Authenticator device facilitating file security
First Claim
Patent Images
1. A method for controlling access to an encrypted file, comprising:
- establishing a trusted relationship between an authenticator device and a file storage application hosting the encrypted file;
receiving a request to access the encrypted file from an access device;
authenticating the request by determining that the access device has authority to access the encrypted file;
providing a decryption key to the authenticator device when the access device has authority;
providing the encrypted file to the access device;
transmitting the decryption key from the authenticator device to the access device; and
decrypting the encrypted file, by the access device, using the decryption key received from the authenticator device.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.
214 Citations
20 Claims
-
1. A method for controlling access to an encrypted file, comprising:
-
establishing a trusted relationship between an authenticator device and a file storage application hosting the encrypted file; receiving a request to access the encrypted file from an access device; authenticating the request by determining that the access device has authority to access the encrypted file; providing a decryption key to the authenticator device when the access device has authority; providing the encrypted file to the access device; transmitting the decryption key from the authenticator device to the access device; and decrypting the encrypted file, by the access device, using the decryption key received from the authenticator device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory computer readable media comprising instructions which, when executed by one or more processors, execute a method for controlling access to an encrypted file, the instructions being configured to:
-
establish a trusted relationship between an authenticator device and a file storage application hosting the encrypted file; receive a request to access the encrypted file from an access device; authenticate the request by determining that the access device has authority to access the encrypted file; provide a decryption key to the authenticator device when the access device has authority; provide the encrypted file to the access device; transmit the decryption key from the authenticator device to the access device; and decrypt the encrypted file, by the access device, using the decryption key received from the authenticator device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for controlling access to an encrypted file, comprising:
-
an authenticator device; an access device; and a file storage system hosting the encrypted file, wherein; the file storage system establishes a trusted relationship with the authenticator device; the file storage system receives a request to access the encrypted file from an access device; the file storage system authenticates the request by determining that the access device has authority to access the encrypted file; the file storage system provides a decryption key to the authenticator device when the access device has authority; the file storage system provides the encrypted file to the access device; the authenticator device transmits the decryption key to the access device; and the access device decrypts the encrypted file using the decryption key received from the authenticator device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification