CRYPTOGRAPHIC KEY
First Claim
Patent Images
1. A method for managing a file, comprising:
- receiving a request to encrypt the file, the request identifying a target location;
determining a plurality of coordinates based on the target location;
generating a cryptographic key based on the plurality of coordinates;
generating an encrypted version of the file using the cryptographic key; and
storing the encrypted version of the file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for managing a file, including receiving a request to encrypt the file, the request identifying a target location; determining a plurality of coordinates based on the target location; generating a cryptographic key based on the plurality of coordinates; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file.
29 Citations
22 Claims
-
1. A method for managing a file, comprising:
-
receiving a request to encrypt the file, the request identifying a target location; determining a plurality of coordinates based on the target location; generating a cryptographic key based on the plurality of coordinates; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file. - View Dependent Claims (2)
-
-
3. A method for managing a file, comprising:
-
receiving a request to encrypt the file, the request identifying a plurality of computing devices having permission to access the file; generating a cryptographic key based on an attribute of the plurality of computing devices; generating an encrypted version of the file using the cryptographic key; and storing the encrypted version of the file. - View Dependent Claims (4, 5, 6, 7, 8, 9)
-
-
10. A method for managing a file, comprising:
-
receiving, by a computing device of a plurality of computing devices, a request to decrypt an encrypted version of the file, wherein the encrypted version of the file is generated using an encryption key, and wherein the encryption key is generated using an attribute of the plurality of computing devices specified in a request to encrypt the file; determining, by the computing device, a test attribute of the computing device; generating, by the computing device, a test cryptographic key based on the test attribute; and decrypting, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory computer readable medium (CRM) storing instructions for managing a file, the instructions comprising functionality for:
-
receiving, by a computing device of a plurality of computing devices, a request to decrypt an encrypted version of the file, wherein the encrypted version of the file is generated using an encryption key, and wherein the encryption key is generated using an attribute of the plurality of computing devices specified in a request to encrypt the file; determining, by the computing device, a test attribute of the computing device; generating, by the computing device, a test cryptographic key based on the test attribute; and decrypting, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file. - View Dependent Claims (15, 16, 17)
-
-
18. A system for managing a file, comprising:
-
a first computing device, comprising; a first graphical user interface (GUI) that collects a request to encrypt the file, the request identifying a plurality of computing devices having permission to access the file; a first key generation engine that generates an cryptographic key based on an attribute of the plurality of computing devices; and an encryption engine that generates an encrypted version of the file using the cryptographic key; and a second computing device, comprising; a second graphical user interface (GUI) that collects a request to decrypt the encrypted version of the file; a second key generation engine that generates a test cryptographic key based on a test attribute of the second computing device, wherein the plurality of computing devices includes the second computing device; and a decryption engine that decrypts, in response to the test cryptographic key equaling the cryptographic key, the encrypted version using the test cryptographic key to obtain the file. - View Dependent Claims (19, 20, 21, 22)
-
Specification