×

Methods and apparatuses for reducing or eliminating unauthorized access to tethered data

  • US 9,712,324 B2
  • Filed: 03/19/2013
  • Issued: 07/18/2017
  • Est. Priority Date: 03/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for reducing or eliminating unauthorized access to a secured file, the method comprising:

  • adding a communication portion, comprised of executable code, to the secured file;

    establishing a connection between the communication portion of the secured file and an authentication agent, the secured file further including an encrypted portion;

    requesting a decryption key, using the communication portion, from the authentication agent for accessing the secured file on a first computing device, the decryption key being based on identification information other than user information, the identification information being retrieved from at least a second computing device and a third computing device in an authenticated environment of devices including the first computing device, the authenticated environment being an environment in which the secured file was encrypted;

    determining, by the authentication agent, whether the first computing device is in the authenticated environment by reading a plurality of hash values of the secured file, the hash values represent the environment in which the secured file was created;

    converting the hash values to network locations within the authentication environment;

    retrieving key segments from the network locations including the second and third computing devices;

    determining the first computing device is not in the authenticated environment in response to determining a hash value of the hash values does not correspond to a location within the authenticated environment; and

    destroying the secured file, using the communication portion, subsequent to receiving a message indicating that the requesting has failed, including encrypting, using the communication portion, the secured file a plurality of times with an encryption key, the encryption key being based on data stored on the first computing device.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×