METHODS AND APPARATUSES FOR REDUCING OR ELIMINATING UNAUTHORIZED ACCESS TO TETHERED DATA
First Claim
1. A method for reducing or eliminating unauthorized access to a secured file, the method comprising:
- establishing a connection between a communication portion of the secured file and an authentication agent;
requesting a decryption key from the authentication agent for accessing the secured file on a first computing device, the decryption key being based on environment information retrieved from devices in an authenticated environment of devices, the authenticated environment being an environment in which the secured file was encrypted; and
destroying the secured file subsequent to receiving a message indicating that the requesting has failed.
11 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of a method and apparatus for reducing or eliminating unauthorized access to secured files are generally described herein. In some embodiments, the method includes establishing a connection between a communication portion of the secured file and an authentication agent. The method may include requesting a decryption key from the authentication agent for accessing the secured file on a first computing device. The decryption key may be based on device information retrieved from devices in an authenticated environment of devices. The authenticated environment may be an environment in which the secured the was encrypted. The method may include destroying the secured file subsequent to receiving a message indicating that the requesting has failed.
35 Citations
21 Claims
-
1. A method for reducing or eliminating unauthorized access to a secured file, the method comprising:
-
establishing a connection between a communication portion of the secured file and an authentication agent; requesting a decryption key from the authentication agent for accessing the secured file on a first computing device, the decryption key being based on environment information retrieved from devices in an authenticated environment of devices, the authenticated environment being an environment in which the secured file was encrypted; and destroying the secured file subsequent to receiving a message indicating that the requesting has failed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium comprising instructions that, when executed on a first machine, cause the first machine to:
-
receive a request for access to a file, the file being stored on the first machine, on a remote machine, or on both the first machine and the remote machine; establish a connection, through a communication portion of the file for Which access is requested, to an authentication agent on the first machine; request a decryption key from the authentication agent for decrypting the file, the decryption key being based on information retrieved from devices in an authenticated environment of devices, the authenticated environment of devices being an environment in which the file was encrypted; and destroy the file subsequent to determining that the request has failed. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium comprising instructions that, when executed on a machine, cause the machine to:
-
receive a request for a decryption key for decrypting a file; determine whether the request is received from within an authenticated environment, the authenticated environment being a device on which the file was encrypted or a network of devices including the device on which the file was encrypted; and return an error message subsequent to determining that the request is received from outside the authenticated environment. - View Dependent Claims (17)
-
-
18. An apparatus comprising:
-
a communication interface to communicate with a remote file storage; an authentication agent to communicate with the remote file storage over the communication interface, communicate with a secured file through a communication portion of the secured file, and receive a request, from the communication portion, for a decryption key for accessing the secured file, the decryption key being based on device information retrieved from devices in an authenticated environment, the authenticated environment being an environment in which the secured file was encrypted, and generate either the decryption key or an error message, based on whether the request is received from within the authenticated environment. - View Dependent Claims (19, 20, 21)
-
Specification