DISTRIBUTED ACCESS TO VALUABLE AND SENSITIVE DOCUMENTS AND DATA
First Claim
1. A method for providing for protection of data integrity, comprising the steps of:
- supporting data access to a network by users comprising submitters of data content and retrievers of data content;
determining an identity of each of the users that obtains access to the network for submission and retrieval of said data content;
accepting input from said submitter including at least one of a document representing at least part of the data content, and a data file representing at least part of the data content;
storing the data content as indexed to the input from the submitter, and protecting the data content from alteration;
accepting input from a retriever including designation of at least a subset of the data content that is requested for retrieval;
determining according to programmed criteria based on the input from the submitter and the input from the retriever, whether retrieval shall be permitted by the retriever of the data for the subset of the data content that is requested; and
, providing output data to the retriever as a result of said determining.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing access to documents and data files that are inherently valuable, and also documents that contain sensitive information, is configured with robust user identification and document control capabilities and facilitates document submission by, for or on behalf of a user who perhaps is the subject of the document. The document is processed, optionally character recognized and steganographically marked, and is stored in a fixed format together with descriptive identifiers and database indexing values to facilitate control and searching. The level of security encourages users to entrust documents to storage and the system is programmed to control disclosure of documents (or parts of them) according to the user'"'"'s dictates. Correspondingly strict user identification and document controls apply to those who log on for purposes of document review or serve as authenticators. The result is a virtual safe depository for documents that enables documents to be reviewed when necessary with reduced risk of misuse, for example by inadvertent disclosure to identity thieves and others.
171 Citations
16 Claims
-
1. A method for providing for protection of data integrity, comprising the steps of:
-
supporting data access to a network by users comprising submitters of data content and retrievers of data content;
determining an identity of each of the users that obtains access to the network for submission and retrieval of said data content;
accepting input from said submitter including at least one of a document representing at least part of the data content, and a data file representing at least part of the data content;
storing the data content as indexed to the input from the submitter, and protecting the data content from alteration;
accepting input from a retriever including designation of at least a subset of the data content that is requested for retrieval;
determining according to programmed criteria based on the input from the submitter and the input from the retriever, whether retrieval shall be permitted by the retriever of the data for the subset of the data content that is requested; and
,providing output data to the retriever as a result of said determining. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification