Method and system for protecting information on a computer system
First Claim
1. A method for securing information stored on a computer system, comprising:
- creating a user ID and personal password for a user to access said computer system;
generating an access code in response to said user scheduling a future start time and duration to access said stored information on said computer system, wherein an end time comprises said duration added to said scheduled figure start time;
before said end time and at or after said scheduled future start time, said computer system receiving said access code, user ID and personal password from said user; and
responsive to said access code, user ID and personal password said computer system, allowing said user to access said stored information for no longer than said duration.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting sensitive information, for example, a user'"'"'s personal information, stored on a database where the information is accessible via a communications network such as the Internet. An exemplary embodiment stores the sensitive information on an off-line server. The off-line server is connected to an on-line server. The on-line server is connected to the user via the Internet. The user interfaces with the on-line server, and at a scheduled time window, the sensitive information is made available to the on-line server by the off-line server. Outside of the time window, none of the sensitive information is kept on the on-line server. Thus by placing the sensitive information on-line for only limited periods of time the risk of compromise to the sensitive information is greatly reduced.
53 Citations
30 Claims
-
1. A method for securing information stored on a computer system, comprising:
-
creating a user ID and personal password for a user to access said computer system; generating an access code in response to said user scheduling a future start time and duration to access said stored information on said computer system, wherein an end time comprises said duration added to said scheduled figure start time; before said end time and at or after said scheduled future start time, said computer system receiving said access code, user ID and personal password from said user; and responsive to said access code, user ID and personal password said computer system, allowing said user to access said stored information for no longer than said duration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 29)
-
-
9. A security system for protecting information stored on a database, comprising:
-
a first server computer comprising said database; a second server computer connected to said first server computer by a first communications path; a user computer connected to said second server computer by a second communications path; and an access code generated by said first server computer in response to a user scheduling a future start time and a duration to enable said user computer to access said information on or after said scheduled future start time and for no longer than said duration, wherein an end time comprises said duration added to said scheduled future start time; and wherein, responsive to receiving said access code before said end time and at or after said scheduled future start time from said user computer, said first server computer copying a portion of said information to said second server computer, and wherein said user computer has access to said portion of said information only on said second server computer. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A security system for protecting information stored on a database, comprising:
-
a first server computer comprising said database; a second server computer connected to said first server computer by a first communications path; a user computer for a user to access said information, said user computer connected to said second server computer by a second communications park; a phone system, comprising a telephone connection to said user and a third communications path to said first server computer; and an access code generated by said first server computer after a request by said user via said phone system to access said information during a future time period, wherein said user enters said access code into said user computer to access said information, and wherein said first server computer copies a portion of said information to said second server computer, and wherein said user computer has access to information in said database only when said information resides on said second server computer. - View Dependent Claims (16, 17, 27, 28)
-
-
18. A method for providing security for information stored on a first server system, said first server system connected to a second server system, wherein said second server system is connected to a user computer, said method comprising:
-
said first server system generating a code in response to a user scheduling a future time period to access information on said first server system; sending said code to said user; at a time in said scheduled future time period, receiving said code by said second server system from said user computer system; and said second server system responsive to said code, loading at least part of said information stored on said first server system for use by said user computer until said scheduled future time period ends. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A method for accessing information stored on a system, comprising a computer, said system connected to a user computer via a communications network, said method comprising:
-
a user scheduling a future time and duration when said user computer is allowed to access information on said system, said scheduling via a first communications path of said communications network; receiving from said system an access code, said access code based on said scheduled future time and duration, wherein an end time comprises said duration added to said scheduled future start time; before said end time and at or after said scheduled future time, said user computer connecting to said system using said access code and a predetermined password, said connecting via a second communications path of said communications network, wherein said second communications path is different from said first communications path; and said user computer having access to said information for no longer than said duration. - View Dependent Claims (25, 26, 30)
-
Specification