Secure information storage and retrieval apparatus and method
First Claim
Patent Images
1. A method for securely storing and retrieving confidential information, the method comprising:
- a. encrypting an electronic file using a private key to create an encrypted file;
b. saving said encrypted file in an encrypted file computer memory;
c. transmitting said private key for storage in a private key computer memory, said private key computer memory being at a different physical location from said encrypted file computer memory.
0 Assignments
0 Petitions
Accused Products
Abstract
A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt an electronic file. The client computer generates a private key, encrypts the electronic file and transmits the key to the server computer. The client computer saves the encrypted file. The encrypted file and the key are saved at different physical locations. The owner of the file is able to grant permission to other registered users to unlock the encrypted file.
-
Citations
20 Claims
-
1. A method for securely storing and retrieving confidential information, the method comprising:
-
a. encrypting an electronic file using a private key to create an encrypted file; b. saving said encrypted file in an encrypted file computer memory; c. transmitting said private key for storage in a private key computer memory, said private key computer memory being at a different physical location from said encrypted file computer memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for securely storing and retrieving confidential information, the apparatus comprising:
-
a. a client computer, said client computer being configured to communicate with a server computer over a computer network; b. a biometric scanner, said biometric scanner being operably connected to said client computer, said biometric scanner being configured to scan a body part of a user to generate a biometric identifier, said client computer being configured to transmit said biometric identifier to said server computer over said computer network, said client computer being configured to receive a verification from said server computer that said user is a registered user based on said biometric identifier; c. a client computer memory operably connected to said client computer; d. an electronic file accessible to said client computer, said client computer being configured to generate a private key and to encrypt said electronic file using said private key to create an encrypted file upon receiving an encryption command from said registered user, said client computer being configured to transmit said private key to said server computer over said computer network for storage of said private key in a private key memory, said client computer being configured not to save said private key to said client computer memory; e. an encrypted file computer memory, said client computer being configured to save said encrypted file to said encrypted file computer memory, said encrypted file computer memory being located in a different physical location from said private key computer memory. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. An apparatus for securely storing and retrieving confidential information, the apparatus comprising:
-
a. a client computer, said client computer being configured to communicate with a server computer over a computer network; b. a biometric scanner, said biometric scanner being operably connected to said client computer, said biometric scanner being configured to scan a body part of a user to generate a biometric identifier, said client computer being configured to transmit a registration request from said user to said server computer over said computer network, said registration request comprising said biometric identifier, said client computer being configured to receive a notification from said server computer that said user is registered as a registered user; c. a client computer memory operably connected to said client computer, said client computer memory storing an electronic file, said client computer being configured to receive a request by said registered user to encrypt said electronic file, said client computer being configured to generate a private key and to encrypt said electronic file using said private key to create an encrypted file, said registered user being an owner of said encrypted file, said client computer being configured to receive a permission from said owner that another said registered user may decrypt said encrypted file, said client computer being configured to transmit said private key and said permission to said server computer over said computer network, said client computer being configured to save said encrypted file to an encrypted file memory, said client computer being configured not to save said private key to said encrypted file memory. - View Dependent Claims (20)
-
Specification