×

Systems and methods for secure online repositories

  • US 9,710,615 B1
  • Filed: 09/27/2007
  • Issued: 07/18/2017
  • Est. Priority Date: 06/09/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing access control to a secure online repository, comprising:

  • a computer network;

    at least one database configured to store the secure online repository, wherein the at least one database is connected to the computer network and the secure online repository includes a primary lockbox and a secondary lockbox;

    a computing device connected to the computer network and the database the computing device comprising at least one processor and a non-transitory computer readable storage medium encoded with a computer program comprising instructions that when executed, operate to cause the at least one processor to perform operations comprising;

    provide a user interface to a client device of a first party;

    receive, from the user interface of the client device, a first access key from the first party;

    receive a second access key from a second party, the second party being different from the first party;

    simultaneously validate the first access key and the second access key; and

    in response to simultaneously validating both the first access key and the second access key;

    provide remote access to the primary lockbox to the first party and remote access to the secondary lockbox to the second party over the computer network, wherein the primary lockbox and the secondary lockbox share content in common, and the content in common includes information unique to the first party and information unique to the second party; and

    provide remote access to the content in common by the first party and the second party, wherein the information unique to the first party is concurrently available to the second party only for the duration the first party is remotely accessing the primary lockbox and the information unique to the second party is concurrently available to the first, party only for the duration the second party is remotely accessing the secondary lockbox;

    provide, through the computer network, a presentation of the primary lockbox to the client device of the first party for display on the user interface when both the first and second access keys are validated simultaneously.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×