SECURE DIGITAL STORAGE
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving from a user a request to access secure data container provided by a service provider;
identifying a location associated with the secure data container based on an identifier of the secure data container and an identifier of the service provider;
verifying that the secure data container has an active status;
identifying a directory container associated with the secure data container, the directory container identified based on a directory container identifier and including a list of file identifiers associated with files stored in file containers; and
providing access to the directory container to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein.
133 Citations
24 Claims
-
1. A computer-implemented method comprising:
-
receiving from a user a request to access secure data container provided by a service provider; identifying a location associated with the secure data container based on an identifier of the secure data container and an identifier of the service provider; verifying that the secure data container has an active status; identifying a directory container associated with the secure data container, the directory container identified based on a directory container identifier and including a list of file identifiers associated with files stored in file containers; and providing access to the directory container to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving from a user a request to access secure data container provided by a service provider; identifying a location associated with the secure data container based on an identifier of the secure data container and an identifier of the service provider; verifying that the secure data container has an active status; identifying a directory container associated with the secure data container, the directory container identified based on a directory container identifier and including a list of file identifiers associated with files stored in file containers; and providing access to the directory container to the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer storage medium encoded with computer program instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
receiving from a user a request to access secure data container provided by a service provider; identifying a location associated with the secure data container based on an identifier of the secure data container and an identifier of the service provider; verifying that the secure data container has an active status; identifying a directory container associated with the secure data container, the directory container identified based on a directory container identifier and including a list of file identifiers associated with files stored in file containers; and providing access to the directory container to the user. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification