e.g., generated in real-time), in some examples, the tokens 42 and 70may be determined. A token may be determined by being generated (as isdiscussed above). Alternatively, a token may be determined in any othermanner For example, a token may be determined by selecting the tokenfrom a group of stored tokens. As an example, the data device 14 mayhave thousands (or millions, or any other number) of storage tokens 42stored on disk or accessible to the data device 14 (e.g., stored on amemory unit that the data device 14 has access to). In such an example,the data device 14 may determine a particular storage token 42 byselecting it from these thousands (or millions, or any other number) ofpossible storage tokens 42. Also, the requesting device 50 may havematching possible receiving tokens 70. In this example, the particularstorage token 42 selected by the data device 14 may match the particularreceiving token 70 selected by the requesting device 50. This selectionof matching tokens 42 and 70 may be performed in any manner (e.g., aselection based on a synchronization of the counters, as is discussedabove).

At step 316, the requesting device 50 may transmit a request for data 30to the data device 14. The request for data 30 may be transmitted as aresult of a user of the requesting device 50 requesting the data 30. Forexample, where the data device 14 is associated with a service, such asa file streaming service (e.g., NETFLIX), the request for data 30 may betransmitted as a result of the user selecting a particular file (e.g.,selecting a particular movie from a list of movies offered by theservice). The request may be for any amount of data 30. For example, therequest may be for an entire document, file, or set of information(e.g., an entire song, an entire movie, an entire spreadsheet). Asanother example, the request may be for only a portion or chunk of thedocument, file, or set of information (e.g., a portion of a streamedsong, a portion of a streamed movie, a portion of a spreadsheet).

The request for data 30 may be transmitted in any manner and over anycommunications network. For example, the request for data 30 may betransmitted over the Internet (e.g., using a TCP communicationsprotocol), a Wi-Fi network, a cellular network, a radiotelecommunication network, a Bluetooth network, a NFC network, any otherwireless network, any wired network, any other manner of transmission,or any combination of the preceding.

Following transmission of the request for data 30, the data device 14may receive the request for data 30 at step 320. In response to therequest for data 30, the data device 14 may retrieve the requested data30. For example, the data device 14 may retrieve the requested data 30from data storage medium 58 or any other storage location.

Following receipt of the request for data 30, the data device 14 maygenerate an encryption key at step 324. As is discussed above, theencryption key may be any type of key that is used with one or moreencryption methods 34 to encrypt data and/or decrypt data. Theencryption key many be a random string of bits created for scramblingand unscrambling data. The encryption key may have any length, may haveany characters, and may be generated using any method. For example, theencryption key may be generated using a random character generator.

The encryption key may be generated in real time (e.g., generated onlywhen it is needed for a secure transfer of data 30). This may preventthe encryption key from having to be stored on disk. Instead, theencryption key may only be stored in transient memory, as opposed tobeing stored on disk. Furthermore, once the encryption key is used toencrypt the data 30, the encryption key may be deleted (e.g., deletedfrom transient memory) or otherwise destroyed. As such, the encryptionkey may be a one-time use encryption key that is destroyed after itsuse. This may prevent the encryption key from being compromised if anunauthorized entity were to access the data device 14.

Although the encryption key is described above as being generated (e.g.,generated in real-time), in some examples, the encryption key may bedetermined. An encryption key may be determined by being generated (asis discussed above). Alternatively, an encryption key may be determinedin any other manner. For example, an encryption key may be determined byselecting the encryption key from a group of stored encryption keys. Asan example, the data device 14 may have thousands (or millions, or anyother number) of encryption keys stored on disk or accessible to thedata device 14 (e.g., stored on a memory unit that the data device 14has access to). In such an example, the data device 14 may determine aparticular encryption key by selecting it from these thousands (ormillions, or any other number) of possible encryption keys. Thisselection of an encryption key may be performed in any manner (e.g., theselection may be random). Furthermore, because the data device 14 maystore thousands (or millions, or any other number) of encryption keys,the vast number of possible encryption keys may prevent an unauthorizedentity from determining which encryption key was used, even if theunauthorized entity were to gain access to the data device 14.

Following generation of the encryption key, the data device 14 mayencrypt the requested data 30 at step 328. The requested data 30 may beencrypted in any manner using the encryption key. For example, the datadevice 14 may utilize the encryption key with one or more encryptionmethods 34 to encrypt the data. The encryption method(s) 34 used toencrypt the requested data 30 may be selected in any manner For example,as is discussed above, the encryption method(s) 34 may be selectedduring the pairing process discussed above. This may, in some examples,allow the data device 14 and the requesting device 50 to select the sameencryption method(s) 34 to use with the requested data 30.

Following encryption of the requested data 30, the data device 14 maydetermine one or more tokens for the encryption key at step 332. In someexamples, the data device 14 may determine one or more storage tokens 42for the encryption key. These determined storage tokens 42 may be usedto more securely transmit the data 30 to the requesting device 50. Forexample, as is discussed above, the actual encryption key may not besent to the requesting device 50. Instead, storage tokens 42 thatrepresent the encryption key may be determined, and these storage tokens42 may be sent to the requesting device 50. This may allow therequesting device 50 to determine the encryption key without the actualencryption key having to be transmitted. This may prevent the actualencryption key from being intercepted by an unauthorized entity who maybe listening to the communications between the data device 14 and therequesting device 50, in some examples.

The storage tokens 42 may be determined in any manner. As an example ofthis, the storage tokens 42 may be determined using the encryption keyand the storage decoder values 38. In such an example, the encryptionkey may first be broken up into key portions. A key portion may be anyportion of the encryption key. For example, a key portion may be anibble (4 bits) of an encryption key, a byte of an encryption key, twobytes of an encryption key, or any other portion of the encryption key.In some examples, when the key portion is a byte, and the encryption keyis 256 bytes, then the encryption key may be broken up into 256 keyportions.

After the encryption key is broken up into key portions, the data device14 may determine a storage token 42 for each key portion. The storagetokens 42 for each key portion may be determined in any manner Forexample, the storage tokens 42 for each key portion may be determinedusing the storage decoder values 38.

As is discussed above, the storage decoder values 38 may be any type ofvalue that represents all or a portion of an encryption key. Forexample, a storage decoder value 38 may be a value that matches a keyportion of the encryption key. As an example of this, a key portion ofthe encryption key may be a byte having a binary value of 00000000. Insuch an example, the data device 14 may have a storage decoder value 38having a binary value of 00000000. As such, both binary values (e.g.,00000000) match each other. As another example of this, a key portion ofthe encryption key may be a byte having a hexadecimal value of 00. Insuch an example, the data device 14 may have a storage decoder value 38having a hexadecimal value of 00. As such, both hexadecimal values(e.g., 00) match each other. In these examples, the data device 14 maysearch its storage decoder values 38 for a particular storage decodervalue 38 that matches the key portion. Once a match is found, the datadevice 14 may select that particular storage decoder value 38 for thatkey portion.

Furthermore, the data device 14 may then use the selected storagedecoder value 38 to determine the storage token 42 for the key portion.For example, as is also discussed above, each storage decoder value 38may be associated with (e.g., it may uniquely identify) a particularstorage token 42. In such an example, the data device 14 may use theselected storage decoder value 38 a (e.g., a hexadecimal value of 00) toidentify the first associated storage token 42 a (e.g., “58U48”) that isuniquely identified by that selected storage decoder value 38 a. Forexample, the data device 14 may access or look up the selected storagedecoder value 38, and based on the accessed storage decoder value 38(and the association 204), the data device 14 may determine the storagetoken 42. As an example, the data device 14 may access a first selectedstorage decoder value 38 a (e.g., a hexadecimal value of 00) and utilizeassociation 204 to determine the associated storage token 42 a (e.g.,“58U48”). The data device 14 may then select that particular storagetoken 42 for the key portion.

This determination process may be conducted for each key portion of theencryption key. As an example of this, the encryption key may be thefollowing: “000102”. In this example, the encryption key is a three byteencryption key that may be broken up into three key portions: (a) thehexadecimal value 00; (b) the hexadecimal value 01; and (c) thehexadecimal value 02. These hexadecimal values may be used to identifymatching storage decoder values 38, such as: (a) a first storage decodervalue 38 a having the hexadecimal value 00; (b) a second storage decodervalue 38 a having the hexadecimal value 01; and (c) a third storagedecoder value 38 a having the hexadecimal value 02. Then, the datadevice 14 may use these three storage decoder values 38 to identify theassociated storage tokens 42 that are uniquely identified by each ofthese three storage decoder values 38, such as (a) a first storage token42 a of “58U48” that is uniquely identified by the first storage decodervalue 38 a; (b) a second storage token 42 b of “U9GH6” that is uniquelyidentified by the second storage decoder value 38 b; and (c) a thirdstorage token 42 c of “1089Z” that is uniquely identified by the thirdstorage decoder value 38 c. These storage tokens 42 may be used in placeof the actual encryption key. As such, instead of transmitting anencryption key of “000102”, the data device 50 may transmit the storagetokens 42 (e.g., “58U48”, “U9GH6”, and “1089Z”). Furthermore, in someexamples, these storage tokens 42 may be combined to form a single value(e.g., “58U48U9GH61089Z”) which is then transmitted to the requestingdevice 50.

Following the determination of the storage tokens 42, the data device 14may generate a packet at step 336. The packet may be generated in anymanner Furthermore, the packet may include any information fortransmission to the requesting device 50. For example, the packet mayinclude the encrypted requested data 30, and may further include thedetermined storage tokens 42 (e.g., in combined form). The packet maynot, however, include the actual encryption key.

In some examples, the packet may include additional information. Forexample, the packet may include a header. The header of the packet mayinclude an identification code (which may identify the packet as havingbeen sent by the data device 14), a timestamp (which may identify thetime and/or date the packet was created and/or transmitted by the datadevice 14, such as in a yyyy.dd.HH.mm sss format), a parsing formatidentifier (which may identify how the packet was formed and how thedata can be de-parsed), any other data, or any combination of thepreceding.

As a further example, the packet may include one or more chaff tokens. Achaff token may refer to data that may imitate a storage token 42, butmay not be an actual storage token 42. Instead, a chaff token may be afake token that is meant to hide (or obfuscate) the real storage token42. For example, as is discussed above, a storage token 42 may be“58U48”, which matches a receiving token 70 of “58U48” (stored onrequesting device 50). In such an example, a chaff token may be anyother combination of characters (e.g., “97U3M”, but which does not matchany receiving token 70 stored on requesting device 50.

The chaff token(s) included in the packet may hide (or obfuscate) thereal storage tokens 42. As an example, instead of a packet includingonly the character string “58U48” (i.e., only the storage token 42), thepacket may include, for example, the character string “97U3M58U48P07HI”(i.e., the storage token 42 and chaff tokens), which further hides thestorage token 42. As such, in some examples, an unauthorized entityintercepting the packet may be unable to separate the storage tokens 42from the chaff tokens. Furthermore, the chaff tokens may also increasethe size of the packet, which may cause an unauthorized entity to spendmore time attempting to decipher the packet (if it is even possible).Therefore, even if the unauthorized entity may decipher the storagetokens 42 from the intercepted packet, it may already be too late forthe unauthorized entity to use the storage tokens 42, as the system 10may have already detected the unauthorized entity, or the requestingdevice 50 may have already received and/or utilized the storage tokens42 to determine the encryption key and decrypt the data 30 (making thestorage tokens 42 and/or the encryption key obsolete, for example).

The chaff token may by any data. For example, the chaff may be a set ofnumbers, a set of letters (e.g., A, B, C, etc.), a set of numbers andletters, a set of symbols (e.g., %, !, ?, etc.), a code, any othergrouping of characters, or any combination of the preceding. Inparticular examples, the chaff token may have a similar format as astorage token 42. The chaff token may have any length. For example, thechaff token may be an eight character identifier, a sixteen characteridentifier, a 32 character identifier, an identifier with a lengthbetween eight characters and 32 characters, or have any other length.The chaff token may have the same length as a storage token 42, in someexamples. Furthermore, one or more (or all) of the chaff tokens in aparticular packet may have a different format and/or length than otherchaff tokens in the particular packet.

The packet may include any number of chaff tokens. For example, thepacket may include no chaff tokens, one chaff token, two chaff tokens,ten chaff tokens, 100 chaff tokens, 1,000 chaff tokens, 1 million chafftokens, 10 million chaff tokens, or any other number of chaff tokens.Furthermore, each packet may include the same number of chaff tokens, ora different number of chaff tokens. The real storage tokens 42 may beincluded in any location (in the character string of the packet) inrelation to the chaff tokens. For example, the real storage tokens 42may each be surrounded by a chaff token on each side. Furthermore, thelocation of the real storage tokens 42 in relation to the chaff tokensmay be random. As such, an unauthorized entity may be unable todetermine which tokens are the real storage tokens 42 based on theirlocation.

Following generation of the packet, the data device 14 may transmit thepacket at step 340. The data device 14 may transmit the packet to therequesting device 50. The data device 14 may transmit the packet in anymanner and over any communications network. For example, the data device14 may transmit the packet over the Internet (e.g., using a TCPcommunications protocol), a Wi-Fi network, a cellular network, a radiotelecommunication network, a Bluetooth network, a NFC network, any otherwireless network, any wired network, any other manner of transmission,or any combination of the preceding.

Following transmittal of the packet, the requesting device 50 mayreceive the packet at step 344. After receiving the packet, therequesting device 50 may determine whether the packet is legitimate. Therequesting device 50 may determine whether the packet is legitimate inany manner. As an example, the requesting device 50 may analyze theheader of the packet to determine whether or not the header of thepacket includes an identification code that identifies the packet ashaving been sent by the data device 14. In some examples, if the packetis determined to not be legitimate, the packet may be disregarded by therequesting device 50, and the requesting device 50 may request the data30 again.

Following reception of the packet, the requesting device 50 maydetermine the encryption key in step 348. The requesting device 50 maydetermine the encryption key in any manner As an example of this, therequesting device 50 may determine the encryption key using the storagetokens 42 included in the packet, and further using the receiving tokens70 and receiving decoder values 66. In such an example, the requestingdevice 50 may first determine the storage tokens 42 included in thepacket. The requesting device 50 may determine the storage tokens 42included in the packet in any manner For example, if the packet does notinclude any chaff tokens, the requesting device 50 may parse the packetto determine the storage tokens 42.

As another example, if the packet does include chaff tokens, therequesting device 50 may de-parse the packet and filter out the chafftokens in order to determine the storage tokens 42. De-parsing thepacket may refer to breaking up the information in the packet intopotential tokens, or otherwise identifying potential tokens. Forexample, the information in the packet (other than the header and thedata 30, for example) may include the following string of characters:“97U3M58U48P07HIU9GH6PLQ321089Z”. In such an example, de-parsing thisheader may identify six potential tokens: (1) “97U3M”; (2) “58U48”; (3)“P07HI”; (4) “U9GH6”; (5) “PLQ32”; and (6) “1089Z”. The requestingdevice 50 may de-parse the packet in any manner In some examples, therequesting device 50 may have one or more parsing methods that may allowthe requesting device 50 to de-parse the packet into potential tokens.For example, a parsing method may provide a format and/or length of eachtoken (e.g., one token is 5 characters of the data, one token is 32characters of the data, one token has the formatxxxx-xxx-xxxx-xxxxxxxxx, one token has the characters “A” and “X” as thefirst and fourth characters), allowing the requesting device 50 tode-parse the packet based on the format and/or length of the tokens. Asanother example, a parsing method may provide a character patternin-between tokens (e.g., fake characters that indicate a token, such asthe first 2 characters are fake and the last 3 characters are fake).

The parsing method used to de-parse the packet may always be the same.On the other hand, the parsing method used to de-parse the packet maydiffer based on the particular parsing method used to create the packet.For example, both the data device 14 and the requesting device 50 mayhave more than one parsing method (e.g., 3 parsing methods, 5 parsingmethods) to choose from in generating the packet and de-parsing thepacket. In such an example, the requesting device 50 may use the sameparsing method to de-parse the packet as the data device 14 used to formthe packet. Furthermore, in such an example, the data device 14 maygenerate the packet using a particular parsing method, and may furtheradd an identifier of that parsing method into the header of the packet(e.g., the parsing format identifier discussed above). The requestingdevice 50 may use this parsing format identifier to determine whichparsing method to use, and may then use that parsing method to de-parsethe packet. As another example, the same parsing method may beindependently selected by both the data device 14 and the requestingdevice 50 during the pairing process (discussed above).

Following the de-parsement of the packet, the requesting device 50 mayfilter out the chaff tokens in order to determine the storage tokens 42.The requesting device 50 may filter out the chaff tokens in any mannerFor example, the requesting device 50 may compare each potential token(determined above) to each of its receiving tokens 70 in order todetermine if there are any matches. If a potential token does not matchany of the receiving tokens 70, the potential token may be determined tobe a chaff token, and may be filtered out. On the other hand, if apotential token does match a receiving token 70, the potential token maybe determined to be a storage token 42.

Following the determination of the storage tokens 42 included in thepacket, the requesting device 50 may match each determined storage token42 to one of its receiving tokens 70. The requesting device 50 may matcha storage token 42 to one of its receiving tokens 70 in any manner Forexample, the requesting device 50 may compare the storage token 42 toeach of the receiving tokens 70 in order to determine if there are anymatches. The storage token 42 may match a receiving token 70 if the twotokens are identical (e.g., “58U48” and “58U48”). As another example,the storage token 42 may match a receiving token 70 if the receivingtoken 70 includes at least all of the characters of the storage token 42(or vice versa) (e.g., “58U48” and “58U4878910”). As further examples,the storage token 42 may match a receiving token 70 if the two tokensare opposite (e.g., “up” and “down”), if the two tokens complement orcomplete each other (e.g., “12345” and “6789”), if one token asks aquestion and the other token correctly answers it, any other manner ofmatching, or any combination of the preceding. In particularembodiments, the step of matching the storage token 42 to a receivingtoken 70 may already be a part of the step of determining a storagetoken 42 (as is discussed above with regard to matching potential tokensto the receiving tokens 70). In such examples, the step of matching thestorage token 42 to a receiving token 70 may not be repeated. Instead,the initial match may be used.

Following the matching of the storage tokens 42 to receiving tokens 70,the requesting device 50 may determine key portions of the encryptionkey based on the matching receiving tokens 70, and further based on theassociated storage decoder values 66. The requesting device 50 may makethis determination in any manner For example, as is discussed above, areceiving token 70 may be associated with a storage decoder value 66(e.g., it may uniquely identify the storage decoder value 66). In suchan example, the requesting device 50 may utilize the matching receivingtokens 70 to determine the associated storage decoder values 66. Forexample, the requesting device 50 may access or look up a matchingreceiving token 70, and based on the accessed receiving token 70 (andthe association 208), the requesting device 50 may determine the storagedecoder value 66. As an example, the requesting device 50 may access afirst matching receiving token 70 a (e.g., “58U48”) and utilizeassociation 208 to determine the associated storage decoder value 66 a(e.g., a hexadecimal value of 00). This determination may be performedfor each of the matching receiving tokens 70, resulting in adetermination of a storage decoder value 66 for each matching receivingtoken 70.

The requesting device 50 may then utilize the determined storage decodervalues 66 to determine the key portions of the encryption key. Forexample, each determined receiving decoder value 66 may be a value thatmatches a key portion of the encryption key. As an example of this, adetermined receiving decoder value 66 may have a binary value of00000000. In such an example, this binary value (e.g., 00000000) may bedetermined to be a key portion of the encryption key. Thus, the keyportion may be determined to be a byte having the binary value of00000000, for example. As another example, a determined receivingdecoder value 66 may have a hexadecimal value of 00. In such an example,this hexadecimal value (e.g., 00) may be determined to be a key portionof the encryption key. Thus, the key portion may be determined to be abyte having the hexadecimal value of 00. In some examples, thisdetermination of a key portion may be performed for each determinedreceiving decoder value 66.

Following the determination of the key portions, the requesting device50 may determine the encryption key using the key portions. Therequesting device 50 may determine the encryption key in any mannerusing the key portions. As an example, the requesting device 50 mayre-assemble the key portions into the encryption key. The requestingdevice 50 may re-assemble the key portions into the encryption key inany manner. For example, the requesting device 50 may combine all of thekey portions together to form the encryption key. As an example of this,the requesting device 50 may have determined the following key portions:(a) a first key portion having the hexadecimal value 00; (b) a secondkey portion having the hexadecimal value 01; and (c) a third key portionhaving the hexadecimal value 02. In such an example, these three keyportions may be combined to form the following three byte encryptionkey: “000102”.

The order in which the key portions are combined to form the encryptionkey may be based on the order of storage tokens 42 included in thepacket. For example, if a storage token 42 was the first token (or thethird token) included in the packet, the key portion determined usingthat storage token 42 may be the first key portion (or the third keyportion) in the combination. As another example, the order in which thekey portions are combined to form the encryption key may be based on amethod that was determined during the pairing process (discussed above).

Following the determination of the encryption key, the requesting device50 may de-crypt the encrypted requested data 30 at step 352. Therequesting device 50 may utilize the determined encryption key tode-crypt the encrypted requested data 30. The encrypted requested data30 may be de-crypted in any manner using the encryption key. Forexample, the requesting device 50 may utilize the encryption key withthe same encryption method 34 that was used by the data device 14 tooriginally encrypt the data 30. In some examples, the requesting device50 may select this same encryption method 34 during the pairing processdiscussed above. In other examples, the requesting device 50 may selectthis same encryption method 34 based on an identifier included in thepacket, itself.

Following the de-cryption of the encrypted requested data 30, therequesting device 50 may transmit the requested data 30 for use at step356. In some examples, the requesting device 50 may transmit therequested data 30 to the user of the requesting device 50. In such anexample, the transmission of the requested data 30 may refer to atransmission that causes the data 30 to be displayed on a display screen(e.g., displayed on a display screen of a mobile device), and/or atransmission that causes the data 30 to be output to another userinterface (e.g., output as sound from speakers or earphones of a mobiledevice). As such, the user may view, listen to, or otherwise access thedata 30. In other examples, the requesting device 50 may transmit therequested data 30 for use by the requesting device 50. For example, therequested data 30 may be transmitted to an “app” or other program thatis being executed by the processor of the requesting device 50. This mayallow the “app” or other program to use or otherwise access therequested data 30. In additional examples, the requesting device 50 maytransmit the requested data to another device (e.g., a television thatwill display the requested data 30, a speaker that will play therequested data 30, another computer or mobile phone that originallyrequested the data 30 from the requesting device 50). In other examples,the transmission of the requested data 30 may refer to any other mannerin which the requesting device 50 may utilize the requested data 30.

Following the transmission of the requested data 30, the requestingdevice 50 may determine whether to request additional data at step 360.The requesting device 50 may determine whether to request additionaldata 30 for any reason. For example, the requesting device 50 maydetermine that it should request additional data 30 as a result of auser of the requesting device 50 (or an “app” or other program installedon the requesting device 50) selecting to request additional data 30. Asan example of this, the user may have selected a new document to review,may have selected a new movie to watch, or may have selected a new songto purchase. As another example, the requesting device 50 may determinethat it should request additional data 30 if the originally requesteddata 30 is finished or almost finished being used. As an example ofthis, the originally requested data 30 may be one or more chunks orportions of a streaming video file. When those chunks are done beingwatched (or are close to being done), the requesting device 50 maydetermine that the next chunk(s) of the streaming video file are neededin order to continue the streaming process. In such an example, therequesting device 50 may determine (e.g., automatically determine) torequest the additional data 30 (e.g., the additional chunk(s) of thestreaming video file). Furthermore, this may continue until the fullstreaming video file is done being watched, or until the user decides tostop watching the streaming video file.

