You are on page 1of 8

CLAIMS

Claim 1-28 (Canceled)

29. (Previously Presented) A method comprising:

receiving a first input indicative of a selection of a first file for access, the first file
being encrypted;

transmitting a file name of the first file to a wireless device based on Near Field
Communication (NFC) technology;

receiving a first decryption key for the first file from the wireless device based on
the NFC technology in response to transmitting the file name of the first file to the
wireless device; and

decrypting the first file using the first decryption key.

30. (Previously Presented) A method as recited in claim 29, wherein


decrypting the first file comprises decrypting the first file by hardware.

31. (Previously Presented) A method as recited in claim 29, wherein

decrypting the first file comprises decrypting the first file by software.

32. (Currently Amended) A method as recited in claim 29, further

comprising:

providing notification to the user indicating that [[the]] g second file is decrypted
or accessible.

Serial No.: 13/976,097 Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. forefrontiawarmmcom
Attorney: Kasey Christie June 23, 2016
%%*75
RST

new/M441
s

33. (Previously Presented) A method as recited in claim 29, further

comprising:

starting a file access application on a computing device; and

displaying file information to a user, the file information representative of one or

more files selectable by the user including the first file.

34. (Previously Presented) A method as recited in claim 29, further

comprising:

upon decrypting the first file, providing an indication to a user such that the user

is prompted by the indication to bring the wireless device to close proximity of a


computing device where the first file is stored; and
detecting a presence of the wireless device such that the detecting the presence
of the wireless device results in transmitting the file name of the first file to the wireless
device based on the NFC technology.

35. (Currently Amended) A method comprising:


receiving a first input indicative of a selection of a first file for encryption;
generating a first encryption key for the first file;
encrypting the first file using the first encryption key; [[and]]
transmitting a file name of the first file and-the-rstenerypti-enkey to a wireless

device based on Near Field Communication (NFC) technology;


receiving a first decryption key for the first file from the wireless device based on
the NFC technology in response to transmitting the file name of the first file to the

wireless device; and

decrypting the first file using the first decryption key.

Serial No.: 13/976,097 _3_ Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. fwmtiawumuncom
Attorney: Kasey Christie June 23, 2016
F3RQTf

36. (Canceled)

37. (Previously Presented) A method as recited in claim 35, wherein

encrypting the first file comprises encrypting the first file by hardware.

38. (Previously Presented) A method as recited in claim 35, wherein

encrypting the first file comprises encrypting the first file by software.

39. (Previously Presented) A method as recited in claim 35, further

comprising:

starting a file access application on a computing device; and


displaying file information to a user, the file information representative of one or
more files selectable by the user including the first file.

40. (Currently Amended) A method as recited in claim 35, further

comprising:

upon encrypting the first file, providing an indication to user such that the user is
prompted by the indication to bring the wireless device to close proximity of a
computing device where the first file is stored; and

detecting a presence of the wireless device such that the detecting results in the
transmitting of the file name of the first file andthef-i-rsteneey-pti-enkey to the wireless
device based on the NFC technology.

Serial No.2 13/976,097 Forefront IP Lawgroup


Atty Docket No.2 Error! Reference source not found. forefrontiawarcumom
Attorney: Kasey Christie June 23, 2016
_ -.-,4(///////,._. I
x' x
\

41. (Previously Presented) A method as recited in claim 35, further

comprising:

receiving a second input indicative of a selection of a second file for access, the

second file being encrypted;

transmitting a file name of the second file to the wireless device based on the
NFC technology;
receiving a second decryption key for the second file from the wireless device
based on the NFC technology in response to transmitting the file name of the second file
to the wireless device;

decrypting the second file using the second decryption key; and
providing notification to the user indicating that the second file is decrypted or
accessible.

