×

Location-based authentication

  • US 20070101438A1
  • Filed: 10/26/2006
  • Published: 05/03/2007
  • Est. Priority Date: 10/28/2005
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for managing access to location protected data on a first computational device, the method comprising the steps of:

  • a) receiving a request to access the location protected data, the request being received from a second computational device;

    b) retrieving an authorized location key corresponding to a location of the second computational device when the location of the second computational device is an authorized location;

    c) retrieving a data encryption key by using the authorized location key;

    d) authorizing the second computational device to access the location protected data, the location protected data being decrypted by using the data encryption key; and

    e) preventing the data encryption key and the authorized location key from being exposed to the second computational device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×