×

Methods and apparatuses for securing tethered data

  • US 9,697,372 B2
  • Filed: 03/19/2013
  • Issued: 07/04/2017
  • Est. Priority Date: 03/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a first computing device for securing a file created on the first computing device, the method comprising:

  • adding a communication portion as executable code to the file, the communication portion communicating with an authentication agent on the first computing device to retrieve identification information of machines remote to the first computing device in a trusted network, the trusted network including the first computing device;

    encrypting data of the file using a first key received through the communication portion from the authentication agent, the first key being generated based on data from a first machine of the machines;

    adding a metadata field to the file to indicate a key location of the first key including identification information of the machines, the metadata field including a plurality of hashed values indicating respective locations of the machines including the first machine;

    saving the file to a remote file storage location;

    setting a metadata indicator within the file to a value, the value indicating whether permissions exist to save the file locally to the first computing device; and

    if the value indicates that permissions exist;

    receiving a second key through the communication portion from the authentication agent, the second key being generated based on identification information of the first computing device;

    encrypting data of a second version of the file using the received second key; and

    saving the encrypted second version of the file to a local memory of the first computing device; and

    if the value indicates that permissions do not exist, deleting the file from the first computing device in response to closing the file in an editor.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×