Geolocation-based encryption method and system

ABSTRACT

A geolocation-based encryption method and system. The geolocation-based encryption method and system may comprise the steps of: providing an encryption application running on a first mobile computing device and a second mobile computing device; generating a key based, at least in part, of a geolocation data, a device identification data, and a unique file identifier associated with said digital content; selecting a target location on the first mobile computing device to create a GPS data, which may be a portion of the geolocation data; encrypting a digital content based on the key; establishing secure session(s) among the user, a recipient, and server(s); and transmitting the encrypted digital content to the server(s). The encrypted digital content may be transmitted from the server(s) to the second mobile computing device. The encryption application may decrypt the encrypted digital content based on the key.

FIELD OF USE

This U.S. Non-Provisional Patent Application is a Continuation of U.S.Non-Provisional patent application Ser. No. 15/908,489, filed on Feb.28, 2018, titled “Geolocation-Based Encryption Method and System”, byinventor Agostino Sibillo. U.S. Non-Provisional patent application Ser.No. 15/908,489 claims the benefit of U.S. Non-Provisional PatentApplication No. Ser. No. 14/960,034, now U.S. Pat. No. 9,940,477, filedon Dec. 4, 2015, titled “Geolocation-Based Encryption Method andSystem”, by inventor Agostino Sibillo. This U.S. Non-Provisional PatentApplication and U.S. Non-Provisional Patent Application Nos. 15/908,489and 14/960,034 claim priority to and the benefit of U.S. ProvisionalPatent Application No. 62/090,496, filed on Dec. 11, 2014, titled“Geolocation-Based Encryption Method and System”, by inventor AgostinoSibillo, the contents of which all three parent Applications areexpressly incorporated herein by this reference as though set forth intheir entirety.

FIELD OF USE

The present disclosure relates generally to the field of encryption, andmore specifically, to methods and systems for location andgeolocation-based encryption schemes for securely distributing andaccessing messages and files.

BACKGROUND

Encryption is the process of encoding digital content stored on computersystems, such as messages, data, and/or information in order to protectthe confidentiality of the content and to secure such content fromunauthorized use. For example, a message may be encrypted intociphertext using one or more cryptographic techniques. The content maythen be read to authorized users only when the content is decrypted.Thus, the primary benefits of encryption is to maintain the data'sintegrity and limit access to the data to only authorized users.

Despite the various cryptographic techniques available, these techniquesdo not always provide adequate security. For example, variouscryptographic products and software utilize long key lengths. Althoughlonger decryption keys are more powerful, these keys are not a panacea,as the decryption key or password may be compromised through crackingtechniques such as the brute force method. Although the brute forcemethod generally requires vast amounts of computing power, and more isneeded as the length of the key increase—(e.g., a 32-bit key takes 2̂32(4294967296) steps while a system with 40 bit keys (e.g., US-exportableversion of RC4) generally takes 2̂40 steps), such computing power isgenerally available at most universities and small companies.

Another example is the use of identity-based encryption schemes.Identity-based encryption allows a party to create a public key basedupon a public, unique identifier such as an e-mail address. When thesender desires to send an encrypted message to a recipient, the senderwould only need to know the identifier for sending the message. Oncereceiving the encrypted message for the first time, the recipient wouldthen request the corresponding private key from a trusted third party(i.e., Private Key Generator (PKG)). The private key is then preferablyused to decrypt the message.

Unfortunately, once the third party PKG is compromised, all messagesprotected over the entire lifetime of the public-private key pair usedby that particular server may also be compromised. Thus, the third partyPKG generally becomes a prime target to adversaries or to those seekingto break the encryption(s). Although a master private-public key pairmay be updated with a new independent key pair, this may create akey-management problem, as most users must have the most recent publickey for the server.

Accordingly, there is a need for a new and improved method forencrypting messages and digital data content. Preferably, the new andimproved encryption method utilizes geolocation data and internetprotocol address data to improve security.

SUMMARY OF EMBODIMENTS

To minimize the limitations in the prior art, and to minimize otherlimitations that will become apparent upon reading and understanding thepresent specification, the present specification discloses a new andimproved geolocation-based encryption method and system.

One embodiment may be a geolocation-based encryption method, the methodcomprising: providing an encryption application; wherein the encryptionapplication is configured to run on a first mobile computing device andencrypt a digital content stored in a computer readable storage medium;prompting a user of the first mobile computing device to select a targetlocation on the first mobile computing device to create a globalpositioning system data; generating a key based on a geolocation data, adevice identification data, and a unique file identifier associated withthe digital content; wherein the geolocation data may comprise theglobal positioning system data; encrypting the digital content based onthe key; establishing one or more secure sessions between the user andthe one or more servers; and transmitting the encrypted digital contentto the one or more servers; wherein the encryption application runningon the first mobile computing device may be configured to: (1) downloadthe encrypted digital content from the one or more servers based on thedevice identification data and the unique file identifier; and (2)decrypt the encrypted digital content based on the key to generate adecrypted digital content. The device identification data may comprisean internet protocol address of the first mobile computing device. Theencryption application may be configured to run on a second mobilecomputing device associated with a recipient of the digital content;wherein the device identification data may comprise an internet protocoladdress of the second mobile computing device; and wherein theencryption application running on the second mobile computing device maybe configured to: (1) download the encrypted digital content from theone or more servers based on the device identification data and theunique file identifier; and (2) decrypt the encrypted digital contentbased on the key to generate the decrypted digital content. The deviceidentification data may comprise a machine access control address of thesecond mobile computing device. The decryption of the encrypted digitalcontent may occur only when the second mobile computing device isphysically positioned approximately at the target location. Thedecryption of the encrypted digital content may occur on the secondmobile computing device only when the recipient selects the targetedlocation on a digital map displayed on the second mobile computingdevice. The geolocation-based encryption method may further comprise thestep: prompting the user to physically orient the first mobile computingdevice to a target orientation to create a target gyroscope data;wherein the geolocation data may comprise the target gyroscope data; andwherein the decryption of the encrypted digital content may occur on thesecond mobile computing device only when the second mobile computingdevice is physically oriented at approximately the target orientation.The display screen of the second mobile computing device may display anenvironment with an image overlay of the decrypted digital content via acamera of the second mobile computing device when the second mobilecomputing device is physically oriented at approximately the targetorientation. The image overlay may be one or more advertisements. Theimage overlay may be a clue for a scavenger hunt, the clue being adaptedto direct the user to a second target location.

Another embodiment may be a geolocation-based encryption system, thesystem comprising: a first mobile computing device having a computerreadable storage medium, comprising one or more instructions that, whenexecuted by the first mobile computing device, cause the first mobilecomputing device to: prompt a user of the first mobile computing deviceto select a target location on the first mobile computing device tocreate a global positioning system data; generate a key based on ageolocation data, a device identification data, and a unique fileidentifier associated with the digital content; wherein the geolocationdata may comprise the global positioning system data; encrypt a digitalcontent stored in the computer readable storage medium based on the key;establish one or more secure sessions among the user, a recipient of thedigital content, and the one or more servers; and transmit the encrypteddigital content to a second mobile computing device associated with therecipient via the one or more servers; wherein the encryptionapplication running on the second mobile computing device may beconfigured to decrypt the encrypted digital content based on the key togenerate a decrypted digital content. The device identification data maycomprise an internet protocol address of the second mobile computingdevice. The decryption of the encrypted digital content may only occurwhen the second mobile computing device is physically positionedapproximately at the target location. The decryption of the encrypteddigital content may only occur when the recipient selects the targetedlocation on a digital map displayed on the second mobile computingdevice. The geolocation-based encryption method may further comprise:prompting a user to physically orient the first mobile computing deviceto a target orientation to create a target gyroscope data; wherein thegeolocation data may comprise the target gyroscope data; wherein thedecryption of the encrypted digital content may occur only when thesecond mobile computing device is physically oriented at approximatelythe target orientation.

