File vault and cloud based document notary service
First Claim
1. A method executed by at least one processor comprising:
- receiving at least one security credential from a third party;
receiving a first document from a first node associated with a first party, based on the at least one security credential, and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network;
storing the first and second documents, the first and second documents respectively assigned to first and second document identifiers;
periodically receiving additional documents from the first node based on the at least one security credential and storing the additional documents;
receiving a first request to access the first document, the first request corresponding to the first document identifier;
receiving a first authorization from a third node, associated with the third party, that is remotely coupled to the at least one processor via the network; and
granting the first request based on the first authorization and the first document identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a trusted cloud service such as an “electronic vault” may store records of a consumer'"'"'s electronic data file history. These documents may come from disparate providers and include financial statements and the like. The trusted vault cloud may act as an online notary to certify documents are legitimate and may be trusted. For example, a retailer may dispute whether the consumer paid a debt. To resolve the issue the retailer may access the cloud vault to retrieve a bank statement for the consumer, whereby the bank statement is electronically notarized by the vault cloud and is thus credible to the retailer. The retailer may then see proof the consumer had indeed paid a past debt to the retailer. Other embodiments are described herein.
19 Citations
20 Claims
-
1. A method executed by at least one processor comprising:
-
receiving at least one security credential from a third party; receiving a first document from a first node associated with a first party, based on the at least one security credential, and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; storing the first and second documents, the first and second documents respectively assigned to first and second document identifiers; periodically receiving additional documents from the first node based on the at least one security credential and storing the additional documents; receiving a first request to access the first document, the first request corresponding to the first document identifier; receiving a first authorization from a third node, associated with the third party, that is remotely coupled to the at least one processor via the network; and granting the first request based on the first authorization and the first document identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory machine-readable medium having stored thereon data which, if used by at least one machine, causes the at least one machine to perform operations comprising:
-
receive at least one security credential from a third party; receive a first document from a first node associated with a first party, based on the at least one security credential, and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one machine via a network; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; periodically receive additional documents from the first node based on the at least one security credential and store the additional documents; receive a first request to access the first document, the first request corresponding to the first document identifier; receive a first authorization from a third node, associated with the third party, that is remotely coupled to the at least one machine via the network; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
at least one memory; and at least one processor, coupled to the memory, to perform operations comprising; receive at least one security credential from a third party; receive a first document from a first node associated with a first party, based on the at least one security credential, and a second document from a second node associated with a second party, the first and second nodes remotely coupled to the at least one processor via a network; store the first and second documents, the first and second documents respectively assigned to first and second document identifiers; periodically receive additional documents from the first node based on the at least one security credential and store the additional documents; receive a first request to access the first document, the first request corresponding to the first document identifier; receive a first authorization from a third node, associated with the third party, that is remotely coupled to the at least one processor via the network; and grant the first request based on the first authorization and the first document identifier. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification