×

Cryptographic key

  • US 10,083,311 B2
  • Filed: 06/30/2014
  • Issued: 09/25/2018
  • Est. Priority Date: 06/30/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for limiting access to a file within a target location, comprising:

  • receiving, by a first computing device, a request to encrypt the file, the request identifying the target location;

    determining, by the first computing device, a plurality of coordinates based on the target location;

    generating, by the first computer device and by rounding the plurality of coordinates to a coarser granularity, a plurality of rounded coordinates corresponding to a geographical region comprising the target location;

    generating, by the first computer device, a cryptographic key comprising the plurality of rounded coordinates;

    generating, by the first computer device, an encrypted version of the file using the cryptographic key;

    storing, by the first computer device, the encrypted version of the file in a storage device;

    receiving, by a second computing device, a request to decrypt the encrypted version of the file;

    determining, by the second computing device, a plurality of test coordinates based on an actual location of the second computing device;

    generating, by the second computing device and by rounding the plurality of test coordinates, a plurality of rounded test coordinates corresponding to the geographical region;

    generating, by the second computing device, a test cryptographic key comprising the plurality of rounded test coordinates; and

    decrypting, by the second computing device and in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×