Document encryption and decryption
First Claim
1. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:
- receiving a request from a user that an action be performed on a first computer;
identifying said requested action directed by said user as encryption, decryption, opening of said file, closing of said file and/or logging off, where encrypting encrypts the entire file rendering the file unreadable until decrypted;
retrieving user credentials and computing device identification of said first computer;
transmitting said user credentials and computing device identification for remote authentication of user access;
comparing said user credentials and computing device identification with stored credentials at a remote server component for authenticating said credentials, wherein matching said user credentials and computing device identification with said remotely stored credentials authenticates said user;
applying an encryption key assigned to said user that is unique to said user and stored on said remote server component; and
processing said request of said authenticated user;
wherein said computer-implemented method further comprises,processing said encrypted file automatically creating a re-encrypted file when predetermined parameters are verified; and
selectively transmitting said encryption key assigned to said user to a second computing device for controlling access by a second user and applying decryption of said file transmitted to said second computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A document encryption and decryption system for selectively encrypting and decrypting files and any other items and method for same to protect or secure its contents by helping to prevent unauthorized individuals from viewing data in human-perceivable or readable form. The encryption system includes remote authentication to verify a user'"'"'s credentials stored on a remote database hosted by a web server. The encryption system further includes remote delete to automatically delete encrypted items stored on the user'"'"'s computer, handheld or portable device, smartphone, and any other computing device of any kind when it logs onto a network if the user'"'"'s computer or computing device is reported lost, stolen, or otherwise compromised. Decryption keys allow selective decryption of encrypted items that are on the computer or computing device of any kind. A Windows Communication Foundation service helps with authenticating the users with the encryption key and login process stored and processed by the web server.
27 Citations
18 Claims
-
1. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:
-
receiving a request from a user that an action be performed on a first computer; identifying said requested action directed by said user as encryption, decryption, opening of said file, closing of said file and/or logging off, where encrypting encrypts the entire file rendering the file unreadable until decrypted; retrieving user credentials and computing device identification of said first computer; transmitting said user credentials and computing device identification for remote authentication of user access; comparing said user credentials and computing device identification with stored credentials at a remote server component for authenticating said credentials, wherein matching said user credentials and computing device identification with said remotely stored credentials authenticates said user; applying an encryption key assigned to said user that is unique to said user and stored on said remote server component; and processing said request of said authenticated user; wherein said computer-implemented method further comprises, processing said encrypted file automatically creating a re-encrypted file when predetermined parameters are verified; and selectively transmitting said encryption key assigned to said user to a second computing device for controlling access by a second user and applying decryption of said file transmitted to said second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17)
-
-
11. A computer-implemented method comprising creating encryption and decryption of a file in a computing device and controlling remote deletion of said files from said computing device, said computer-implemented method comprising the steps of:
-
storing user credentials and computing device identification at a remote server component for user authentication and processing of requested actions directed by said authenticated user for encrypting, decrypting, opening of said file, closing of said file, logging-off, and/or for marking said computing device as compromised, wherein authenticating said user for encrypting, decrypting and/or opening of said file further comprises said user logging into the same computing device that said user pre-registered; selectively applying an encryption key assigned to said user that is unique to said user and stored on said remote server component and selectively transmitting said encryption key assigned to said user to a second computing device for controlling access by a second user and applying decryption of said file transmitted to said second computing device; and re-encrypting said file when said user closes out of said file and/or logs off;
wherein said remote deletion further comprises,receiving said user request to mark said computing device as compromised; storing identifying compromised computing device information; generating a list of encrypted data and any additional selected items for remote deletion; terminating access to remotely authenticate said compromised computing device identification; retrieving said compromised computing device identification automatically upon said computing device connecting to a network; comparing said computing device identification with said remotely stored credentials; controlling remote deletion of all encrypted files and said list of encrypted data and any additional selected items automatically and substantially immediately upon said compromised computing device connecting to said network; and reporting deletion of all encrypted files and said list of encrypted data and any additional selected items as deleted. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
18. A computer-implemented method of creating encryption and decryption of a file in a computing device, said computer-implemented method comprising steps of:
-
receiving a request from a user that an action be performed on a first computer; identifying said requested action directed by said user as encryption, decryption, opening of said file, closing of said file and/or logging off, where encrypting encrypts the entire file rendering the file unreadable until decrypted; retrieving user credentials and computing device identification of said first computer; transmitting said user credentials and computing device identification for remote authentication of user access; comparing said user credentials and computing device identification with stored credentials at a remote server component for authenticating said credentials, wherein matching said user credentials and computing device identification with said remotely stored credentials authenticates said user; applying an encryption key assigned to said user that is unique to said user and stored on said remote server component; and processing said request of said authenticated user; wherein said computer-implemented method further comprises, re-encrypting said file when said user closes out of said file and/or logs off; and selectively transmitting said encryption key assigned to said user to a second computing device for controlling access by a second user and applying decryption of said file transmitted to said second computing device.
-
Specification