Browse Prior Art Database

Method and Apparatus for Firewalling and Caching a Digital Footprint

IP.com Disclosure Number: IPCOM000244529D
Publication Date: 2015-Dec-18
Document File: 5 page(s) / 227K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method and system for triple factor authentication to ensure the security of user data. Incorporating a user layer and a cloud layer in the design, the idea is to use a non-repudiable, non-refutable, and non-reputable device, application, or method to uniquely identify an entity.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 41% of the total text.

Page 01 of 5

Method and Apparatus for Firewalling and Caching a Digital Footprint

Users of computer and digital electronics continually generate large amounts of data, much of it personal and confidential; that data is also increasingly vulnerable to hackers and other malicious third parties. Maintaining user privacy via the Internet is a challenge of high priority.

Current solutions focus on storing data more efficiently at centralized locations and grant access across entities , making the risk of information leaks greater. Other solutions focus on the financial aspect of the transactions (e.g., making mobile wallets). The Internet is a labyrinth of data that allows unscrupulous users to hide behind layers of anonymity. It does not guarantee that a specific user was involved or did a specific task online. In addition, current security measures are based on a user's phone, number, email, and a unique identifier, which might not be enough to secure a person's data.

However, personal data such as a telephone number and address, if too difficult to access, might impede emergency assistance getting to a user.

The novel solution is a method and system for triple factor authentication . This solution is designed to distribute the data and reduce the impact of a hack attempt to gather all of the information required to impersonate a user , while also resolve the problem of lack of information access when a user requires emergency services.

The idea is to use a non-repudiable, non-refutable, and non-reputable device, application, or method to uniquely identify an entity. Said entity can be, but is not limited to, a person, device, or legal entity.

The solution works in two layers: user and cloud. The user layer is the key to grant access to the information that is centrally managed by the cloud layer.

The approach is to generate a single device or application, coupled with the method described herein, which:


1. Replaces all of the user profile documentation

2. Grants access to a central store of minimum Personally Identifiable Information (PII)


3. Positively identifies the entity (user)

4. Generates a random identification to a system that requires login

The novel system provides the user the freedom to use any of the current online solutions , but control personal digital footprint in

1


Page 02 of 5

several ways. The PII may be understood as, but is not limited to:

Social media profiles Driver's license number Passport information Medical history Insurance information
Personal profiles for common use devices (e.g., personal computer credentials, web browser settings, site or application credentials, Smart TV, Home Automation, stereo system, etc.)


Financial transaction profiles (e.g., credit cards, banking accounts, etc.)

The system keeps all personal information secured and encrypted within the cloud layer and the hashes provided relate to access level permissions to the data registry. The solution works as a firewall and...