Another embodiment may be a non-transitory computer readable medium,comprising one or more executable instructions, which, when executed bya first mobile computing device, configure the first mobile computingdevice to perform a geolocation-based encryption, the method comprising:prompting a user of the first mobile computing device to select a targetlocation on the first mobile computing device to create a globalpositioning system data; generating a key based on a geolocation data, adevice identification data, and a unique file identifier associated withthe digital content; wherein the geolocation data may comprise theglobal positioning system data; encrypting a digital content stored in acomputer readable storage medium based on the key; establishing one ormore secure sessions among the user, a recipient of the digital content,and the one or more servers; and transmitting the encrypted digitalcontent to the second mobile computing device via the one or moreservers; wherein the encryption application running on the second mobilecomputing device may be configured to decrypt the encrypted digitalcontent based on the key to generate a decrypted digital content. Thedevice identification data may comprise an internet protocol address ofthe second mobile computing device. The decryption of the encrypteddigital content may only occur when the second mobile computing deviceis physically positioned approximately at the target location. Thedecryption of the encrypted digital content may only occur when therecipient selects the targeted location on a digital map displayed onthe second mobile computing device. The non-transitory computer readablemedium may further comprise the step of: prompting a user to physicallyorient the first mobile computing device to create a target orientationto create a target gyroscope data; wherein the target gyroscope data maybe a portion of the geolocation data; and wherein the decryption of theencrypted digital content may occur only when the second mobilecomputing device is approximately physically oriented at the targetorientation.

Another embodiment may be a geolocation-based encryption method, themethod comprising: providing an encryption application; wherein theencryption application may be configured to run on a first mobilecomputing device and a second mobile computing device; generating a key;wherein the key may comprise a geolocation data; prompting a user of thefirst mobile computing device to select a target location on the firstmobile computing device to create a global positioning system data;wherein the global positioning system data may be a portion of thegeolocation data; encrypting a digital content stored in a computerreadable storage medium by the encryption application running on thefirst mobile computing device based on the key; establishing one or moresecure sessions among the user, a recipient of the digital content, andthe one or more servers; and transmitting the encrypted digital contentto the second mobile computing device via the one or more servers;wherein the encryption application running on the second mobilecomputing device may be configured to decrypt the encrypted digitalcontent based on the key to generate a decrypted digital content. Thekey may further comprise a device identification data of the secondmobile computing device. The device identification data may comprise aninternet protocol address of the second mobile computing device. Thedevice identification data may comprise a machine access control addressof the second mobile computing device. The decryption of the encrypteddigital content may occur only when the second mobile computing deviceis physically positioned approximately at the target location. Thedecryption of the encrypted digital content may occur on the secondmobile computing device only when the recipient selects the targetedlocation on a digital map displayed on the second mobile computingdevice. The geolocation-based encryption method may further comprise:prompting the user to physically orient the first mobile computingdevice to a target orientation to create a target gyroscope data;wherein the target gyroscope data may be a portion of the geolocationdata; and wherein the decryption of the encrypted digital content mayoccur on the second mobile computing device only when the second mobilecomputing device is physically oriented at approximately the targetorientation. The display screen of the second mobile computing devicemay display an environment with an image overlay of the decrypteddigital content via a camera of the second mobile computing device andwhen the second mobile computing device is physically oriented atapproximately the target orientation. The image overlay may be one ormore advertisements. The image overlay may be a clue for a scavengerhunt, the clue being adapted to direct the user to a second targetlocation.

Another embodiment may be a geolocation-based encryption system, thesystem comprising: a first mobile computing device having a computerreadable storage medium, comprising one or more instructions that, whenexecuted by the first mobile computing device, cause the first mobilecomputing device to: generating a key; wherein the key may comprise ageolocation data; prompting a user of the first mobile computing deviceto select a target location on the first mobile computing device tocreate a global positioning system data; wherein the global positioningsystem data may be a portion of the geolocation data; encrypting adigital content stored in the computer readable storage medium based onthe key; establishing one or more secure sessions among the user, arecipient of the digital content, and the one or more servers; andtransmitting the encrypted digital content to the second mobilecomputing device via the one or more servers; wherein the encryptionapplication running on the second mobile computing device may beconfigured to decrypt the encrypted digital content based on the key togenerate a decrypted digital content. The key may further comprise adevice identification data of the second mobile computing device;wherein the device identification data may comprise an internet protocoladdress of the second mobile computing device; and wherein the deviceidentification data may comprise a machine access control address of thesecond mobile computing device. The decryption of the encrypted digitalcontent may only occur when the second mobile computing device isphysically positioned approximately at the target location. Thedecryption of the encrypted digital content may only occur when therecipient selects the targeted location on a digital map displayed onthe second mobile computing device. The geolocation-based encryptionmethod may further comprise: prompting a user to physically orient thefirst mobile computing device to a target orientation to create a targetgyroscope data; wherein the target gyroscope data may be a portion ofthe geolocation data; wherein the decryption of the encrypted digitalcontent may occur only when the second mobile computing device isphysically oriented at approximately the target orientation.

Another embodiment may be a non-transitory computer readable medium,comprising one or more executable instructions, which, when executed bya first mobile computing device, configure the first mobile computingdevice to perform a geolocation-based encryption, the method comprising:generating a key; wherein the key may comprise a geolocation data;prompting a user of the first mobile computing device to select a targetlocation on the first mobile computing device to create a globalpositioning system data; wherein the global positioning system data maybe a portion of the geolocation data; encrypting a digital contentstored in a computer readable storage medium based on the key;establishing one or more secure sessions among the user, a recipient ofthe digital content, and the one or more servers; and transmitting theencrypted digital content to the second mobile computing device via theone or more servers; and wherein the encryption application running onthe second mobile computing device may be configured to decrypt theencrypted digital content based on the key to generate a decrypteddigital content. The key may further comprise a device identificationdata of the second mobile computing device; wherein the deviceidentification data may comprise an internet protocol address of thesecond mobile computing device; and wherein the device identificationdata may comprise a machine access control address of the second mobilecomputing device. The decryption of the encrypted digital content mayonly occur when the second mobile computing device is physicallypositioned approximately at the target location. The decryption of theencrypted digital content may only occur when the recipient selects thetargeted location on a digital map displayed on the second mobilecomputing device. The non-transitory computer readable medium mayfurther comprise: prompting a user to physically orient the first mobilecomputing device to create a target orientation to create a targetgyroscope data; wherein the target gyroscope data may be a portion ofthe geolocation data; and wherein the decryption of the encrypteddigital content may occur only when the second mobile computing deviceis approximately physically oriented at the target orientation.

Another embodiment may a geolocation-based encryption method, the methodcomprising: providing an encryption application; wherein the encryptionapplication may be configured to run on a first mobile computing deviceand a second mobile computing device; wherein the encryption applicationmay be configured to generate a key based, at least in part, of ageolocation data; prompting a user of the first mobile computing deviceto select a target location on the first mobile computing device tocreate a global positioning system data, the global positioning systemdata being a portion of the geolocation data; encrypting a digitalcontent stored in a computer readable storage medium by the encryptionapplication running on the first mobile computing device based on thekey; establishing one or more secure sessions among the user, arecipient of the digital content, and the one or more servers; andtransmitting the encrypted digital content to the one or more servers;wherein the encrypted digital content may be transmitted from the one ormore servers to the second mobile computing device; and wherein theencryption application running on the second mobile computing device maybe configured to decrypt the encrypted digital content based on the keyto generate the decrypted digital content. The key may be also based, atleast in part, of a device identification data of the second mobilecomputing device. The device identification data may comprise aninternet protocol address of the second mobile computing device. Thedevice identification data may comprise a machine access control addressof the second mobile computing device. The decryption of the encrypteddigital content on the second mobile computing device may occur when thesecond mobile computing device is physically positioned at leastapproximately at the target location based on the global positioningsystem data, such that the recipient is also physically located at thetarget location. The decryption of the encrypted digital content mayoccur on the second mobile computing device when the recipient selectsthe targeted location on a digital map displayed on the second mobilecomputing device. The geolocation-based encryption method may furthercomprise the step of: prompting a user to physically orient the firstmobile computing device to create a target gyroscope data, the targetgyroscope data being a portion of the geo-location data; wherein thedecryption of the encrypted digital content may occur on the secondmobile computing device when the second mobile computing device is atleast approximately physically oriented based on the target gyroscopicdata. The display screen of the second mobile computing device maydisplay an environment with an image overlay of the decrypted digitalcontent when a camera of the second mobile computing device is activatedand when the second mobile computing device is at least physicallyoriented based on the target gyroscope data. The image overlay may beone or more advertisements. The image overlay may be a clue for ascavenger hunt, the clue being adapted to direct the user to a secondtarget location.

