Search
Patexia Research

Patent 07738660 - Cryptographic key split binding process and apparatus > Claims

  • 1. A process for decrypting an encrypted object, comprising: generating a plurality of cryptographic key splits, each based on seed data; randomizing the cryptographic key splits to produce a cryptographic key; and applying the cryptographic key to the encrypted object according to a pre-determined object/key relationship to produce an unencrypted object; wherein generating a plurality of cryptographic key splits includes generating a location key split based on location seed data; wherein generating a plurality of cryptographic key splits further includes generating a random key split based on random seed data, generating an organization key split based on organization seed data, and generating a maintenance key split based on maintenance seed data.
    • 2. The process of claim 1, further comprising receiving the location seed data from a geographic location device.
    • 3. The process of claim 1, wherein the location seed data is based at least in part on at least one of virtual location data, actual location data, and relative location data.
    • 4. The process of claim 1, wherein the location seed data corresponds to at least one of virtual location data, actual location data, and relative location data.
    • 5. The process of claim 1, wherein the location seed data is based at least in part on at least one of Global Positioning System receiver output data and Galileo receiver output data.
    • 6. The process of claim 1, wherein the location seed data corresponds to at least one of Global Positioning System receiver output data and Galileo receiver output data.
    • 7. The process of claim 1, wherein the location seed data is based at least in part on at least one of longitude, latitude, altitude, and satellite distance data.
    • 8. The process of claim 1, wherein the location seed data corresponds to at least one of longitude, latitude, altitude, and satellite distance data.
    • 9. The process of claim 1, further comprising receiving the location seed data from a computer network.
    • 10. The process of claim 1, wherein the location seed data is based at least in part on a network location.
    • 11. The process of claim 1, wherein the location seed data corresponds to a network location.
    • 12. The process of claim 1, wherein the location seed data is based at least in part on at least one of an Internet Protocol address and a Media Access Control address.
    • 13. The process of claim 1, wherein the location seed data corresponds to at least one of an Internet Protocol address and a Media Access Control address.
    • 14. The process of claim 1, wherein the location seed data is based at least in part on network domain data.
    • 15. The process of claim 1, wherein the location seed data corresponds to network domain data.
    • 16. The process of claim 1, wherein the cryptographic key is a stream of symbols.
    • 17. The process of claim 1, wherein the cryptographic key is at least one symbol block.
    • 18. The process of claim 1, wherein the cryptographic key is a key matrix.
Menu