Systems And Methods For Personal Digital Data Ownership And Vaulting
First Claim
Patent Images
1. A processor-implemented method for collecting and providing user-controlled access to user-generated digital information, said method comprising:
- collecting, throughout a current day, a plurality of digital data receipts from different classes of information representing the user activities of a single user;
encrypting each data receipt using an encryption method under the control of the user;
routing each encrypted data receipt to a first storage facility;
aggregating the encrypted data receipts associated with the user at a second storage facility; and
providing user controlled access to a third party to at least a portion of the data from the aggregated data receipts;
said portion of the data from the aggregated data receipts being generated by;
generating a personal algorithm from the aggregated data receipts;
identifying digital rights management criteria for the data; and
filtering the data based on the personal algorithm and the digital rights management criteria; and
said collecting, encrypting, routing, aggregating, generating, identifying and filtering steps being performed by one or more data processors.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for aggregating user-generated digital information. As an example, a system and method can be configured to collect, throughout a current day, a plurality of digital data receipts from different classes of information representing the user activities of a single user; encrypt each data receipt using an encryption method under the control of the user; rout each encrypted data receipt to a first storage facility; and aggregate the encrypted data receipts associated with the user at a second storage facility.
97 Citations
20 Claims
-
1. A processor-implemented method for collecting and providing user-controlled access to user-generated digital information, said method comprising:
-
collecting, throughout a current day, a plurality of digital data receipts from different classes of information representing the user activities of a single user; encrypting each data receipt using an encryption method under the control of the user; routing each encrypted data receipt to a first storage facility; aggregating the encrypted data receipts associated with the user at a second storage facility; and providing user controlled access to a third party to at least a portion of the data from the aggregated data receipts; said portion of the data from the aggregated data receipts being generated by; generating a personal algorithm from the aggregated data receipts; identifying digital rights management criteria for the data; and filtering the data based on the personal algorithm and the digital rights management criteria; and said collecting, encrypting, routing, aggregating, generating, identifying and filtering steps being performed by one or more data processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for collecting and providing user-controlled access to user-generated digital information, said method comprising:
-
receiving, throughout a current day, a plurality of digital data receipts from different classes of information representing the user activity of multiple users; uniquely encrypting each data receipt wherein each user has control over the encryption method applied to its data receipts; storing each encrypted data receipt at a first computer storage location; aggregating for each user at a unique computer storage location for each user the encrypted data receipts associated with that user; providing user controlled access to a third party to at least a portion of the data from the aggregated data receipts; said portion of the data from the aggregated data receipts being generated by; generating a personal algorithm for each user from the aggregated data receipts; identifying digital rights management criteria for the data; and filtering the data based on the personal algorithm and the digital rights management criteria; and said receiving, encrypting, storing, aggregating, generating, identifying and filtering steps being performed by one or more data processors. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A data acquisition system for collecting and providing user-controlled access to user-generated digital information, comprising:
-
a router for executing on one or more data processors and for collecting, throughout a current day, a plurality of digital data receipts from different classes of information representing the user activities of a single user; an encryption engine executing on the one or more data processors and for encrypting each data receipt using an encryption method under the control of the user; a first computer storage facility for storing each encrypted data receipt; a second computer storage facility for aggregating the encrypted data receipts associated with the user; and a terminal engine executing on the one or more data processors for providing user controlled access to a third party to at least a portion of the data from the aggregated data receipts. - View Dependent Claims (18, 19, 20)
-
Specification