You are correct. Geo-Encryption is being used to e
Post# of 82672
If someone attempts to decrypt the data at another location, the decryption process fails and reveals no details.The device performing the decryption determines its location using some sort of location sensor such as a GPS receiver or other satellite or radio frequency positioning system. In today's world- Every one has mobile with built in GPS. DOD and other military use secured satellite networks besides encrypted GPS for their decryption devices.
Basically,you cannot decrypt the data outside a set locations. While doing the implementation we can always specify locations & GPS coordinates to confine access to a broad geographic region. We can also place a time and space constraints on the decryption location.
Geo-Encryption is builds on a established cryptographic algorithms ( RSA 2048 in SFOR/ACS case ) and protocols in a way that provides an additional layer of security beyond that is provided by conventional cryptography.
Depending on how the implementation is done,we can also provide strong protection against location spoofing.