If it is determined at step 360 that additional data should not berequested, the method 300 may move to step 364, where the method 300ends. On the other hand, if it is determined that additional data 30should be requested, the method 300 may move back up to step 316, wherethe requesting device 50 requests the additional data 30. Then themethod 300 may re-perform steps 316-356 so as to securely transfer theadditional data 30.

Although the method 300 may re-perform steps 316-356, it may do so usingdifferent storage tokens 42, different receiving tokens 70, and adifferent encryption key. As such, even if an unauthorized entity wereto determine the storage tokens 42, receiving tokens 70, encryption key,and/or data 30 from the previous transmission, these determinationswould not help the unauthorized entity in subsequent transmission ofdata 30.

In order to utilize different tokens 42 and 70, both the data device 14and the requesting device 50 may generate (or determine) new tokens 42and 70. This generation may be similar to step 312 discussed above. Forexample, in order to generate new storage tokens 42, the data device 14may generate a storage token 42 for each storage decoder value 38.Furthermore, this generated storage token 70 may be uniquely identifiedits respective storage decoder value 38, as is discussed above.Additionally, in order to generate new receiver tokens 70, therequesting device 50 may generate a receiving token 70 for eachreceiving decoder value 66. Furthermore, this generated receiving token70 may uniquely identify its respective receiving decoder value 66.Additionally, each generated storage token 42 may match a generatedreceiving token 70, as is discussed above.

The generation of new tokens 42 and 70 may occur at any time after theuse of the old tokens 42 and 70. For example, the data device 14 maygenerate new storage tokens 42 after (e.g., immediately after) the datadevice 14 inserts the old storage tokens 42 into a packet fortransmission to the requesting device 50, after (e.g., immediatelyafter) the data device 14 transmits the packet to the requesting device,after (e.g., immediately after) the data device 14 receives aconfirmation message indicating that the requesting device 50 hasreceived the packet, or any other time after the use of the old storagetokens 42 but prior to the use of the new storage tokens 42. As anotherexample, the requesting device 50 may generate new receiving tokens 70after (e.g., immediately after) the requesting device 50 uses the oldreceiving tokens 70 to determine associated receiving decoder values 66,after (e.g., immediately after) the requesting device 50 determines keyportions for the encryption key, after (e.g., immediately after) therequesting device 50 determines the encryption key, after (e.g.,immediately after) the requesting device 50 de-crypts the encryptedrequested data 30, after (e.g., immediately after) the requesting device50 transmits the requested data 30 for use, or any other time after theuse of the old receiving tokens 70 but prior to the use of the newreceiving tokens 70.

In some examples, by generating (or otherwise determining) new tokens 42and 70, the old tokens 42 and 70 may become obsolete. As such, even ifan unauthorized entity were to determine the old tokens 42 and 70, thesedeterminations would not help the unauthorized entity in subsequenttransmissions of data 30. In some examples, the same applies to thegeneration (or determination) of a new encryption key (which may occurin step 324, and which renders the old encryption key obsolete). Even ifan unauthorized entity were to determine the old encryption key, thisdetermination would not help the unauthorized entity in subsequenttransmissions of data 30.

Modifications, additions, or omissions may be made to method 300. Forexample, although the steps of method 300 are described above as beingperformed by data device 14 or requesting device 50, in some examples,one or more of the steps of method 300 may be performed by any otherdevice. As another example, one or more steps of method 300 may beoptional, or may not be performed. For example, method 300 may notinclude step 308, where a connection is established. Instead,communication between the data device 14 and requesting device 50 maybegin when the requesting device 50 requests data 30. As a furtherexample, the steps of method 300 may be performed in parallel or in anysuitable order.

Additionally, although method 300 is described above as generating (orotherwise determining) a single storage token 42 for association witheach storage decoder value 38, in some examples, any number of storagetokens 42 may be generated (or otherwise determined) for associationwith each storage decoder value 38. Similarly, any number of receivingtokens 70 may be generated (or otherwise determined) for associationwith each receiving decoder value 66. As an example of this, the datadevice 14 may generate a set of 10 different storage tokens 42 toassociate with each storage decoder value 38, and the requesting device50 may generate a set of 10 different receiving tokens 70 to associatewith each receiving decoder value 66. In such an example, the datadevice 14 may select one of these 10 different storage tokens 42 toinsert into the packet in steps 332-336. In some examples, this mayallow the data device 14 to utilize different storage tokens 42 when thesame value (e.g., the same binary value, the same hexadecimal value) isincluded multiple times in the same encryption key. In some examples,this may alternatively (or additionally) allow the data device 14 tofurther secure the data 30, as an unauthorized entity may have todetermine or access all 10 different storage tokens 42 for each storagedecoder value 38, not just one.

As is discussed above, in some examples, the information utilized by thedata device 14 may not be stored on the data device 14. Instead, thedata device 14 may merely have access to that information, in someexamples. As one example of this, the information may be accessed by thedata device 14 during a browser enabled communication session. Such abrowser enabled communication session may allow for a compiled (binary)piece of code to be delivered to a browser and then executed as if thecompiled piece of code was installed on the data device 14. As such, thebrowser enabled communication session may allow for the secure transferof data between the data device 14 and the requesting device 50, but maynot require information associated with the secure transfer to be storedon and/or installed on the data device 14 and/or the browser. Instead,the information may be accessed by the data device 14 through thebrowser, and then the information may be deleted or otherwise freed frommemory.

