Method and system for secure automated document registration from social media networks
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
G06F-021/62
G06Q-010/10
G06Q-050/18
출원번호
US-0082633
(2013-11-18)
등록번호
US-8914351
(2014-12-16)
발명자
/ 주소
Krislov, Clinton A.
출원인 / 주소
Krislov, Clinton A.
대리인 / 주소
Lesavich High-Tech Law Group, S.C.
인용정보
피인용 횟수 :
0인용 특허 :
79
초록▼
A method and system for secure automated document registration with social media. A secure cloud transformed electronic document is created on an application on a target network device from an original electronic document. The original electronic document is electronic text, audio, video or pictures
A method and system for secure automated document registration with social media. A secure cloud transformed electronic document is created on an application on a target network device from an original electronic document. The original electronic document is electronic text, audio, video or pictures from a social media network or from a telecommunications network. The secure cloud transformed electronic document is made viewable via the target network device and other target devices from anywhere on a cloud communications network or on a social media network without the ability to tamper with the information within the secure cloud transformed electronic document. This provides an automatic secure electronic document registration system on the cloud communications network and the social media network.
대표청구항▼
1. A method for automatic registration of electronic documents from social media networks with cloud computing, comprising: receiving an original electronic document on a first application in a non-transitory computer readable medium on a target network device with one or more processors from a soci
1. A method for automatic registration of electronic documents from social media networks with cloud computing, comprising: receiving an original electronic document on a first application in a non-transitory computer readable medium on a target network device with one or more processors from a social media network via a cloud communications network;automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic document being registered via an automatic document registration system, thereby creating a first level modified electronic document;automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the first application on the target network device;automatically transforming via the first application the second level modified electronic document into a secure cloud electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure cloud transformed electronic document;automatically generating via the first application a plurality of electronic document registration codes for the secure cloud transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes;securely transferring the secure cloud transformed electronic document with the first application from the target network device via a cloud communications network to a cloud server network device with one or more processors, one or more different databases and a second application executing in a second non-transitory computer readable medium on the cloud server network device;storing the secure cloud transformed electronic document from the second application on the cloud server network device as a cloud storage object,wherein the cloud storage object comprises a plurality of separate portions stored in a plurality of separate secure storage locations on a plurality of other different cloud server network devices distributed across the cloud communications network but functions as a single secure cloud storage object; andallowing viewing from the second application of the secure cloud transformed electronic document via the target network device and other target devices from anywhere on the cloud communications network or on the social media network without the ability to tamper with the information within the secure cloud transformed electronic document thereby providing an automatic secure electronic document registration system on the cloud communications network and the social media network. 2. A non-transitory computer readable medium having stored therein a plurality of instructions for causing one or more processors on one or more network devices to execute the steps of: receiving an original electronic document on a first application in a non-transitory computer readable medium on a target network device with one or more processors from a social media network via a cloud communications network;automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic document being registered via an automatic document registration system, thereby creating a first level modified electronic document;automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the first application on the target network device;automatically transforming via the first application the second level modified electronic document into a secure cloud electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure cloud transformed electronic document;automatically generating via the first application a plurality of electronic document registration codes for the secure cloud transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes;securely transferring the secure cloud transformed electronic document with the first application from the target network device via a cloud communications network to a cloud server network device with one or more processors, one or more different databases and a second application executing in a second non-transitory computer readable medium on the cloud server network device;storing the secure cloud transformed electronic document from the second application on the cloud server network device as a cloud storage object,wherein the cloud storage object comprises a plurality of separate portions stored in a plurality of separate secure storage locations on a plurality of other different cloud server network devices distributed across the cloud communications network but functions as a single secure cloud storage object; andallowing viewing from the second application of the secure cloud transformed electronic document via the target network device and other target devices from anywhere on the cloud communications network or on the social media network without the ability to tamper with the information within the secure cloud transformed electronic document thereby providing an automatic secure electronic document registration system on the cloud communications network and the social media network. 