Secure identity and personal information storage and transfer
First Claim
Patent Images
1. A system for securely storing and transferring sensitive and confidential data, comprising:
- a secure server for storing;
personal and identity information of a user; and
data files corresponding to said personal and identity information of said user;
a secure communications system to provide said user remote access to said sensitive and confidential data; and
a secure transmission system to transmit to said user data files corresponding to said personal and identity information of said user, upon request by said user.
9 Assignments
0 Petitions
Accused Products
Abstract
The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with methods of securely accessing that data, and transferring information from that data, as necessary.
-
Citations
20 Claims
-
1. A system for securely storing and transferring sensitive and confidential data, comprising:
-
a secure server for storing; personal and identity information of a user; and data files corresponding to said personal and identity information of said user; a secure communications system to provide said user remote access to said sensitive and confidential data; and a secure transmission system to transmit to said user data files corresponding to said personal and identity information of said user, upon request by said user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for securely transferring and storing sensitive and confidential data on a mobile device, comprising:
-
storing on a server, in a first secure store, personal and identity information of a mobile device user, and, in a second secure store, sensitive and confidential data files corresponding to said personal and identity information of said mobile device user; interfacing with said mobile device via a secure interface to provide access to said sensitive and confidential data files; receiving a request from said mobile device user for said sensitive and confidential data files from said second secure store; authenticating said mobile device user requesting said sensitive and confidential data files; and presenting said sensitive and confidential data files to said mobile device user thereof. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification