Location dependent encryption and/or decryption
First Claim
1. A method for encrypting data, comprising:
- identifying a first spatial location for a current location;
selecting a known location having a second spatial location;
determining an encryption key based at least in part on the first spatial location and the second spatial location; and
encrypting data with respect to the encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Encryption and decryption may be tied to physical location information, e.g., GPS or other position data. Decryption keys may be defined with respect to a location at which decryption is to occur. A clock may be used to ensure decryption is occurring at a desired decryption location. For security, names may be associated with GPS position data, where encrypted data and a name associated with position data may be provided to a recipient, and the recipient is required to know or have access to the position data associated with the name in order to compute a decryption key. For additional security, encryption may also be performed with respect to position data for an encryption location, where an identifier associated with the encryption location is provided to the recipient, and the recipient is required to know or have access to the position data associated with the second name. Other embodiments are disclosed.
-
Citations
30 Claims
-
1. A method for encrypting data, comprising:
-
identifying a first spatial location for a current location;
selecting a known location having a second spatial location;
determining an encryption key based at least in part on the first spatial location and the second spatial location; and
encrypting data with respect to the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 25)
-
-
11. A method for encrypting data, comprising:
-
determining a first spatial location for an encryption location;
determining an encryption key based at least in part on the first spatial location; and
encrypting data with respect to the encryption key so that encrypted data may be decrypted by a decryption device having an input for receiving a current spatial location and configured to determine a decryption key based at least in part on the current spatial location. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An article, comprising a machine-accessible media having associated instructions for performing encryption, wherein the instructions, when accessed, results in a machine performing:
-
identifying a first spatial location for a current location;
selecting a known location having a second spatial location;
determining an encryption key based at least in part on the first spatial location and the second spatial location; and
encrypting data with respect to the encryption key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
26. An article, comprising a machine-accessible media having associated instructions for performing encryption, wherein the instructions, when accessed, results in a machine performing:
-
determining a spatial location for an encryption location;
determining an encryption key based at least in part on the spatial location; and
encrypting data with respect to the encryption key so that encrypted data may be decrypted by a decryption device having an input for receiving a first spatial location and configured to determine a decryption key based at least in part on the first spatial location. - View Dependent Claims (27, 28, 29, 30)
-
Specification