US20150074429A1 - System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification - Google Patents
System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification Download PDFInfo
- Publication number
- US20150074429A1 US20150074429A1 US14/543,347 US201414543347A US2015074429A1 US 20150074429 A1 US20150074429 A1 US 20150074429A1 US 201414543347 A US201414543347 A US 201414543347A US 2015074429 A1 US2015074429 A1 US 2015074429A1
- Authority
- US
- United States
- Prior art keywords
- subscriber
- data
- based system
- encrypted data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present disclosure relates generally to systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator; for securely storing and managing such data files within the subscriber-based system as an electronic repository keeping the data files intact and unalterable, with no access to the content of the data files by the third party administrator; and for long term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists.
- Important business and personal data has conventionally been maintained in different formats, including paper files and electronic files.
- Traditional distribution methods for such data files including regular mail, facsimile and electronic mail (e-mail), for example, may allow the data files to be accessed or retrieved by someone other than the intended recipient.
- traditional storage systems such as file rooms and electronic networks, for example, may allow the data files to be tampered with or altered from their original form.
- Traditional storage methods may also involve storing such data files in a variety of different formats and in different physical or electronic locations, which precludes efficient data aggregation, mining, searching and/or linking of such data files.
- Embodiments of the present disclosure generally provide systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator.
- Embodiments of the present disclosure also generally provide systems and methods for securely storing and managing data files within the subscriber-based system as an electronic repository to ensure the files remain intact, secure, and unalterable from their original form, with no access to the content of the data file by the third party administrator.
- Embodiments of the present disclosure further generally provide systems and methods for long-term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists.
- the present disclosure provides a subscriber-based system comprising a secure computer server and desktop software and/or enterprise software to manage data files and the content thereof
- management may comprise, for example, data file transfers, deletions, encryption/decryption, synchronization, data aggregation, integrity verification, content analysis, structure control, sorting, querying, hyper linking and accounting.
- the subscriber-based system further comprises a public computer server with one or more open and publicly accessible directories, including a checksum records directory.
- the present disclosure provides a method for establishing an anonymous account with the subscriber-based system by setting a username, a password, and a system identification (ID) that may also be used as a public key for optional public key data encryption.
- ID system identification
- the present disclosure provides a method for establishing an identity account with the subscriber-based system under a user's own name.
- the identity account may be established by presenting to a registered agent of the subscriber-based system sufficient forms of positive identification that may be linked to the username, password, and system ID associated with the subscriber's identity account.
- the present disclosure provides a method for an account holder of a subscriber-based system to upload a data file to the system.
- the account holder may further encrypt the data file before uploading.
- the data file may be stored in the account holder's dedicated directory on the system, distributed to one or more other account holders' dedicated directories on the system, or downloaded from the system, all with no ability to alter its content.
- the method may further comprise associating tracking information with the data file, such as system ID numbers/public keys, a data description, a time stamp, and a date stamp, for example.
- Associating tracking information with the data file may be performed by a third party administrator that maintains the subscriber-based system rather than by an account holder on the system.
- the method may further comprise creating a checksum of an uploaded data file, associating the checksum with tracking information for the data file, and maintaining a checksum record comprising the checksum with the tracking information in a publicly accessible checksum directory on the system.
- the present disclosure provides systems and methods for one account holder of a subscriber-based system to distribute to another account holder of the subscriber-based system any type of data file, such as: purchase transaction records; financial statements; merchant discounts and offers; invoices; mail; government documents; voting ballots; medical records; insurance records; legal records; and music, books, movies and other digital media, for example.
- account holders may control which of such distributed data files are received into their directories by allowing or blocking data file distribution based on the identity of the sending account holder or the type of data file.
- the present disclosure further provides systems and methods for an account holder of a subscriber-based system to store and manage any type of data file in the account holder's dedicated directory of the subscriber-based system.
- the present disclosure further provides systems and methods for an account holder of the subscriber-based system to download any type of data file to the account holder's registered computer. Once downloaded, the data file may be deleted from the subscriber-based system.
- a checksum record of the data file remains stored in the checksum directory on the system for long term verification of data file integrity, regardless of whether the data file is still stored on the subscriber-based system.
- a copy of the checksum record of the data file is provided to a subscriber for long term verification of data file integrity, even if the third party administrator is out of business or the system otherwise ceases to exist.
- the present disclosure provides systems and methods for completing secure financial transactions between parties, either anonymously or under a user's own name.
- secure financial transactions may comprise payments to merchants or other entities through the subscriber-based system, for example.
- FIG. 1 is a schematic illustration of a subscriber-based system in accordance with one embodiment of the present disclosure
- FIG. 2 is a flowchart of one embodiment of a method for establishing an anonymous account with the subscriber-based system of FIG. 1 ;
- FIG. 3 is a flowchart of one embodiment of a method for establishing an identity account with the subscriber-based system of FIG. 1 ;
- FIG. 4 is a flowchart of one embodiment of a method for uploading, distributing, storing and downloading a data file using the subscriber-based system of FIG. 1 ;
- FIG. 5 is a flowchart of one embodiment of a method for long term verification of data file integrity using the subscriber-based system of FIG. 1 ;
- FIG. 6 is a flowchart of one embodiment of a method for making a payment through the subscriber-based system of FIG. 1 .
- the present disclosure relates generally to systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator; for securely storing and managing such data files within the subscriber-based system as an electronic repository keeping the data files intact and unalterable, with no access to the content of the data files by the third party administrator; and for long term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists.
- keeping the data files intact and unalterable may include allowing read-only access to the data file, restricting the ability of users to alter the data file (e.g., through password protection), and/or through the use of a restricted file format (e.g., a noneditable pdf file).
- a restricted file format e.g., a noneditable pdf file
- FIG. 1 is a schematic illustration of a subscriber-based system 100 according to an embodiment of the present disclosure. It should be understood that the subscriber-based system 100 shown in FIG. 1 is for illustrative purposes only and that any other suitable system or subsystem could be used in conjunction with, or in lieu of, subscriber-based system 100 according to the present disclosure.
- subscriber-based system 100 may comprise a secure computer server 110 with multiple dedicated directories 120 , 130 , 132 , 134 assigned to system subscribers, such as User A and User B, for example.
- User A may have a single dedicated directory 120 and User B may have multiple dedicated directories 130 , 132 , 134 on the server 110 .
- the data 112 such as the directories, 120 , 130 , 132 , 134 may be stored on a memory 114 of the server 110 .
- the memory 114 may also store instructions 116 such as an operating system and/or software modules executable by a processor of the server 110 .
- the memory 114 may also store a management module 118 .
- the management module 118 may perform services for subscribers, such as facilitating the secure management of data; facilitating communications between users of the subscriber-based system, and/or receive information from users and non-users of the subscriber-based system.
- the management module 118 may receive data files from users, restrict access to the data files, create data integrity records, create tracking information, associate other data with received and/or stored data files, and/or transmit data for storage in a memory of the server or other memories.
- the management module 118 may transmit data such as the data file, the data integrity record, identity files, and other files to devices (e.g., computers, portable memory devices, and/or smartphones) of users and/or non-users.
- the management module 118 may transmit data such as the data file, the data integrity record, identity files, and other files to various memories for storage.
- the management module 118 may restrict access to the data file and/or restrict transmission of the data file.
- the management module 118 may restrict transmission of the data file to another user based on preferences (e.g., sender identity, type of file, etc.).
- the preferences may be defined by the user receiving the data file and/or the user transmitting the file.
- the management module 118 may also instruct that data is removed from the memory 114 of the server 110 or other memories communicably coupled to the server 110 .
- the server 110 may also include a communication interface that allows the system 100 to communicate with other systems and/or memories.
- the subscriber-based system 100 may retrieve data from a repository for analysis.
- the server may also include a presentation interface to present, for example, data integrity files and/or other information.
- Subscriber-based system 100 may further comprise a public computer server 115 with multiple directories 180 , 190 that are open and publicly available to non-subscribers to the system 100 , such as Non-User C, for example.
- a repository may be accessible by users and non-users, who may view, download, and/or save files in the repository.
- the public computer server 115 may comprise a checksum directory 180 for verification of the integrity of data files uploaded to the secure computer server 110 , as described in more detail herein.
- the public computer server 115 may further comprise an open phonebook directory 190 , available for review by subscribers and non-subscribers alike, wherein User A and User B may optionally elect to post their names, addresses, phone numbers, email addresses, public encryption keys, and other information, for example.
- the public computer server 115 may also be configured to enable non-subscribers to the system 100 , such as Non-User C, to post their information to the open phonebook directory 190 .
- the subscriber-based system 100 may further comprise registered subscriber computers 140 , 150 , 160 , each approved to connect to the secure computer server 110 , and each associated with particular user directories 120 , 130 , 132 , 134 .
