×

SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD

  • US 20120047365A1
  • Filed: 08/15/2011
  • Published: 02/23/2012
  • Est. Priority Date: 08/18/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing a secure file-exchange service, the method comprising:

  • obtaining, by a file-exchange server from a remote client device associated with a new member, new-member information including identity information and a professional credential associated with said new member;

    verifying, by said file-exchange server according to said identity information, that said new member has a personal identity as indicated by said identity information, and that said new member has a professional designation as indicated by said professional credential;

    when said new member'"'"'s personal identity and professional designation have been verified, designating said new member as a verified-professional member and obtaining, by said file-exchange server, a member public key of a public/private key pair for said verified-professional member;

    generating, by said file-exchange server, a member widget indicating said verified-professional member'"'"'s status as a verified professional and being configured to accept files submitted for secure transfer to said verified-professional member;

    providing, by said file-exchange server, said member widget for publication by said new member;

    receiving an indication, by said file-exchange server via said published member widget, to provide a file from a remote sender device to said verified-professional member;

    obtaining, by said file-exchange server from said remote sender device via said published member widget, metadata associated with said file;

    obtaining, by said file-exchange server, a reference cryptographic integrity code derived from said file;

    obtaining, by said file-exchange server from said remote sender device via said published member widget, an encrypted copy of said file, said encrypted copy being encrypted with said member public key; and

    storing said metadata, said reference cryptographic integrity code, and said encrypted copy in a non-transient data store for subsequent secure, auditable transfer to said verified-professional member.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×