This document proposes a novel scheme for encrypting and decrypting sensitive data on laptops using secret sharing techniques. The scheme involves three entities - the laptop, a USB device, and a server. It consists of four phases: registration, encryption/decryption, recovery, and reuse. In the registration phase, the user registers their laptop and USB device with the server. In the encryption/decryption phase, the user uses the registered USB device to encrypt and decrypt files on their laptop offline. The recovery phase allows encrypted files to be decrypted online if the USB is lost. The reuse phase enables rebuilding a new USB device without reregistration.