Secure multiple-party communication and data orchestration
First Claim
1. A method of providing asynchronous and restricted access to confidential content transmitted from a secure storage location to an applicant device that accesses the confidential content over an unsecure computer network, the method comprising:
- using a first applicant device, initiating a secure connection to a data orchestration system;
after establishing the secure connection, using the first applicant device, receiving and transmitting a first set of confidential content to the data orchestration system wherein, the first set of confidential content includes a destination address of a second applicant device;
based on the first set of confidential content received from the first applicant device, generating a first filtering scheme for the first applicant device and a second filtering scheme for the second applicant device;
using the data orchestration system, initiating unsecure communication over the unsecure network with the second applicant device at the destination address provided by the first applicant device;
coordinating secure and asynchronous access via the second applicant device to the data orchestration system;
based on coordinating secure and asynchronous access to the data orchestration system, receiving a second set of confidential content from the second applicant device;
deploying a third filtering scheme to coordinate asynchronous access, via the first applicant device, to a third set of confidential content that includes the first set of confidential content and a subset of the second set of confidential content; and
deploying a fourth filtering scheme to coordinate secure asynchronous access, via the second applicant device, to a fourth set of confidential content that includes the second set of confidential content and a subset of the first set of confidential content;
wherein;
the first applicant device is associated with a primary applicant;
the second applicant device is associated with a co-applicant; and
the primary applicant is not the co-applicant.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and methods may enable a primary to add a co-applicant via phone number to initiate a three-way communication. The primary applicant and the co-applicant can submit their confidential content along with other inputs from their own device after biometric authentication. Consent to submit a final application can be taken separately from each applicant through biometric capabilities on their own personal devices. A chat-bot may orchestrate and collect information for application fulfillment in parallel from both the applicants. Confidential content of one applicant, such as a social security number, may be kept hidden from disclosure to a co-applicant. Interaction among applicants may be across one or more communication channels.
11 Citations
16 Claims
-
1. A method of providing asynchronous and restricted access to confidential content transmitted from a secure storage location to an applicant device that accesses the confidential content over an unsecure computer network, the method comprising:
-
using a first applicant device, initiating a secure connection to a data orchestration system; after establishing the secure connection, using the first applicant device, receiving and transmitting a first set of confidential content to the data orchestration system wherein, the first set of confidential content includes a destination address of a second applicant device; based on the first set of confidential content received from the first applicant device, generating a first filtering scheme for the first applicant device and a second filtering scheme for the second applicant device; using the data orchestration system, initiating unsecure communication over the unsecure network with the second applicant device at the destination address provided by the first applicant device; coordinating secure and asynchronous access via the second applicant device to the data orchestration system; based on coordinating secure and asynchronous access to the data orchestration system, receiving a second set of confidential content from the second applicant device; deploying a third filtering scheme to coordinate asynchronous access, via the first applicant device, to a third set of confidential content that includes the first set of confidential content and a subset of the second set of confidential content; and deploying a fourth filtering scheme to coordinate secure asynchronous access, via the second applicant device, to a fourth set of confidential content that includes the second set of confidential content and a subset of the first set of confidential content; wherein; the first applicant device is associated with a primary applicant; the second applicant device is associated with a co-applicant; and the primary applicant is not the co-applicant. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system architecture for providing asynchronous and restricted access to confidential content transmitted from a secure storage location to an applicant device that requests the confidential content over an unsecure computer network, the system architecture comprising:
-
a data orchestration system; a first applicant device that initiates a secure connection to the data orchestration system; and a second applicant device that is invited to access the data orchestration system by the first applicant device; wherein, in operation; after establishing the secure connection, the first applicant device receives and transmits a first set of confidential content to the data orchestration system and the first set of confidential content includes a destination address of the second applicant device; based on the first set of confidential content received from the first applicant device, the data orchestration system associates a first filtering scheme with the first applicant device, the first filtering scheme, when applied to the first applicant device by the data orchestration system, coordinates asynchronous access to the first set of confidential content; the data orchestration system initiates an unsecure communication over the unsecure network with the second applicant device, the unsecure communication comprising transmitting to the second device computer executable instructions for initiating a secure connection from the second device to the data orchestration system; in response to receiving a request, from the second applicant device to initiate the secure connection, the data orchestration system applies a second filtering scheme to the second applicant device, the second filtering scheme, when applied to the second applicant device by the data orchestration system, accepts a second set of confidential content from the second applicant device and coordinates asynchronous access to the second set of confidential content; and based on applying the first and second filtering schemes, the data orchestration system receives the first and second sets of confidential content in parallel from each of the first applicant and second applicant devices; wherein; the first applicant device is associated with a primary applicant; the second applicant device is associated with a co-applicant; and the primary applicant is not the co-applicant. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
wherein the second subset comprises more confidential content than the first subset.
-
-
16. The system architecture of claim 8, wherein the second filtering scheme terminates access of the second applicant device to the data orchestration system when the destination address provided by the first applicant device does not match corresponding data stored on the second applicant device.
Specification