Another embodiment may be a geolocation-based encryption system, thesystem comprising: a first mobile computing device having a computerreadable storage medium, comprising one or more instructions that, whenexecuted by the first mobile computing device, cause the first mobilecomputing device to: generating a key based, at least in part, of ageolocation data; prompting a user of the first mobile computing deviceto select a target location on the first mobile computing device tocreate a global positioning system data, the global positioning systemdata being a portion of the geolocation data; encrypting a digitalcontent stored in a computer readable storage medium based on the key;establishing one or more secure sessions among the user, a recipient ofthe digital content, and the one or more servers; and transmitting theencrypted digital content to the one or more servers; wherein theencrypted digital content may be transmitted from the one or moreservers to the second mobile computing device; and wherein theencryption application running on the second computer may be configuredto decrypt the encrypted digital content based on the key to generatethe decrypted digital content. The key may be also based, at least inpart, of a device identification data of the second mobile computingdevice; wherein device identification data may comprise an internetprotocol address of the second mobile computing device; and wherein thedevice identification data may comprise a machine access control addressof the second mobile computing device. The decryption of the encrypteddigital content on the second mobile computing device may occur when thesecond mobile computing device is physically positioned at leastapproximately at the target location based on the global positioningsystem data, such that the recipient is also physically located at thetarget location. The decryption of the encrypted digital content mayoccur on the second mobile computing device when the recipient selectsthe targeted location on a digital map displayed on the second mobilecomputing device. The geolocation-based encryption method may furthercomprise the step of: prompting a user to physically orient the firstmobile computing device to create a target gyroscope data, the targetgyroscope data being a portion of the geo-location data; wherein thedecryption of the encrypted digital content may occur on the secondmobile computing device when the second mobile computing device is atleast approximately physically oriented based on the target gyroscopicdata.

Another embodiment may be a non-transitory computer readable medium,comprising one or more executable instructions, which, when executed bya first mobile computing device, configure the first mobile computingdevice to perform a geolocation-based encryption method, comprising:generating a key based, at least in part, of a geolocation data;prompting a user of the first mobile computing device to select a targetlocation on the first mobile computing device to create a globalpositioning system data, the global positioning system data being aportion of the geolocation data; encrypting a digital content stored ina computer readable storage medium based on the key; establishing one ormore secure sessions among the user, a recipient of the digital content,and the one or more servers; and transmitting the encrypted digitalcontent to the one or more servers; wherein the encrypted digitalcontent may be transmitted from the one or more servers to the secondmobile computing device; and wherein the encryption application runningon the second computer may be configured to decrypt the encrypteddigital content based on the key to generate the decrypted digitalcontent. The key may also be based, at least in part, of a deviceidentification data of the second mobile computing device; whereindevice identification data may comprise an internet protocol address ofthe second mobile computing device; and wherein the deviceidentification data may comprise a machine access control address of thesecond mobile computing device. The decryption of the encrypted digitalcontent on the second mobile computing device may occur when the secondmobile computing device is physically positioned at least approximatelyat the target location based on the global positioning system data, suchthat the recipient is also physically located at the target location.The decryption of the encrypted digital content may occur on the secondmobile computing device when the recipient selects the targeted locationon a digital map displayed on the second mobile computing device. Thegeolocation-based encryption method may further comprise the step of:prompting a user to physically orient the first mobile computing deviceto create a target gyroscope data, the target gyroscope data being aportion of the geo-location data; wherein the decryption of theencrypted digital content may occurs on the second mobile computingdevice when the second mobile computing device is at least approximatelyphysically oriented based on the target gyroscopic data.

It is an object to provide a method that encrypts digital content storedon a user's device. Preferably, the encryption method utilizes a keybased on various geolocation data such as global positioning system(GPS) data generated by the mobile computing device and gyroscope data.The key of the encryption method may also utilize a deviceidentification data such as an internet protocol (IP) address andmachine access control (MAC) address of the mobile computing device toencrypt and decrypt the digital content. The key of the encryptionmethod may also utilize a unique file identifier associated with thedigital content to be encrypted.

It is an object to provide a method that enables communication privacybetween various individuals. Preferably, the method enables a user topublish a public comment regarding any location in the world and on thenature, activity, substance and condition of that location by “dropping”messages tied to that location.

It is an object to provide a method that encrypts digital content storedon a user's device with a key utilizing: (1) geolocation data (e.g., GPScoordinates data, gyroscope data) and (2) device identification data(e.g., IP address data, MAC address data). The geolocation data may beprovided by the user via the following steps: (i) loading a digital mapusing the encryption application running on the mobile computing deviceof the user; (ii) selecting a target location on the digital map (e.g.,dropping a pin of the target location on the digital map) to obtain GPScoordinates; and (iii) using the GPS coordinates as the geolocation datafor the key.

In order for the recipient to decrypt the digital content, the recipientmay decrypt such content via multiple approaches. In one embodiment, therecipient may decrypt the encrypted content by performing the followingsteps: (i) visiting the target location selected by the user, such thatthe GPS coordinates generated by the recipient's mobile computing devicefulfill the geolocation data portion of the key; (ii) activating thecamera function on the mobile computing device; and (iii) viewing thedecrypted digital content on the display screen of the mobile computingdevice. The IP address and MAC address of the recipient's mobilecomputing device may be used to satisfy the device identification dataportion of the key. Additionally, the gyroscope data generated by themobile computing device may be used to orient the device at a particularangle for viewing the decrypted message. Thus, in this embodiment, therecipient preferably decrypts the encrypted digital content byphysically visiting the target location selected by the user.

In another embodiment, the recipient may decrypt the encrypted contentby performing the following steps: (i) loading a digital map using theencryption application running on the recipient's mobile computingdevice; (ii) inputting or selecting the target location selected by theuser previously (e.g., dropping a pin of the target location on thedigital map); and (iii) based on the target location inputted by therecipient, using the GPS coordinates of that target location to satisfythe geolocation data portion of the key. The IP address and MAC addressof the recipient's mobile computing device may be used to satisfy thedevice identification data portion of the key. Thus, in this embodiment,the recipient may decrypt the encrypted digital content simply byselecting the target location on a digital map without having tophysically visit the target location.

In another embodiment, the geolocation-based encryption method may beused to create a scavenger hunt. In one embodiment, the scavenger huntmay allow a user to create a series of clues which are accessible by ascavenger hunt participant once one or more of the decryption keyparameters are met or substantially met. The clue may be displayed as anoverlay, as described above, or by another way of communicatinginformation to the scavenger hunt participant. The clue may provide thescavenger hunt participant with a hint as to how to meet one or more ofthe decryption key parameters of the next clue in order to view the nextclue. The scavenger hunt may have a series of clues, with each cluedirecting the scavenger hunt participant to find a next clue until thescavenger hunt has been completed.

In another embodiment, the scavenger hunt may allow the recipient todecrypt messages that direct one or more recipients to visit additionaltarget locations in order to obtain additional clues for the scavengerhunt. Specifically, when a recipient decrypts the encrypted content byphysically visiting the target location, the decrypted digital contentmay include additional clues for the next target location.

In another embodiment, the method may include advertisements.Specifically, in this embodiment, when the recipient decrypts theencrypted content, the decrypted digital content may compriseadvertisements that promote the goods or services for a company.

In various embodiments, the server may store the following: (1) theencrypted digital content, (2) unique file identifier associated withthat digital content; and (3) IP address or mobile computing device ofthe user or intended recipient. The user or recipient may then downloador retrieve that encrypted digital content if the IP address of theuser's or recipient's mobile device is verified by the encryptionapplication running on that mobile device. This may be achieved by crosschecking the IP address of the user's or recipient's mobile device andthe IP address stored in the server. Once verified, the user orrecipient may download or retrieve the encrypted digital content.

In another embodiment, after the encrypted digital content is downloadedto the user's or recipient's mobile computing device, the user's orrecipient's mobile computing device may also store the following: (1)unique file identifier associated with that digital content and (2)geolocation data. The user or recipient may then proceed in having theencryption application decrypt the encrypted digital content. In doingso, the encryption application may verify the geolocation data stored inthe mobile computing device by checking the (1) unique file identifierassociated with that digital content and/or (2) geolocation data. Onceverified, the encryption application may proceed with the decryption ofthe encrypted digital content.

It is an object to provide a computer-based method that allows users toview decrypted digital content via a camera and a display screen of themobile computing device.

It is an object to provide a new method for promoting advertisements viageolocation-based encryption. Preferably, users utilizing the cameras ontheir mobile phones may be able to decrypt and view messages that havebeen created for the general public to view. Preferably, these publicmessages are viewable only at the locations where they were originallycreated.

It is an object to overcome the deficiencies of the prior art.

These, as well as other components, steps, features, objects, benefits,and advantages, will now become clear from a review of the followingdetailed description of illustrative embodiments, of the accompanyingphotographs, and of the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings show illustrative embodiments, but do not depict allembodiments. Other embodiments may be used in addition to or instead ofthe illustrative embodiments. Details that may be apparent orunnecessary may be omitted for the purpose of saving space or for moreeffective illustrations. Some embodiments may be practiced withadditional components or steps and/or without some or all components orsteps provided in the illustrations. When different drawings contain thesame numeral, that numeral refers to the same or similar components orsteps.

FIG. 1 is an illustration of one embodiment of a geolocation-basedencryption method.

FIG. 2 is a block diagram of one embodiment of a mobile computingdevice.

FIG. 3 is an illustration of one embodiment of the geolocation-basedencryption system.

FIG. 4 is a screenshot of one embodiment of the encryption applicationand shows how a user may select a target location on the encryptionapplication.

FIG. 5 is an illustration of one embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device.

FIG. 6 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device.

FIG. 7 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device.

FIG. 8 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device with a display whileusing a filter.

FIG. 9 is a screenshot of one embodiment of the encryption applicationshowing a scavenger hunt.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

In the following detailed description of various embodiments, numerousspecific details are set forth in order to provide a thoroughunderstanding of various aspects of one or more embodiments. However,one or more embodiments may be practiced without some or all of thesespecific details. In other instances, well-known procedures and/orcomponents have not been described in detail so as not to unnecessarilyobscure aspects of the embodiments.

While some embodiments are disclosed here, still other embodiments willbecome obvious to those skilled in the art as a result of the followingdetailed description of the illustrative embodiments. The embodimentsare capable of modifications of various obvious aspects, all withoutdeparting from the spirit and scope of the protection. The figures, andtheir detailed descriptions, are to be regarded as illustrative innature and not restrictive. Also, the reference or non-reference to aparticular embodiment shall not be interpreted to limit the scope ofprotection.

Definitions

In the following description, certain terminology is used to describecertain features of one or more embodiments. For instance, the terms“computer”, “computer system”, and “mobile computing device” generallyrefer to any apparatus or device that processes information with anintegrated circuit chip, including without limitation, mainframecomputers, workstations, gaming consoles, servers, desktop computers,portable computers, laptop computers, and embedded computers.Furthermore, the term “mobile computing device” may refer to anywireless electronic devices including smart phones, cellular phones,tablet computers, personal digital assistants, digital media players,portable game players, and hand-held computers.

As used herein, the terms “Internet” or “Cloud” generally refers to anycollection of networks that utilizes standard protocols, whetherEthernet, Token ring, Wi-Fi, asynchronous transfer mode (ATM), FiberDistributed Data Interface (FDDI), code division multiple access (CDMA),global systems for mobile communications (GSM), long term evolution(LTE), or any combination thereof.

As used herein, the terms “application”, “software”, “encryptionapplication”, or “software application” generally refer to any set ofmachine-readable instructions on a client machine, web interface, mobilecomputing device, and/or mobile computing device, that directs aprocessor to perform specific steps, processes, or operations disclosedherein.

As used herein, the term “geolocation” generally refers the process ortechnique of identifying the geographical location of a person or deviceby means of digital information processed via the Internet. Thus,geolocation-based encryption may refer to technology that utilizes auser's location when using the Internet or a mobile phone. The term“geolocation data” may refer to data that is utilized for locating auser, including without limitation, network router list data, globalpositioning satellite data, internet protocol address data, gyroscopedata, and an accelerometer data. The term “network router list data” mayrefer to any data or information pertaining to the existing routers atan actual, physical location of a user.

The present specification discloses a geolocation-based encryptionmethod and system. The method and system may be used to encrypt anddecrypt digital content based on a location selected by a user.Specifically, a user may encrypt a message and its attachments using asoftware algorithm that creates a key based on, inter alia, geolocationdata (e.g., global positioning satellite (GPS) data, gyroscope data)and/or device identification data (e.g., internet protocol (IP) addressdata, machine access control (MAC) address data) of the mobile computingdevice of the user(s) or recipient(s). The recipient may then decryptthe message and attachments based on the key using the same type ofdata—e.g., GPS, gyroscope, and IP address—of the recipient's mobilecomputing device.

In particular, when encrypting a message, the GPS capabilities andgyroscope data of the mobile computing device may be used by theencryption software to create a key. Optionally, data pertaining to alist of networking hardware (e.g., network routers) near (or at leastwithin range of) the user and mobile computing device (i.e., networkrouter list data) may also be sent to the encryption software as part ofthe key. For example, in one embodiment, the list of networking hardwaremay be acquired by the mobile computing device by scanning and receivingof wireless signals of the networking hardware located near the mobilecomputing device of the user. After the digital content is encrypted,the digital content may be sent and stored on a server and may beaccessible by the recipient only when the recipient inputs the propertarget location or is at the target location. Preferably, the message isaddressed to a specific device owned by the recipient via a uniqueidentification number (e.g., IP address/MAC address of the mobilecomputing device). That way, the message may only be decrypted by thatspecific mobile computing device.

In order for the recipient to decrypt the digital content, the recipientmay decrypt such content in various approaches. In one embodiment, therecipient may decrypt the encrypted content by performing the followingsteps: (i) visiting the target location selected by the user, such thatthe GPS coordinates generated by the recipient's mobile computing devicefulfill the geolocation data portion of the key; (ii) activating thecamera function on the mobile computing device; and (iii) viewing thedecrypted digital content on the display screen of the mobile computingdevice. The IP address and MAC address of the recipient's mobilecomputing device may be used to satisfy the device identification dataportion of the key. Additionally, the gyroscope data generated by themobile computing device may be used to orient the device at a particularangle for viewing the decrypted message. Thus, in this embodiment, therecipient preferably decrypts the encrypted digital content byphysically visiting the target location selected by the user and perhapsorienting the device at a particular angle.

In another embodiment, the recipient may decrypt the encrypted contentby performing the following steps: (i) loading a digital map using theencryption application running on the recipient's mobile computingdevice; (ii) inputting or selecting the target location selected by theuser previously (e.g., dropping a pin of the target location on thedigital map); and (iii) based on the target location inputted by therecipient, using the GPS coordinates of that target location to satisfythe geolocation data portion of the key. The IP address and MAC addressof the recipient's mobile computing device may be used to satisfy thedevice identification data portion of the key. Thus, in this embodiment,the recipient may decrypt the encrypted digital content simply byselecting the target location on a digital map without having tophysically visit the target location.

