Methods and apparatus to protect data
First Claim
Patent Images
1. A computer-implemented method for providing protection for information of a data file, the method comprising:
- decrypting an encrypted file to produce a composite file, said composite file including said information of said data file and allowable location information, wherein said allowable location information defines an allowable geographic area within which said information of said data file is accessible;
ascertaining said allowable location information from said composite file;
after said decrypting, ascertaining a geographic location of a computer, said computer being employed to access said data file;
determining whether to permit access by said computer to said information of said data file based on at least said allowable location information and said geographic location of said computer; and
preventing said access by said computer to said information of said data file if said geographic location of said computer according to said ascertaining is not within said allowable geographic area.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing protection for a data file is disclosed. The method includes employing allowable location information to control access to information of the data file, wherein the allowable location information is associated with the data file The information in the data file is inaccessible if a location of a computer employed to access the data file is not within an allowable geographic area defined by the allowable location information.
-
Citations
19 Claims
-
1. A computer-implemented method for providing protection for information of a data file, the method comprising:
-
decrypting an encrypted file to produce a composite file, said composite file including said information of said data file and allowable location information, wherein said allowable location information defines an allowable geographic area within which said information of said data file is accessible; ascertaining said allowable location information from said composite file; after said decrypting, ascertaining a geographic location of a computer, said computer being employed to access said data file; determining whether to permit access by said computer to said information of said data file based on at least said allowable location information and said geographic location of said computer; and preventing said access by said computer to said information of said data file if said geographic location of said computer according to said ascertaining is not within said allowable geographic area. - View Dependent Claims (4, 5, 6, 7)
-
-
2. A computer-implemented method for providing protection for information of a data file, the method comprising:
-
decrypting an encrypted file to produce a composite file; ascertaining allowable location information from said composite file, said composite file being created from embedding said allowable location information with a temporary file, said temporary file being resulted from performing invertible transformation on said data file, said allowable location information specifying a geographic area within which said protected file is accessible; after said decrypting, ascertaining a geographic location of a computer, said computer being employed to access said protected file; determining whether to permit access by said computer to said information of said data file based on at least said allowable location information and said geographic location of said computer; and permitting said access by said computer to said information of said data file only if said geographic location of said computer according to said ascertaining is within said geographic area. - View Dependent Claims (8, 9, 10)
-
-
3. A method for providing protection for information in a data file, the method comprising:
-
embedding said data file with allowable location information to create a composite file, wherein said allowable location information defines an allowable geographic area within which said information of said data file is accessible; after said embedding, encrypting said composite file to create an encrypted file; decrypting said encrypted file into said composite file; ascertaining said allowable location information from said composite file; after said decrypting, ascertaining a geographic location of a computer, said computer being employed to access said data file; determining whether to permit access by said computer to said information of said data file based on at least said allowable location information and said geographic location of said computer; and preventing said access by said computer to said information in said data file if said geographic location of said computer according to said ascertaining is not within said allowable geographic area defined by said allowable location information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification