Cryptographic key
First Claim
Patent Images
1. A method for limiting access to a file within a target location, comprising:
- receiving, by a first computing device, a request to encrypt the file, the request identifying the target location;
determining, by the first computing device, a plurality of coordinates based on the target location;
generating, by the first computer device and by rounding the plurality of coordinates to a coarser granularity, a plurality of rounded coordinates corresponding to a geographical region comprising the target location;
generating, by the first computer device, a cryptographic key comprising the plurality of rounded coordinates;
generating, by the first computer device, an encrypted version of the file using the cryptographic key;
storing, by the first computer device, the encrypted version of the file in a storage device;
receiving, by a second computing device, a request to decrypt the encrypted version of the file;
determining, by the second computing device, a plurality of test coordinates based on an actual location of the second computing device;
generating, by the second computing device and by rounding the plurality of test coordinates, a plurality of rounded test coordinates corresponding to the geographical region;
generating, by the second computing device, a test cryptographic key comprising the plurality of rounded test coordinates; and
decrypting, by the second computing device and in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for managing a file, including receiving a request to encrypt the file, the request identifying a target location; determining a plurality of coordinates based on the target location; generating a cryptographic key based on the plurality of coordinates; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file.
-
Citations
12 Claims
-
1. A method for limiting access to a file within a target location, comprising:
-
receiving, by a first computing device, a request to encrypt the file, the request identifying the target location; determining, by the first computing device, a plurality of coordinates based on the target location; generating, by the first computer device and by rounding the plurality of coordinates to a coarser granularity, a plurality of rounded coordinates corresponding to a geographical region comprising the target location; generating, by the first computer device, a cryptographic key comprising the plurality of rounded coordinates; generating, by the first computer device, an encrypted version of the file using the cryptographic key; storing, by the first computer device, the encrypted version of the file in a storage device; receiving, by a second computing device, a request to decrypt the encrypted version of the file; determining, by the second computing device, a plurality of test coordinates based on an actual location of the second computing device; generating, by the second computing device and by rounding the plurality of test coordinates, a plurality of rounded test coordinates corresponding to the geographical region; generating, by the second computing device, a test cryptographic key comprising the plurality of rounded test coordinates; and decrypting, by the second computing device and in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file.
-
-
2. A method for limiting access to a file based on an internet protocol (IP) address prefix, comprising:
-
receiving a request to encrypt the file, the request identifying a plurality of computing devices having permission to decrypt an encrypted version of the file; generating a cryptographic key comprising the IP address prefix shared by the plurality of computing devices; generating the encrypted version of the file using the cryptographic key; storing the encrypted version of the file in a storage device; obtaining a plurality of coordinates specifying a geographic region comprising the plurality of computing devices using a first global positioning system (GPS) device, wherein the cryptographic key further comprises the plurality of coordinates; receiving, by a computing device of the plurality of computing devices, a request to decrypt the encrypted version of the file; determining, by the computing device, an IP address prefix of the computing device; generating, by the computing device, a test cryptographic key comprising the IP address prefix of the computing device; decrypting, by the computing device and in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file; determining, by the computing device, a location of the computing device using a second GPS device; and mapping, by the computing device, the location to the plurality of coordinates of the geographic region, wherein the test cryptographic key further comprises the plurality of coordinates. - View Dependent Claims (3, 4, 5)
-
-
6. A method for limiting access to a file based on an internet protocol (IP) address prefix, comprising:
-
receiving, by a computing device of a plurality of computing devices, a request to decrypt an encrypted version of the file, wherein the encrypted version of the file is generated using a cryptographic key, and wherein the cryptographic key comprises the IP address prefix of the plurality of computing devices specified in a request to encrypt the file, the request identifying the plurality of computing devices having permission to decrypt an encrypted version of the file; determining, by the computing device, an IP address prefix of the computing device; generating, by the computing device, a test cryptographic key comprising the IP address prefix of the computing device; decrypting, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file; determining, by the computing device, a location of the computing device using a global position system (GPS) device; and mapping, by the computing device, the location to a plurality of coordinates of the geographic region, wherein the cryptographic key further comprises the plurality of coordinates, and wherein the test cryptographic key further comprises the plurality of coordinates. - View Dependent Claims (7)
-
-
8. A non-transitory computer readable medium (CRM) storing instructions for limiting access to a file based on an internet protocol (IP) address prefix, the instructions comprising functionality for:
-
receiving, by a computing device of a plurality of computing devices, a request to decrypt an encrypted version of the file, wherein the encrypted version of the file is generated using a cryptographic key, and wherein the cryptographic key comprises the IP address prefix of the plurality of computing devices specified in a request to encrypt the file, the request identifying the plurality of computing devices having permission to decrypt an encrypted version of the file; determining, by the computing device, an IP address prefix of the computing device; generating, by the computing device, a test cryptographic key comprising the IP address prefix of the computing device; decrypting, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file; determining, by the computing device, a location of the computing device using a global position system (GPS) device; and mapping, by the computing device, the location to a plurality of coordinates of the geographic region, wherein the test cryptographic key further comprises the plurality of coordinates, and wherein the cryptographic key further comprises the plurality of coordinates. - View Dependent Claims (9)
-
-
10. A system for limiting access to a file based on an internet protocol (IP) address prefix, comprising:
-
a first computing device, comprising; a first graphical user interface (GUI) that collects a request to encrypt the file, the request identifying the IP address prefix of a plurality of computing devices having permission to decrypt an encrypted version of the file; a first key generation engine that generates a cryptographic key comprising the IP address prefix of the plurality of computing devices; and an encryption engine that generates the encrypted version of the file using the cryptographic key; and a second computing device, comprising; a second graphical user interface (GUI) that collects a request to decrypt the encrypted version of the file; a second key generation engine that; determines an IP address prefix of the second computing device; generates a test cryptographic key comprising the IP address prefix of the second computing device, wherein the plurality of computing devices includes the second computing device; and a decryption engine that decrypts, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file, wherein; the first computing device further comprises; a first global positioning system (GPS) device that obtains a plurality of coordinates for a geographic region comprising the plurality of computing devices, wherein the cryptographic key further comprises the plurality of coordinates; and the second computing device further comprises; a second GPS device that obtains a location of the second computing device and maps the location to the plurality of coordinates of the geographic region, wherein the test cryptographic key further comprises the plurality of coordinates. - View Dependent Claims (11, 12)
-
Specification