Personal portal and secure information exchange
First Claim
1. A computer-implemented secure information exchange system comprising:
- a digital repository comprising;
means for permitting n authorized suppliers to submit desired information;
means for storing the desired information; and
means for allowing m permitted accessors, including owner of the digital repository, access to the desired information.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a secure information exchange mechanism that can be seen as a portal or gateway to his or her digital information. The invention is sometimes referred to as an “n-by-m lockbox” because it allows n suppliers to submit information accessible by m accessors. Each lockbox owner specifies and controls who or what can provide what information to the lockbox, who or what can access what information stored therein, and when and how the stored information is accessed. The information may be encrypted and only authorized accessors would be able to decipher it. The lockbox may comprise multiple compartments that segregate information based on pertinent criteria and may incorporate multiple encryption/decryption mechanisms that respectively correspond to each of the multiple compartments. The lockbox owner may associate different encryption keys with different compartments and give these keys to different depositors or instruct depositors to utilize different keys for specific categories of content. The lockbox provides a means for improved organization of the storage of potentially vast amounts of information. Further, the lockbox solves many problems associated with spamming and also advantageously prevents problems associated with various security attacks, such as flooding and denial of service.
37 Citations
83 Claims
-
1. A computer-implemented secure information exchange system comprising:
a digital repository comprising;
means for permitting n authorized suppliers to submit desired information;
means for storing the desired information; and
means for allowing m permitted accessors, including owner of the digital repository, access to the desired information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
70. A system for evaluating trustworthiness of information suppliers, comprising:
means for determining an estimate of trustworthiness of an information supplier based on whether information supplied by the information supplier to a digital repository matches a specification for desired information. - View Dependent Claims (71, 72, 73, 74, 75, 76, 77)
-
78. A system for organizing desired information stored in a digital repository, comprising:
means for classifying content of the desired information into one or more categories. - View Dependent Claims (79, 80, 81, 82, 83)
Specification