42. (Canceled)

43. (Canceled)

44. (Canceled)

45. (Canceled)

46. (Canceled)

47. (Canceled)

Serial No.: 13/976,097 Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. forefrontiawaroupcom
Attorney: Kasey Christie June 23, 2016
_ ovary/#10,... I
48. (Previously Presented) A processing device comprising:

a wireless communication unit configured to detect presence of and

communicate with a wireless device based on Near Field Communication (NFC)

technology; and
a control unit coupled to the wireless communication unit, the control unit
configured to:
receive a first input indicative of a selection of a first file for access, the
first file being encrypted;

direct the wireless communication unit to transmit a file name of the first
file to a wireless device based on the NFC technology;
receive, via the wireless communication unit, a first decryption key for the
first file from the wireless device in response to transmitting the file name of the
first file to the wireless device; and

decrypt the first file using the first decryption key.

49. (Previously Presented) A processing device as recited in claim 48,


wherein the control unit is further configured to:
receive a second input indicative of a selection of a second file for encryption;
generate a second encryption key for the second file;

encrypt the second file using the second encryption key; and
direct the wireless communication unit to transmit a file name of the second file

and the second encryption key to the wireless device based on the NFC technology.

Serial No.2 13/976,097 _6_ Forefront IP Lawgroup


Atty Docket No.2 Error! Reference source not found. forefmtiawamuncom
Attorney: Kasey Christie June 23, 2016
RE,t

_ -.-,4(///////
50. (Previously Presented) A processing device as recited in claim 49,

wherein the control unit is further configured to:

generate a second decryption key for the second file; and

direct the wireless communication unit to transmit the file name of the second
file and the second decryption key to the wireless device based on the NFC technology.

51. (Previously Presented) A processing device as recited in claim 48,


further comprising:
a file access module controlled by the control unit to decrypt the first file using

the first decryption key, the file access module further configured to:
receive the first input from a user;
provide file information to an output device, which outputs the file
information to a user, the file information representative of one or more files
selectable by the user including the first file.

52. (Previously Presented) A processing device as recited in claim 51,


wherein the file access module is further configured to encrypt a second file selected by
the user.

53. (Currently Amended) At least one nontransitory computer

accessible medium having stored thereon a set of instructions that, when executed by
one or more processors, direct the one or more processors to execute operations
comprising:

receiving a first input indicative of a selection of a first file for encryption;

generating a first encryption key for the first file;

Serial No.: 13/976,097 _7_ Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. ferefrmtiawrcunmom
Attorney: Kasey Christie June 23, 2016
encrypting the first file using the first encryption key; [[and]]
directing a file name of the first file andthe-Fst-enepypt-ienkey to be transmitted
to a wireless device based on Near Field Communication (NFC) technology;

receiving a first decryption key for the first file from the wireless device based on

the NFC technology in response to directing the transmitting of the file name of the first
file to the wireless device; 2m
decrypting the first file using the first decryption key.

54. (Currently Amended) At least one nontransitory computer

accessible medium as recited in claim 53, wherein the operations further comprise:

starting a file access application on a computing device; and

displaying file information to a user, the file information representative of one or


more files selectable by the user including the first file.

55. (Currently Amended) At least one non-transitory computer

accessible medium as recited in claim 53, wherein the operations further comprise:
upon encrypting the first file, providing an indication to user such that the user is
prompted by the indication to bring the wireless device to close proximity of a
computing device where the first file is stored; and

detecting a presence of the wireless device such that the detecting directs the

transmitting of the file name of the first file andthef-i-Fsten-eicypt-i-en-key to the wireless
device based on the NFC technology.

56. (Currently Amended) At least one nontransitory computer

accessible medium as recited in claim 53, wherein the operations further comprise:

Serial No.: 13/976,097 _8_ Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. ferefrotiammrcxinmm
Attorney: Kasey Christie June 23, 2016
T

/
.V

4%1/,
receiving a second input indicative of a selection of a second file for access, the
second file being encrypted;

transmitting a file name of the second file to the wireless device based on the
NFC technology;

receiving a second decryption key for the second file from the wireless device
based on the NFC technology in response to transmitting the file name of the second file
to the wireless device;

decrypting the second file using the second decryption key; and

providing notification to the user indicating that the second file is decrypted or
accessible.

Serial No.: 13/976,097 _9_ Forefront IP Lawgroup


Atty Docket No.: Error! Reference source not found. forefrontiawvrcuncom
Attorney: Kasey Christie June 23, 2016

You might also like