×

Method and System for a Virtual Safe

  • US 20090210347A1
  • Filed: 11/05/2008
  • Published: 08/20/2009
  • Est. Priority Date: 04/14/2000
  • Status: Abandoned Application
First Claim
Patent Images

1. A multi-tiered, identity and consent management system, driven by policy and legally bound strong authentication that enables powerful security and privacy when processing electronic data and transactions, comprising:

  • authentication authority means for strongly registering users, performing identification authenticity, authentication, authorization and enabling Single Sign On of all user(s) and parties involved in transaction;

    means for authenticating all parties involved in a transaction including the user(s), the application, the network access, the transaction and the communication layers, providing a legally binding mechanism between a secure processing environment and strong user(s) authentication;

    means for strongly authenticating other user(s) required to initiate a transaction;

    means for carrying out a user'"'"'s online accountable transaction without having to provide vendors with sensitive personal information, said means acting as a trusted third party;

    means for mediating user present and user non-present, anonymous, accountable transactions between parties;

    application/repository means, set-up by a dynamic policy, regulated by a transaction risk management module for performing intermediate vetting, a back-end authentication module, and a transaction fulfillment mechanism for determining the type of delivery to be made and effecting the transaction, said policy regulating the process of all transactional data;

    means for providing user-only control over their personal information in a multi-jurisdictional interoperable node architecture that supports global corporate applications, in compliance with regulations for privacy, data protection and security;

    means for communicating with different standard-by-standard interfaces where application dependent data received by said system can be processed to change formatting of Public Key Infrastructure (PKI) data or other application data and be forwarded to user(s) or said application/repository, integrating seamlessly with new security and privacy standards and empowering exchange of customer private information, according to a consensual agreement;

    means for communicating between different environments via industry standard interfaces and modular design, allowing implementation interchange with different applications, implemented as a new security layer in round of existing applications, links between data sources being protected using user(s) unique encryption as defined by a data bundling policy;

    means for preparing and storing a fulfillment record in an anonymous format, securely linking transactional data with user name; and

    means for processing and fragmenting data via a cryptographic algorithm which dislocates symmetrically/asymmetrically, fragments of cryptographic material and fattening material to different locations, known only to user(s) triangulation of granulated and dislocated data.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×