Method and apparatus for storing, sharing, and/or organizing personal information

ABSTRACT

Embodiments of the subject invention relate to systems and methods for presenting and managing user information. Specific embodiments allow creating, editing, presenting, and storing user information. In a more specific embodiment, the systems and methods can be used to provide a digital safe deposit box (DSDB) that allows users to save, maintain, update, and/or share information about themselves and/or their organization. Specific embodiments provide a personal financial solution that is designed for customers interacting with professional institutions, such as accounting firms, banks, and insurance agencies, and/or interacting with family members and people that may need to access certain documents. Embodiments of the invention provide individuals, based on permission granted/allocated to them, access to specific information, while providing safety from fraud.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the benefit of U.S. ProvisionalApplication Ser. No. 61/499,844, filed Jun. 22, 2011, the disclosure ofwhich is hereby incorporated by reference herein in its entirety,including any figures, tables, or drawings.

BACKGROUND OF INVENTION

In the normal course of everyday interactions, there is often a vastamount of information received that must be stored, updated, organized,and/or shared. The ability to organize and update information andretrieve that information is vital. Oftentimes, the information thatmust be maintained is sensitive, confidential, or personal in natureand, if shared, should only be available to select individuals on an“as-needed” basis. For example, a considerable amount of information isreceived and maintained regarding various financial matters. A varietyof information such as checking account statements, tax returns,insurance information, and loan information, is kept by most individualsor organizations. Sometimes it is necessary to share certain types ofinformation during interactions with professional institutions, such asaccounting firms, banks, and insurance agencies, as well as with familymembers, trustees, attorneys, and other individuals that may be involvedwith our finances and/or other personal information.

Most individuals or organizations utilize computers to keep track of andmaintain their information. Accordingly, most information is digitizedin some computer readable format and stored on some type of computer ormemory storage device. However, if the information needs to be shared,it is often either printed again or transferred to a portable computerreadable format (e.g., CD, DVD, flashdrive, etc.) and transported to theindividual that needs to see it. This can be a time-consuming process.But, more importantly, the information may no longer be secure andsubject to inappropriate or unauthorized dissemination once it isremoved from the computer.

Accordingly, there is a need for centralized, user controlled,information storage that allows users to store, organize, and shareinformation. There is also a need for users to be able to control whohas access to particular information and control how long they have suchaccess.

BRIEF SUMMARY

Embodiments of the subject invention relate to systems and methods forpresenting and managing user information. Specific embodiments allowcreating, editing, presenting, and storing user information. In a morespecific embodiment, the systems and methods can be used to provide adigital safe deposit box (DSDB) that allows users to save, maintain,update, and/or share information about themselves and/or theirorganization.

Specific embodiments provide a personal financial solution that isdesigned for customers interacting with professional institutions, suchas accounting firms, banks, and insurance agencies, and/or interactingwith family members and people that may need to access certaindocuments. Embodiments of the invention provide individuals, based onpermission granted/allocated to them, access to specific information,while providing safety from fraud.

In particular embodiments, the subject invention provides accountingsoftware for accumulation of transactions that provide the capabilitiesand resources to do one or more of the following:

-   -   Online storage of important document(s)    -   Customer friendly interactive software to create and manage        personal financial statements    -   Each customer can create one or more financial profile(s)    -   Allow peace of mind for customers that their documents are        active, stored, filed, and organized in an easily accessible        manner.

Advantageously, embodiments of the subject DSDB are designed to performa dual role for users, as a secure method of allowing access tonecessary information by professionals at professional institutions,such as accounting firms, banks, and insurance agencies, as well asallowing access to certain information to people, such as personalfamily members, trustees, attorneys, and other important peopleassociated with the user's personal financial situation.

Utilizing the embodiments of the subject invention, trusted individualsor financial advisors can be given limited access to any DSDB, orindividual file within a DSDB. Permission is specific to an individualand can be time limited, enabled, or revoked at any point by theuser/account owner.

