×

Systems and methods for secure online repositories

  • US 10,289,813 B1
  • Filed: 06/13/2017
  • Issued: 05/14/2019
  • Est. Priority Date: 06/09/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing access control to a secure online repository, comprising:

  • a computer network;

    at least one database configured to store the secure online repository, the at least one database being connected to the computer network and the secure online repository including a first lockbox and a second lockbox;

    a computing device connected to the computer network and the database, the computing device comprising at least one processor and a non-transitory computer-readable storage medium encoded with a computer program comprising instructions that, when executed, cause the at least one processor to;

    receive, from a user interface of a first client device, a first access key from a first party;

    receive, from a user interface of a second client device, a second access key from a second party, the second party being different from the first party;

    simultaneously validate the first access key and the second access key;

    in response to simultaneously validating both the first and second access keys, provide remote access to the first lockbox to the first party and remote access to the second lockbox to the second party over the computer network, wherein the first lockbox and the second lockbox share content in common that includes information unique to the first party and information unique to the second party; and

    responsive to the provided remote access, provide, through the computer network, the content in common to the first client device and the second client device, wherein the information unique to the first party is concurrently available on the user interface of the second client device for the duration the first party is remotely accessing the first lockbox and the information unique to the second party is concurrently available on the user interface of the first client device for the duration the second party is remotely accessing the second lockbox.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×