Systems and methods for secure online repositories
First Claim
1. A system for providing access control to a secure online repository, comprising:
- a computer network;
at least one database configured to store the secure online repository, the at least one database being connected to the computer network and the secure online repository including a first lockbox and a second lockbox;
a computing device connected to the computer network and the database, the computing device comprising at least one processor and a non-transitory computer-readable storage medium encoded with a computer program comprising instructions that, when executed, cause the at least one processor to;
receive, from a user interface of a first client device, a first access key from a first party;
receive, from a user interface of a second client device, a second access key from a second party, the second party being different from the first party;
simultaneously validate the first access key and the second access key;
in response to simultaneously validating both the first and second access keys, provide remote access to the first lockbox to the first party and remote access to the second lockbox to the second party over the computer network, wherein the first lockbox and the second lockbox share content in common that includes information unique to the first party and information unique to the second party; and
responsive to the provided remote access, provide, through the computer network, the content in common to the first client device and the second client device, wherein the information unique to the first party is concurrently available on the user interface of the second client device for the duration the first party is remotely accessing the first lockbox and the information unique to the second party is concurrently available on the user interface of the first client device for the duration the second party is remotely accessing the second lockbox.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms are disclosed herein for storing various records. Numerous keys and parties can access online repositories. These repositories contain a plurality of lockboxes, structured hierarchically and otherwise, providing public and private areas with varying levels of access. Some content of such lockboxes can be sharable. These lockboxes can be used not only to store diverse content, ranging from birth certificates to deeds and social security numbers, but they can also be accessed in a variety of ways. For example, keys to lockboxes can be made available by such events as the issuing of death certificates or birth certificates. Alternatively, keys can be issued according to various rules and heuristics stipulated by lockbox users. In either case, the plurality of lockboxes residing in repositories can be configured to provide centralized storage facilities that are secure and readily accessible from various computing devices.
79 Citations
15 Claims
-
1. A system for providing access control to a secure online repository, comprising:
-
a computer network; at least one database configured to store the secure online repository, the at least one database being connected to the computer network and the secure online repository including a first lockbox and a second lockbox; a computing device connected to the computer network and the database, the computing device comprising at least one processor and a non-transitory computer-readable storage medium encoded with a computer program comprising instructions that, when executed, cause the at least one processor to; receive, from a user interface of a first client device, a first access key from a first party; receive, from a user interface of a second client device, a second access key from a second party, the second party being different from the first party; simultaneously validate the first access key and the second access key; in response to simultaneously validating both the first and second access keys, provide remote access to the first lockbox to the first party and remote access to the second lockbox to the second party over the computer network, wherein the first lockbox and the second lockbox share content in common that includes information unique to the first party and information unique to the second party; and responsive to the provided remote access, provide, through the computer network, the content in common to the first client device and the second client device, wherein the information unique to the first party is concurrently available on the user interface of the second client device for the duration the first party is remotely accessing the first lockbox and the information unique to the second party is concurrently available on the user interface of the first client device for the duration the second party is remotely accessing the second lockbox. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method for providing a secure online repository executed by at least one processor, the method comprising:
-
receiving, by the at least one processor, from a user interface of a first client device, a first access key from a first party; receiving, by the at least one processor, from a user interface of a second client device, a second access key from a second party, the second party being different from the first party; simultaneously validating, by the at least one processor, the first access key and the second access key; in response to simultaneously validating both the first access key and the second access key, providing remote access to a first lockbox of the secure online repository to the first party and remote access to a second lockbox of the secure online repository to the second party over a computer network, wherein the first lockbox and the second lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and responsive to the provided remote access, providing, through the computer network, the content in common to the first client device and the second client device, wherein the information unique to the first party is concurrently available on the user interface of the second client device for the duration the first party is remotely accessing the first lockbox and the information unique to the second party is concurrently available on the user interface of the first client device for the duration the second party is remotely accessing the second lockbox. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium encoded with a computer program comprising instructions that, when executed, operate to cause at least one processor to perform operations for providing access control to a secure online repository that comprises a first lockbox and a second lockbox, the operations comprising:
-
receiving, from a user interface of a first client device, a first access key from a first party; receiving, from a user interface of a second client device, a second access key from a second party, the second party being different from the first party; simultaneously validating the first access key and the second access key; in response to simultaneously validating both the first and second access keys, providing remote access to the first lockbox to the first party and remote access to the second lockbox to the second party over a computer network, wherein the first lockbox and the second lockbox share content in common that includes information unique to the first party and information unique to the second party; and responsive to the provided remote access, providing, through the computer network, the content in common to the first client device and the second client device, wherein the information unique to the first party is concurrently available on the user interface of the second client device for the duration the first party is remotely accessing the first lockbox and the information unique to the second party is concurrently available on the user interface of the first client device for the duration the second party is remotely accessing the second lockbox. - View Dependent Claims (12, 13, 14, 15)
-
Specification