×

Document encryption and decryption

  • US 8,621,214 B2
  • Filed: 02/10/2011
  • Issued: 12/31/2013
  • Est. Priority Date: 02/10/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:

  • receiving a request from a user that an action be performed on a first computer;

    identifying said action requested by said user as encryption, decryption and/or opening of said file;

    retrieving user credentials and computing device identification of said first computer;

    transmitting said user credentials and said computing device identification for remote authentication of user access;

    comparing said user credentials and said computing device identification with stored credentials at a remote server component for authenticating said user credentials, and matching said user credentials and said computing device identification with said stored credentials at said remote server component;

    determining said user as authenticated;

    if said user is authenticated, applying an encryption key assigned to said authenticated user that is unique to said user and stored on said remote server component;

    processing said request of said authenticated user; and

    providing access to said authenticated user for a predetermined period of time to selectively proceed with requesting additional action(s) to be performed;

    wherein said method further comprises controlling remote deletion of said file, wherein said remote deletion comprises,receiving a user request to mark said computing device as compromised;

    storing identification of said computing device;

    generating a list of directories containing files for remote deletion;

    terminating access to remotely authenticate said identification of said computing device;

    retrieving said identification of said computing device automatically upon said computing device connecting to a network;

    comparing said identification of said computing device with said stored credentials on said remote server component;

    determining said computing device as compromised;

    marking said computing device as compromised;

    controlling remote deletion of all encrypted files and said list of directories containing files upon said compromised computing device connecting to said network; and

    reporting deletion of all encrypted files and said list of directories containing files as deleted.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×