BRIEF DESCRIPTION OF DRAWINGS

In order that a more precise understanding of the above recitedinvention can be obtained, a more particular description of theinvention briefly described above will be rendered by reference tospecific embodiments thereof that are illustrated in the appendeddrawings. Thus, understanding that these drawings depict only typicalembodiments of the invention and are not therefore to be considered aslimiting in scope, the invention will be described and explained withadditional specificity and detail through the use of the accompanyingdrawings in which:

FIG. 1 shows a schematic of a specific embodiment of the subjectinvention.

FIG. 2 illustrates an example layout for a Home web page in accordancewith an embodiment of the subject invention.

FIG. 3 illustrates an example layout for an “Into video” web page inaccordance with an embodiment of the subject invention.

FIG. 4 illustrates an example layout for a “How it works” web page inaccordance with an embodiment of the subject invention.

FIG. 5 illustrates an example layout for a “Personal Financial StatementDetails” web page in accordance with an embodiment of the subjectinvention.

FIG. 6 illustrates a “Personal Financial Statement Form” web page inaccordance with an embodiment of the subject invention.

FIG. 7 illustrates a “Default Vaults” web page in accordance with anembodiment of the subject invention.

FIG. 8 illustrates an example layout for a “Vault Create form” web pagein accordance with an embodiment of the subject invention.

FIG. 9 illustrates the interactions between individuals and/or entitieswith respect to an embodiment of the subject invention.

FIG. 10A shows a schematic of a system utilizing a cloud serverinfrastructure with respect to an embodiment of the subject invention.

FIG. 10B shows a schematic of a system utilizing a dedicated serverinfrastructure with respect to an embodiment of the subject invention.

FIG. 11 shows a workflow for a professional interacting with a system inaccordance with an embodiment of the subject invention.

FIG. 12 shows a workflow for a client interacting with a system inaccordance with an embodiment of the subject invention.

FIG. 13 shows a Personal Financial Statement workflow with respect to anembodiment of the subject invention.

DETAILED DISCLOSURE

Embodiments of the subject invention relate to a method and apparatusfor saving, storing, maintaining, updating, sharing, and/or organizingpersonal information. Specific embodiments incorporate financialinformation. Specific embodiments of the subject invention pertain to asoftware-as-a-service (SaaS) product designed for individuals,businesses, organizations, and/or other groups to save, store, maintain,update, share, and/or organize financial and/or personal information forsafekeeping. In one embodiment, a user can control who has access to,what information they have access to, when they have access, and howlong they have access to the information. In more particularembodiments, financial information is stored in various folders andorganized as a “Digital Safe Deposit Box” (DSDB).

The following description will disclose that the subject invention isparticularly useful in the field of personal computing, in particularthe use of personal computers and related software and/or hardware forstoring, sharing, and organizing information for the purpose ofproviding select access to such information. However, a person withskill in the art will be able to recognize numerous other uses thatwould be applicable to the devices and methods of the subject invention.While the subject application will proceed with describing embodimentsfor personal use, other modifications apparent to a person with skill inthe art and having benefit of the subject disclosure are contemplated tobe within the scope of the present invention.

In an embodiment, one or more steps of a method for creating, storing,sharing, and organizing a DSDB are performed by one or more suitablyprogrammed computers. In a particular embodiment, at least one of thesesteps is preformed by the one or more suitably programmed computers.Computer-executable instructions for performing these steps can beembodied on one or more computer-readable media as described below. Inan embodiment, the one or more suitably programmed computers incorporatea processing system as described below. In an embodiment, the processingsystem is part of a single user system, multi-user system, intranetsystem or internet (World Wide Web) system.

In an embodiment, computer-executable instructions for providing a userinterface can be embodied on one or more computer-readable media asdescribed below. In an embodiment, the interface can be presented on oneor more suitably programmed computers. In an embodiment, the one or moresuitably programmed computers incorporate a processing system asdescribed below. In an embodiment, the processing system is part of partof a single user system, multi-user system, intranet system or internet(World Wide Web) system.

In an embodiment, one or more components of a data structure for anembodiment of the subject DSDB is embodied on one or morecomputer-readable media as described below. In an embodiment, the datastructure can be accessed via one or more suitably programmed computers.In an embodiment, the one or more suitably programmed computersincorporate a processing system as described below. In an embodiment,the processing system is part of part of a single user system,multi-user system, intranet system or internet (World Wide Web) system.

As used herein, the terms “user” or “client” refer to, withoutlimitation, individuals, groups, organizations, or other entitiesutilizing the herein described embodiments of the subject invention.Thus, while the embodiments disclosed herein are explained withreference to individual use, it should be understood that theseembodiments can also be used to store, share, and organize any of avariety of types of information for any type of user or client.

The present invention is more particularly described in the followingexamples that are intended to be illustrative only since numerousmodifications and variations therein will be apparent to those skilledin the art. As used in the specification and in the claims, the singularfor “a,” “an” and “the” include plural referents unless the contextclearly dictates otherwise.

With reference to the attached figures, which show certain embodimentsof the subject invention, it can be seen that the subject inventioncomprises embodiments of a Digital Safe Deposit Box (DSDB) that can beorganized in any of a variety of ways. In one embodiment, a DSDB can beorganized as follows:

-   -   Tax Returns—arranged by year, and each year will have all tax        returns named by the client in a PDF file.    -   2. Insurance—arranged by type of insurance, named by the client        in a PDF file.    -   3. Estate Planning—arranged by date, named by the client in a        PDF file.    -   4. Miscellaneous—arranged by date, named by the client in a PDF        file, and includes important information not fitting in other        files.    -   5. Personal Financial Statements—arranged by date, named by the        client in a PDF file. Users can create and store information        pertaining to a financial statement. A CPA can attach a report        letter to the Personal Financial Statements.

Although embodiments are described that store documents as PDF's, otherfile formats for storing documents that are known in art, such as WORDand JPEG, as well as many others, and can be utilized with embodimentsof the subject invention.

In one embodiment, a graphical user interface (GUI) is utilized tointeract with the DSDB. In a more specific embodiment, a personalcomputer is utilized to interface with a GUI arranged in the format ofan internet website with various pages for displaying information andallowing various interactions with the DSDB.

In one embodiment, content and data existing on the internet isexpressed on web pages as an organization of text and graphicalinformation, some of which is configured as interactive hyperlinks, allof which can be formatted using HTML for presentation to an end user'sPC via HTTP communication protocols.

FIG. 1 shows a schematic of an embodiment of the subject invention. Theclient 1, which can be, for example, an individual, business entity, orother group or entity, can interconnect with a system, such as a DSDB 4,in order to grant access to one or more individuals or business entities2, such as an attorney, an accountant, a law firm, a bank, an insurancecompany, a family member, and/or a trustee, in order to allow suchindividual or business entity full or partial access to information,documents, financial information, financial documents, legalinformation, legal documents, and/or other materials stored, accessedby, filed, or otherwise controlled by the system. Such access can becharacterized by a status of the individual or entity, can be specificto the individual or entity, can be limited to viewing only, can allowability to update and/or amend, can be limited in time (time period,length of time), can be limited to certain documents or information, canbe limited to certain type(s) of information or documents (legal,financial, personal, business), or otherwise controlled. The informationand/or documents 3, such as a financial document shown in FIG. 1, can bestored in the system and/or accessed by the system. Specificembodiments, such as shown in FIG. 1, can allow the client and/or one ormore individuals or entities to access one or more of the documentsand/or information outside of the system. As an example, the system canhave access to a client's tax return, to which the client and/or theclient's accountant may also have independent access, as shown in FIG.1.

Again, referring to FIG. 1, an embodiment of the subject invention isshown where a professional 2 uploads a document 3 on behalf of theclient 1. The client 1 is notified and promoted with a link to takeownership of the document 3. The client can grant access to the documentto one or more professionals, including or not including theprofessional that uploaded the document. The client can see theprofessionals that have access to the document. In a specificembodiment, one or more of the professionals having access to thedocument cannot see which other professionals have access to thedocument. The client can revoke access to the document for any of theprofessionals previously granted access without revoking access to thedocument for one or more other professionals to whom access has beenpreviously granted, such that access for each professional can beseparately controlled. The system can selectively allow one or more ofthe client and the various professionals to be allowed access to read,add, and/or remove documents and/or information. A preferred embodimentmaintains a record of any modification, such as adding, removing, orediting, of a document by the client and/or professional user bystamping the modification on a duplicate of the document to preserve anaudit trail of which user modified the document and when the documentwas modified.

In order to better facilitate an understanding of the embodiments of thesubject invention, a number of screen shots of exemplary web pages foruse by a user will now be described. More specifically, a number ofscreen shots of exemplary web pages for use by a user in an embodimentof a DSDB system will now be described. For purposes of description ofthis embodiment, references to the actions of a user or client of theDSDB system should be understood to mean actions that are taken on oneor more of the web pages. These web pages demonstrate how portions ofsuch a system may be constructed as well as illustrate how some of themethods for presenting entity information described may be realized inpractice. These descriptions of specific embodiments are intended to beillustrative, but not limiting, of the scope of the present invention asset forth in the claims. One of ordinary skill in the art wouldrecognize many other modifications and alternative embodiments. Inparticular, while a web page graphical user interface (GUI) isdescribed, many other types of computer programs, routines, andinterfaces may be used to implement the DSDB system or any of thedescribed methods. With reference to FIG. 2, it can be seen that in oneembodiment that initiation of the GUI is in the form of in opening HomePage 20. The Home page 20 can display all of the available menu items ofthe website. In one embodiment, the Home page 20 includes page tabs 21that can be activated, such as, but not limited to, the following:

-   -   What is this? (30): describes about the product personal        financial statement and its goal    -   Into video (40)    -   How it works (50)    -   Company (60)    -   Sign up (70)    -   Log in (80)

In a further embodiment, a footer 22 at the bottom of the Home Page 20can include various GUI activation buttons that can be activated by auser to display information, such as, for example, a privacy policy,terms of use, a Frequently Asked Questions (FAQ) page(s), a site map,and an “About Us” page that can display company information, history,contact information or other information.

In a further embodiment, the Home Page 20 comprises a display area 24 inwhich the page tabs can display various information as it is activated.Thus, the Home Page 20 and all associated activation tabs, buttons, etc.can be viewable at all times. In one embodiment, a user can switchdisplays or activate multiple overlying displays by activating multipletabs and/or footer buttons.

In a further embodiment, the page tabs 21 when activated will displaydrop-down menus from which the client can make a selection. Upon makinga selection, an appropriate sub-page will appear within the display area24.

In an embodiment, a web page showing the results of selecting the “Whatis this?” tab 30 on the home page 20 will display information about theproduct and its intended use(s) within the display area 24.

FIG. 3 illustrates an example of a web page showing the results ofselecting the “Intro Video” tab 40 on the home page 20. In oneembodiment, one or more video selection icons 42 are made available tothe client. Selecting one of the icons will display the sample videosthrough which one can learn about how it works for personal financialstatements. In one embodiment, the selected video will play within a“thumbnail” screen in the display area.

In a specific embodiment, a user can select by clicking on intro videomenu, which will display a sample video related to product. Here userscan watch before login or signup. In one embodiment, some sample videosare provided to let users know more about the personal financialplanning. In another embodiment, a video explains how to create ormanage the personal financial statements in easy manner. In a particularembodiment, clicking video icons causes them to play.

FIG. 4 illustrates an example of a web page showing the results ofselecting the “How it works” tab 50 on the home page 20. In oneembodiment, a submenu 25 includes one or more activating icons 23 thatwill be displayed in the display area. Selecting one of the activatingicons 23 will provide information associated with that icon. In oneembodiment, one or more Feature icons 52 is displayed that when selectedwill display information about a particular feature of the product. In afurther embodiment, an Overview icon 54 can be displayed as part of thesubmenu 25 in the display area. Selecting this icon can display overviewinformation and explanations about the product and the features of theproduct.

An example of a web page showing the results of selecting the “Company”tab 60 on the home page 20 can provide information about the companypresented within the display area 24. In a further embodiment one ormore icons can be displayed in the display area 24. For example,leadership details, news updates about the company, latest events,pictures and/or a list of people associated with the company can beprovided.

In a particular embodiment, illustrated in FIG. 4, a submenu 25 can bedisplayed with various icons that can be selected to obtain particularinformation. In one embodiment, a “Leadership” icon 62 is presentedthat, when selected, will display details about the people who areassociated with the website or the company. In a further embodiment, a“News updates” icon is presented that, when selected will display thenews, events organized, and updates with pictures about the company.

An example of a web page showing the results of selecting the “Sign up”tab 70 on the home page 20 can allow a user to register. In oneembodiment, users can register to the site by completing a registrationform that will be presented within the display area 24. In a furtherembodiment one or more icons pertaining to registration can be displayedin the display area 24. In a particular embodiment, a submenu 25 can bedisplayed with various icons and/or data entry text boxes 27 that can beselected to complete or provide particular information, such as an emailaddress. In a still further embodiment, certain information can bemandatory in order to complete the registration process.

Table I illustrates examples of activation icons that can be included ina submenu, including, but not limited to data entry text boxes 27, mouseover buttons 29 or radio buttons 28 in the display area 24 and examplefunctions:

TABLE I Field Manda- Name tory Type/Action Validations Email yes Textboxto input It should accept either text or alphanumeric value, firstletter should be text. Confirm Yes Text box to input It should accepteither text or email alphanumeric value, first letter should be text.Password Yes Text box to input Allow numeric/alpha numeric Confirm YesText box to input Allow numeric/alpha numeric password Submit No Buttonto click On click it should save the text box values into DB after somevalidations. Cancel No Button to click On click, it will cleat the textbox values and focus will go to first textbox

An example of a web page showing the results of selecting by clickingthe “Log in” tab 80 on the home page 20 can allow a user to login. Inone embodiment, users can use this web page and the information thereonto log into the service, once they have completed the registrationprocess. In a further embodiment one or more activation icons 23 can bedisplayed in the display area 24. In a particular embodiment, a submenu25 can be displayed with various activation icons 23 that can beselected to obtain or complete particular information. In a stillfurther embodiment, certain information can be mandatory in order tocomplete the registration process.

Table II illustrates examples of activation icons that can be includedin a submenu, including, but not limited to data entry text boxes 27,mouse over buttons 29 or radio buttons 28 in the display area 24 andexample functions:

TABLE II Field Manda- Name tory Type/Action Validations Email yes Textbox to input Password Yes text box to input Remember No Radio/option Onclick me Button It should save the login To click credential for thenext login on same computer Login Yes Button to click On click, itallows to enter into website, if login credential not matched, it shouldshow an error. Cancel No Button to click On click It should clear thetext box values and focus goes to first text box Forgot No Clickablelink On click it should take user password to recovery password page.

An embodiment of a Password Recovery web page 100 showing the results ofselecting the “Forgot password” icon 86 on the Log-in page 80 can allowa user to input the user's password. The information associated withthis webpage is used to assist clients in recovering lost/forgottenpasswords. In one embodiment, users can input identifying informationinto a Password recovery form and complete other identifying informationthereon to log into the service, once they have completed theregistration process. In a further embodiment, certain information canbe mandatory in order to complete the recovery process. In still afurther embodiment one or more icons 23 can be displayed in the displayarea 24.

Table III illustrates examples of activation icons that can be includedin a submenu, including, but not limited to data entry text boxes 27,mouse over buttons 29 or radio buttons 28 in the display area 24 andexample functions:

TABLE III Field Manda- Name tory Type/Action Validations Email YesTextbox to input It will check whether entered email id is in correctformat or not? Send Yes Button to click It should send the password topassword users email account, if values entered is not in correct emailformat, should display an error

In addition to the above-described tab-associated web pages, additionalweb pages can be provided under each tab that can allow a client tointeract with other aspects or options of the product. Following areembodiments of some additional web pages that can be utilized with theproduct:

I. Member Home Web Page

An embodiment of a Member Home Page 110, after being logged in, can havefollowing selectable options shown on the screen:

Profile

Docs

Vaults

Trusted Parties

Table IV illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE IV Field Manda- Name tory Type/Action Validations Profile NoMouseover It should display the two options ‘view profile’ and ‘updateprofile’. Docs No Mouseover It should list all the available documentsVaults No MouseOver It should list all the vaults available. TrustedParties No Mouseover It should list all the trusted parties that amember is having

II. Profile—View/Update Web Page

A Profile Page 120 can allow a client to make changes, updates, orcorrections to their profile. In one embodiment, a mouse over button canbe used. In a specific embodiment, using a mouse over button on theProfile button 122, allows one to view his/her profile. Also they canupdate their profile on selecting update profile option.