- User A computer 140 is associated with User A directory 120
- User B computer 150 is associated with User B directories 130 , 132
- User B computer 160 is associated with User B directory 134 .
- the subscriber-based system 100 may further comprise one or more non-subscriber computers 175 , each approved to connect to the public computer server 115 to access the open and publicly available directories 180 , 190 on the system 100 .
- Non-User C computer 175 is operable to connect to public directories 180 , 190 on the public computer server 115 .
- server and/or “computer” encompasses the broadest possible meaning of the term and includes, without limitation, a single personal computer (such as a desktop computer, laptop computer, notebook computer, tablet computer, hand-held computer, personal digital assistant (PDA), and smart phone, for example), a network of personal computers, a single enterprise computer, and a network of enterprise computers, etc.
- a single personal computer such as a desktop computer, laptop computer, notebook computer, tablet computer, hand-held computer, personal digital assistant (PDA), and smart phone, for example
- PDA personal digital assistant
- smart phone for example
- a connection between the registered subscriber computers 140 , 150 , 160 and the server 110 is accomplished through proprietary desktop and/or enterprise software 170 .
- each of the registered subscriber computers 140 , 150 , 160 may be loaded with proprietary desktop and/or enterprise software 170 that may automatically synchronize with the secure computer server 110 whenever a subscriber is connected to the server 110 via the Internet.
- connection to the server 110 enables subscribers to upload and download data files to and from those directories 120 , 130 , 132 , 134 that are associated with each of the registered computers 140 , 150 , 160 .
- arrows 142 , 152 , 162 represent the operation of uploading data files
- arrows 144 , 154 , 164 represent the operation of downloading data files.
- Uploaded data files may be encrypted at the subscriber computer 140 , 150 , 160 before being uploaded, and downloaded data files may be decrypted at the subscriber computer 140 , 150 , 160 after being downloaded.
- the system 100 may create a checksum for the data file, associate that checksum with tracking information for that data file to create a data integrity record such as a checksum record, and then transfer 185 the checksum record to public computer server 115 for long term storage in public checksum directory 180 . Since the checksum directory 180 resides on the public computer server 115 , both subscribers and non-subscribers to the system are permitted to access the public checksum directory 180 to verify data file integrity.
- data integrity tests may include checksum, cyclic redundancy checks, parity, and/or cryptographic hashes.
- Uploaded data files may be addressed for distribution to another subscriber's directory.
- a data file uploaded 142 from User A computer 140 to User A directory 120 on the secure computer server 110 may be addressed for distribution by the system 100 to User B directory 130 , as represented by arrow 125 in FIG. 1 .
- subscribers to the system can control which other users are permitted to distribute data files to the subscriber's directories and over which types of data files may be distributed to the subscriber's directories.
- User B has not barred receipt of data files from User A nor the type of data file that User A is distributing to User B, so the data file distribution 125 from User A directory 120 to User B directory 130 is completed.
- the subscriber-based system 100 of FIG. 1 will be universal in that it will allow any individual or entity that meets the terms of use to subscribe to the system 100 and upload, store, distribute and/or download any type of data file to the secure computer server 110 .
- the system 100 also provides a secure repository for data files since the third party administrators of the system 100 have no access to data content unless the data files are not encrypted.
- the system 100 provides a public checksum directory 180 to enable long term verification of data file integrity, regardless of whether the data file has been deleted from the system, and regardless of whether the third party administrator remains in business and/or the system continue to exist, as described in more detail herein.
- FIG. 2 depicts a flowchart of a method 200 for establishing an anonymous user account with the subscriber-based system 100 according to an embodiment of the present disclosure.
- FIG. 1 for clarity purposes. It should be understood that the method 200 reflected in FIG. 2 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps of method 200 according to the present disclosure.
- the method 200 begins at step 210 when a user, such as User B, accesses a website associated with the subscriber-based system 100 using a computer that will be deemed a registered subscriber computer 150 , 160 by the system 100 once the account is established.
- a user such as User B
- the user accesses an account set-up screen on the website where the user is prompted to type in a username, a password, and a system identification (ID), each of which may require certain characteristics, such as a specific length, numbers only, a combination of letters and numbers, any type of alphanumeric characters, etc.
- a username, a password, and a system identification each of which may require certain characteristics, such as a specific length, numbers only, a combination of letters and numbers, any type of alphanumeric characters, etc.
- the user remains anonymous and is assured a level of privacy since no personal data is required during this step.
- the anonymous account is established and a directory 130 , 132 or 134 is assigned to the account for User B.
- the subscriber's system ID may also act as a public key for encryption/decryption of data files.
- the subscriber may use known public key encryption technology software to generate a matching public key and private key, or to associate a user-generated public key with a user-generated private key, for encrypting and decrypting data.
- the subscriber may encrypt data files for distribution to other users while still maintaining anonymous status (e.g., personal data about the subscriber may not be distributed to other users of the system).
- an anonymous user may upload a data file encrypted, using public key/private key technology based on the subscriber's system identification rather than personal data, to the system for purchase by and distribution to other anonymous subscribers and/or other subscribers.
- an anonymous subscriber may distribute an encrypted data file to another anonymous subscriber and both parties may retain their anonymous status.
- the subscriber retains his private key separate and apart from the system 100 , but submits the public key to the system 100 as the subscriber's system ID.
- Other account holders in the system may then use the subscriber's system ID/public key to encrypt data files that are uploaded to the system for distribution to the subscriber, who can then download copies of the data files and use the private key known only to the subscriber to decrypt them.
- Other account holders in the system may also establish their own system IDs/public keys associated with individual private keys.
- the subscriber may obtain a system ID/public key device for use in transactions and data file transfers with other account holders in the system, such as individuals, merchants, businesses, and government entities, for example.
- the system ID/public key device comprises a bar code suitable for scanning that may be printed onto a sheet of paper or displayed on a hand-held computer, for example.
- the system ID/public key device comprises a Radio-Frequency Identification (RFID) chip with the information encoded thereon.
- RFID Radio-Frequency Identification
- a credit card number is set as a substitute for the system ID/public key, and the system ID/public key device is the credit card itself. When a credit card is used as the system ID/public key device, the party who accepts the credit card for a transaction will use the desktop and/or enterprise software 170 to look up the actual system ID/public key on the system server 110 .
- An anonymous user account established via method 200 may be used for receiving, storing and managing many types of unalterable, data files. However, in some cases, subscribers may want/need to establish an account under their own name so that senders and recipients can verify the identity of the person or entity to whom or from whom data files are being distributed.
- FIG. 3 depicts a flowchart of a method 300 for establishing an identity account with the subscriber-based system 100 under a user's own name according to an embodiment of the present disclosure.
- FIG. 1 for clarity purposes. It should be understood that the method 300 reflected in FIG. 3 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps of method 300 according to the present disclosure.
- the method 300 begins at step 310 when a user, such as User B, establishes another subscriber account with the subscriber-based system 100 following the method 200 of FIG. 2 .
- the account established in step 310 requires a new and unique system ID/public key from any anonymous accounts.
- an identity account established according to method 300 is separate and distinct from any established anonymous accounts 130 , 132 , 134 , and the system 100 has no record of any link between the identity account and such anonymous accounts 130 , 132 , 134 .
- the subscriber may present to a registered agent of the system 100 the identity account information established in step 310 along with documentation verifying the identity of the subscriber.
- Such documentation may include, but is not limited to, a driver's license, a social security card, a birth certificate, and other legal documents that verify the legal name, mailing address, date and place of birth, and any other identity information that the subscriber would like to have certified on the system 100 .
- the registered agent may record a physical address for mail through the postal service and an electronic address using existing protocols.
- Each registered agent may be assigned a public key and a private key by the system 100 , and administrators of the system 100 may maintain documentation of these assigned public/private keys.
- the registered agent may create separate data files for specific identity elements based on the identity documents provided by the subscriber. Such separate data files may comprise identity elements such as name with Social Security number and/or name with address, for example. These separate identity data files are encrypted with the agent's private key, then encrypted with the subscriber's public key, then uploaded into the agent's designated directory on the server 110 .
- the registered agent may authorize the secure computer server 110 to distribute the encrypted identity data files from the agent's designated directory to the designated directory associated with the subscriber's identity account. Security measures will ensure that the registered agent is the source of the transmitted data.
- the subscriber may download the encrypted identity data files, decrypt the data file with his own private key, decrypt the data file with the registered agent's public key, and verify the accuracy and completeness of the identity data. The subscriber will then notify the registered agent of any errors. Otherwise, the subscriber keeps a copy of identity data files, which are encrypted with the registered agent's private key.
