FILE VAULT AND CLOUD BASED DOCUMENT NOTARY SERVICE
First Claim
1. A method executed by at least one processor comprising:
- receiving a first document from a first node associated with a first party and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network;
storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers;
receiving a first request to access the first document, the first request corresponding to the first document identifier;
receiving a first authorization from a third node, associated with a third party, that is remotely coupled to the at least one processor via the network; and
granting the first request based on the first authorization and the first document identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a trusted cloud service such as an “electronic vault” may store records of a consumer'"'"'s electronic data file history. These documents may come from disparate providers and include financial statements and the like. The trusted vault cloud may act as an online notary to certify documents are legitimate and may be trusted. For example, a retailer may dispute whether the consumer paid a debt. To resolve the issue the retailer may access the cloud vault to retrieve a bank statement for the consumer, whereby the bank statement is electronically notorized by the vault cloud and is thus credible to the retailer. The retailer may then see proof the consumer had indeed paid a past debt to the retailer. Other embodiments are described herein.
-
Citations
29 Claims
-
1. A method executed by at least one processor comprising:
-
receiving a first document from a first node associated with a first party and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers; receiving a first request to access the first document, the first request corresponding to the first document identifier; receiving a first authorization from a third node, associated with a third party, that is remotely coupled to the at least one processor via the network; and granting the first request based on the first authorization and the first document identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. (canceled)
-
15. An apparatus comprising:
-
at least one processor; control logic, coupled to the at least one processor, to; receive a first document from a first node associated with a first party and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; receive a first request to access the first document, the first request corresponding to the first document identifier; receive a first authorization from a third node, associated with a third party, that is remotely coupled to the at least one processor via the network; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. (canceled)
-
24. (canceled)
-
25. (canceled)
-
26. At least one machine-accessible medium having instructions stored thereon, the instructions when executed on a machine cause the machine to:
-
receive a first document from a first node associated with a first party and a second document from a second node associated with a second party; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; receive a first request to access the first document, the first request corresponding to the first document identifier; receive a first authorization from a third node associated with a third party; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (27, 28, 29)
-
Specification