AUTHENTICATOR DEVICE FACILITATING FILE SECURITY
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method for controlling access to an encrypted file, comprising:
-
establishing a trusted relationship between an authenticator device and a file storage application hosting the encrypted file; receiving a request to access the encrypted file from an access device; authenticating the request by determining that the access device has authority to access the encrypted file; providing a decryption key to the authenticator device when the access device has authority; providing the encrypted file to the access device; transmitting the decryption key from the authenticator device to the access device; and decrypting the encrypted file, by the access device, using the decryption key received from the authenticator device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. One or more computer readable media comprising instructions which, when executed by one or more processors, execute a method for controlling access to an encrypted file, the instructions being configured to:
-
establish a trusted relationship between an authenticator device and a file storage application hosting the encrypted file; receive a request to access the encrypted file from an access device; authenticate the request by determining that the access device has authority to access the encrypted file; provide a decryption key to the authenticator device when the access device has authority; provide the encrypted file to the access device; transmit the decryption key from the authenticator device to the access device; and decrypt the encrypted file, by the access device, using the decryption key received from the authenticator device. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A system for controlling access to an encrypted file, comprising:
-
an authenticator device; an access device; and a file storage system hosting the encrypted file, wherein; the file storage system establishes a trusted relationship with the authenticator device; the file storage system receives a request to access the encrypted file from an access device; the file storage system authenticates the request by determining that the access device has authority to access the encrypted file; the file storage system provides a decryption key to the authenticator device when the access device has authority; the file storage system provides the encrypted file to the access device; the authenticator device transmits the decryption key to the access device; and the access device decrypts the encrypted file using the decryption key received from the authenticator device. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification