Document encryption and decryption
First Claim
1. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:
- receiving a request from a user that an action be performed on a first computer;
identifying said action requested by said user as encryption, decryption and/or opening of said file;
retrieving user credentials and computing device identification of said first computer;
transmitting said user credentials and said computing device identification for remote authentication of user access;
comparing said user credentials and said computing device identification with stored credentials at a remote server component for authenticating said user credentials, and matching said user credentials and said computing device identification with said stored credentials at said remote server component;
determining said user as authenticated;
if said user is authenticated, applying an encryption key assigned to said authenticated user that is unique to said user and stored on said remote server component;
processing said request of said authenticated user; and
providing access to said authenticated user for a predetermined period of time to selectively proceed with requesting additional action(s) to be performed;
wherein said method further comprises controlling remote deletion of said file, wherein said remote deletion comprises,receiving a user request to mark said computing device as compromised;
storing identification of said computing device;
generating a list of directories containing files for remote deletion;
terminating access to remotely authenticate said identification of said computing device;
retrieving said identification of said computing device automatically upon said computing device connecting to a network;
comparing said identification of said computing device with said stored credentials on said remote server component;
determining said computing device as compromised;
marking said computing device as compromised;
controlling remote deletion of all encrypted files and said list of directories containing files upon said compromised computing device connecting to said network; and
reporting deletion of all encrypted files and said list of directories containing files as deleted.
1 Assignment
0 Petitions
Accused Products
Abstract
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its contents by helping to prevent unauthorized individuals from viewing data in human-perceivable or readable form. The encryption system includes remote authentication to verify a user'"'"'s credentials stored on a remote database hosted by a web server. The encryption system further includes remote delete to automatically delete encrypted items stored on the user'"'"'s computer, handheld or portable device, smartphone, and any other computing device of any kind when it logs onto a network if the user'"'"'s computer or computing device is reported lost, stolen, or otherwise compromised. Decryption keys allow selective decryption of encrypted items that are on the computer or computing device of any kind. A Windows Communication Foundation service helps with authenticating the users with the encryption key and login process stored and processed by the web server.
-
Citations
4 Claims
-
1. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:
-
receiving a request from a user that an action be performed on a first computer; identifying said action requested by said user as encryption, decryption and/or opening of said file; retrieving user credentials and computing device identification of said first computer; transmitting said user credentials and said computing device identification for remote authentication of user access; comparing said user credentials and said computing device identification with stored credentials at a remote server component for authenticating said user credentials, and matching said user credentials and said computing device identification with said stored credentials at said remote server component; determining said user as authenticated; if said user is authenticated, applying an encryption key assigned to said authenticated user that is unique to said user and stored on said remote server component; processing said request of said authenticated user; and providing access to said authenticated user for a predetermined period of time to selectively proceed with requesting additional action(s) to be performed; wherein said method further comprises controlling remote deletion of said file, wherein said remote deletion comprises, receiving a user request to mark said computing device as compromised; storing identification of said computing device; generating a list of directories containing files for remote deletion; terminating access to remotely authenticate said identification of said computing device; retrieving said identification of said computing device automatically upon said computing device connecting to a network; comparing said identification of said computing device with said stored credentials on said remote server component; determining said computing device as compromised; marking said computing device as compromised; controlling remote deletion of all encrypted files and said list of directories containing files upon said compromised computing device connecting to said network; and reporting deletion of all encrypted files and said list of directories containing files as deleted. - View Dependent Claims (2, 3, 4)
-
Specification