3. The method of claim 1 wherein the cloud storage object includes one or more of a REpresentational State Transfer (REST) or Simple Object Access Protocol (SOAP) cloud storage objects, portions thereof, or a combination thereof. 4. The method of claim 1 wherein the first and second cloud applications offer the cloud computing Infrastructure as a Service (IaaS), the cloud computing Platform, as a Service (PaaS) and offers Specific cloud automatic secure electronic document registration services as a Service (SaaS) including a cloud software service. 5. The method of claim 1 wherein social media network includes FACEBOOK, TWITTER, LINKEDIN, GOOGLE+, PINTEREST, TUMBLR, FLICKR, INSTAGRAM, MYSPACE, SKYPE, MEETUP or other social media network. 6. The method of claim 1 wherein the original electronic document includes a social media post comprising electronic text, audio files, video files, graphical entities or digital pictures. 7. The method of claim 1 further comprising: receiving a second original electronic document on the first application previously stored in the non-transitory computer readable medium on the target network device; andcreating a second secure cloud transformed electronic document with the first application with the second original electronic document. 8. The method of claim 7, wherein the second original electronic document previously stored in the non-transitory computer readable medium includes an e-mail message, text message or an instant message, the audio file includes a voice mail message, the video files includes a video file or and video message. 9. The method of claim 8, wherein the second original electronic document was previously stored in the non-transitory computer readable medium and includes the second original electronic document downloaded from another server network device on a telecommunications network. 10. The method of claim 1 wherein the target network device includes desktop computers, laptop computers, tablet computers, mobile phones, non-mobile phones, smart phones, electronic tablets, Internet phones, Internet appliances, personal digital/data assistants (PDA), digital cameras, portable game consoles, non-portable game consoles, cable television (CATV) set-top boxes, satellite television boxes, or digital televisions including a high definition television (HDTV) or a three-dimensional (3D) television. 11. The method of claim 1 wherein the secure cloud transformed electronic document format includes an un-viewable encrypted, hashed, message digested format and a read-only view format. 12. The method of claim 1 wherein the secure cloud transformed electronic document is stored in the cloud storage object using Lightweight Directory Access Protocol (LDAP) and securely accessed from the cloud storage object via the X.509 security protocol. 13. The method of claim 1 further comprising: storing one or more portions of the cloud storage object in the one or more different databases on the cloud communications network using one or more of a plurality of pre-determined virtual file associations for secure cloud transformed electronic document documents in a pre-determined hierarchical structure of security groups and security sub-groups for storing, sharing and retrieving secure transformed electronic documents, wherein a single secure cloud transformed electronic document can reside in a plurality of pre-determined virtual file associations and a plurality of pre-determined security groups and security sub-groups at a same time. 14. The method of claim 1 wherein a copy of the unalterable date and time stamp is encrypted and included in the secure cloud transformed electronic document or a biometric collected from a user of the target network device is encrypted and included in the secure cloud transformed electronic document with the unalterable date and time stamp. 15. The method of claim 1 wherein the one or more different databases include a virtual cloud file system that creates a virtual matrixed directory structure by establishing file accesses based on assigning a files to any number of security groups and security sub-groups instead of designating the files to directories and subdirectories in the virtual cloud file system. 16. The method of claim 15 wherein the virtual cloud file system allows the virtual matrixed directory structure to be overlaid to a plurality of other viewers who have permission to view the secure cloud transformed electronic document. 17. The method of claim 1 further comprising: receiving a request from the cloud application on the target network device via the cloud communications network on the second cloud application on the cloud server network device to view a selected secure cloud transformed electronic document stored on the cloud communications network;verifying on the second cloud application on the cloud server network device that the first cloud application on the target network device is allowed to view the requested secure cloud transformed electronic file;retrieving securely on the second cloud application on the cloud server network device a copy of the requested secure transformed electronic document from the other different one or more server network devices on the cloud communications network; andsecurely transferring the requested secure cloud transformed electronic document to the first cloud application on the target network device from the second cloud application on the cloud server network device via the cloud communications network for secure viewing on the first cloud application. 18. The method of claim 17 wherein the retrieving securely step includes: retrieving securely on the second cloud application a plurality of portions of the requested secure cloud transformed electronic document as the plurality of portions of the cloud storage object from the plurality of separate secure storage locations on the plurality of other different server network devices distributed and stored across the one or more public communication networks, one or more private networks, one or more community networks and one or more hybrid networks of the cloud communications network; andcombining on the second cloud application the retrieved plurality of potions of the requested secure cloud transformed electronic document in a complete electronic document for secure viewing on the first cloud application as the requested secure cloud transformed electronic document. 19. The method of claim 18 wherein the combining step includes combining the plurality of portions of the cloud storage object into one portion of the requested secure cloud transformed electronic document by extracting information from the plurality of portions of the cloud storage object and placing the extracted information into a pre-determined format for the requested secure cloud transformed electronic document. 20. A system for automatic registration of electronic documents with cloud computing, comprising in combination: one or more target network devices each with one or more processors;one or more server network device each with one or more processors;a cloud communications network;a social media network;one or more non-transitory computer readable mediums on the one or more target network devices and on the one or more server network devices including a plurality of instructions configured for causing the one or more processors to execute a plurality of steps:for receiving an original electronic document on a first application in a non-transitory computer readable medium on a target network device with one or more processors from a social media network via the cloud communications network;for automatically applying via the first application a first set of electronic document registration rules to the original electronic document, wherein the first set of electronic document registration rules include document registration rules applied to all electronic documents being registered via an automatic document registration system, thereby creating a first level modified electronic document;for automatically applying via the first application a second set of electronic document registration rules to the first level modified electronic document thereby creating a second level modified electronic document, wherein the second set of electronic document registration rules include local document registration rules applied only via the first application on the target network device;for automatically transforming via the first application the second level modified electronic document into a secure cloud electronic document storage format using a pre-determined set of electronic document transformation rules thereby creating a secure cloud transformed electronic document;for automatically generating via the first application a plurality of electronic document registration codes for the secure cloud transformed electronic document, wherein the plurality of electronic document registration codes includes an unalterable date and time stamp, an identification code and one or more encryption codes;for securely transferring the secure cloud transformed electronic document with the first application from the target network device via the cloud communications network to a cloud server network device with one or more processors, one or more different databases and a second application executing in a second non-transitory computer readable medium on the cloud server network device;for storing the secure cloud transformed electronic document from the second application on the cloud server network device as a cloud storage object,wherein the cloud storage object comprises a plurality of separate portions stored in a plurality of separate secure storage locations on a plurality of other different cloud server network devices distributed across the cloud communications network but functions as a single secure cloud storage object;for allowing viewing from the second application of the secure cloud transformed electronic document via the target network device and other target network devices each with one or more processors from anywhere on the cloud communications network or on the social media network without the ability to tamper with the information within the secure cloud transformed electronic document thereby providing an automatic secure electronic document registration system on the cloud communications network and the social media network;for receiving a second original electronic document on the first application previously stored in the non-transitory computer readable medium on the target network device, wherein the second original electronic document was previously stored in the non-transitory computer readable medium on the target network device from another server network device with one or more processors on a telecommunications network via the cloud communications network; andfor creating a second secure cloud transformed electronic document with the first application with the second original electronic document.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (79)
Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Tung, Roger D.; Harbeson, Scott L.; Deininger, David D.; Murcko, Mark A.; Bhisetti, Govinda R.; Farmer, Luc J., Inhibitors of serine proteases, particularly hepatitis C virus NS3 protease.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Mitty Todd Jay ; Shoupp Douglas Scott ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary to perform electronic services.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Stephen F. Bisbee ; Jack J. Moskowitz ; Michael W. White, System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.