Additionally, the browser enabled communication session may provide fora one and done scenario with regard to the secure transfer of data, insome examples. In this one and done scenario, the browser enabledcommunication session may allow for single exchange (i.e., a singlecall) between the requesting device 50 (e.g., a web server hosting awebsite) and the data device 14 (e.g., a laptop running a browser so asto access the website hosted by the web server), where the singleexchange (i.e., a single call) allows for initialization, pairing of therequesting device 50 and the data device 14, and the secure transfer ofdata 30 between the data device 14 and the requesting device 50. Afterthis single exchange (i.e., a single call), the information (and data30) used in the single exchange may be unloaded or deleted at both thedata device 14 and the requesting device 50, allowing the process to berepeated (if desired) reliably. That is, the information (and data 30)is freed from memory in both the browser of the data device 14 and therequesting device 50 after the single exchange ends.

In some examples, the browser enabled communication session may alsoallow the requesting device 50 to interact with many different datadevices 14 simultaneously or substantially simultaneously (e.g.,thousands of different data device 14 simultaneously or substantiallysimultaneously), so as to receive requested data 30 from each of thesedifferent data devices 14.

The browser may refer to an application that runs on a computing device(e.g., data device 14), receives formatted Hypertext Markup Language(“HTML”) from a web server, and renders a specific presentation of theHTML. The browser may have the ability to run scripts to manipulate andtransform data on the computing device. In some examples, the browsermay be a WebAssembly (“WASM”) enabled browser that has the ability tointerpret and transform a WASM enabled piece of data and execute thecode that is represented by a WASM object. WASM may refer to a binaryinstruction format for a stack-based virtual machine. WASM is designedas a portable target for compilation of high-level languages, such asC/C++/Rust, enabling deployment on the web for client and serverapplications.

A web server may refer to a server (e.g., a physical server) running ina data center that manages connections with browsers and routes theappropriate content to the connected browser. The web server may host awebsite, which may refer to an application that creates HTML content(primarily visual) and communicates the HTML content to the specifiedbrowser through HyperText Transfer Protocol (“HTTP”) requests and HTTPresponses. This content may contains scripts within the HTML that run asprocesses within the browser. The web server may also run a web service,which may refer to an application that handles requests and processingof specific data. A web service is commonly referred to as an API or aREST service.

An example of a browser enabled communication session may include abrowser enabled communication session between the requesting device 50(e.g., a web server hosting a website) and the data device 14 (e.g., alaptop running a browser so as to access the website hosted by the webserver). The requesting device 50 may be associated with a service, suchas a bank or an investment advisor service, in some examples. In such anexample, the requesting device 50 may host a website that allows a user(e.g., a user of the data device 14) to access the user's account at theservice.

The website hosted by the requesting device 50 may include one or morerequests for data 30. For example, the website may include data fieldsthat may be filled in by the user. Such data fields may include anaccount number data field, a password data field, a command data field(e.g., transfer instructions), any other data field, or any combinationof the preceding. When the HTML of the website is executed by thebrowser of the data device 14, these requests for data 30 (e.g., datafields) may be displayed to the user. The user can then input therequested data 30 (e.g., by typing in the user's account information),and then the user can select for the requested data 30 to be transferredto the requesting device 50 (e.g., by selecting “submit” on thedisplayed website). In some examples, by hosting the website andproviding the HTML content to the browser of the data device 14, therequesting device 50 may be requesting particular data 30 from the userand/or the data device 14, such as account information, passwordinformation, or any other data 30. This hosting of the website andproviding the HTML content to the browser of the data device 14 may beone example of step 316 (i.e., transmitting a request for data) of FIG.3. In other examples, the data device 14 may transmit data 30 withouthaving received a request for data at all (i.e., without step 316 ofFIG. 3 occurring at all).

In addition to including one or more requests for data 30, the websitemay also include information that allows for the secure transfer of thedata 30 from the data device 14 to the requesting device 50. Forexample, the website may include all or a portion of the informationthat allows the data device 14 to pair with requesting device 50 (as isdiscussed above), synchronize with the requesting device 50 (as is alsodiscussed above), generate (or determine) storage tokens 42 (i.e., step312), generate an encryption key (i.e., step 324), encrypt the requesteddata 30 (i.e., step 328), determine one or more storage tokens 42 forthe encryption key (i.e., step 332), generate a packet (i.e., step 336),and/or transmit the packet (i.e., step 340). As an example of this, thewebsite may include all or a portion of instructions 26, encryptionmethods 34, token generation methods, storage decoder values 38,associations 204, and/or any other information that allows for thesecure transfer of data from the data device 14 to the requesting device50. This information may be included in the website (or a web page ofthe website) in any manner For example, the information may be wrappedusing WASM and embedded in the website (or a web page of the website).This may allow the information to be accessed by the data device 14(e.g., the processor 18 of the data device 14) when the browser executesthe scripting language within the HTML of the website. As such, theinformation may not need to be stored or installed on the data device 14or even on the browser. Instead, in some examples, the information maybe accessed at run-time, and then the information may be deleted orfreed from memory.

As is discussed above, a user can enter data 30 into a displayed website(or web page) and then have that data 30 transferred to the requestingdevice 50 (e.g., by selecting “submit” on the displayed website). Whenthe user elects to have the data 30 transferred to the requesting device50, the data device 14 may transmit the data 30 using the aboveinformation, so as to securely transfer the data 30 to the requestingdevice 50. For example, the data device 14 may access the aboveinformation in order to generate (or determine) storage tokens 42 (i.e.,step 312), generate an encryption key (i.e., step 324), encrypt therequested data 30 (i.e., step 328), determine one or more storage tokens42 for the encryption key (i.e., step 332), generate a packet (i.e.,step 336), and/or transmit the packet (i.e., step 340). In someexamples, prior to securely transferring the data 30, the data 30 may beused to create a Java Script Object Notation (“JSON”), and this JSON(which includes the data 30) may then be securely transferred.

In some examples, all of the data provided by the user (e.g., all of thedata input into the data fields) may be securely transferred to therequesting device 50 in this manner. In other examples, only a portionof the data provided by the user may be securely transferred to therequesting device 50 in this manner For example, only the accountinformation and password may be securely transferred to the requestingdevice 50 in this manner, while the remainder of the data may betransferred to the requesting device 50 in another manner (e.g., a lesssecure manner).