In another embodiment, the key may comprise network router list data, IPaddress, GPS coordinates, and gyroscope data, which may then be used todecrypt the message. For instance, by positioning the camera and displayof the mobile computing device at the target location and by compiling alist (complete or partial) of networking hardware nearby the mobileelectronic device, the user may then decrypt the message and access andview the encrypted and previously hidden message.

In the event that the recipient is located somewhat near the desiredlocation, but not at the precise targeted area, the software may directthe intended recipient to the exact location to enable the recipient todecrypt the message.

In various embodiments, the geolocation-based encryption method andsystem may also utilize generic public message by using digitaladvertising space, which would be visible when users use theirelectronic device to search for the exact physical location of themessage. For example, the public message may be in the form ofadvertisements. The advertisement may appear to the user via the cameraof the mobile computing device.

FIG. 1 is an illustration of one embodiment of a geolocation-basedencryption method. As shown in FIG. 1, one embodiment of thegeolocation-based encryption method 100 may comprise steps 105, 110,115, 118, 120, 125, 130, 135, 140. Specifically, FIG. 1 shows that themethod 100 may comprise the first step 105 of providing an encryptionapplication. The encryption application is generally an application orsoftware program that runs on a computer system or mobile computingdevice and may be configured to encode or encrypt digital content suchas a message, image, or video so that the encrypted digital content canbe read only by the user/sender and/or intended recipient(s).Importantly, the encryption application may also be configured toencrypt such digital content based on, inter alia, geolocation data. Forexample, in one embodiment, the encryption application may encryptdigital content based on a key utilizing geolocation data such as GPSdata (e.g., GPS coordinates). In another embodiment, the encryptionapplication may also encrypt digital content based on a key utilizinggyroscope data. In various embodiments, the encryption application mayalso encrypt digital content utilizing other data such deviceidentification data, which may include IP address data and/or MACaddress data, and perhaps a unique file identifier associated with thedigital content to be encrypted. This will preferably allow only thesender or the intended recipient to receive, decrypt, and/or view thedigital content. In various embodiments, the encryption application mayalso be configured to decode or decrypt the encrypted digital content.

FIG. 1 also shows the next step 110, which may be prompting the user ofa first mobile computing device to select a target location. This mayallow the encryption application to also create global positioningsystem data, which may be at least part of the geolocation datanecessary for a key. The global positioning system data may, forexample, be latitudinal and longitudinal coordinates of a specificlocation on a map, and, in some embodiments, the latitudinal andlongitudinal coordinates may be converted to a numeric or alphanumericvalue used for the encryption key.

In one embodiment, the user may select a target location by simplytouching or pinning a target location shown on that digital map.Specifically, the user may first launch a digital map on his or hermobile computing device via the encryption application and touch or“pin” the exact target location on that digital map. In anotherembodiment, the user may select a target location by simply inputtingthe GPS coordinates into the encryption application. In this manner, theuser may type the desired GPS coordinates into the encryptionapplication in order to select the target location. In variousembodiments, the user may need to be physically present at the targetlocation in order to select a target location.

In addition to geolocation data, the encryption application may alsoutilize the IP address and/or MAC address of the mobile computing deviceof the user or recipient to further strengthen the encryption of thedigital content. The encryption application may also use a unique fileidentifier associated with the digital content as part of the key toalso further strengthen the encryption of the digital content. Theunique file identifier may be a unique alphanumeric or numeric valueassigned to that particular digital content.

FIG. 1 also shows that, in other embodiments, the geolocation-basedencryption method 100 may also comprise step 115, which may be promptingthe user to physically orient the first mobile computing device to atarget orientation to create a target gyroscope data. This step may beattributed to certain embodiments of the geolocation-based encryptionmethod 100. As discussed above, the geolocation data may also comprisegyroscope data, which may require that the recipient orient his or hermobile computing device at a particular angle (i.e., target orientation)in order to unlock or decrypt the encrypted digital data. For example,the user may first create a key with gyroscope data, requiring that therecipient orient his or her mobile computing device facing northwest atapproximately a 40 degree angle. Thus, in this manner, in addition tobeing physically at the target location, the recipient may view thehidden or encrypted message only when the recipient orients his or hermobile computing device at that particular angle.

Once the geolocation data is inputted by the user or entered into theencryption application, the encryption application may also prompt theuser or retrieve other data for the encryption key. Such data mayinclude device identification data (e.g., internet protocol address ofthe user or recipient of the digital content) and the unique fileidentifier associated with the digital content. Various embodiments ofthe encryption application may utilize a single form of data (e.g.,geolocation data only) or possibly the geolocation data, deviceidentification data, and unique file identifier data.

Once the data or information is obtained by the encryption application,the geolocation-based encryption method may perform the next step 120,which may be generating a key. As discussed above, in one embodiment,the key may be generated based on a geolocation data, a deviceidentification data, and a unique file identifier associated with thedigital content. Preferably, the encryption application preferablyencodes digital content based on an encryption key. In one embodiment,the key may comprise portions that pertain to geolocation data such asGPS coordinates (e.g., latitude/longitude coordinates) and/or gyroscopecoordinates. For example, the key may include GPS data of the targetlocation of the intended recipient(s). The GPS data of the targetlocation may be a particular location only known to the sender andrecipient such as the user's or recipient's residence, business address,or special location known only between the user and recipient. Inanother embodiment, the geolocation data may also comprise gyroscopedata that only unlock the encrypted digital data when the mobilecomputing device is oriented at a particular angle (i.e., targetorientation) for viewing the decrypted message. For example, the user,using the encryption software, may create a key requiring geolocationdata for the orienting the recipient's mobile computing device facingnorth at approximately a 45 degree angle. In this manner, the hidden orencrypted message may unlock and be viewable in the recipient's mobilecomputing device only when the recipient's mobile computing device islikewise positioned at that angle.

Additionally, the key may comprise device identification data such asthe IP address of recipient and a unique file identifier, which may aspecific value assigned to the digital content to be encrypted. Forexample, in one embodiment, the key may comprise the geolocation dataand a unique file identifier. In another embodiment, the key maycomprise the geolocation data, a unique file identifier, and an IPaddress of the recipient.

Once the key has been created, the encryption application may performstep 125, which may be encrypting the digital content stored in acomputer readable storage medium based on the key. As discussed above,the digital content may be encrypted by the encryption application andmay include, without limitation, a message, image, advertisement,direction, file, or any other piece of digital information. In oneembodiment, the digital content may be created by the user or may beuploaded to a computer readable medium of the mobile computing device.In an alternative embodiment, the user may also download the digitalcontent from the Internet or networked computers. The user may also, inanother embodiment, create the digital content via a message and “drop”that message to a particular location on a map, such that the message istied to that location. Preferably, the digital content to be encryptedis stored in a computer readable storage medium of the device runningthe encryption application.

The digital content may then be encrypted via one or more encryptionalgorithms that utilize various parameters including location,orientation, device identification, and/or a unique file identifier. Thelocation parameter may be based on GPS coordinate data such as thelatitude and longitude generated by the mobile computing device.Alternatively, the GPS coordinate data may simply be inputted by theuser. In one embodiment, the location may be provided by inputtinggeographic locations, such as selecting a target location on a digitalmap displayed on the mobile computing device.

Regarding the orientation parameter, a gyroscope component of the mobilecomputing device may be used to provide the gyroscope data for orientingthe device at a certain approximate angle. The gyroscope data may beinputted by the user or may be recorded by the encryption applicationwhen the mobile computing device is positioned at a certain angle.

Regarding the device identification parameter, this parameter maycomprise the IP address or MAC address of the mobile computing deviceand may be inputted by the user. In one embodiment, the user may selectthe recipient of the digital content, and in doing so, the encryptionapplication may retrieve the recipient's IP address of his or herdevice. In another embodiment, the user may select the recipient of thedigital content, and the encryption application may retrieve both therecipient's IP address and MAC address. The encryption application maythen use the IP address and/or MAC address as part of the key.