- step 360 when the subscriber wants to share the verified identity data with another party, the subscriber may then upload the identity data files, encrypted with the other party's public key, to the subscriber's identity account directory for access by or distribution to the other party.
- the other party may access the subscriber's identity data files by decrypting the confirmation with the other party's private key, then with the registered agent's public key.
- Decrypting the identity data files with the registered agent's public key confirms to the other party that the identity data files were created and verified by the registered agent since such decryption would only be possible if the identity data files were encrypted by the registered agent's private key.
- the method 300 ends at step 380 .
- the identity data files established via method 300 reside within the subscriber's identity account directory, encrypted with the registered agent's private key.
- the identity data files encrypted with the registered agent's private key may be maintained by the subscriber separate and apart from the system 100 .
- the certified identity data file, as described, may preclude the need for traditional third party digital certificates.
- Entity subscribers to the system 100 could benefit from establishing identity accounts for verifying the source and recipient of, and the integrity of, important business records in a single, secure server 110 where the documents cannot be deleted or altered.
- identity accounts could be used for sales people placing orders, accounts receivable and payable, employees submitting expense reports, human resources records, and any other data file that the business desires to maintain in an unaltered state.
- the system 100 and the methods described herein may be used for legal compliance in the maintenance of records.
- FIG. 4 is a flowchart of one simplified, representative embodiment of a method 400 for uploading, distributing, storing and downloading an encrypted, data file using the subscriber-based system 100 of FIG. 1 according to an embodiment of the present disclosure.
- FIG. 4 In describing the method 400 of FIG. 4 , reference may be made to FIG. 1 for clarity purposes. It should be understood that the method 400 reflected in FIG. 4 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps of method 400 according to the present disclosure.
- Users in some embodiments, may be anonymous users and/or users with identity accounts.
- the method 400 begins at step 410 where a subscriber of the system 100 , such as User A, optionally encrypts a data file in preparation for uploading 142 the data file to the secure computer server 110 of the system 100 .
- a subscriber of the system 100 such as User A
- User A encrypts the data file using a system ID/public key provided by User B during a transaction with User A.
- User A encrypts the data file with a private key established by User A.
- the third party administrator of the system may optionally dictate data structure standards for certain data file types to enable data integration from multiple sources.
- the data file may optionally be structured using XML or proprietary structure that allows the data to be categorized, indexed and searched.
- the data file may include a header that classifies the type of data contained therein as a receipt and may include such data fields as merchant name, purchase location, purchase date, item purchased, quantity purchased, and price, for example.
- the data file may further include the system ID/public key of User B as the intended recipient of the data file.
- the data file may be uploaded 142 from the User A registered subscriber computer 140 to the User A directory 120 on the secure computer server 110 .
- Uploading an encrypted data file to the server 110 is similar to recording a document with a courthouse or other government entity.
- the data submitted is maintained by the system 100 and cannot be altered. Moreover, only a subscriber with a corresponding public or private key operable to decrypt the data file can access the data.
- step 425 of the method 400 the system 100 creates a checksum of the uploaded data file.
- a checksum is like a signature for the data file, and the checksum will change if the data file is altered in any respect.
- the system 100 also adds tracking information, such as sender identification, the checksum, a tracking number, and a time stamp to the header of the data file.
- a checksum record of the data file comprising the checksum and the tracking information for the data file is then saved to the public checksum directory 180 on the public computer server 115 .
- the encrypted data file may be distributed 125 from the User A directory 120 to the appropriate User B directory 130 , 132 , 134 on the secure computer server 110 corresponding to the system ID/public key data that was identified in the data file.
- User B may establish rules for determining whether or not the data file can be distributed 125 to the intended User B directory 130 , 132 , 134 .
- User B has the option of blocking certain types of data files or data files distributed by certain subscribers or types of subscribers to the system 100 .
- the rules established by User B allow data files originating with User A to be distributed 125 to any of the User B directories 130 , 132 , 134 , and the rules also allow distribution 125 of the data file type that User A intends to distribute to User B. If the data represents a purchase by User B from User A, then the data file represents a certified copy of an unalterable receipt for that transaction so that User B is not required to track a paper receipt.
- User A may also retain a copy of the data file on User A registered subscriber computer 140 or within its directory 120 on the secure computer server. By retaining copies of such data file receipts, merchant User A will have the ability to track the individual shopping habits of individual User B as well as communicate with User B, even without knowing the actual identity of User B. Thus, the present systems and methods enable two subscribers of the system to conduct transactions and communicate with one another while remaining anonymous.
- User B may download 154 , 164 a copy of the data file from the User B directory 130 , 132 , 134 where the data file is stored.
- User B may use a registered subscriber computer 150 , 160 associated with the designated directory 130 , 132 , 134 to complete the download 154 , 164 or User B may use an unregistered computer to complete the download 154 , 164 .
- User B may then decrypt the downloaded data file using the User B private key if User A encrypted the data file with the User B public key.
- User B may decrypt the downloaded data file using the User A public key if User A encrypted the data file with the User A private key.
- the decrypted data file may then be saved to a User B computer 150 , 160 using the proprietary software 170 .
- the decrypted data file saved to the User B computer 150 , 160 may be used to link the transaction to User B's detailed financial records, allowing for data queries and/or hyper linking to related documents.
- the method 400 ends at step 450 .
- all uploaded copies of the data file may be deleted from the system 100 while still retaining the ability to verify data file integrity and file ownership in the future.
- the system 100 comprises a unique public directory 180 of data file checksums
- anyone to whom User B provides a copy of the data file can re-encrypt the data file with User B's public key and compare the checksum of the re-encrypted file with the checksum record held by the system 100 in public directory 180 . If the checksums match, the data file has not been altered, and re-encrypting with User B's public key also confirms that User B was the original recipient of the data file from the system 100 .
- the system 100 still performs the function of a repository that maintains records operable to prove the integrity of a data file.
- systems and methods of the present disclosure enable long term verification of data file integrity, even if data stored on the system 100 is lost, and even if the third party administrator goes out of business and/or shuts down the system 100 .
- FIG. 5 is a flowchart of one simplified, representative embodiment of such a method 500 for long term verification of data file integrity using the subscriber-based system 100 of FIG. 1 .
- FIG. 5 In describing the method 500 of FIG. 5 , reference may be made to FIG. 1 for clarity purposes. It should be understood that the method 500 reflected in FIG. 5 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps of method 500 according to the present disclosure.
- the method 500 begins at step 510 where a subscriber to the system, such as User A, requests from the third party administrator relevant checksum records from the public checksum directory 180 .
- step 520 of the method 500 the third party administrator encrypts such relevant checksum records with the administrator's private key.
- step 530 the encrypted checksum records are distributed to the subscriber's directory, such as User A's directory 120 , on the secure computer server 110 , and in step 540 , the encrypted checksum records are downloaded 144 to the subscriber's computer, such as User A computer 140 .
- step 550 at any time the subscriber can then decrypt the checksum records using the third party administrator's public key to verify that the data files downloaded from the system 100 and stored on the subscriber's computer have not been altered. Thus, if the system 100 were to shut down or lose data, subscribers can still verify the integrity of the data files that had been uploaded to the system 100 before that date.
- the method 500 ends at step 560 .
- subscribers to the system 100 may include all parties to a financial transaction, such as an individual, a merchant and a bank.
- the system 100 may enable individuals to pay merchants from a bank account at the point of sale.
- FIG. 6 is a flowchart of one embodiment of a method 600 for making a payment from a bank account at a point of sale through the subscriber-based system 100 of FIG. 1 according to an embodiment of the present disclosure.
- FIG. 6 reference may be made to FIG. 1 for clarity purposes. It should be understood that the method 600 reflected in FIG. 6 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps of method 600 according to the present disclosure.
- the method begins at step 610 at the point of sale terminal where the individual subscriber provides the individual's system ID/public key and the bank's system ID/public key to the merchant.
- the system IDs/public keys may be broadcast from the individual's hand-held computer, such as a PDA or smart phone.
- the system IDs/public keys may be displayed on the PDA or smart phone as a bar code suitable for scanning by the merchant.
- the merchant sends a data file request for payment to the bank, encrypted with the bank's system ID/public key.
- the bank decrypts the merchant's data file request for payment using the bank's private key. The bank then looks up the individual's bank account using the individual's system ID/public key to confirm that sufficient funds are present to cover the purchase.
- the bank may send a confirmation number to the individual's hand-held computer.
- the confirmation number is encrypted with the individual's system ID/public key.
- the hand-held computer may then decrypt the confirmation number and display it as a bar code, or transmit it electronically to the merchant's computer.
- step 650 the merchant may send the confirmation number back to the bank, and in step 660 the bank may transfer the funds from the individual's bank account to the merchant's bank account.
- step 660 the bank may transfer the funds from the individual's bank account to the merchant's bank account.
- the subscriber-based system 100 described herein offers long-term storage of data files that cannot be deleted or altered by any subscribers of the system 100 . Moreover, administrators of the system 100 have no access to the content of encrypted data files. As such, these encrypted data files are ensured to remain intact in the original form received by the system 100 .
- the subscriber-based system 100 may allow any type of data file to be uploaded, stored, distributed and/or downloaded in accordance with the present disclosure.
- data files may include, but are not limited to: purchase transaction records; financial statements; merchant discounts and offers; invoices; mail; government documents; voting ballots; medical records; insurance records; legal records; and music, books, movies and other digital media, for example.
- the system 100 and methods 200 , 300 , 400 , 500 , 600 disclosed herein may support many different possible applications.
- one such application is a financial management and record-keeping tool.
- the system 100 may be operable to automatically aggregate and categorize data files identified as receipts, for example.
- the system 100 may also receive credit card statements and bank statements with hyperlinks to the individual receipts.
- the system 100 may further include hyperlinks between a warranty document, a user manual, and a receipt for the purchase of the item.
- the system 100 may interface with tax preparation software for preparation of tax returns.
- the system 100 may enable merchants to distribute coupons or special offers to the directories of individual subscribers based on their purchasing habits with that merchant, or based on their overall purchasing habits summarized in a system-generated profile, for example.
- Additional applications include sending mail to subscriber's of the system 100 electronically rather than through the regular postal service; establishing a bidding system for purchasing items through the system 100 ; transferring medical records, insurance claim records, legal documents, government benefit transaction records (food stamps, unemployment, social security, student loans, etc.), voting registration forms, voting ballots, and other important documentation through the system 100 ; storing raw research data and notes to establish a verifiable timeline for development of the data; and many other possible applications.
- a fee may be charged to a sending subscriber for distributing certain types of data files to receiving subscribers via the system 100 .
- data files may be sent COD to a subscriber's registered computer on the system 100 .
- Couple and its derivatives refer to any direct or indirect communication between two or more elements, whether or not those elements are in physical contact with one another.
- the term “or” is inclusive, meaning and/or.
- the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like.
- the subscriber-based system and/or subscriber-based system server may be communicably coupled, for example through a network such as the Internet, to the user devices and/or the publically accessible repository.
- the subscriber-based system may automatically analyze the data files and determine a data integrity record such as the checksum record.
- the subscriber-based system may generate an interface to facilitate user interaction.
- the interface may be accessible through the Internet, for example.
- the subscriber-based system has been described as including a server, the subscriber-based system may include other computing devices such as personal computers, laptops, etc.
- data file has been described as the transmitted to the subscriber-based system by a user, various types and/or sizes of data may be transmitted and process as described.
- XML data packets may be transmitted to the subscriber-based system and processed.
- a user may be a person, a group of people, a person or persons interacting with one or more computers, and/or a computer system.
- Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof.
- ASICs application specific integrated circuits
- These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
- the systems and techniques described here can be implemented on a computer having a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user and a keyboard and a pointing device (e.g., a mouse or a trackpad) by which the user can provide input to the computer.
- a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
- a keyboard and a pointing device e.g., a mouse or a trackpad
- Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user by an output device can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
- the systems and techniques described here can be implemented in a computing system that includes a back end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front end component (e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back end, middleware, or front end components.
- the components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), and the Internet.
- LAN local area network
- WAN wide area network
- the Internet the global information network
- the computing system may include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network.
- the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Abstract
Systems and methods for securely uploading, distributing, managing and/or storing any type of data file within a subscriber-based system maintained by a third party administrator are disclosed. The subscriber-based system acts as an electronic repository to ensure that data files remain intact, secure, and unaltered from their original form. Systems and methods for long term verification of data file integrity using checksum records stored in a public checksum directory are also disclosed.
Description
- The present application is a continuation of U.S. patent application Ser. No. 13/475,685 filed May 18, 2012 and entitled “SYSTEM AND METHOD FOR SECURE DISTRIBUTION AND/OR STORAGE OF DATA FILES WITH LONG TERM FILE INTEGRITY VERIFICATION,” which claims the benefit of U.S. Provisional Patent Application No. 61/488,052, also entitled “SYSTEM AND METHOD FOR SECURE DISTRIBUTION AND/OR STORAGE OF DATA FILES WITH LONG TERM FILE INTEGRITY VERIFICATION” filed on May 19, 2011, both of which are incorporated by reference herein for all purposes.
- The present disclosure relates generally to systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator; for securely storing and managing such data files within the subscriber-based system as an electronic repository keeping the data files intact and unalterable, with no access to the content of the data files by the third party administrator; and for long term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists.
- Important business and personal data has conventionally been maintained in different formats, including paper files and electronic files. Traditional distribution methods for such data files, including regular mail, facsimile and electronic mail (e-mail), for example, may allow the data files to be accessed or retrieved by someone other than the intended recipient. Likewise, traditional storage systems, such as file rooms and electronic networks, for example, may allow the data files to be tampered with or altered from their original form. Traditional storage methods may also involve storing such data files in a variety of different formats and in different physical or electronic locations, which precludes efficient data aggregation, mining, searching and/or linking of such data files.
- Embodiments of the present disclosure generally provide systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator.
- Embodiments of the present disclosure also generally provide systems and methods for securely storing and managing data files within the subscriber-based system as an electronic repository to ensure the files remain intact, secure, and unalterable from their original form, with no access to the content of the data file by the third party administrator.
- Embodiments of the present disclosure further generally provide systems and methods for long-term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists.
- In an embodiment, the present disclosure provides a subscriber-based system comprising a secure computer server and desktop software and/or enterprise software to manage data files and the content thereof In various embodiments, such management may comprise, for example, data file transfers, deletions, encryption/decryption, synchronization, data aggregation, integrity verification, content analysis, structure control, sorting, querying, hyper linking and accounting.
- In an embodiment, the subscriber-based system further comprises a public computer server with one or more open and publicly accessible directories, including a checksum records directory.
- In an embodiment, the present disclosure provides a method for establishing an anonymous account with the subscriber-based system by setting a username, a password, and a system identification (ID) that may also be used as a public key for optional public key data encryption.
- In another embodiment, the present disclosure provides a method for establishing an identity account with the subscriber-based system under a user's own name. The identity account may be established by presenting to a registered agent of the subscriber-based system sufficient forms of positive identification that may be linked to the username, password, and system ID associated with the subscriber's identity account.
- In an embodiment, the present disclosure provides a method for an account holder of a subscriber-based system to upload a data file to the system. The account holder may further encrypt the data file before uploading. Once uploaded, the data file may be stored in the account holder's dedicated directory on the system, distributed to one or more other account holders' dedicated directories on the system, or downloaded from the system, all with no ability to alter its content.
- In an embodiment, the method may further comprise associating tracking information with the data file, such as system ID numbers/public keys, a data description, a time stamp, and a date stamp, for example. Associating tracking information with the data file may be performed by a third party administrator that maintains the subscriber-based system rather than by an account holder on the system.
- In an embodiment, the method may further comprise creating a checksum of an uploaded data file, associating the checksum with tracking information for the data file, and maintaining a checksum record comprising the checksum with the tracking information in a publicly accessible checksum directory on the system.
- In various embodiments, the present disclosure provides systems and methods for one account holder of a subscriber-based system to distribute to another account holder of the subscriber-based system any type of data file, such as: purchase transaction records; financial statements; merchant discounts and offers; invoices; mail; government documents; voting ballots; medical records; insurance records; legal records; and music, books, movies and other digital media, for example. In an embodiment, account holders may control which of such distributed data files are received into their directories by allowing or blocking data file distribution based on the identity of the sending account holder or the type of data file.
- In various embodiments, the present disclosure further provides systems and methods for an account holder of a subscriber-based system to store and manage any type of data file in the account holder's dedicated directory of the subscriber-based system.
- The present disclosure further provides systems and methods for an account holder of the subscriber-based system to download any type of data file to the account holder's registered computer. Once downloaded, the data file may be deleted from the subscriber-based system. In an embodiment, a checksum record of the data file remains stored in the checksum directory on the system for long term verification of data file integrity, regardless of whether the data file is still stored on the subscriber-based system. In another embodiment, a copy of the checksum record of the data file is provided to a subscriber for long term verification of data file integrity, even if the third party administrator is out of business or the system otherwise ceases to exist.
- In still another embodiment, the present disclosure provides systems and methods for completing secure financial transactions between parties, either anonymously or under a user's own name. Such secure financial transactions may comprise payments to merchants or other entities through the subscriber-based system, for example.
