US 12,170,720 B2
Location-key encryption system
Erik A. Aronesty, New York, NY (US); Christopher Higley, New York, NY (US); Joseph Oren Tysor, New York City, NY (US); Aman Grewal, New York, NY (US); Daniel Gallancy, Accord, NY (US); David Cash, Chicago, IL (US); and Alexander Pinkerton, New York, NY (US)
Assigned to Atakama LLC, New York, NY (US)
Filed by Atakama LLC, New York, NY (US)
Filed on May 9, 2022, as Appl. No. 17/739,537.
Claims priority of provisional application 63/186,325, filed on May 10, 2021.
Prior Publication US 2022/0360429 A1, Nov. 10, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/06 (2006.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01)
CPC H04L 9/0637 (2013.01) [H04L 9/0643 (2013.01); H04L 9/0872 (2013.01); H04L 9/3066 (2013.01)] 28 Claims
OG exemplary drawing
 
1. An encryption method comprising:
creating an asymmetric profile key using a set of user devices, the asymmetric profile key comprising a multipart threshold key;
signing a declaration using the profile key and each device of the set of user devices, the declaration identifying the set of user devices;
creating an asymmetric location key comprising two multipart threshold keys;
sharding and storing the asymmetric location key;
creating a symmetric key;
encrypting a file with the symmetric key;
encrypting the symmetric key with the location key; and
storing the encrypted file and encrypted key such that the encrypted file cannot be decrypted without decrypting the encrypted key by a threshold of the set of user devices;
wherein the two multipart threshold keys of the location key are generated with different elliptic curves;
wherein one of the two multipart threshold keys of the location key is used for signing and a second of the two multipart threshold keys of the location key is used for the encrypting of the symmetric key.