(Total Views: 594)
Posted On: 07/26/2018 1:28:09 PM
Post# of 82676
Re: baldeagle1 #32799
You are correct. Geo-Encryption is being used to ensure that data cannot be decrypted outside a particular facility:~~> for example, Secured Data can be decrypted based on certain parameters only at location set in the encryption algo implementation i.e. Pentagon( Head Office ) or Microsoft ( Head Office in WA )or an office of SFOR or your home.
If someone attempts to decrypt the data at another location, the decryption process fails and reveals no details.The device performing the decryption determines its location using some sort of location sensor such as a GPS receiver or other satellite or radio frequency positioning system. In today's world- Every one has mobile with built in GPS. DOD and other military use secured satellite networks besides encrypted GPS for their decryption devices.
Basically,you cannot decrypt the data outside a set locations. While doing the implementation we can always specify locations & GPS coordinates to confine access to a broad geographic region. We can also place a time and space constraints on the decryption location.
Geo-Encryption is builds on a established cryptographic algorithms ( RSA 2048 in SFOR/ACS case ) and protocols in a way that provides an additional layer of security beyond that is provided by conventional cryptography.
Depending on how the implementation is done,we can also provide strong protection against location spoofing.
If someone attempts to decrypt the data at another location, the decryption process fails and reveals no details.The device performing the decryption determines its location using some sort of location sensor such as a GPS receiver or other satellite or radio frequency positioning system. In today's world- Every one has mobile with built in GPS. DOD and other military use secured satellite networks besides encrypted GPS for their decryption devices.
Basically,you cannot decrypt the data outside a set locations. While doing the implementation we can always specify locations & GPS coordinates to confine access to a broad geographic region. We can also place a time and space constraints on the decryption location.
Geo-Encryption is builds on a established cryptographic algorithms ( RSA 2048 in SFOR/ACS case ) and protocols in a way that provides an additional layer of security beyond that is provided by conventional cryptography.
Depending on how the implementation is done,we can also provide strong protection against location spoofing.
(4)
(0)
Scroll down for more posts ▼