- For a more complete understanding of the present disclosure and its features, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a schematic illustration of a subscriber-based system in accordance with one embodiment of the present disclosure; -
FIG. 2 is a flowchart of one embodiment of a method for establishing an anonymous account with the subscriber-based system ofFIG. 1 ; -
FIG. 3 is a flowchart of one embodiment of a method for establishing an identity account with the subscriber-based system ofFIG. 1 ; -
FIG. 4 is a flowchart of one embodiment of a method for uploading, distributing, storing and downloading a data file using the subscriber-based system ofFIG. 1 ; -
FIG. 5 is a flowchart of one embodiment of a method for long term verification of data file integrity using the subscriber-based system ofFIG. 1 ; and -
FIG. 6 is a flowchart of one embodiment of a method for making a payment through the subscriber-based system ofFIG. 1 . - The present disclosure relates generally to systems and methods for securely uploading and distributing data files within a subscriber-based system maintained by a third party administrator; for securely storing and managing such data files within the subscriber-based system as an electronic repository keeping the data files intact and unalterable, with no access to the content of the data files by the third party administrator; and for long term verification of data file integrity through the subscriber-based system, regardless of whether the data file is still stored on the subscriber-based system, and regardless of whether the third party administrator is still in business or the system otherwise exists. In some embodiments, keeping the data files intact and unalterable may include allowing read-only access to the data file, restricting the ability of users to alter the data file (e.g., through password protection), and/or through the use of a restricted file format (e.g., a noneditable pdf file).
-
FIG. 1 is a schematic illustration of a subscriber-basedsystem 100 according to an embodiment of the present disclosure. It should be understood that the subscriber-basedsystem 100 shown inFIG. 1 is for illustrative purposes only and that any other suitable system or subsystem could be used in conjunction with, or in lieu of, subscriber-basedsystem 100 according to the present disclosure. - In an embodiment, subscriber-based
system 100 may comprise a secure computer server 110 with multiplededicated directories dedicated directory 120 and User B may have multiplededicated directories data 112 such as the directories, 120, 130, 132, 134 may be stored on amemory 114 of the server 110. Thememory 114 may also storeinstructions 116 such as an operating system and/or software modules executable by a processor of the server 110. Thememory 114 may also store amanagement module 118. - The
management module 118 may perform services for subscribers, such as facilitating the secure management of data; facilitating communications between users of the subscriber-based system, and/or receive information from users and non-users of the subscriber-based system. In some embodiments, themanagement module 118 may receive data files from users, restrict access to the data files, create data integrity records, create tracking information, associate other data with received and/or stored data files, and/or transmit data for storage in a memory of the server or other memories. In some embodiments, themanagement module 118 may transmit data such as the data file, the data integrity record, identity files, and other files to devices (e.g., computers, portable memory devices, and/or smartphones) of users and/or non-users. Themanagement module 118 may transmit data such as the data file, the data integrity record, identity files, and other files to various memories for storage. Themanagement module 118 may restrict access to the data file and/or restrict transmission of the data file. For example, themanagement module 118 may restrict transmission of the data file to another user based on preferences (e.g., sender identity, type of file, etc.). The preferences may be defined by the user receiving the data file and/or the user transmitting the file. Themanagement module 118 may also instruct that data is removed from thememory 114 of the server 110 or other memories communicably coupled to the server 110. - The server 110 may also include a communication interface that allows the
system 100 to communicate with other systems and/or memories. For example, the subscriber-basedsystem 100 may retrieve data from a repository for analysis. The server may also include a presentation interface to present, for example, data integrity files and/or other information. - Subscriber-based
system 100 may further comprise apublic computer server 115 withmultiple directories system 100, such as Non-User C, for example. As an example, a repository may be accessible by users and non-users, who may view, download, and/or save files in the repository. In an embodiment, thepublic computer server 115 may comprise achecksum directory 180 for verification of the integrity of data files uploaded to the secure computer server 110, as described in more detail herein. In an embodiment, thepublic computer server 115 may further comprise anopen phonebook directory 190, available for review by subscribers and non-subscribers alike, wherein User A and User B may optionally elect to post their names, addresses, phone numbers, email addresses, public encryption keys, and other information, for example. In an embodiment, thepublic computer server 115 may also be configured to enable non-subscribers to thesystem 100, such as Non-User C, to post their information to theopen phonebook directory 190. - The subscriber-based
system 100 may further comprise registeredsubscriber computers particular user directories User A computer 140 is associated withUser A directory 120,User B computer 150 is associated withUser B directories User B computer 160 is associated withUser B directory 134. - The subscriber-based
system 100 may further comprise one or morenon-subscriber computers 175, each approved to connect to thepublic computer server 115 to access the open and publiclyavailable directories system 100. In a representative example,Non-User C computer 175 is operable to connect topublic directories public computer server 115. - As used herein, the terms “server” and/or “computer” encompasses the broadest possible meaning of the term and includes, without limitation, a single personal computer (such as a desktop computer, laptop computer, notebook computer, tablet computer, hand-held computer, personal digital assistant (PDA), and smart phone, for example), a network of personal computers, a single enterprise computer, and a network of enterprise computers, etc.
- In an embodiment, a connection between the registered
subscriber computers enterprise software 170. In particular, each of the registeredsubscriber computers enterprise software 170 that may automatically synchronize with the secure computer server 110 whenever a subscriber is connected to the server 110 via the Internet. - As described in more detail herein, connection to the server 110 enables subscribers to upload and download data files to and from those
directories computers FIG. 1 ,arrows arrows subscriber computer subscriber computer - Further, as described in more detail herein, when a data file is uploaded to the secure computer server 110, the
system 100 may create a checksum for the data file, associate that checksum with tracking information for that data file to create a data integrity record such as a checksum record, and then transfer 185 the checksum record topublic computer server 115 for long term storage inpublic checksum directory 180. Since thechecksum directory 180 resides on thepublic computer server 115, both subscribers and non-subscribers to the system are permitted to access thepublic checksum directory 180 to verify data file integrity. - Although a data integrity test including a checksum has been described to verify the data file integrity, other data integrity tests may be created and/or utilized by the system. For example, data integrity tests may include checksum, cyclic redundancy checks, parity, and/or cryptographic hashes.
- Uploaded data files may be addressed for distribution to another subscriber's directory. As a representative example, a data file uploaded 142 from
User A computer 140 toUser A directory 120 on the secure computer server 110 may be addressed for distribution by thesystem 100 toUser B directory 130, as represented byarrow 125 inFIG. 1 . In an embodiment, subscribers to the system can control which other users are permitted to distribute data files to the subscriber's directories and over which types of data files may be distributed to the subscriber's directories. In the present example, User B has not barred receipt of data files from User A nor the type of data file that User A is distributing to User B, so the data filedistribution 125 fromUser A directory 120 toUser B directory 130 is completed. - It is contemplated that the subscriber-based
system 100 ofFIG. 1 will be universal in that it will allow any individual or entity that meets the terms of use to subscribe to thesystem 100 and upload, store, distribute and/or download any type of data file to the secure computer server 110. Thesystem 100 also provides a secure repository for data files since the third party administrators of thesystem 100 have no access to data content unless the data files are not encrypted. Further, thesystem 100 provides apublic checksum directory 180 to enable long term verification of data file integrity, regardless of whether the data file has been deleted from the system, and regardless of whether the third party administrator remains in business and/or the system continue to exist, as described in more detail herein. -
FIG. 2 depicts a flowchart of amethod 200 for establishing an anonymous user account with the subscriber-basedsystem 100 according to an embodiment of the present disclosure. In describing themethod 200 ofFIG. 2 , reference may be made toFIG. 1 for clarity purposes. It should be understood that themethod 200 reflected inFIG. 2 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps ofmethod 200 according to the present disclosure. - The
method 200 begins atstep 210 when a user, such as User B, accesses a website associated with the subscriber-basedsystem 100 using a computer that will be deemed a registeredsubscriber computer system 100 once the account is established. - At
step 220, the user accesses an account set-up screen on the website where the user is prompted to type in a username, a password, and a system identification (ID), each of which may require certain characteristics, such as a specific length, numbers only, a combination of letters and numbers, any type of alphanumeric characters, etc. The user remains anonymous and is assured a level of privacy since no personal data is required during this step. Once the username, password, and system ID are set atstep 220, the anonymous account is established and adirectory - In an embodiment, the subscriber's system ID may also act as a public key for encryption/decryption of data files. In more detail, the subscriber may use known public key encryption technology software to generate a matching public key and private key, or to associate a user-generated public key with a user-generated private key, for encrypting and decrypting data. Thus, in some embodiments, the subscriber may encrypt data files for distribution to other users while still maintaining anonymous status (e.g., personal data about the subscriber may not be distributed to other users of the system). For example, an anonymous user may upload a data file encrypted, using public key/private key technology based on the subscriber's system identification rather than personal data, to the system for purchase by and distribution to other anonymous subscribers and/or other subscribers. In some embodiments, an anonymous subscriber may distribute an encrypted data file to another anonymous subscriber and both parties may retain their anonymous status.
- The subscriber retains his private key separate and apart from the
system 100, but submits the public key to thesystem 100 as the subscriber's system ID. Other account holders in the system may then use the subscriber's system ID/public key to encrypt data files that are uploaded to the system for distribution to the subscriber, who can then download copies of the data files and use the private key known only to the subscriber to decrypt them. Other account holders in the system may also establish their own system IDs/public keys associated with individual private keys. - At
step 230, the subscriber may obtain a system ID/public key device for use in transactions and data file transfers with other account holders in the system, such as individuals, merchants, businesses, and government entities, for example. - In an embodiment, the system ID/public key device comprises a bar code suitable for scanning that may be printed onto a sheet of paper or displayed on a hand-held computer, for example. In another embodiment, the system ID/public key device comprises a Radio-Frequency Identification (RFID) chip with the information encoded thereon. In another embodiment, a credit card number is set as a substitute for the system ID/public key, and the system ID/public key device is the credit card itself. When a credit card is used as the system ID/public key device, the party who accepts the credit card for a transaction will use the desktop and/or
enterprise software 170 to look up the actual system ID/public key on the system server 110. Many other types of devices may be used for providing a system ID/public key to other account holders for adding to a transaction record or other data file. Once the subscriber obtains the system ID/public key device atstep 230, themethod 200 for establishing an anonymous user account ends atstep 240. - An anonymous user account established via
method 200 may be used for receiving, storing and managing many types of unalterable, data files. However, in some cases, subscribers may want/need to establish an account under their own name so that senders and recipients can verify the identity of the person or entity to whom or from whom data files are being distributed. -
FIG. 3 depicts a flowchart of amethod 300 for establishing an identity account with the subscriber-basedsystem 100 under a user's own name according to an embodiment of the present disclosure. In describing themethod 300 ofFIG. 3 , reference may be made toFIG. 1 for clarity purposes. It should be understood that themethod 300 reflected inFIG. 3 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps ofmethod 300 according to the present disclosure. - The
method 300 begins atstep 310 when a user, such as User B, establishes another subscriber account with the subscriber-basedsystem 100 following themethod 200 ofFIG. 2 . The account established instep 310 requires a new and unique system ID/public key from any anonymous accounts. In an embodiment, an identity account established according tomethod 300 is separate and distinct from any establishedanonymous accounts system 100 has no record of any link between the identity account and suchanonymous accounts - In
step 320, the subscriber may present to a registered agent of thesystem 100 the identity account information established instep 310 along with documentation verifying the identity of the subscriber. Such documentation may include, but is not limited to, a driver's license, a social security card, a birth certificate, and other legal documents that verify the legal name, mailing address, date and place of birth, and any other identity information that the subscriber would like to have certified on thesystem 100. The registered agent may record a physical address for mail through the postal service and an electronic address using existing protocols. - Each registered agent may be assigned a public key and a private key by the
system 100, and administrators of thesystem 100 may maintain documentation of these assigned public/private keys. Instep 330, the registered agent may create separate data files for specific identity elements based on the identity documents provided by the subscriber. Such separate data files may comprise identity elements such as name with Social Security number and/or name with address, for example. These separate identity data files are encrypted with the agent's private key, then encrypted with the subscriber's public key, then uploaded into the agent's designated directory on the server 110. - In
step 340, the registered agent may authorize the secure computer server 110 to distribute the encrypted identity data files from the agent's designated directory to the designated directory associated with the subscriber's identity account. Security measures will ensure that the registered agent is the source of the transmitted data. - In
step 350, the subscriber may download the encrypted identity data files, decrypt the data file with his own private key, decrypt the data file with the registered agent's public key, and verify the accuracy and completeness of the identity data. The subscriber will then notify the registered agent of any errors. Otherwise, the subscriber keeps a copy of identity data files, which are encrypted with the registered agent's private key. - In
step 360, when the subscriber wants to share the verified identity data with another party, the subscriber may then upload the identity data files, encrypted with the other party's public key, to the subscriber's identity account directory for access by or distribution to the other party. - In
step 370, the other party may access the subscriber's identity data files by decrypting the confirmation with the other party's private key, then with the registered agent's public key. Decrypting the identity data files with the registered agent's public key confirms to the other party that the identity data files were created and verified by the registered agent since such decryption would only be possible if the identity data files were encrypted by the registered agent's private key. Themethod 300 ends atstep 380. - In an embodiment, the identity data files established via
method 300 reside within the subscriber's identity account directory, encrypted with the registered agent's private key. Alternatively, the identity data files encrypted with the registered agent's private key may be maintained by the subscriber separate and apart from thesystem 100. The certified identity data file, as described, may preclude the need for traditional third party digital certificates. - Entity subscribers to the
system 100 could benefit from establishing identity accounts for verifying the source and recipient of, and the integrity of, important business records in a single, secure server 110 where the documents cannot be deleted or altered. Such identity accounts could be used for sales people placing orders, accounts receivable and payable, employees submitting expense reports, human resources records, and any other data file that the business desires to maintain in an unaltered state. In an embodiment, thesystem 100 and the methods described herein may be used for legal compliance in the maintenance of records. -
FIG. 4 is a flowchart of one simplified, representative embodiment of amethod 400 for uploading, distributing, storing and downloading an encrypted, data file using the subscriber-basedsystem 100 ofFIG. 1 according to an embodiment of the present disclosure. In describing themethod 400 ofFIG. 4 , reference may be made toFIG. 1 for clarity purposes. It should be understood that themethod 400 reflected inFIG. 4 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps ofmethod 400 according to the present disclosure. Users, in some embodiments, may be anonymous users and/or users with identity accounts. - Referring now to
FIG. 1 andFIG. 4 , themethod 400 begins atstep 410 where a subscriber of thesystem 100, such as User A, optionally encrypts a data file in preparation for uploading 142 the data file to the secure computer server 110 of thesystem 100. In an embodiment, User A encrypts the data file using a system ID/public key provided by User B during a transaction with User A. In another embodiment, User A encrypts the data file with a private key established by User A. - In an embodiment, the third party administrator of the system may optionally dictate data structure standards for certain data file types to enable data integration from multiple sources. In an embodiment, the data file may optionally be structured using XML or proprietary structure that allows the data to be categorized, indexed and searched. As one representative example, if the data file corresponds to a purchase made by individual User B from merchant User A, the data file may include a header that classifies the type of data contained therein as a receipt and may include such data fields as merchant name, purchase location, purchase date, item purchased, quantity purchased, and price, for example. The data file may further include the system ID/public key of User B as the intended recipient of the data file.
- In
step 420, the data file may be uploaded 142 from the User A registeredsubscriber computer 140 to theUser A directory 120 on the secure computer server 110. Uploading an encrypted data file to the server 110 is similar to recording a document with a courthouse or other government entity. The data submitted is maintained by thesystem 100 and cannot be altered. Moreover, only a subscriber with a corresponding public or private key operable to decrypt the data file can access the data. - In
step 425 of themethod 400, thesystem 100 creates a checksum of the uploaded data file. A checksum is like a signature for the data file, and the checksum will change if the data file is altered in any respect. Thesystem 100 also adds tracking information, such as sender identification, the checksum, a tracking number, and a time stamp to the header of the data file. A checksum record of the data file comprising the checksum and the tracking information for the data file is then saved to thepublic checksum directory 180 on thepublic computer server 115. - In the
next step 430 of themethod 400, the encrypted data file may be distributed 125 from theUser A directory 120 to the appropriateUser B directory User B directory system 100. - In a representative example, the rules established by User B allow data files originating with User A to be distributed 125 to any of the
User B directories distribution 125 of the data file type that User A intends to distribute to User B. If the data represents a purchase by User B from User A, then the data file represents a certified copy of an unalterable receipt for that transaction so that User B is not required to track a paper receipt. - User A may also retain a copy of the data file on User A registered
subscriber computer 140 or within itsdirectory 120 on the secure computer server. By retaining copies of such data file receipts, merchant User A will have the ability to track the individual shopping habits of individual User B as well as communicate with User B, even without knowing the actual identity of User B. Thus, the present systems and methods enable two subscribers of the system to conduct transactions and communicate with one another while remaining anonymous. - In
step 440 of themethod 400, User B may download 154, 164 a copy of the data file from theUser B directory subscriber computer directory download download User B computer proprietary software 170. For financial transactions, the decrypted data file saved to theUser B computer method 400 ends atstep 450. - In an embodiment, after the data file has been downloaded to the
User B computer system 100 while still retaining the ability to verify data file integrity and file ownership in the future. In particular, because thesystem 100 comprises a uniquepublic directory 180 of data file checksums, anyone to whom User B provides a copy of the data file can re-encrypt the data file with User B's public key and compare the checksum of the re-encrypted file with the checksum record held by thesystem 100 inpublic directory 180. If the checksums match, the data file has not been altered, and re-encrypting with User B's public key also confirms that User B was the original recipient of the data file from thesystem 100. Thus, thesystem 100 still performs the function of a repository that maintains records operable to prove the integrity of a data file. - In another embodiment, the systems and methods of the present disclosure enable long term verification of data file integrity, even if data stored on the
system 100 is lost, and even if the third party administrator goes out of business and/or shuts down thesystem 100. -
FIG. 5 is a flowchart of one simplified, representative embodiment of such amethod 500 for long term verification of data file integrity using the subscriber-basedsystem 100 ofFIG. 1 . In describing themethod 500 ofFIG. 5 , reference may be made toFIG. 1 for clarity purposes. It should be understood that themethod 500 reflected inFIG. 5 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps ofmethod 500 according to the present disclosure. - The
method 500 begins atstep 510 where a subscriber to the system, such as User A, requests from the third party administrator relevant checksum records from thepublic checksum directory 180. - In
step 520 of themethod 500, the third party administrator encrypts such relevant checksum records with the administrator's private key. - In
step 530, the encrypted checksum records are distributed to the subscriber's directory, such as User A'sdirectory 120, on the secure computer server 110, and instep 540, the encrypted checksum records are downloaded 144 to the subscriber's computer, such asUser A computer 140. - In
step 550, at any time the subscriber can then decrypt the checksum records using the third party administrator's public key to verify that the data files downloaded from thesystem 100 and stored on the subscriber's computer have not been altered. Thus, if thesystem 100 were to shut down or lose data, subscribers can still verify the integrity of the data files that had been uploaded to thesystem 100 before that date. Themethod 500 ends atstep 560. - It is contemplated that the subscriber-based
system 100 and themethods system 100 may include all parties to a financial transaction, such as an individual, a merchant and a bank. In that case, thesystem 100 may enable individuals to pay merchants from a bank account at the point of sale. -
FIG. 6 is a flowchart of one embodiment of amethod 600 for making a payment from a bank account at a point of sale through the subscriber-basedsystem 100 ofFIG. 1 according to an embodiment of the present disclosure. In describing themethod 600 ofFIG. 6 , reference may be made toFIG. 1 for clarity purposes. It should be understood that themethod 600 reflected inFIG. 6 is for illustrative purposes only and that any other suitable method steps could be used in conjunction with, or in lieu of, the steps ofmethod 600 according to the present disclosure. - The method begins at
step 610 at the point of sale terminal where the individual subscriber provides the individual's system ID/public key and the bank's system ID/public key to the merchant. In an embodiment, the system IDs/public keys may be broadcast from the individual's hand-held computer, such as a PDA or smart phone. In another embodiment, the system IDs/public keys may be displayed on the PDA or smart phone as a bar code suitable for scanning by the merchant. - In the
next step 620, the merchant sends a data file request for payment to the bank, encrypted with the bank's system ID/public key. Instep 630, the bank decrypts the merchant's data file request for payment using the bank's private key. The bank then looks up the individual's bank account using the individual's system ID/public key to confirm that sufficient funds are present to cover the purchase. - In
step 640, the bank may send a confirmation number to the individual's hand-held computer. In an embodiment, the confirmation number is encrypted with the individual's system ID/public key. The hand-held computer may then decrypt the confirmation number and display it as a bar code, or transmit it electronically to the merchant's computer. - In
step 650, the merchant may send the confirmation number back to the bank, and instep 660 the bank may transfer the funds from the individual's bank account to the merchant's bank account. Themethod 600 ends atstep 670. - The subscriber-based
system 100 described herein offers long-term storage of data files that cannot be deleted or altered by any subscribers of thesystem 100. Moreover, administrators of thesystem 100 have no access to the content of encrypted data files. As such, these encrypted data files are ensured to remain intact in the original form received by thesystem 100. - The subscriber-based
system 100 may allow any type of data file to be uploaded, stored, distributed and/or downloaded in accordance with the present disclosure. Such data files may include, but are not limited to: purchase transaction records; financial statements; merchant discounts and offers; invoices; mail; government documents; voting ballots; medical records; insurance records; legal records; and music, books, movies and other digital media, for example. Thus, thesystem 100 andmethods - In an embodiment, one such application is a financial management and record-keeping tool. The
system 100 may be operable to automatically aggregate and categorize data files identified as receipts, for example. Thesystem 100 may also receive credit card statements and bank statements with hyperlinks to the individual receipts. Thesystem 100 may further include hyperlinks between a warranty document, a user manual, and a receipt for the purchase of the item. In addition, thesystem 100 may interface with tax preparation software for preparation of tax returns. - Another application is a marketing tool for merchants. The
system 100 may enable merchants to distribute coupons or special offers to the directories of individual subscribers based on their purchasing habits with that merchant, or based on their overall purchasing habits summarized in a system-generated profile, for example. - Additional applications include sending mail to subscriber's of the
system 100 electronically rather than through the regular postal service; establishing a bidding system for purchasing items through thesystem 100; transferring medical records, insurance claim records, legal documents, government benefit transaction records (food stamps, unemployment, social security, student loans, etc.), voting registration forms, voting ballots, and other important documentation through thesystem 100; storing raw research data and notes to establish a verifiable timeline for development of the data; and many other possible applications. In some embodiments, a fee may be charged to a sending subscriber for distributing certain types of data files to receiving subscribers via thesystem 100. In other embodiments, data files may be sent COD to a subscriber's registered computer on thesystem 100. - It may be advantageous to set forth definitions of certain words and phrases used in this patent document. The term “couple” and its derivatives refer to any direct or indirect communication between two or more elements, whether or not those elements are in physical contact with one another. The terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation. The term “or” is inclusive, meaning and/or. The phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like.
- In some embodiments, the subscriber-based system and/or subscriber-based system server may be communicably coupled, for example through a network such as the Internet, to the user devices and/or the publically accessible repository. The subscriber-based system may automatically analyze the data files and determine a data integrity record such as the checksum record.
- In some embodiments, the subscriber-based system may generate an interface to facilitate user interaction. The interface may be accessible through the Internet, for example.
- Although the subscriber-based system has been described as including a server, the subscriber-based system may include other computing devices such as personal computers, laptops, etc.
- Although data file has been described as the transmitted to the subscriber-based system by a user, various types and/or sizes of data may be transmitted and process as described. For example, XML data packets may be transmitted to the subscriber-based system and processed.
- Although users have been described as a human, a user may be a person, a group of people, a person or persons interacting with one or more computers, and/or a computer system. Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
- These computer programs (also known as programs, software, software applications or code) include machine instructions for a programmable processor, and can be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the term “machine-readable medium” refers to any computer program product, apparatus and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal” refers to any signal used to provide machine instructions and/or data to a programmable processor.
- To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user and a keyboard and a pointing device (e.g., a mouse or a trackpad) by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user by an output device can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
- The systems and techniques described here can be implemented in a computing system that includes a back end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front end component (e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back end, middleware, or front end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), and the Internet.
- The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- While the present disclosure has described certain embodiments and generally associated methods, alterations and permutations of these embodiments and methods will be apparent to those skilled in the art. Accordingly, the above description of example embodiments does not define or constrain this disclosure. Other changes, substitutions, and alterations are also possible without departing from the spirit and scope of this disclosure, as defined by the following claims.
Claims (15)
1. A computer-implemented method for securely managing data, the method comprising:
storing encrypted data in a memory of a subscriber-based system maintained by a third-party administrator, wherein the stored encrypted data is unalterable;
restricting access to the stored encrypted data;
creating a data integrity record associated with the encrypted data, wherein an integrity of the encrypted data is determined at least partially based on the created data integrity record; and
transmitting the data integrity record to an accessible repository, wherein the accessible repository is accessible by devices associated with subscribers of the subscriber-based system and devices associated with nonsubscribers of the subscriber-based system.
2. The method of claim 1 , further comprising storing the data integrity record in the accessible repository.
3. The method of claim 1 , further comprising:
retrieving the data integrity record of the encrypted data; and
determining an integrity of the decrypted data based on the retrieved data integrity.
4. The method of claim 1 , wherein the data integrity record includes tracking information and at least one checksum based at least partially on the encrypted data.
5. The method of claim 1 , further comprising:
transmitting the encrypted data to a subscriber of the subscriber-based system; and
removing the transmitted encrypted data from the memory of the subscriber-based system, wherein the data integrity record associated with the encrypted data is stored in at least one of a device associated with the subscriber of the subscriber-based system or the accessible repository.
6. The method of claim 1 , further comprising:
wherein the data integrity record may be used to verify the integrity of the encrypted data received from the subscriber-based system or received from a party other than the subscriber-based system.
7. The method of claim 1 , further comprising decrypting the encrypted data, wherein the decrypted data is unalterable.
8. An article comprising non-transitory, machine-readable medium storing instructions for managing data, the instructions operable to cause data processing apparatus to perform operations comprising:
receiving encrypted data by a subscriber-based system maintained by a third-party administrator;
transmitting the encrypted data for storage in a memory of the subscriber-based system, wherein the stored encrypted data is unalterable;
restricting access to the stored encrypted data;
creating a data integrity record associated with the encrypted data, wherein an integrity of the encrypted data is determined at least partially based on the created data integrity record; and
transmitting the data integrity record to an accessible repository, wherein the accessible repository is accessible by devices associated with subscribers of the subscriber-based system and devices associated with nonsubscribers of the subscriber-based system.
9. The article of claim 8 , wherein the instructions are further operable to cause data processing apparatus to perform operations comprising:
transmitting the encrypted data to a group of subscribers of the subscriber-based system.
10. The article of claim 9 , wherein transmitting the encrypted data retains an anonymous status of at least one of the group of subscribers of the subscriber-based system.
11. A system for securely managing data comprising:
a subscriber-based system comprising:
a memory including encrypted data that is unalterable; and
a management module adapted to:
receive the encrypted data;
restrict access to the encrypted data; and
create a data integrity record associated with the encrypted data, wherein an integrity of the encrypted data is determined at least partially based on the created data integrity record; and
wherein the subscriber-based system is managed by a third-party.
12. The system of claim 11 , wherein the management module is further adapted to transmit the data integrity record to an accessible repository, wherein the accessible repository is accessible by devices associated with subscribers of the subscriber-based system and devices associated with nonsubscribers of the subscriber-based system.
13. The system of claim 11 , further comprising a repository including the data integrity record, wherein the repository is accessible by devices associated with subscribers of the subscriber-based system and devices associated with nonsubscribers of the subscriber-based system.
14. The system of claim 11 , wherein the management module is further adapted to transmit the encrypted data.
15. The system of claim 11 , wherein the management module is further adapted to remove the encrypted data from the memory when the encrypted data is transmitted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/543,347 US20150074429A1 (en) | 2011-05-19 | 2014-11-17 | System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161488052P | 2011-05-19 | 2011-05-19 | |
US13/475,685 US8904175B2 (en) | 2011-05-19 | 2012-05-18 | System and method for secure distribution and/or storage of data files with long term file integrity verification |
US14/543,347 US20150074429A1 (en) | 2011-05-19 | 2014-11-17 | System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/475,685 Continuation US8904175B2 (en) | 2011-05-19 | 2012-05-18 | System and method for secure distribution and/or storage of data files with long term file integrity verification |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150074429A1 true US20150074429A1 (en) | 2015-03-12 |
Family
ID=47175859
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/475,685 Active 2032-11-27 US8904175B2 (en) | 2011-05-19 | 2012-05-18 | System and method for secure distribution and/or storage of data files with long term file integrity verification |
US14/543,347 Abandoned US20150074429A1 (en) | 2011-05-19 | 2014-11-17 | System and Method for Secure Distribution and/or Storage of Data Files with Long Term File Integrity Verification |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/475,685 Active 2032-11-27 US8904175B2 (en) | 2011-05-19 | 2012-05-18 | System and method for secure distribution and/or storage of data files with long term file integrity verification |
Country Status (1)
Country | Link |
---|---|
US (2) | US8904175B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10826968B1 (en) | 2017-11-03 | 2020-11-03 | EMC IP Holding Company LLC | Controlled distribution of files based on designated machine feed type |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140096262A1 (en) * | 2012-10-02 | 2014-04-03 | Roberto M. CASSO | Methods, systems, and computer readable media for securely collecting, safeguarding, and disseminating electronically stored information |
US10380583B1 (en) | 2012-12-17 | 2019-08-13 | Wells Fargo Bank, N.A. | System and method for interoperable mobile wallet |
US11037129B1 (en) * | 2014-02-24 | 2021-06-15 | Groupon, Inc. | Consumer device presence-based transaction session |
US10733145B1 (en) | 2014-12-16 | 2020-08-04 | Amazon Technologies, Inc. | Techniques for distributing verification checks incident to data deletion |
WO2017024288A1 (en) * | 2015-08-05 | 2017-02-09 | Chita Inc. | Managing regulated content items stored on non-regulated storage platforms |
IT201800009905A1 (en) * | 2018-10-30 | 2020-04-30 | St Microelectronics Srl | Procedure for the generation of customized profile package data in integrated circuit cards, corresponding system and IT product |
AU2020261068A1 (en) * | 2019-04-25 | 2021-11-04 | Shazzle, Llc | Trusted customer identity systems and methods |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6192405B1 (en) * | 1998-01-23 | 2001-02-20 | Novell, Inc. | Method and apparatus for acquiring authorized access to resources in a distributed system |
US20030014666A1 (en) * | 2001-07-11 | 2003-01-16 | O'keefe Kevin | Trusted content server |
US6898709B1 (en) * | 1999-07-02 | 2005-05-24 | Time Certain Llc | Personal computer system and methods for proving dates in digital data files |
US20070198632A1 (en) * | 2006-02-03 | 2007-08-23 | Microsoft Corporation | Transferring multimedia from a connected capture device |
US20090055915A1 (en) * | 2007-06-01 | 2009-02-26 | Piliouras Teresa C | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation |
US20100257351A1 (en) * | 2009-04-01 | 2010-10-07 | Salesforce. Com, Inc. | Enhanced system security |
US20120030463A1 (en) * | 2010-07-28 | 2012-02-02 | Atp Electronics Taiwan Inc. | Data secure system and method of storing and reading data |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6038597A (en) * | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
US20090063196A1 (en) * | 2007-08-28 | 2009-03-05 | Dds Ventures, Inc. | System and method of dental case management |
-
2012
- 2012-05-18 US US13/475,685 patent/US8904175B2/en active Active
-
2014
- 2014-11-17 US US14/543,347 patent/US20150074429A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6192405B1 (en) * | 1998-01-23 | 2001-02-20 | Novell, Inc. | Method and apparatus for acquiring authorized access to resources in a distributed system |
US6898709B1 (en) * | 1999-07-02 | 2005-05-24 | Time Certain Llc | Personal computer system and methods for proving dates in digital data files |
US20030014666A1 (en) * | 2001-07-11 | 2003-01-16 | O'keefe Kevin | Trusted content server |
US20070198632A1 (en) * | 2006-02-03 | 2007-08-23 | Microsoft Corporation | Transferring multimedia from a connected capture device |
US20090055915A1 (en) * | 2007-06-01 | 2009-02-26 | Piliouras Teresa C | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation |
US20100257351A1 (en) * | 2009-04-01 | 2010-10-07 | Salesforce. Com, Inc. | Enhanced system security |
US20120030463A1 (en) * | 2010-07-28 | 2012-02-02 | Atp Electronics Taiwan Inc. | Data secure system and method of storing and reading data |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10826968B1 (en) | 2017-11-03 | 2020-11-03 | EMC IP Holding Company LLC | Controlled distribution of files based on designated machine feed type |
Also Published As
Publication number | Publication date |
---|---|
US20120297191A1 (en) | 2012-11-22 |
US8904175B2 (en) | 2014-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8904175B2 (en) | System and method for secure distribution and/or storage of data files with long term file integrity verification | |
US20220156706A1 (en) | File vault and cloud based document notary service | |
US9984252B2 (en) | Methods and systems for facilitating personal data propagation | |
US11223482B2 (en) | Secure data exchange | |
US8296323B2 (en) | Personal data subscriber systems and methods | |
TW466858B (en) | Method and apparatus for delivering documents over an electronic network | |
US8959595B2 (en) | Methods and systems for providing secure transactions | |
CA2355785C (en) | Electronic presentation of invoices using a trusted document repository | |
US20140041006A1 (en) | Secure messaging center | |
US20110270763A1 (en) | Methods and apparatus for a financial document clearinghouse and secure delivery network | |
US10992683B2 (en) | System and method for authenticating, storing, retrieving, and verifying documents | |
EP2389658B1 (en) | Personal data subscriber systems and methods | |
US20210250359A1 (en) | System and method for authenticating, storing, retrieving, and verifying documents | |
CN110032688B (en) | Electronic delivery method for legal documents | |
US8620815B1 (en) | Systems and methods for document management | |
MXPA05011295A (en) | Secure messaging center |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |