METHODS AND APPARATUSES FOR SECURING TETHERED DATA
First Claim
1. A method for securing a file created, the method comprising:
- adding a communication portion to the file, the communication portion communicating with an authentication agent on a first computing device;
encrypting data of the file using a first key received through the communication portion from the authentication agent, the first key being generated based on identification information of a second computing device in a trusted network of computing devices, the trusted network including the first computing device and the second computing device; and
saving the file to a remote file storage location.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of a method and apparatus for securing and accessing files are generally described herein. In some embodiments, the method includes adding a communication portion to the file. The communication portion may communicate with an authentication agent on the first computing device. The method may include encrypting data of the file using a first key received through the communication portion from the authentication agent. The first key may be generated based on identification information of a second computing device in a trusted network of computing devices with the first computing device. The method may include saving the file to a remote file storage location.
47 Citations
22 Claims
-
1. A method for securing a file created, the method comprising:
-
adding a communication portion to the file, the communication portion communicating with an authentication agent on a first computing device; encrypting data of the file using a first key received through the communication portion from the authentication agent, the first key being generated based on identification information of a second computing device in a trusted network of computing devices, the trusted network including the first computing device and the second computing device; and saving the file to a remote file storage location. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for opening a secured file on a first computing device, the method comprising:
-
retrieving the secured file from a file storage, the secured file including a communication portion for communicating with an authentication agent on the first computing device, and an encrypted data portion; decrypting the data portion using a key received through the communication portion from the authentication agent; and opening the decrypted data portion for viewing or editing in an editing application or a viewing application. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions that, when executed on a machine, cause the machine to:
-
receive a request for a first encryption key for encrypting a file; query a first network device for data of the first network device, the first network device being a member of a trusted network including at least the first network device and the machine; create the first encryption key using the data of at least first network device, the data being collected by an aggregation server; and write a secured file to a file storage, the secured file including an encrypted data portion encrypted with the first encryption key. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
a communication interface; an authentication agent to communicate with a remote file storage over the communication interface, and generate an encryption key based on identification information of the apparatus or on identification information of at least a second apparatus in a trusted network with the apparatus, the identification information being collected by an aggregation server; and one or more file editors to create a secured file, the secured file including a communication portion for requesting the encryption key from the authentication agent and a data portion including data encrypted with the encryption key. - View Dependent Claims (20, 21, 22)
-
Specification