Electronic file protection using location

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S035000, C380S044000, C380S262000, C380S268000, C380S270000, C380S273000, C380S277000, C726S018000, C726S021000

Reexamination Certificate

active

10003572

ABSTRACT:
An invention for electronic file protection using location and other entropy factors is provided. Environment information regarding a computer is obtained, wherein the environment information includes data concerning an operating environment of the computer. Based on the environment information, an encryption key is generated and an electronic file is encrypted using the encryption key. A decryption key can also be created based on environment information, wherein the decryption key can be utilized to decrypt the electronic file. In addition, the environment information can include location information of the computer, drive information regarding a drive wherein the electronic file will be stored, and time information specifying access duration.

REFERENCES:
patent: 4972431 (1990-11-01), Keegan
patent: 4993067 (1991-02-01), Leopold
patent: 5412730 (1995-05-01), Jones
patent: 5598577 (1997-01-01), Overfield
patent: 5640452 (1997-06-01), Murphy
patent: 5659617 (1997-08-01), Fischer
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6429773 (2002-08-01), Schuyler
patent: 2004/0049675 (2004-03-01), Micali et al.
Munro, J., “Windows Product Activation (WPA) for Windows XP”, Aug. 6, 2001, PC Magazine, Ziff Davis Media Inc., entire document, http://www.extremetech.com/print—article2/0, 1217,a=11079,00.asp.
Fischer, Viktor , et al, ‘Simple PLL-Based True Random Number Generator for Embedded Digital Systems’, IEEE workshop on Design and Diagnostics of Electronic Circuits and Systems, Apr. 18-21, 2004, entire document, www.best.tuke.sk/simka/download/pub/fis—dru—sim—cel—04.pdf.
Merriam-Webster's Collegiate Dictionary, 10thedition, Merriam-Webster, Inc. 1998, “environment” 1:, p. 387.
Schneier, Bruce, “Applied Cryptography,” 1996, John Wiley & Sons, Inc., pp. 423-426, 174.
Ellison, C; and Schneier, B, “Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure,” 2000, Computer Security Journal, vol. 16, No. 1, pp. 1-7.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Electronic file protection using location does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Electronic file protection using location, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Electronic file protection using location will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3838848

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.