Electronic file protection using location
First Claim
1. A method for protecting electronic files, comprising:
- receiving first and second timing signals from a remote source using a receiver;
computing a delay number, the delay number being a measure of a variation between arrival times of the first and second timing signals at the receiver;
obtaining environment information regarding a computer, the environment information including the delay number and data concerning an operating environment of the computer;
creating an encryption key based on the environment information; and
encrypting an electronic file using the encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
An invention for electronic file protection using location and other entropy factors is provided. Environment information regarding a computer is obtained, wherein the environment information includes data concerning an operating environment of the computer. Based on the environment information, an encryption key is generated and an electronic file is encrypted using the encryption key. A decryption key can also be created based on environment information, wherein the decryption key can be utilized to decrypt the electronic file. In addition, the environment information can include location information of the computer, drive information regarding a drive wherein the electronic file will be stored, and time information specifying access duration.
87 Citations
28 Claims
-
1. A method for protecting electronic files, comprising:
-
receiving first and second timing signals from a remote source using a receiver; computing a delay number, the delay number being a measure of a variation between arrival times of the first and second timing signals at the receiver; obtaining environment information regarding a computer, the environment information including the delay number and data concerning an operating environment of the computer; creating an encryption key based on the environment information; and encrypting an electronic file using the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for protecting electronic files, comprising:
-
receiving first and second timing signals from a remote source using a receiver; computing a first delay number, the first delay number being a measure of a variation between arrival times of the first and second timing signals at the receiver; storing an electronic file encrypted using an encryption key, wherein the encryption key is created using a first environment profile of a computer, and wherein the environment profile includes the first delay number and data concerning an operating environment of the computer; receiving third and fourth timing signals from the remote source using the receiver; computing a second delay number, the second delay number being a measure of a variation between arrival times of the third and fourth timing signals at the receiver; creating a decryption key based on a second environment profile of the computer, the second environment profile being based on a current operating environment of the computer and the second delay number; and decrypting the electronic file using the decryption key. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for protecting electronic files, comprising:
-
receiving first and second timing signals from a remote source using a receiver; authenticating a digital transaction using a delay number, the delay number being a measure of a variation between arrival times of the first and second timing signals at the receiver; obtaining environment information regarding a computer, the environment information including the delay number and data concerning an operating environment of the computer; creating an encryption key based on the environment information; and encrypting an electronic file using the encryption key. - View Dependent Claims (27, 28)
-
Specification