Systems and methods for secure watchlisting
First Claim
1. A method for tracking entities, comprising:
- receiving a request to create a watchlist including an entity associated with the watchlist;
providing an interface for entering information about the watchlist, the information comprising access control information for controlling access to processes associated with the watchlist;
generating a first unique identifier for identifying the watchlist;
generating a second unique identifier for identifying a watchlist entry;
generating the watchlist including the watchlist entry, the watchlist entry comprising an identity of the entity, the first unique identifier, the second unique identifier, a third unique identifier for identifying the entity, and the access control information;
storing the generated watchlist;
generating a state key for the watchlist entry, the state key comprising the first unique identifier, the second unique identifier, the third unique identifier, and the access control information; and
encrypting the state key to generate a state lock.
4 Assignments
0 Petitions
Accused Products
Abstract
A watchlisting module is configured to securely and efficiently create, modify, manage, and store a watchlist. The watchlisting module is configured to generate a watchlist consisting of watchlist entries. Each watchlist entry encapsulates information about an entity to be associated with the watchlist. The watchlist entry includes information about the entity including a unique identifier for the watchlist, a unique identifier of the watchlist entry, a unique identifier for the entity, and access control information for membership process related to the watchlist. The watchlist entry also includes a State Lock. Watchlisting module is configured to utilize the State Lock to secure and verify a watchlist entry.
9 Citations
21 Claims
-
1. A method for tracking entities, comprising:
-
receiving a request to create a watchlist including an entity associated with the watchlist; providing an interface for entering information about the watchlist, the information comprising access control information for controlling access to processes associated with the watchlist; generating a first unique identifier for identifying the watchlist;
generating a second unique identifier for identifying a watchlist entry;
generating the watchlist including the watchlist entry, the watchlist entry comprising an identity of the entity, the first unique identifier, the second unique identifier, a third unique identifier for identifying the entity, and the access control information;storing the generated watchlist; generating a state key for the watchlist entry, the state key comprising the first unique identifier, the second unique identifier, the third unique identifier, and the access control information; and encrypting the state key to generate a state lock. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for tracking entities, comprising:
-
maintaining at least one watchlist in a repository, the at least one watchlist comprising a plurality of watchlist entities, wherein each watchlist entry of the plurality of watchlist entries comprises an identity of an entity associated with the watchlist, a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the watchlist entry, a third unique identifier for identifying the entity, and access control information for controlling access to processes associated with each of the plurality of watchlist entries; providing interfaces for interacting with the at least one watchlist, wherein the interfaces allow a user to interact with the at least one watchlist; retrieving information from the at least one watchlist in the repository in response to user interaction with the interfaces; and providing the retrieved information to the user; wherein maintaining the at least one watchlist, comprises; generating a state key for at least one watchlist entry, the state key comprising a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the at least one watchlist entry, a third unique identifier for identifying a stored entity associated with the at least one watchlist entry, and access control information for controlling access to processes associated with the at least one watchlist entry; and encrypting the state key to generate a state lock. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for tracking entities, comprising:
-
at least one watchlist in a repository, the at least one watchlist comprising a plurality of watchlist entities, wherein each watchlist entry of the plurality of watchlist entries comprises an identity of an entity associated with the watchlist, a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the watchlist entry, a third unique identifier for identifying the entity, and access control information for controlling access to processes associated with each of the plurality of watchlist entries; and a watchlisting module coupled to the repository and configured to maintain the at least one watchlist, the watchlisting module comprising; a watchlisting engine configured to retrieve information from the at least one watchlist in the repository; and an application interface configured to provide interfaces for interacting with the at least one watchlist, wherein the interfaces allow a user to interact with the at least one watchlist; wherein the watchlisting engine is further configured to; generate a state key for at least one watchlist entry, the state key comprising a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the at least one watchlist entry, a third unique identifier for identifying a stored entity associated with the at least one watchlist entry, and access control information for controlling access to processes associated with the at least one watchlist entry; and encrypt the state key to generate a state lock. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium comprising instructions for causing a computer to perform a method for tracking entities, the method comprising:
-
maintaining at least one watchlist in a repository, the at least one watchlist comprising a plurality of watchlist entities, wherein each watchlist entry of the plurality of watchlist entries comprises an identity of an entity associated with the watchlist, a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the watchlist entry, a third unique identifier for identifying the entity, and access control information for controlling access to processes associated with each of the plurality of watchlist entries; providing interfaces for interacting with the at least one watchlist, wherein the interfaces allow a user to interact with the at least one watchlist; retrieving information from the at least one watchlist in the repository in response to user interaction with the interfaces; and providing the retrieved information to the user; wherein maintaining the at least one watchlist, comprises; generating a state key for at least one watchlist entry, the state key comprising a first unique identifier for identifying the at least one watchlist, a second unique identifier for identifying the at least one watchlist entry, a third unique identifier for identifying a stored entity associated with the at least one watchlist entry, and access control information for controlling access to processes associated with the at least one watchlist entry; and encrypting the state key to generate a state lock. - View Dependent Claims (18, 19, 20, 21)
-
Specification