Method and system for protecting information on a computer system
First Claim
1. A method for securing information stored on a computer system, comprising:
- creating a user ID and personal password for a user to access said computer system;
generating an access code in response to said user scheduling a start time and duration to access said information on said computer system;
at least at said scheduled start time, said computer system receiving said access code, user ID and personal password from said user; and
responsive to said access code, user ID and personal password said computer system allowing said user to access said information for said duration.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting sensitive information, for example, a user'"'"'s personal information, stored on a database where the information is accessible via a communications network such as the Internet. An exemplary embodiment stores the sensitive information on an off-line server. The off-line server is connected to an on-line server. The on-line server is connected to the user via the Internet. The user interfaces with the on-line server, and at a scheduled time window, the sensitive information is made available to the on-line server by the off-line server. Outside of the time window, none of the sensitive information is kept on the on-line server. Thus by placing the sensitive information on-line for only limited periods of time the risk of compromise to the sensitive information is greatly reduced.
-
Citations
26 Claims
-
1. A method for securing information stored on a computer system, comprising:
-
creating a user ID and personal password for a user to access said computer system;
generating an access code in response to said user scheduling a start time and duration to access said information on said computer system;
at least at said scheduled start time, said computer system receiving said access code, user ID and personal password from said user; and
responsive to said access code, user ID and personal password said computer system allowing said user to access said information for said duration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A security system for protecting information stored on a database, comprising:
-
a first server computer comprising said database;
a second server computer connected to said first server computer by a first communications path;
a user computer connected to said second server computer by a second communications path, wherein said user computer'"'"'s only connection to said database is via said second server computer; and
an access code generated by said first server computer in response to a user scheduling a start time and a duration to access said information on said database; and
wherein responsive to receiving said access code at or after said scheduled start time from said user computer, said first server computer copying a portion of said information to said second server computer, said portion accessible to said user computer. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A security system for protecting information stored on a database, comprising:
-
a first server computer comprising said database;
a second server computer connected to said first server computer by a first communications path;
a user computer for a user to access said information, said user computer connected to said second server computer by a second communications path, wherein said user computer'"'"'s only connection to said database is via said second server computer;
a phone system, comprising a telephone connection to said user and a third communications path to said first server computer; and
an access code generated by said first server computer after a request by said user via said phone system, wherein said user enters said access code into said user computer to access said information. - View Dependent Claims (16, 17)
-
-
18. A method for providing security for information stored on a first server system, said first server system connected to a second server system, wherein said second server system is connected to a user computer, said method comprising:
-
said first server system generating a code in response to a user scheduling a time period to access information on said first server system;
sending said code to said user;
at said scheduled time period receiving said code by said second server system from said user computer system; and
said second server system responsive to said code, loading at least part of said information stored on said first server system for use by said user computer during said scheduled time period. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method for accessing information stored on a system, comprising a computer, said system connected to a user computer via a communications network, said method comprising:
-
a user scheduling a time and duration when said user computer is allowed to access information on said system, said scheduling via a first communications path of said communications network;
receiving from said system an access code, said access code based on said scheduled time and duration;
at said scheduled time said user computer connecting to said system using said access code and a predetermined password, said connecting via a second communications path of said communications network, wherein said second communications path is different from said first communications path; and
said user computer having access to said information for said duration. - View Dependent Claims (25, 26)
-
Specification