Data services outsourcing verification
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for verifying outsource data and providing a certification system includes but is not limited to a method including receiving one or more deposits of one or more data elements in connection with an outsourcing transaction from or on behalf of a third party, verifying an identification of the third party, maintaining a transaction log to provide a validation record acknowledging receipt of the one or more deposits, and performing a cryptographic action against one or more aspects of the outsourcing transaction to provide a certified version of the transaction log to confirm the outsourcing transaction.
-
Citations
93 Claims
-
1-56. -56. (canceled)
-
57. A method for a verifying outsourced data, the method comprising:
-
depositing one or more data elements to an outsourcing service in one or more transactions; providing one or more identification elements to validate the deposit; and receiving a record of the deposit of the one or more data elements, the record including a cryptographic digital fingerprint traceable to the one or more identification elements. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
-
71. A computer program product comprising:
-
a signal bearing medium bearing; one or more instructions for depositing one or more data elements to an outsourcing service in one or more transactions; one or more instructions for providing one or more identification elements to validate the deposit; and one or more instructions for receiving a record of the deposit of the one or more data elements, the record including a cryptographic digital fingerprint traceable to the one or more identification elements. - View Dependent Claims (72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87)
-
-
88. A certification system for verifying one or more data elements in connection with an outsourcing transaction, the certification system comprising:
-
a processor; a memory coupled to the processor; a storage facility accessible by the processor, the storage facility configured to store one or more deposits of the one or more data elements in connection with the outsourcing transaction from or on behalf of a third party; a database coupled to the processor, the database configured to maintain a transaction log to provide a validation record acknowledging receipt of the one or more deposits; a verification module coupled to the processor, the verification module configured to verify an identification of the third party; and a cryptographic module coupled to the processor, the cryptographic module configured to perform a cryptographic action against one or more aspects of the outsourcing transaction to provide a certified version of the transaction log. - View Dependent Claims (89, 90, 91, 92, 93)
-
Specification