Method and System for a Virtual Safe
First Claim
1. A multi-tiered, identity and consent management system, driven by policy and legally bound strong authentication that enables powerful security and privacy when processing electronic data and transactions, comprising:
- authentication authority means for strongly registering users, performing identification authenticity, authentication, authorization and enabling Single Sign On of all user(s) and parties involved in transaction;
means for authenticating all parties involved in a transaction including the user(s), the application, the network access, the transaction and the communication layers, providing a legally binding mechanism between a secure processing environment and strong user(s) authentication;
means for strongly authenticating other user(s) required to initiate a transaction;
means for carrying out a user'"'"'s online accountable transaction without having to provide vendors with sensitive personal information, said means acting as a trusted third party;
means for mediating user present and user non-present, anonymous, accountable transactions between parties;
application/repository means, set-up by a dynamic policy, regulated by a transaction risk management module for performing intermediate vetting, a back-end authentication module, and a transaction fulfillment mechanism for determining the type of delivery to be made and effecting the transaction, said policy regulating the process of all transactional data;
means for providing user-only control over their personal information in a multi-jurisdictional interoperable node architecture that supports global corporate applications, in compliance with regulations for privacy, data protection and security;
means for communicating with different standard-by-standard interfaces where application dependent data received by said system can be processed to change formatting of Public Key Infrastructure (PKI) data or other application data and be forwarded to user(s) or said application/repository, integrating seamlessly with new security and privacy standards and empowering exchange of customer private information, according to a consensual agreement;
means for communicating between different environments via industry standard interfaces and modular design, allowing implementation interchange with different applications, implemented as a new security layer in round of existing applications, links between data sources being protected using user(s) unique encryption as defined by a data bundling policy;
means for preparing and storing a fulfillment record in an anonymous format, securely linking transactional data with user name; and
means for processing and fragmenting data via a cryptographic algorithm which dislocates symmetrically/asymmetrically, fragments of cryptographic material and fattening material to different locations, known only to user(s) triangulation of granulated and dislocated data.
0 Assignments
0 Petitions
Accused Products
Abstract
A transaction server for performing a transaction over a network using a virtual smart card the server comprising, a virtual smart card database having a plurality of records each record including a virtual card identification and a value corresponding to a single virtual smart card; a security module; an emulator for emulating a smart card, the emulator for receiving smart card commands and processing the commands in conjunction with the virtual smart card database and the security module; and a virtual card reader module for receiving the smart card commands and relaying the commands to the smart card emulator whereby transactions are performed over the network using one or more the records and the virtual smart card database.
-
Citations
20 Claims
-
1. A multi-tiered, identity and consent management system, driven by policy and legally bound strong authentication that enables powerful security and privacy when processing electronic data and transactions, comprising:
-
authentication authority means for strongly registering users, performing identification authenticity, authentication, authorization and enabling Single Sign On of all user(s) and parties involved in transaction; means for authenticating all parties involved in a transaction including the user(s), the application, the network access, the transaction and the communication layers, providing a legally binding mechanism between a secure processing environment and strong user(s) authentication; means for strongly authenticating other user(s) required to initiate a transaction; means for carrying out a user'"'"'s online accountable transaction without having to provide vendors with sensitive personal information, said means acting as a trusted third party; means for mediating user present and user non-present, anonymous, accountable transactions between parties; application/repository means, set-up by a dynamic policy, regulated by a transaction risk management module for performing intermediate vetting, a back-end authentication module, and a transaction fulfillment mechanism for determining the type of delivery to be made and effecting the transaction, said policy regulating the process of all transactional data; means for providing user-only control over their personal information in a multi-jurisdictional interoperable node architecture that supports global corporate applications, in compliance with regulations for privacy, data protection and security; means for communicating with different standard-by-standard interfaces where application dependent data received by said system can be processed to change formatting of Public Key Infrastructure (PKI) data or other application data and be forwarded to user(s) or said application/repository, integrating seamlessly with new security and privacy standards and empowering exchange of customer private information, according to a consensual agreement; means for communicating between different environments via industry standard interfaces and modular design, allowing implementation interchange with different applications, implemented as a new security layer in round of existing applications, links between data sources being protected using user(s) unique encryption as defined by a data bundling policy; means for preparing and storing a fulfillment record in an anonymous format, securely linking transactional data with user name; and means for processing and fragmenting data via a cryptographic algorithm which dislocates symmetrically/asymmetrically, fragments of cryptographic material and fattening material to different locations, known only to user(s) triangulation of granulated and dislocated data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for providing a multi-tiered, identity and consent management system, driven by policy and legally bound strong authentication that enables powerful security and privacy when processing electronic data and transactions, comprising the steps of:
-
strongly registering users, performing identification authenticity, authentication, authorization and enabling Single Sign On of all user(s) and parties involved in transaction; authenticating all parties involved in a transaction including the user(s), the application, the network access, the transaction and the communication layers, providing a legally binding mechanism between a secure processing environment and strong user(s) authentication; strongly authenticating other user(s) required to initiate a transaction; carrying out a user'"'"'s online accountable transaction without having to provide vendors with sensitive personal information, said means acting as a trusted third party; mediating user present and user non-present, anonymous, accountable transactions between parties; providing users-only control over their personal information in a multi-jurisdictional interoperable node architecture that supports global corporate applications, in compliance with regulations for privacy, data protection and security; communicating with different standard-by-standard interfaces where application dependent data received by said system can be processed to change formatting of Public Key Infrastructure (PKI) data or other application data and be forwarded to user(s) or said application/repository, integrating seamlessly with new security and privacy standards and empowering exchange of customer private information, according to a consensual agreement; communicating between different environments via industry standard interfaces and modular design, allowing implementation interchange with different applications, implemented as a new security layer in round of existing applications, links between data sources being protected using user(s) unique encryption as defined by a data bundling policy; preparing and storing a fulfillment record in an anonymous format, securely linking transactional data with user name, in an application/repository, set-up by a dynamic policy, regulated by a transaction risk management module for performing intermediate vetting, a back-end authentication module, and a transaction fulfillment mechanism for determining the type of delivery to be made and effecting the transaction, said policy regulating the process of all transactional data; and processing and fragmenting data via a cryptographic algorithm which dislocates symmetrically/asymmetrically, fragments of cryptographic material and fattening material to different locations, known only to user(s) triangulation of granulated and dislocated data.
-
Specification