×

Method and systems for virtual file storage and encryption

  • US 10,516,674 B2
  • Filed: 02/10/2016
  • Issued: 12/24/2019
  • Est. Priority Date: 02/11/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing a non-transitory computer readable document file, the method comprising:

  • storing and accessing information relating to a business enterprise'"'"'s operations and structure for an access authorization to the computer readable document file;

    saving the computer readable document file on a digital media storage database forming part of a host'"'"'s cloud storage system;

    determining at least a first access permission level and a second access permission level for the computer readable document file;

    identifying a first type of sensitive information and identifying a second type of sensitive information in the computer readable document file;

    matching the first type of sensitive information in the computer readable document file with the first access permission level, and matching the second type of sensitive information in the computer readable document file with the second access permission level;

    encrypting the identified first type of sensitive information, and encrypting the identified second type of sensitive information;

    determining whether individuals meet a first plurality of threshold requirements for access to the computer readable document file at the first access permission level, and determining whether the individuals meet a second plurality of threshold requirements for access to the computer readable document file at the second access permission level;

    if the individuals meet each of the first plurality of threshold requirements, then assigning the individuals the first access permission level to access the computer readable document file, and if the individuals meet each of the second plurality of threshold requirements, then assigning the individuals the second access permission level to access the computer readable document file; and

    providing a first access key that is configured to provide the individuals that are assigned the first access permission level access to the first type of sensitive information in the computer readable document file, and providing a second access key that is configured to provide the individuals that are assigned the second access permission level access to the second type of sensitive information in the computer readable document file;

    wherein the identifying of the first type of sensitive information or the second type of sensitive information in the computer readable document file is done via pre-programmed key-term identification.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×