Patent attributes
The disclosed embodiments include computer-implemented apparatuses and processes that resolve securely email-based queries involving confidential third-party data. For example, an apparatus may receive message data associated with an inquiry from a first computing system. The message data includes encrypted interlaced data, an identifier, and temporal data, and when a structure of the message data corresponds to an expected structure, the apparatus generates a decryption key based on at least one of the identifier or the temporal data, and decrypts the encrypted interlaced data using the decryption key. Based on a portion of the decrypted interlaced data, the apparatus requests and receives a response to the inquiry from a second computing system, and transmits at least a portion of the response to the first computing system, which presents the portion of the response within a digital interface.