After the digital content is encrypted in step 125, the encryptionapplication may perform step 130, which may be establishing one or moresecure sessions among the user, a recipient of the digital content,and/or the one or more servers. Here, various security protocols may beused to establish a secure session to allow the transmission ofsensitive data across the different communication networks. This willpreferably allow the encrypted digital data to remain secure andun-tampered from unauthorized recipients. In one embodiment, the user'smobile computing device may require a negotiation or handshaking phasethat requires the server to verify that the intended sender is theauthorized user. For example, the user or client may exchange ahandshake with a server to establish a secure session. In response, theserver may transmit various security operations, which may a primitivesecurity operation or a macro security operation. The mobile computingdevice of the user, for instance, may initially transmit variousmessages or utilize a random number generator to generate and store arandom number(s) in response to s random number operation. In anotherembodiment, random numbers may be generated in advance of establishingthe session, which may generate a hash of the accumulated handshakemessages. The server may then transmit a message or certificate forauthorized access. In another embodiment, the encryption application andserver may not utilize security questions, random number generators,messages, or certificates.

Once the secured sessions are established, the encrypted digital contentmay be transmitted to the second mobile computing device via one or moreservers, as shown in step 135. In one embodiment, the encrypted digitalcontent may first be transmitted to a server or database for storage andthen retransmitted to the recipient's second mobile computing device fordecrypting. Specifically, the recipient may download or access theencrypted digital content, and the encrypted digital content may firstbe verified by cross-checking the IP address and/or MAC address of themobile computing device of the intended recipient. This may beaccomplished by having the IP address or MAC address verified bychecking the key created by the encryption application. Thus, once theencrypted digital content is downloaded to the second mobile computingdevice, the user may then decrypt the digital content using theencryption application.

In another embodiment, the encrypted digital content may first betransmitted to a storage medium in a server and then decrypted beforebeing transmitted to the second mobile computing device. Specifically,the recipient may first access and decrypt the encrypted digital contentwhile that encrypted digital content is stored in the server. Oncedecrypted, the recipient may then download or access the decrypteddigital content using the second mobile computing device, and thedecrypted digital content may be verified by cross-checking the IPaddress and/or MAC address of the mobile computing device of theintended recipient. Both the IP address and MAC address may be verifiedby checking the key created by the encryption application. Preferably,the encrypted digital content is stored in the database or server, sothat the intended recipient may access such digital content via theInternet or network.

Still, in an alternative embodiment, the encrypted digital content maybe stored in the user's first mobile computing device and not betransmitted to a server for storage. Here, in this embodiment, thedigital content may be encrypted using only the geolocation data and theunique file identifier associated with that digital content without thedevice identification data (e.g., IP address). Thus, when the decryptingthe encrypted digital content, the encryption application may check theunique file identifier, and the user may then decrypt the digitalcontent by simply inputting the correct geolocation data or GPScoordinates into the encryption application.

FIG. 1 also shows that the geolocation-based encryption method 100 mayalso comprise step 135, which may be downloading the encrypted digitalcontent from the server(s). This downloading may be based on variousdata stored along with the encrypted digital content such as deviceidentification data (e.g., IP address) and/or the unique file identifierthat is associated with the encrypted digital content. Here, in oneembodiment, the encrypted digital content may be stored in a serveralong with other forms of data such as the unique file identifier dataand the IP address of the recipient's mobile computing device. Therecipient or user requesting to download the digital content may make arequest to the server via the encryption application. Before downloadingthe encrypted digital content from the server(s), the encryptionapplication may first verify the device identification data of therecipient (e.g., IP address) and/or the unique file identifier. Onceverified, the encrypted digital content may be downloaded to therecipient's device.

FIG. 1 also shows step 140 of the geolocation method 100, which may bedecrypting the encrypted digital content based on the key to create thedecrypted digital content. In various embodiments, the decryption of theencrypted digital content may utilize various parameters similar to theencryption algorithm parameters. For example, in one embodiment, inorder to decrypt the digital content, the recipient may be required tohave the same location, orientation, and identification parameters asutilized by the encryption algorithm. For example, in one embodiment,the intended recipient may utilize the encryption application to accessthe digital content. In doing so, the user may encrypt the digitalcontent with a key comprising a geolocation data, which may include thetarget location selected by the user (and known only between the userand intended recipient). The intended recipient may then decrypt theencrypted digital data by simply selecting the target location. In thismanner, the recipient may access the digital content without having tophysically be at the target location. For example, the recipient maydecrypt the encrypted content by performing the following steps: (i)loading a digital map using the encryption application running on therecipient's mobile computing device; (ii) inputting or selecting thetarget location selected by the user previously (e.g., dropping a pin ofthe target location on the digital map); and (iii) based on the targetlocation inputted by the recipient, using the GPS coordinates of thattarget location to satisfy the geolocation data portion of the key. TheIP address and/or MAC address of the recipient's mobile computing devicemay also be used to satisfy the device identification data portion ofthe key. The unique file identifier may also be used to satisfy aportion of the key. Thus, in this embodiment, the recipient may decryptthe encrypted digital content simply by selecting the target location ona digital map without having to physically visit the target location.

In another embodiment, step 135 may be performed by requiring theintended recipient to be physically located at the targeted location.Specifically, in this embodiment, the user may encrypt the digitalcontent by selecting a target location known only known between the userand intended recipient. The intended recipient may then decrypt theencrypted digital data by visiting the target location with his or hermobile computing device. In this manner, the digital content such as amessage may be securely accessed by intended recipient only if therecipient is at the target location. For example, the recipient maydecrypt the encrypted content by performing the following steps: (i)visiting the target location selected by the user, such that the GPScoordinates generated by the recipient's mobile computing device fulfillthe geolocation data portion of the key; (ii) activating the camerafunction on the mobile computing device; and (iii) viewing the decrypteddigital content tied to that location on the display screen of themobile computing device. The IP address and MAC address of therecipient's mobile computing device may be used to satisfy the deviceidentification data portion of the key. Additionally, the gyroscope datagenerated by the mobile computing device may be used to orient thedevice at a particular angle for viewing the decrypted message. Theunique file identifier may also be used to satisfy a portion of the key.Thus, in this embodiment, the recipient preferably decrypts theencrypted digital content by physically visiting the target locationselected by the user.

In various embodiments, one or more image overlays may be generated whenthe recipient visits the targeted location. These image overlays mayvary based on how closely the key parameters match the parameters usedby the encryption algorithm. For example, if the actual location of therecipient's mobile computing device and the parameters set by theencryption algorithm have a difference of several feet, the overlay maysignal recipient where to move in order for the location of the mobilecomputing device to match the parameters of the encryption algorithm. Inother embodiments, the image overlay may also comprise messages,advertisements, information, data, directions, or anything else that maybe displayed on the display.

In various embodiments, the mobile computing device of the user orrecipient may also store the following: (1) unique file identifierassociated with that digital content and (2) geolocation data. The useror recipient may then proceed in having the encryption applicationdecrypt the encrypted digital content. In doing so, the encryptionapplication may verify the geolocation data stored in the mobilecomputing device by checking the (1) unique file identifier associatedwith that digital content and/or (2) geolocation data. Once verified,the encryption application may proceed with the decryption of theencrypted digital content.

FIG. 2 is a block diagram of one embodiment of a mobile computingdevice. As shown in FIG. 2, one embodiment of the mobile computingdevice 200 may comprise: a computer-readable medium 205, display 210,read only memory (ROM) 215, disk controller 220, display controller 225,communication bus 230, random access memory (RAM) 235, input/output(I/O) interface 240, processor 245, camera 250, one or more interfacedevices 255, gyroscope component 260, and GPS receiver 265. Theinterface devices may be: a keyboard, pointing device (e.g., mouse),and/or a touchscreen used to allow the user or recipient to provideinputs into the mobile computing device 200. The processor 245 isgenerally any component, or logic circuitry that responds to andprocesses the basic instructions that drive the mobile computing device200. The processor 245 may be electronically coupled to a communicationbus 230, and the communication bus 230 may be electronically coupled toother electronic hardware or components, including without limitation, adisplay controller 225, RAM 235, ROM 215, disk controller 220, and I/Ointerface 240. The disk controller 225 may be configured to control thecomputer-readable medium 205, which may be a hard drive and/or opticaldisk drive. The computer-readable medium 205 may also be another form ofrandom access memory or flash memory. The display controller 225 may becoupled to a display 210 such as a liquid crystal display (LCD),projection system, or touchscreen. The I/O interface 240 may be coupledto one or more input devices such as an interface device 255 (e.g.,mouse, keyboard, pointing device, touchscreen) or camera 250. The camera250 may be any component or electronic device capable of viewing anenvironment and/or capturing one or more images and/or videos onto anelectronic memory component. In additional embodiments, the mobilecomputing device 200 may also comprise a network controller card thatmay connect to a network, such as the Internet or along an Intranet. Invarious embodiments, the mobile computing device 200 may include mobilecomputing devices, including without limitation, laptops, smartphones,tablets, and wearables.

The processor 245 may be configured to execute a set of computerreadable instructions and further to execute a software program,application or computer implemented instructions described herein suchas the customer feedback application. The computer readable instructionsand application may comprise instructions that cause the processor 245to perform one or more processes when the instructions are executed bythe processor 245. In other various embodiments, the computer readableinstructions or application may be tangibly embodied in the memory ofthe mobile computing device 200 such as the RAM 235 or ROM 215, as shownin FIG. 2, or on a computer-readable storage medium, such as a magnetic,optical or solid-state digital storage medium.

The GPS receiver 260 preferably collects GPS signals and data from GPSsatellites. The gyroscope component 265 preferably gathers orientationdata of the mobile computing device. Although FIG. 2 shows that thecomputing device 200 comprises thirteen components, it should beunderstood that the computing device may comprise any number ofcomponents.

FIG. 3 is an illustration of one embodiment of the geolocation-basedencryption system. As shown in FIG. 3, one embodiment of thegeolocation-based encryption system 300 may comprise: one or more mobilecomputing devices, 301, 302, 303, 304, and one or more servers, whichare preferably part of the Cloud or Internet 310. Here, one embodimentof the geolocation-based encryption system 300 may utilize GPSsatellites for generating the GPS signals for the geolocation dataportion of the key disclosed herein. The key may be based on latitude,longitude, and altitude generated by GPS satellites 315, 320, but mayalso comprise other parameters such as gyroscope orientation of themobile computing device, as determined by a gyroscope component.Furthermore, the key may also require specific information, which may beunique, inherent, or generated by the mobile computing device, such asan IP address or MAC address.

FIG. 4 is a screenshot of one embodiment of the encryption applicationand shows how a user may select a target location on the encryptionapplication. As shown in FIG. 4, one embodiment of the encryptionapplication 400 may comprise: a pin 405 and a digital map 410. Asdiscussed above, a user may select a target location on the encryptionapplication 400 by first loading a digital map 410, and selecting thetarget location 415. The target location 415 may be selected byinputting a pin 405 on the digital map 410 of the user's mobilecomputing device. This may allow the user to create the geolocation dataportion of the key and may allow the user to drop a digital content(e.g., message) at a particular location. Similarly, in otherembodiments, the recipient may select the target location by simplyinputting a pin on a digital map on the recipient's mobile computingdevice.

FIG. 5 is an illustration of one embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device. As shown in FIG. 5,one embodiment of the mobile computing device 500 may comprise anencrypted application 505 with a display 510. FIG. 5 shows that, uponarriving at the target location, the recipient may utilize the camera ofthe mobile computing device 500 to create an image or live video feed ofthe environment using the display 510. Based on the: (1) GPS data of therecipient's mobile computing device 500, as determined by the GPSsatellite data feed; (2) orientation of the recipient's mobile computingdevice 500 as determined by gyroscope component; and (3) deviceidentification information as determined by the IP address and/or MACaddress, the digital content 515, 516, which may be one or more messagestied to that target location, may be shown on the display 510 via animage overlay. Preferably, the digital content 515, 516, is superimposedover the environment when displayed with the environment and may only beaccessible near the target location of the recipient. In anotherembodiment, the digital content 515, 516, may also be available onlywhen the recipient views messages through the camera of his or hermobile computing device when positioning the mobile computing device ata certain orientation/angle. Thus, once the mobile computing device 500has met the requirements for the key such as geolocation data (e.g., GPScoordinates, gyroscope data) and device identification data (e.g., IPaddress, MAC address), then the digital content may be decrypted.

FIG. 5 shows that, in one embodiment, the camera of the mobile computingdevice 500 may generate an image of the decrypted digital content, whichmay be visible on the display, over the environment. The decrypteddigital content may include, without limitation, messages, pictures,images, advertisements, directions, or other forms of communication.

FIG. 6 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device. As shown in FIG. 6,another embodiment of the mobile computing device 600 may comprise anencrypted application 605 with a display 610. Like the previousembodiment, shown in FIG. 5, another embodiment of the mobile computingdevice 600 may allow a recipient or user to view the decrypted digitalcontent 615, 616, 617, 621 tied to the target location through his orher mobile computing device 600 when positioning the mobile computingdevice 600 at a target location (e.g., mall) and at a certainorientation. The decrypted digital content 615, 616, 617, 621 mayinclude messages or advertisements from other users who had visited thetarget location and desired to leave a location specific message. Forexample, as shown in FIG. 6, the decrypted digital content 615, 616,617, 621 may be an advertisement posted by a store located at the targetlocation, wishing to inform recipients of a sale, but only if therecipient is at the desired location. The decrypted digital content 615,616, 617, 621 may also be visible only when the user is at the targetlocation and has his or her mobile computing device 600 oriented in aparticular manner.

FIG. 7 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device with a display. Asshown in FIG. 7, another embodiment of the mobile computing device 700may comprise an encrypted application 705 with a display 710. FIG. 7shows that the decrypted digital content 715 may be a message requestinginformation from a recipient. For example, in one embodiment, a user maycreate a message, which becomes encrypted by the geolocation-basedencryption method 100 and tied to the target location. The message ispreferably not displayed unless the recipient arrives at the targetlocation and orients his or her mobile computing device 700 at aspecific angle or orientation. Once the recipient arrives at the targetlocation and orients the mobile computing device 700 at the desiredorientation, the encrypted digital content may decrypted and may beaccessed by the recipient.

FIG. 8 is an illustration of another embodiment of the mobile computingdevice and shows how a recipient can decrypt an encrypted digitalcontent by orienting the mobile computing device with a display whileusing a filter. As shown in FIG. 8, another embodiment of the mobilecomputing device 800 may comprise an encrypted application 805 with adisplay 810. FIG. 8 shows that, in one embodiment, the user may adddigital content to a large environment such as a cityscape and tie thatdigital content to that location. In that environment, the user may thenadd various encrypted digital content, which may be visible on thedisplay 810 of the mobile computing device 800, depending on thelocation and orientation of the mobile computing device 800. Because itmay be possible that the decrypted digital content 815 may comprisesmultiple messages, the user may apply a filter 820, which may limitunwanted messages visible to the recipient and display 810. For example,in one embodiment, the filter 820 may only allow restaurant messages tobe displayed, thereby only allowing restaurant-related messages to bevisible on the display 815. Additionally, because the recipient is atthe desired location that substantially matches the decryption keyparameters, the decrypted digital content 815 may have an indicator todirect and guide the recipient to the specific location position themobile computing device 800 at a certain orientation. For example, inthe event that the decrypted digital content 815 is not visible, theencryption application 805 may guide the recipient at the desiredlocation to satisfy the geolocation requirements portion for the key.This may be embodied by arrows or directions to guide the user to moveand/or position the mobile computing device 800.

