SECURE AND PRIVATE DATA STORAGE
First Claim
1. A method of securely authorizing limited access by a software application to private user data, the method comprising:
- operating, by a computing device, a software application that can utilize user data;
sending, by the computing device, a request to a first server to authorize release of the user data;
receiving, by the computing device, an authorization from the first server to release the user data;
sending, by the computing device, a request to retrieve the user data to a plurality of second servers, wherein;
each second server in the plurality of second servers is independent from the first server; and
each second server in the plurality of second servers is independent from each of the other second servers in the plurality of second servers;
receiving, by the computing device, a portion of the user data from each of the plurality of second servers;
assembling, by the computing device, the user data from at least two of the portions of the user data; and
providing, by the computing device, the user data to the software application.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of securely authorizing limited access by a software application to private user data may include operating a software application that can utilize user data, sending a request to a first server to authorize release of the user data, receiving an authorization from the first server to release the user data, and sending a request to retrieve the user data to a plurality of second servers. The method may also include receiving a portion of the user data from each of the plurality of second servers, assembling the user data from at least two of the portions of the user data, and providing the user data to the software application.
-
Citations
20 Claims
-
1. A method of securely authorizing limited access by a software application to private user data, the method comprising:
-
operating, by a computing device, a software application that can utilize user data; sending, by the computing device, a request to a first server to authorize release of the user data; receiving, by the computing device, an authorization from the first server to release the user data; sending, by the computing device, a request to retrieve the user data to a plurality of second servers, wherein; each second server in the plurality of second servers is independent from the first server; and each second server in the plurality of second servers is independent from each of the other second servers in the plurality of second servers; receiving, by the computing device, a portion of the user data from each of the plurality of second servers; assembling, by the computing device, the user data from at least two of the portions of the user data; and providing, by the computing device, the user data to the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory, computer-readable medium comprising instructions that, when executed by one or more processors, causes the one or more processors to perform operations comprising:
-
operating a software application that can utilize user data; sending a request to a first server to authorize release of the user data; receiving an authorization from the first server to release the user data; sending a request to retrieve the user data to a plurality of second servers, wherein; each second server in the plurality of second servers is independent from the first server; and each second server in the plurality of second servers is independent from each of the other second servers in the plurality of second servers; receiving a portion of the user data from each of the plurality of second servers; assembling the user data from at least two of the portions of the user data; and providing the user data to the software application. - View Dependent Claims (16, 17)
-
-
18. A system comprising:
-
one or more processors; and one or more memory devices comprising instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; operating a software application that can utilize user data; sending a request to a first server to authorize release of the user data; receiving an authorization from the first server to release the user data; sending a request to retrieve the user data to a plurality of second servers, wherein; each second server in the plurality of second servers is independent from the first server; and each second server in the plurality of second servers is independent from each of the other second servers in the plurality of second servers; receiving a portion of the user data from each of the plurality of second servers; assembling the user data from at least two of the portions of the user data; and providing the user data to the software application. - View Dependent Claims (19, 20)
-
Specification