Secure information vault, exchange and processing system and method
First Claim
1. A secure information repository system, comprising:
- data storage for securely storing encrypted information, associated with an account holder;
a deposit system for securely depositing encrypted information into the data storage;
an information access system for accessing the encrypted information stored in the data storage;
an information withdrawal system for removing the encrypted information stored in the data storage; and
a tracking system for logging at least any one of a deposit to the data storage, a withdrawal from the data storage, a deletion to the data storage, an account creation, an account deletion, and an access to the data storage.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing an information vault so that individual owners of personal data may control and manage the access and dissemination of the personal data and provides for the owner of the personal data to receive compensation for the use of the personal data, thus, in effect, the personal data becomes a valuable commodity analogous to money. A business model is provided that allows competitive, unbiased trusted third parties whose business is protecting the information analogous to how a commercial bank protects money. Centralized protected storage of personal data is provided, thereby minimizing the number of copies that may be in existence. Second party access to the centralized storage of personal data may be made on-demand, as required for commerce, with a provision for assessing fees for accesses.
-
Citations
42 Claims
-
1. A secure information repository system, comprising:
-
data storage for securely storing encrypted information, associated with an account holder;
a deposit system for securely depositing encrypted information into the data storage;
an information access system for accessing the encrypted information stored in the data storage;
an information withdrawal system for removing the encrypted information stored in the data storage; and
a tracking system for logging at least any one of a deposit to the data storage, a withdrawal from the data storage, a deletion to the data storage, an account creation, an account deletion, and an access to the data storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for providing a protected information repository, comprising:
an information vault having data storage comprising;
a means for securely creating an account in the information vault;
a means for securely depositing information in the information vault;
a means for accessing information in the information vault; and
a means for charging for transactional activity involving the information. - View Dependent Claims (16, 17, 18)
-
19. A method of providing an information repository, comprising:
-
accessing an information vault to perform a transaction involving a secured item of information stored in the information vault;
authenticating an identity of an entity performing the accessing;
executing the transaction when the identity of the entity is authenticated; and
logging the transaction. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of charging for personal information comprising:
-
depositing personal data by an owner into an information vault;
establishing a contract with at least one entity and the owner to enable access to the personal data by the at least one entity;
accessing the personal data by the at least one entity according to terms of the contract; and
charging a fee for accessing the personal data. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
access an information vault to perform a transaction involving a secured item of information stored in the information vault;
authenticate an identity of an entity performing the accessing;
execute the transaction when the identity of the entity is authenticated; and
log the transaction.
-
Specification