FILE VAULT AND CLOUD BASED DOCUMENT NOTARY SERVICE
First Claim
1. A method executed by at least one processor comprising:
- receiving a first document from a first node associated with a first party and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network;
storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers;
receiving a first request to access the first document, the first request corresponding to the first document identifier;
receiving a first authorization from a third node, associated with a third party, that is remotely coupled to the at least one processor via the network; and
granting the first request based on the first authorization and the first document identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a trusted cloud service such as an “electronic vault” may store records of a consumer'"'"'s electronic data file history. These documents may come from disparate providers and include financial statements and the like. The trusted vault cloud may act as an online notary to certify documents are legitimate and may be trusted. For example, a retailer may dispute whether the consumer paid a debt. To resolve the issue the retailer may access the cloud vault to retrieve a bank statement for the consumer, whereby the bank statement is electronically notarized by the vault cloud and is thus credible to the retailer. The retailer may then see proof the consumer had indeed paid a past debt to the retailer. Other embodiments are described herein.
-
Citations
1 Claim
-
1. A method executed by at least one processor comprising:
-
receiving a first document from a first node associated with a first party and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers; receiving a first request to access the first document, the first request corresponding to the first document identifier; receiving a first authorization from a third node, associated with a third party, that is remotely coupled to the at least one processor via the network; and granting the first request based on the first authorization and the first document identifier.
-
Specification