To transmit the packet (i.e., step 340), the packet may be posted to theweb service of the requesting device 50 via a web call. The requestingdevice 50 may then see this posting and route the packet to its webservice. This is one example of step 344 (i.e., receive the packet) ofFIG. 3. The requesting device 50 may then process the received packet.For example, the requesting device 50 may use its web service to processthe received packet. As an example of this processing, the requestingdevice 50 may determine the encryption key (i.e., step 348), de-cryptthe encrypted requested data 30 (i.e., step 352), and/or transmit therequested data 30 for use (i.e., step 356). In some examples, therequesting device 50 may transmit the requested data 30 for use in anymanner (e.g., transmit it for display to a user, transmit it forstorage, transmit it for execution, transmit it for use in any othermanner, or any combination of the preceding).

The requesting device 50 may process the received packet usinginstructions 62, encryption methods 34, token generation methods,receiving decoder values 66, and/or associations 208—all (or a portionof which) may be stored on the requesting device 50. That is, unlike thedata device 14 in the browser enabled communication session, thisinformation utilized by the requesting device 50 in the secure transfermay be stored on and/or installed on the requesting device 50. However,after the single exchange (i.e., a single call) between the requestingdevice 50 and the data device 14 is finished, the particular informationassociated with that single exchange (e.g., the receiving tokens 70, theencryption key) may be deleted or freed from the memory of therequesting device 50.

In various embodiments, the herein described systems, devices (e.g.,date device 14, requesting device 50), components of the devices, andmethods may be implemented in software, firmware, or executableinstructions stored in a data storage medium such as or includingmachine-readable medium. The term “machine-readable medium” should betaken to include a single medium or multiple media (e.g., a centralizedor distributed database, and/or associated caches and servers) thatstore the one or more sets of instructions. The term “machine-readablemedium” shall also be taken to include any medium that is capable ofstoring, encoding or carrying a set of instructions for execution by themachine and that cause the machine to perform any one or more of themethodologies of the present disclosure. Some examples may beimplemented using a machine-readable medium or article which may storean instruction or a set of instructions that, if executed by a machine,may cause the machine to perform a method and/or operations inaccordance with the examples. Such a machine may include, for example,any suitable processing platform, computing platform, computing device,processing device, computing system, processing system, computer,processor, or the like, and may be implemented using any suitablecombination of hardware and/or software. Computers and computer systemsdescribed herein (e.g., data device 14, requesting device 50) mayinclude operatively associated computer-readable memory media such asmemory for storing software applications and instructions used inobtaining, processing, storing or communicating data. It can beappreciated that such memory can be internal, external, remote or localwith respect to its operatively associated computer or computer system.Memory may also include any means for storing software or otherinstructions including, for example and without limitation, a hard disk,an optical disk, floppy disk, DVD, compact disc, memory stick, ROM (readonly memory), RAM (random access memory), PROM (programmable ROM),EEPROM (extended erasable PROM), or other like computer-readable media.The machine-readable medium or article may include, for example, anysuitable type of memory unit, memory device, memory article, memorymedium, storage device, storage article, storage medium and/or storageunit, for example, memory, removable or non-removable media, erasable ornon-erasable media, writeable or re-writeable media, digital or analogmedia, hard disk, floppy disk, Compact Disk Read Only Memory (CD-ROM),Compact Disk Recordable (CD-R), Compact Disk Rewriteable (CD-RW),optical disk, magnetic media, various types of Digital Versatile Disk(DVD), a tape, a cassette, or the like.

It will be further apparent to one of ordinary skill in the art thatsome of the examples as described hereinabove may be implemented in manydifferent examples of instruction (e.g., software or firmware) andhardware. The instructions may include any suitable type of code, suchas source code, compiled code, interpreted code, executable code, staticcode, dynamic code, and the like. The actual software code orspecialized control hardware used to implement some of the illustratedembodiments do not limit the present disclosure. The instructions may beimplemented, for example, using any suitable programing language, whichmay include high-level, low-level, object-oriented, visual, compiled orinterpreted programming languages, such as, but not limited to, C, C++,C#, Java, BASIC, SQL, Perl, Matlab, Pascal, Visual BASIC, assemblylanguage, machine code, and so forth. The examples are not limited inthis context.

The methods, systems, devices (e.g., date device 14, requesting device50), and components of the devices have been illustrated and describedherein as comprising several separate functional elements, such asmodules or units. Although certain of such modules or units may bedescribed by way of example, it can be appreciated that a greater orlesser number of modules or units may be used and still fall within thescope of the examples. Further, although various examples may bedescribed in terms of modules or units to facilitate description, suchmodules or units may be implemented by one or more hardware components(e.g., embedded systems/peripherals, processors, chips, FPGAs, DSPs,PLDs, ASICs, circuits, registers, servers, clients, network switches androuters), software components (e.g., programs, subroutines, logic)and/or combination thereof. It can be appreciated that, in certainaspects, a single component may be replaced by multiple components, andmultiple components may be replaced by a single component, to provide anelement or structure or to perform a given function or functions. Exceptwhere such substitution would not be operative to practice certainexamples of the present disclosure, such substitution is consideredwithin the scope of the present disclosure. In one example, the all or aportion of the system, its features or functional elements, modules,units, etc. or one or more steps of the method may be associated with,implemented by, executed on, or embedded in (e.g., as embeddedsoftware/firmware) one or more hardware components, (e.g., as describedabove). Further, such one or more components so configured may beinstalled or associated with one or more devices and therein configuredto perform the herein described system functionalities or methods. Themodules or units may comprise, or be implemented as, one or moresystems, sub-systems, devices, components, circuits, logic, programs, orany combination thereof, as desired for a given set of design orperformance constraints. For example, the modules may compriseelectronic elements fabricated on a substrate. In variousimplementations, the electronic elements may be fabricated usingsilicon-based IC processes such as complementary metal oxidesemiconductor (CMOS), bipolar, and bipolar CMOS (BiCMOS) processes, forexample. The examples are not limited in this context

It may be appreciated that terms such as “processing”, “generating”,“determining”, or the like, unless stated otherwise, refer to the actionor processes of a computer or computing system, or similar electroniccomputing device, that manipulates or transforms data represented asphysical quantities (e.g., electronic) within the computing system'sregisters or memories into other data similarly represented as physicalquantities within the computing system's memories, registers or othersuch information storage, transmission or display devices. The examplesare not limited in this context. An action such as “identifying” or“matching” when performed by a computer or computer system may includeidentification by determining, accessing system data, comparisons withsystem data, instructions, or the like. An action such as initiating mayinclude causing an event or thing initiated either directly orindirectly. For example, initiating may include signaling, providingpower or instructions, physical manipulation, transmission of data,calculation of conditions, or other step resulting in the event soughtto be initiated. Furthermore, an action such as “storing”, when used inreference to a computer or computer system, refers to any suitable typeof storing operation including, for example, storing a value to memory,storing a value to cache memory, storing a value to a processorregister, and/or storing a value to a non-volatile data storage device.

This specification has been written with reference to variousnon-limiting and non-exhaustive examples. However, it will be recognizedby persons having ordinary skill in the art that various substitutions,modifications, or combinations of any of the disclosed examples (orportions thereof) may be made within the scope of this specification.Thus, it is contemplated and understood that this specification supportsadditional examples not expressly set forth in this specification. Suchexamples may be obtained, for example, by combining, modifying, orreorganizing any of the disclosed steps, components, elements, features,aspects, characteristics, limitations, and the like, of the variousnon-limiting and non-exhaustive examples described in thisspecification. In this manner, Applicant reserves the right to amend theclaims during prosecution to add features as variously described in thisspecification.

What is claimed is:
 1. A system, comprising: a first computing devicecomprising: one or more first memory units; and one or more firstprocessors coupled to the first memory units and configured, uponexecuting one or more first instructions, to: generate a first set oftokens; generate a first encryption key; encrypt, using the firstencryption key, data for transmittal to a second computing device; breakthe first encryption key into a plurality of key portions; determine,from the first set of tokens, a first token for each of the plurality ofkey portions; generate a packet comprising the encrypted data, andfurther comprising the first tokens; and transmit the packet for receiptby the second computing device; and the second computing devicecomprising: one or more second memory units; and one or more secondprocessors coupled to the second memory units and configured, uponexecuting one or more second instructions, to: generate a second set oftokens that matches the first set of tokens; receive the packet; matcheach of the first tokens to a second token in the second set of tokens;determine the plurality of key portions based on the second tokens;re-assemble the plurality of key portions into the first encryption key;de-crypt the encrypted data using the first encryption key; and transmitthe data for use.
 2. A system, comprising: a first computing devicecomprising: one or more memory units; one or more processors coupled tothe memory units and configured, upon executing one or moreinstructions, to: determine a first set of tokens; generate a firstencryption key; encrypt, using the first encryption key, data fortransmittal to a second computing device; determine, from the first setof tokens, a plurality of tokens for the first encryption key; generatea packet comprising the encrypted data, and further comprising theplurality of tokens; and transmit the packet for receipt by the secondcomputing device.
 3. The system of claim 2 wherein the second computingdevice is configured to: determine a second set of tokens that matchesthe first set of tokens; receive the packet; determine the firstencryption key using the plurality of tokens and the second set oftokens; de-crypt the encrypted data using the first encryption key; andtransmit the data for use.
 4. The system of claim 2, wherein at least aportion of the one or more instructions are accessed by the firstcomputing device during a browser enabled communication session betweenthe first computing device and the second computing device.
 5. Thesystem of claim 2, wherein at least a portion of the one or moreinstructions are accessed by the first computing device from a websitehosted by the second computing device.
 6. The system of claim 2, whereinthe one or more processors of the first computing device are furtherconfigured, upon executing the one or more instructions, to: break thefirst encryption key into a plurality of key portions; and determine,from the first set of tokens, a first token for each of the plurality ofkey portions.
 7. The system of claim 6, wherein each of the plurality ofkey portions comprises a byte of the first encryption key.
 8. The systemof claim 6, wherein each of the plurality of key portions comprises 4bits of the first encryption key.
 9. The system of claim 2, wherein theone or more processors of the first computing device are furtherconfigured, upon executing the one or more instructions, to generate thefirst set of tokens in real time.
 10. The system of claim 2, whereineach of the first set of tokens is associated with an individualhexadecimal value.
 11. The system of claim 2, wherein the firstencryption key is not stored on disk.
 12. The system of claim 2, whereintransmitting the data for use comprises transmitting the data forstorage or transmitting the data for display to a user.
 13. The systemof claim 2, wherein the data is input by a user into a data field of awebsite rendered for display to the user by a browser of the firstcomputing device.
 14. A method, comprising: determining, by one or moreprocessors of a first computing device, a first set of tokens;generating, by the one or more processors, a first encryption key;encrypting, by the one or more processors and using the first encryptionkey, data for transmittal to a second computing device determining, fromthe first set of tokens by the one or more processors, a plurality oftokens for the first encryption key; generating, by the one or moreprocessors, a packet comprising the encrypted data, and furthercomprising the plurality of tokens; and transmitting, by the one or moreprocessors, the packet for receipt by the second computing device. 15.The method of claim 14, wherein the first encryption key is not storedon disk.
 16. The method of claim 14, wherein the data is input by a userinto a data field of a website rendered for display to the user by abrowser of the first computing device.
 17. The method of claim 14,wherein at least a portion of the steps of the method are performedusing instructions accessed by the first computing device during abrowser enabled communication session between the first computing deviceand the second computing device.
 18. The method of claim 14, wherein atleast a portion of the steps of the method are performed usinginstructions accessed by the first computing device from a websitehosted by the second computing device.