File vault and cloud based document notary service
First Claim
1. A method executed by at least one processor comprising:
- receiving (a) a first document from a first node associated with a first party during a first transfer transaction, (b) a second document from a second node associated with a second party, and (c) a third document from the first node during the first transfer transaction, the first and second nodes remotely coupled to the at least one processor via a network;
storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers;
receiving a first request to access the first document from a fourth party, the first request corresponding to the first document identifier;
after receiving the first request, receiving a first authorization, including at least one digital security credential, from a third party associated with a third node that is remotely coupled to the at least one processor via the network; and
granting the first request based on the first authorization and the first document identifier;
wherein the first document corresponds to a first user account and the third document corresponds to an additional user account that is different from the first user account.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a trusted cloud service such as an “electronic vault” may store records of a consumer'"'"'s electronic data file history. These documents may come from disparate providers and include financial statements and the like. The trusted vault cloud may act as an online notary to certify documents are legitimate and may be trusted. For example, a retailer may dispute whether the consumer paid a debt. To resolve the issue the retailer may access the cloud vault to retrieve a bank statement for the consumer, whereby the bank statement is electronically notorized by the vault cloud and is thus credible to the retailer. The retailer may then see proof the consumer had indeed paid a past debt to the retailer. Other embodiments are described herein.
12 Citations
20 Claims
-
1. A method executed by at least one processor comprising:
-
receiving (a) a first document from a first node associated with a first party during a first transfer transaction, (b) a second document from a second node associated with a second party, and (c) a third document from the first node during the first transfer transaction, the first and second nodes remotely coupled to the at least one processor via a network; storing the first and second documents in at least one non-volatile machine accessible medium coupled to the at least one processor, the first and second documents respectively assigned to first and second document identifiers; receiving a first request to access the first document from a fourth party, the first request corresponding to the first document identifier; after receiving the first request, receiving a first authorization, including at least one digital security credential, from a third party associated with a third node that is remotely coupled to the at least one processor via the network; and granting the first request based on the first authorization and the first document identifier; wherein the first document corresponds to a first user account and the third document corresponds to an additional user account that is different from the first user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processor; control logic, coupled to the at least one processor, to; receive at least one security credential from a third party; receive a first document from a first node associated with a first party, based on the at least one security credential, and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; periodically receive additional documents from the first node based on the at least one security credential and storing the additional documents; receive a first request to access the first document, the first request corresponding to the first document identifier; receive a first authorization from a third node, associated with the third party, that is remotely coupled to the at least one processor via the network; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. At least one non-transitory machine-accessible medium having instructions stored thereon, the instructions when executed on a machine cause the machine to:
-
receive a first document from a first node associated with a first party and a second document from a second node associated with a second party, wherein receiving the first document comprises receiving a first digital signature from the first node; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; receive a first request to access the first document, the first request corresponding to the first document identifier; digitally sign the first document, which already includes the first digital signature, with a second digital signature before granting the first request; couple the first document to a first watermark that is based on both of the first and second digital signatures; receive a first authorization from a third node associated with a third party; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (18, 19, 20)
-
Specification