Secure Information Storage and Delivery System and Method
First Claim
1. A method for authenticating user access to a secure vault in a vault repository comprising:
- receiving, at the vault repository, user identification information from a user for verifying the identity of the user;
determining whether the user identification information is valid;
if the user identification information is valid, transmitting a soft token to a computing device associated with the user, the soft token configured to generate a first single use password;
receiving, at the vault repository, the first single use password generated by the soft token;
generating a second single use password at the vault repository; and
authenticating the user to access the secure vault based on the first and the second single use passwords.
23 Assignments
0 Petitions
Accused Products
Abstract
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is configured to receive at least one data entry. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault. and transfers the data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.
79 Citations
21 Claims
-
1. A method for authenticating user access to a secure vault in a vault repository comprising:
-
receiving, at the vault repository, user identification information from a user for verifying the identity of the user; determining whether the user identification information is valid; if the user identification information is valid, transmitting a soft token to a computing device associated with the user, the soft token configured to generate a first single use password; receiving, at the vault repository, the first single use password generated by the soft token; generating a second single use password at the vault repository; and authenticating the user to access the secure vault based on the first and the second single use passwords. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A secure information storage and delivery method comprising:
-
creating a first secure vault associated with a user in a vault repository, the first secure vault being adapted to securely store data; receiving, at the vault repository, at least one data entry associated with the user; storing the at least one data entry in the first secure vault; receiving, at the vault repository, user identification information from a user; determining whether the user identification information is valid; if the user identification information is valid, transmitting a soft token to a computing device associated with the user, the soft token configured to generate a first single use password; receiving, at the vault repository, the first single use password generated by the soft token; generating a second single use password at the vault repository; and authenticating the user to access the first secure vault based on the first and second single use passwords. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium for authenticating user access to a secure vault in a vault repository, the computer readable medium storing program instructions, which when executed by a computer cause the computer to perform the steps of:
-
receiving, at the vault repository, user identification information from a user for verifying the identity of the user; determining whether the user identification information is valid; if the user identification information is valid, transmitting a soft token to a computing device associated with the user, the soft token configured to generate a first single use password; receiving, at the vault repository, the first single use password generated by the soft token; generating a second single use password at the vault repository; and authenticating the user to access the secure vault based on the first and the second single use passwords.
-
-
14. A secure information storage system comprising:
-
a vault repository including a first secure vault associated with a user, the secure vault being adapted to receive and securely store at least one data entry; a vault server coupled to the vault repository, the vault server being configured to communicate with a computing device associated with the user through a network; wherein the vault server is configured to transmit a soft token to the user computing device, the soft token configured to generate a first single use password at the user computing device; and wherein the vault repository generates a second single use password and authenticates the user to access the first secure vault based on the first and second single use passwords. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification