Secure information storage and delivery system and method
First Claim
1. A method comprising:
- receiving a user service type, the user service type comprising a size of a secure vault at a vault repository;
receiving, at the vault repository, user-identification information for verifying the identity of a user;
transmitting, in response to determining that the user-identification information is valid, a soft token to a computing device associated with the user, the soft token configured to generate a first single-use password;
receiving, at the vault repository, the first single-use password generated by the soft token;
generating, at the vault repository, a second single-use password;
authenticating, based on the first single-use password and the second single-use password, the computing device to access the secure vault at the vault repository;
receiving, at the vault repository, a request for data associated with the user, the request comprising a destination address;
identifying, in response to receiving the request, the data in the secure vault; and
sending the data to the destination address.
21 Assignments
0 Petitions
Accused Products
Abstract
A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level including at least one of a data type or a data size limit associated with the secure vault, the secure vault being adapted to receive and at least one data entry and securely store the at least one data entry if the at least one of a size or a type of the at least one data entry is consistent with the service level. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault based on at least one of the size or the type of the at least one data entry and transfers the at least one data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.
-
Citations
25 Claims
-
1. A method comprising:
-
receiving a user service type, the user service type comprising a size of a secure vault at a vault repository; receiving, at the vault repository, user-identification information for verifying the identity of a user; transmitting, in response to determining that the user-identification information is valid, a soft token to a computing device associated with the user, the soft token configured to generate a first single-use password; receiving, at the vault repository, the first single-use password generated by the soft token; generating, at the vault repository, a second single-use password; authenticating, based on the first single-use password and the second single-use password, the computing device to access the secure vault at the vault repository; receiving, at the vault repository, a request for data associated with the user, the request comprising a destination address; identifying, in response to receiving the request, the data in the secure vault; and sending the data to the destination address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
at least one processor; and non-transitory computer-readable media storing program instructions that, when executed by the at least one processor, cause the system to perform the steps of; receiving a user service type, the user service type comprising a size of a secure vault at a vault repository; receiving, at the vault repository, user-identification information for verifying the identity of a user; transmitting, in response to determining that the user-identification information is valid, a soft token to a computing device associated with the user, the soft token configured to generate a first single-use password; receiving, at the vault repository, the first single-use password generated by the soft token; generating, at the vault repository, a second single-use password; authenticating, based on the first single-use password and the second single-use password, the computing device to access the secure vault at the vault repository; receiving, at the vault repository, a request for data associated with the user, the request comprising a destination address; identifying, in response to receiving the request, the data in the secure vault; and sending the data to the destination address. - View Dependent Claims (19, 20, 21)
-
-
22. One or more non-transitory computer-readable media storing program instructions that, when executed by a computer, cause the computer to perform the steps of:
-
receiving a user service type, the user service type comprising a size of a secure vault at a vault repository on the computer; receiving, at the vault repository on the computer, user-identification information for verifying the identity of a user; transmitting, in response to determining that the user-identification information is valid, a soft token to a computing device associated with the user, the soft token configured to generate a first single-use password; receiving, at the vault repository, the first single-use password generated by the soft token; generating, at the vault repository, a second single-use password; authenticating, based on the first single-use password and the second single-use password, the computing device to access the secure vault at the vault repository; receiving, at the vault repository, a request for data associated with the user, the request comprising a destination address; identifying, in response to receiving the request, the data in the secure vault; and sending the data to the destination address. - View Dependent Claims (23, 24, 25)
-
Specification