METHODS FOR PROVIDING SECURE AND TRANSPARENT CACHED MONITORING DEVICE DATA
First Claim
1. A method for providing secured and transparent cached monitoring device data from a monitoring device comprising:
- interfacing a central database with at least one monitoring device;
uploading data from the at least one monitoring device to the central database;
pairing the data with secured transactional data to provide a secure transactional stamp;
storing the data and the paired secure transactional stamp in the central database;
producing a report with the data and the paired transactional stamp; and
providing the report to an authorized third party.
1 Assignment
0 Petitions
Accused Products
Abstract
Generally, in accordance with various exemplary embodiments of the present invention, the present method comprises collecting data from monitoring devices, uploading the data from a monitoring device to a central database, pairing the data with secure transactional data to provide one or more secure transactional stamp(s), storing the data and the paired secure transactional stamp(s) in the central database, producing a report comprising the data and the paired transactional stamp, and providing the report to an authorized third party. Preferably, the transactional stamp comprising the name of personnel, time, and any changes made to the data collected from the monitoring device is generated and attached to the data.
- Further, the present invention discloses methods for transactional stamping all reviews of the monitoring device data and/or all client input data to produce a secure report, admissible under the Federal Rules of Evidence.
-
Citations
33 Claims
-
1. A method for providing secured and transparent cached monitoring device data from a monitoring device comprising:
-
interfacing a central database with at least one monitoring device; uploading data from the at least one monitoring device to the central database; pairing the data with secured transactional data to provide a secure transactional stamp; storing the data and the paired secure transactional stamp in the central database; producing a report with the data and the paired transactional stamp; and providing the report to an authorized third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing secured and transparent cached monitoring device data from a monitoring device comprising:
-
interfacing at least one local computer with at least one monitoring device; uploading data from the at least one monitoring device to the at least one local computer; pairing the data with secured transactional data to provide a secure transactional stamp; transmitting the data and the paired secure transactional stamp from the at least one local computer to a central database; storing the data and the paired secured transactional stamp in the central database; reviewing the data and the paired secured transactional stamp for violations and hardware errors; producing a report comprising the data, the paired transactional stamp; and providing the report to an authorized third party. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for providing secured and transparent cached monitoring device data from a monitoring device comprising:
-
interfacing a central database with at least one monitoring device; uploading data from the at least one monitoring device to the central database; pairing the data with secured transactional data to provide a secure transactional stamp; storing the data and the paired secure transactional stamp in the central database; producing a report with the data and the paired transactional stamp; and providing the report to an authorized third party. - View Dependent Claims (26, 27)
-
-
28. A method for providing secured and transparent cached monitoring device data from a monitoring device comprising:
-
interfacing a central database with at least one monitoring device; uploading data from the at least one monitoring device to the at central database; pairing the data with a secured data identifier; storing the data and the secured data identifier in the central database; producing a report comprising the data; and providing the report to an authorized third party. - View Dependent Claims (29, 30, 31, 32, 33)
-
Specification