US 12,443,749 B2
Method and system for fully encrypted repository
Steven Todd Kirsch, Los Altos Hills, CA (US)
Assigned to NEUSTAR, INC., Reston, VA (US)
Filed by Neustar, Inc., Reston, VA (US)
Filed on Apr. 30, 2024, as Appl. No. 18/651,127.
Application 18/651,127 is a continuation of application No. 14/321,495, filed on Jul. 1, 2014, granted, now 11,972,013.
Application 14/321,495 is a continuation of application No. 13/524,432, filed on Jun. 15, 2012, granted, now 8,769,304, issued on Jul. 1, 2014.
Claims priority of provisional application 61/497,865, filed on Jun. 16, 2011.
Prior Publication US 2025/0036801 A1, Jan. 30, 2025
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/31 (2013.01); G06Q 20/08 (2012.01); G06Q 20/12 (2012.01); G06Q 20/38 (2012.01); G06Q 20/40 (2012.01); G06Q 30/0601 (2023.01); G06Q 40/02 (2023.01); H04L 9/40 (2022.01)
CPC G06F 21/6245 (2013.01) [G06F 21/31 (2013.01); G06Q 20/0855 (2013.01); G06Q 20/12 (2013.01); G06Q 20/382 (2013.01); G06Q 20/38215 (2013.01); G06Q 20/3829 (2013.01); G06Q 20/401 (2013.01); G06Q 20/405 (2013.01); G06Q 30/0609 (2013.01); G06Q 40/02 (2013.01); H04L 63/0435 (2013.01); H04L 63/061 (2013.01); H04L 63/08 (2013.01); H04L 63/105 (2013.01); H04L 63/205 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of securely authorizing an electronic transaction by an identity protection system, the method comprising:
receiving a proposed transaction involving a user;
accessing a list of devices associated with the user, the list identifying a plurality of devices that have been preselected by the user, wherein the plurality of devices includes a new device, the new device having been approved by two pre-existing devices in the plurality of devices or approved in advance by a preset time interval by one pre-existing device in the plurality of devices;
causing presentation of (1) the proposed transaction and (2) an option to approve or disapprove the proposed transaction to each respective person using each of the plurality of devices, wherein responses to the presented option, if provided, are transmitted to the identity protection system by the plurality of devices;
receiving the responses from at least a subset of the plurality of devices; and
causing completion of the proposed transaction after a predetermined amount of time if all of the received responses approve the proposed transaction,
wherein the predetermined amount of time is dynamically determined at a time of receiving the proposed transaction,
wherein the predetermined amount of time is based on a security level of the proposed transaction, and
wherein the security level of the proposed transaction is set to a highest security level associated with the plurality of devices.