×

Data services outsourcing verification

  • US 9,367,833 B2
  • Filed: 07/14/2011
  • Issued: 06/14/2016
  • Est. Priority Date: 07/14/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for verifying outsourced data, the method comprising:

  • receiving a deposit of one or more data elements in connection with an outsourcing transaction;

    receiving an identification of a depositor associated with the outsourcing transaction;

    maintaining a transaction log to provide a validation record acknowledging the outsourcing transaction;

    performing one or more cryptographic actions using a public key encryption on the received identification of the depositor to verify an authorization of the depositor;

    producing a certified version of the transaction log using the public key encryption as at least a portion of the certification process;

    maintaining a statistical failure rate associated with producing the certified version of the transaction log at least partially based on a rate of success associated with the one or more performed cryptographic actions on the received identification of the depositor;

    establishing a deposit history, including at least pricing the outsourcing transaction at least as a function of (i) an amount of data included in the deposit and the statistical failure rate associated with producing the certified version of the transaction log;

    receiving a query related to the pricing of the outsourcing transaction from an authorized party;

    providing the validation record of the certified version of the transaction log, including at least enabling an authorized party associated with the received query to use the public key encryption to establish proof of the deposit via the validation record, the proof traceable to the identification of the depositor; and

    receiving an indication of the authorized party using the public key encryption to establish proof of the deposit of the one or more data elements via the validation record,wherein at least one of the receiving a deposit, receiving an identification, maintaining a transaction log, performing one or more cryptographic actions, producing a certified version of the transaction log, maintaining a statistical failure rate, establishing a deposit history, receiving a query, providing the validation record, or receiving an indication of the authorized party using the public key encryption is at least partially implemented using at least one processing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×