×

SYSTEMS AND METHODS FOR SECURE AND PERSISTENT RETENTION OF SENSITIVE INFORMATION

  • US 20140082749A1
  • Filed: 09/20/2013
  • Published: 03/20/2014
  • Est. Priority Date: 09/20/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented in an information processing system including one or more data processors, the method comprising:

  • provisioning, by the information processing system, a client account for a user to enable a client computer associated with the user to store information in an elastic storage system and to prohibit the client computer, the information processing system, and the elastic storage system from altering and from deleting the stored information during an authorized retention period;

    receiving at the information processing system data messages sent via one or more communications networks from one or more client computers, the received data messages including information that is required to be stored for the authorized retention period;

    transmitting, from the information processing system, the received information via one or more data communications networks to the elastic storage system for storage so that the stored information is non-rewriteable and non-erasable during the authorized retention period;

    in response to an authorized access request from an authorized computer device, the information processing system transmitting a retrieval request message to the elastic storage system via the one or more communication networks to retrieve a copy of the information stored in the elastic storage system;

    wherein the provisioning step includes the information processing system configuring the elastic storage system to permit deletion, modification, or destruction of the stored information only when a trusted third party having a predetermined authentication information associated with the client account provides the predetermined authentication information to the elastic storage system,wherein the trusted third party is an entity independent from and not controlled by the user, the information processing system, or the elastic storage system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×