Cryptographic system and method for geolocking and securing digital information
First Claim
1. A system for controlling access to digital information, comprising:
- a first information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of;
retrieving a location identity attribute that identifies a specific geographic region, the location identity attribute comprising a location value that identifies a unique location within the geographic region and a proximity value that identifies an area that encompasses the unique location;
deriving a shape parameter from the location identity attribute that maps all coordinates within the specific geographic region into a common value without identifying a location of the specific geographic region;
generating an encryption key using the location identity attribute and the shape parameter as inputs;
encrypting the digital information using the encryption key;
sending the shape parameter and the encrypted digital information; and
a second information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of;
receiving the shape parameter and the encrypted digital information;
determining a current location of the second information processing device;
generating a decryption key using the current location and the shape parameter as inputs, wherein the decryption key will match the encryption key if the current location is within the specific geographic region; and
decrypting the digital information using the decryption key, wherein the digital information can only be decrypted if the decryption key matches the encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling access to digital information utilizes a location identity attribute that defines a specific geographic location. The location identity attribute is associated with the digital information such that the digital information can be accessed only at the specific geographic location. The location identity attribute further includes a location value and a proximity value. The location value corresponds to a location of an intended recipient appliance of the digital information, and may be further defined in terms of latitude, longitude and altitude dimensions. The digital information is encrypted using a geolocking key based at least in part on the location identity attribute. The geolocking key is based on a shape parameter that is determined from the location identity attribute and is included with the encrypted digital information. The shape parameter describes a shape of a geographic area, but does not identify where the geographic area is located. The appliance that receives the encrypted digital information can generate the geolocking key to decrypt the digital information based on the received shape parameter and the appliance location. If the appliance location is not within the proximate area of the location identity attribute, the appliance will be unable to generate the geolocking key to decrypt the digital information.
63 Citations
41 Claims
-
1. A system for controlling access to digital information, comprising:
-
a first information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of; retrieving a location identity attribute that identifies a specific geographic region, the location identity attribute comprising a location value that identifies a unique location within the geographic region and a proximity value that identifies an area that encompasses the unique location; deriving a shape parameter from the location identity attribute that maps all coordinates within the specific geographic region into a common value without identifying a location of the specific geographic region; generating an encryption key using the location identity attribute and the shape parameter as inputs; encrypting the digital information using the encryption key; sending the shape parameter and the encrypted digital information; and a second information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of; receiving the shape parameter and the encrypted digital information; determining a current location of the second information processing device; generating a decryption key using the current location and the shape parameter as inputs, wherein the decryption key will match the encryption key if the current location is within the specific geographic region; and decrypting the digital information using the decryption key, wherein the digital information can only be decrypted if the decryption key matches the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An information processing device, comprising:
a processor having suitable memory adapted to store software instructions operable to cause the processor to perform the functions of; retrieving a location identity attribute that identifies a specific geographic region, the location identity attribute comprising a location value that identifies a unique location within the geographic region and a proximity value that identifies an area that encompasses the unique location; deriving a shape parameter from the location identity attribute that maps all coordinates within the specific geographic region into a common value without identifying a location of the specific geographic region; generating an encryption key using the location identity attribute and the shape parameter as inputs; encrypting the digital information using the encryption key; and sending the shape parameter and the encrypted digital information to a recipient;
wherein the encrypted digital information can only be decrypted by the recipient device being located within the specific geographic region and having access to the shape parameter.- View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
32. An information processing device, comprising:
a processor having suitable memory adapted to store software instructions operable to cause the processor to perform the functions of; receiving digital information that has been encrypted using an encryption key that was generated using a location identity attribute and a shape parameter as inputs, the location identity attribute identifying a specific geographic region, the location identity attribute comprising a location value that identifies a unique location within the geographic region and a proximity value that identifies an area that encompasses the unique location, the shape parameter mapping all coordinates within the specific geographic region into a common value without identifying a location of the specific geographic region; receiving the shape parameter; determining a current location of the information processing device; generating a decryption key using the current location and the shape parameter as inputs, wherein the decryption key will match the encryption key if the current location is within the specific geographic region; and decrypting the digital information using the decryption key, wherein the digital information can only be decrypted if the decryption key matches the encryption key. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41)
Specification