Systems and methods for secure online repositories
First Claim
1. A system for providing access control to a secure online repository, comprising:
- a computer network;
at least one database configured to store the secure online repository, wherein the at least one database is connected to the computer network and the secure online repository includes a primary lockbox and a secondary lockbox;
a computing device connected to the computer network and the database the computing device comprising at least one processor and a non-transitory computer readable storage medium encoded with a computer program comprising instructions that when executed, operate to cause the at least one processor to perform operations comprising;
provide a user interface to a client device of a first party;
receive, from the user interface of the client device, a first access key from the first party;
receive a second access key from a second party, the second party being different from the first party;
simultaneously validate the first access key and the second access key; and
in response to simultaneously validating both the first access key and the second access key;
provide remote access to the primary lockbox to the first party and remote access to the secondary lockbox to the second party over the computer network, wherein the primary lockbox and the secondary lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and
provide remote access to the content in common by the first party and the second party, wherein the information unique to the first party is concurrently available to the second party only for the duration the first party is remotely accessing the primary lockbox and the information unique to the second party is concurrently available to the first, party only for the duration the second party is remotely accessing the secondary lockbox;
provide, through the computer network, a presentation of the primary lockbox to the client device of the first party for display on the user interface when both the first and second access keys are validated simultaneously.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms are disclosed herein for storing various records. Numerous keys and parties can access online repositories. These repositories contain a plurality of lockboxes, structured hierarchically and otherwise, providing public and private areas with varying levels of access. Some content of such lockboxes can be sharable. These lockboxes can be used not only to store diverse content, ranging from birth certificates to deeds and social security numbers, but they can also be accessed in a variety of ways. For example, keys to lockboxes can be made available by such events as the issuing of death certificates or birth certificates. Alternatively, keys can be issued according to various rules and heuristics stipulated by lockbox users. In either case, the plurality of lockboxes residing in repositories can be configured to provide centralized storage facilities that are secure and readily accessible from various computing devices.
-
Citations
15 Claims
-
1. A system for providing access control to a secure online repository, comprising:
-
a computer network; at least one database configured to store the secure online repository, wherein the at least one database is connected to the computer network and the secure online repository includes a primary lockbox and a secondary lockbox; a computing device connected to the computer network and the database the computing device comprising at least one processor and a non-transitory computer readable storage medium encoded with a computer program comprising instructions that when executed, operate to cause the at least one processor to perform operations comprising; provide a user interface to a client device of a first party; receive, from the user interface of the client device, a first access key from the first party; receive a second access key from a second party, the second party being different from the first party; simultaneously validate the first access key and the second access key; and
in response to simultaneously validating both the first access key and the second access key;provide remote access to the primary lockbox to the first party and remote access to the secondary lockbox to the second party over the computer network, wherein the primary lockbox and the secondary lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and provide remote access to the content in common by the first party and the second party, wherein the information unique to the first party is concurrently available to the second party only for the duration the first party is remotely accessing the primary lockbox and the information unique to the second party is concurrently available to the first, party only for the duration the second party is remotely accessing the secondary lockbox; provide, through the computer network, a presentation of the primary lockbox to the client device of the first party for display on the user interface when both the first and second access keys are validated simultaneously. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method for providing a secure online repository executed by at least one processor, the method comprising:
-
providing a user interface to a client device of a first party over a computer network; receiving, by the at least one processor, from the user interface of the client device, a first access key from the first party; receiving, by the at least one processor, a second access key from a second party, the second party being different from the first party; simultaneously validating, by the at least one processor, the first access key and the second access key; and
in response to simultaneously validating both the first access key and the second access key;providing remote access to a primary lockbox of the secure online repository to the first party and remote access to a secondary lockbox of the secure online repository to the second party over the computer network, wherein the primary lockbox and the secondary lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and providing remote access to the content in common by the first party and the second party, wherein the information unique to the first party is concurrently available to the second party only for the duration the first party is remotely accessing the primary lockbox and the information unique to the second party is concurrently available to the first party only for the duration the second party is remotely accessing the secondary lockbox; providing, through the computer network, a presentation of the primary lockbox to the client device of the first party for display on the user interface when both the first and second access keys are validated simultaneously. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium encoded with a computer program comprising instructions that, when executed, operate to cause at least one processor to perform operations comprising:
-
providing a user interface to a client device of a first party over a computer network;
receiving, from the user interface of the client device, a first access key from a first party;receiving a second access key from a second party, the second party being different from the first party;
simultaneously validating the first access key and the second access key; andin response to simultaneously validating both the first access key and the second access key; providing remote access to a primary lockbox of a secure online repository to the first party and remote access to a secondary lockbox of the secure online repository to the second party over the computer network, wherein the primary lockbox and the secondary lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and providing remote access to the content in common by the first party and the second party, wherein the information unique to the first party is concurrently available to the second party only for the duration the first party is remotely accessing the primary lockbox and the information unique to the second party is concurrently available to the first party only for the duration the second party is remotely accessing the secondary lockbox; providing, through the computer network, a presentation of the primary lockbox to the client device of the first party for display on the user interface when both the first and second access keys are validated simultaneously. - View Dependent Claims (12, 13, 14, 15)
-
Specification