FIG. 9 is a screenshot of one embodiment of the encryption applicationshowing a scavenger hunt. As shown in FIG. 9, one embodiment of theencryption application 900 may comprise: scavenger hunt locations 905and a digital map 910. As discussed above, another embodiment of thegeolocation-based encryption method may be used to create a scavengerhunt. The scavenger hunt may allow a user to create a series of clues,which are accessible by one or more scavenger hunt participants.Specifically, once the decryption key parameter(s) are met orsubstantially met, the scavenger hunt participants may find clues toobtain rewards or prizes (e.g., cash prizes). For example, in oneembodiment shown in FIG. 9, the digital map 910 may include scavengerlocations 905 used for providing clues for rewarding the user orparticipants with awards and prizes. The scavenger locations 905 may berepresented by an image, symbol, or icon such as a strawberry, shown inFIG. 9, or any other images, symbols, icons, or text.

When participating in a scavenger hunt, the user select one or morescavenger locations 905 loaded on the encryption application 900 on hisor her mobile computing device. For example, the user may first load adigital map 910, and the digital map 910 may populate the scavenger huntlocations 905 on the digital map 910. After the scavenger hunt locations905 are populated or shown, the user may select a scavenger huntlocation 905 by simply touching or pinning the scavenger hunt location905 on the digital map. Once the scavenger hunt location(s) 905 areselected, the user may get redirected to a third party's website such asa sponsor or advertiser. In that website, one or more clues of thescavenger hunt may be provided to the user. Based on the clue(s), theuser may then utilize the encryption application 900 to search for thepossible locations where the reward or prize is located. For example, inone embodiment, the clue may be displayed as an overlay, as describedabove, or by another way of communicating information to the scavengerhunt participant. The clue may provide the scavenger hunt participantwith a hint as to how to meet one or more of the decryption keyparameters of the clue in order to view the next clue. Alternatively,scavenger hunt may have a series of clues, with each clue directing thescavenger hunt participant to find a next clue until the scavenger hunthas been completed.

In another embodiment, the scavenger hunt may allow the scavenger huntparticipants to decrypt messages that directs them to visit additionalscavenger hunt locations 905 in order to obtain additional clues for thescavenger hunt. Specifically, when a scavenger hunt participant decryptsthe encrypted content by physically visiting the target location, thedecrypted digital content may include additional clues for the nexttarget location.

The foregoing description of the preferred embodiment has been presentedfor the purposes of illustration and description. While multipleembodiments are disclosed, still other embodiments will become apparentto those skilled in the art from the above detailed description. Thedisclosed embodiments capable of modifications in various obviousaspects, all without departing from the spirit and scope of theprotection. Accordingly, the detailed description is to be regarded asillustrative in nature and not restrictive. Also, although notexplicitly recited, one or more embodiments may be practiced incombination or conjunction with one another. Furthermore, the referenceor non-reference to a particular embodiment shall not be interpreted tolimit the scope. It is intended that the scope or protection not belimited by this detailed description, but by the claims and theequivalents to the claims that are appended hereto.

Except as stated immediately above, nothing that has been stated orillustrated is intended or should be interpreted to cause a dedicationof any component, step, feature, object, benefit, advantage, orequivalent, to the public, regardless of whether it is or is not recitedin the claims.

What is claimed is:
 1. A geolocation-based encryption method, the stepscomprising: providing an encryption application; wherein said encryptionapplication is configured to run on a first mobile computing devicehaving a geolocation monitoring system; wherein said encryptionapplication encrypts a digital content; creating a global positioningsystem data by said first mobile computing device; prompting a user ofsaid first mobile computing device to make a geolocation based actiongenerating a key based on a geolocation data; wherein said geolocationdata comprises said global positioning system data; establishing one ormore secure sessions between said user and said one or more servers; anddecrypting said encrypted said digital content.
 2. The geolocation-basedencryption method of claim 1, further comprising transmitting saidencrypted digital content to said one or more servers.
 3. Thegeolocation-based encryption method of claim 2, wherein encrypting saiddigital content is based on said key.
 4. The geolocation-basedencryption method of claim 3, wherein decrypting said digital content isbased on said key; wherein said encryption application running on saidfirst mobile computing device is configured to: (1) download saidencrypted digital content from said one or more servers based on saidgeolocation data; and (2) decrypt said encrypted digital content basedon said key to generate a decrypted digital content.
 5. Thegeolocation-based encryption method of claim 4, wherein said encryptionapplication is configured to run on a second mobile computing deviceassociated with a recipient of said digital content.
 6. Thegeolocation-based encryption method of claim 5, wherein said encryptionapplication running on said second mobile computing device is configuredto: (1) download said encrypted digital content from said one or moreservers based on said geolocation data; and (2) decrypt said encrypteddigital content based on said key to generate said decrypted digitalcontent.
 7. A geolocation-based encryption system, the systemcomprising: a first mobile computing device having a computer readablestorage medium, comprising one or more instructions that, when executedby said first mobile computing device, cause said first mobile computingdevice to: prompt a user of said first mobile computing device to make ageolocation based action to create a global positioning system data;generate a key based on a geolocation data; wherein said geolocationdata comprises said global positioning system data; encrypt a digitalcontent stored in said computer readable storage medium based on saidkey; establish one or more secure sessions among said user and said oneor more servers; and transmit said encrypted digital content to said oneor more servers;
 8. The geolocation-based encryption system of claim 7,wherein said system establishes one or more secure sessions with arecipient of said digital content and said one or more servers.
 9. Thegeolocation-based encryption system of claim 8, wherein said systemtransmits said encrypted digital content to a second mobile computingdevice associated with said recipient via said one or more servers. 10.The geolocation-based encryption system of claim 9, wherein saidencryption application running on said second mobile computing device isconfigured to decrypt said encrypted digital content based on said keyto generate a decrypted digital content.
 11. The geolocation-basedencryption method of claim 7, wherein said device identification datacomprises an internet protocol address of said second mobile computingdevice.
 12. The geolocation-based encryption method of claim 7, whereinsaid decryption of said encrypted digital content only occurs when saidsecond mobile computing device is physically positioned approximately atsaid target location.
 13. The geolocation-based encryption method ofclaim 7, wherein said decryption of said encrypted digital content onlyoccurs when said recipient selects said targeted location on a digitalmap displayed on said second mobile computing device.
 14. Thegeolocation-based encryption method of claim 7, further comprising:prompting a user to physically orient said first mobile computing deviceto a target orientation to create a target gyroscope data; wherein saidgeolocation data comprises said target gyroscope data; wherein saiddecryption of said encrypted digital content occurs only when saidsecond mobile computing device is physically oriented at approximatelysaid target orientation.
 15. A non-transitory computer readable medium,comprising one or more executable instructions, which, when executed bya first mobile computing device, configure the first mobile computingdevice to perform a geolocation-based encryption, the steps comprising:prompting a user of said first mobile computing device to select atarget location on said first mobile computing device to create a globalpositioning system data; generating a key based on a geolocation data, adevice identification data, and a unique file identifier associated withsaid digital content; wherein said geolocation data comprises saidglobal positioning system data; encrypting a digital content stored in acomputer readable storage medium based on said key; establishing one ormore secure sessions among said user, a recipient of said digitalcontent, and said one or more servers; and transmitting said encrypteddigital content to said second mobile computing device via said one ormore servers; wherein said encryption application running on said secondmobile computing device is configured to decrypt said encrypted digitalcontent based on said key to generate a decrypted digital content. 16.The non-transitory computer readable medium of claim 14, wherein saiddevice identification data comprises an internet protocol address ofsaid second mobile computing device.
 17. The non-transitory computerreadable medium of claim 14, wherein said decryption of said encrypteddigital content only occurs when said second mobile computing device isphysically positioned approximately at said target location.
 18. Thenon-transitory computer readable medium of claim 14, wherein saiddecryption of said encrypted digital content only occurs when saidrecipient selects said targeted location on a digital map displayed onsaid second mobile computing device.
 19. The non-transitory computerreadable medium of claim 14, further comprising: prompting a user tophysically orient said first mobile computing device to create a targetorientation to create a target gyroscope data; wherein said targetgyroscope data is a portion of said geolocation data; and wherein saiddecryption of said encrypted digital content occurs only when saidsecond mobile computing device is approximately physically oriented atsaid target orientation.