Table V illustrates examples of activation icons that can be included onthis page such, for example, in a submenu, including, but not limited todata entry text boxes 27, mouse over buttons 29 or radio buttons 28 inthe display area 24 and example functions:

TABLE V Field Manda- Name tory Type/Action Validations Profile - view NoOnClick It should display the profile Member's profile Profile - updateNo OnClick It should open a member profile profile that can be updated.

III. Profile—Update Form Web Page

A Profile Update web page 130, upon selection of update profile option,can show a profile update form to allow a client to update/modifyhis/her profile, which can include name, company, address, and otherrelated profile information.

Table VI illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE VI Field Manda- Name tory Type/Action Validations Salutation YesTextbox to input It will allow choosing salutation from combo box. FirstYes Textbox to input It should allow to enter Name the first name ofmember, should accept alphabetic or alphanumeric Middle Yes Textbox toinput It should allow to enter Name the middle name of member, shouldaccept alphabetic or alphanumeric Last Yes Textbox to input It shouldallow to enter Name the last name of member, should accept alphabetic oralphanumeric . . . . . . . . . . . . Update Yes Button _ Onclick It willsave/update the modified data. Cancel No Button _ Onclick It will returnto previous screen,

IV. Docs—Browse Web Page

An embodiment of a Documents Browse Page 140, upon selection of a Doesicon 142, can list all documents. Then using the Browse option, one canselect a Doc and see a related documents details, such as, but notlimited to, when the particular document has been added, who added,whether this document exists in the vaults and who has access to it.Also one can manage these documents, such as adding a document or makethem part of an archive.

In a further embodiment, when a client selects the Browse option 144,two sub options will appear:

1. Doc details

2. Manage

Upon selecting different Doc details, the following screens will appearwith details of particular document with their metadata.

V. Document Details Web Page

An example of a Document Details page 150, which can appear in thedisplay area 24 when a Document Details icon is selected, can displayinformation regarding the selected document, such as who created thedocument, when the document was added and/or last updated, which vaultsthe document exists in, and which parties have access to the document.

Table VII illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE VII Field Manda- Name tory Type/Action Validations Doc name yes —It should display the document name Added by yes — It should display theadded by person name Added on Yes — It should display the added on date.Exist in Yes — It should display whether the these vaults documentexists in present vaults in the system Accessed by Yes — It should showthe status that other parties whether it can be accessed by otherparties. Back Yes Button_Onclick It should take the user to previousscreen

In one embodiment, when selecting, such as by clicking, on Manageoption, two sub options will appear.

In one embodiment, a first option is the ‘Doc details’ explained inrelation to the screen above and second is ‘Manage’ icon, describedbelow. In a further embodiment, using this option either allows a clientto select or add a new document or the client can archive a documentrather than deleting it. In an embodiment, documents are not deletable,but only archivable.

VI. Personal Financial Statements Web Page

A Personal Financial Statements web page 160 can be provided to theuser. In one embodiment, on selection of Personal Financial Statements(PFS) on this page, all PFS will be listed. In a further embodiment, byusing Browse option which appears, one can see the PFS details. Also onecan create a new PFS by filling in a new PFS form. In a specificembodiment, one or more mouse over buttons 29 can be used to select aparticular PFS. The mouse over button can then activate a drop-down menuthat can provide options, such as, but not limited to, browse the PFS orcreate a new one.

In one embodiment, when using a mouse over button on any PFS icon, twooptions will be shown and on selecting, such as, for example, byclicking, on ‘Browse’ sub option, a screen, such as shown, for example,in FIG. 16, will display with Personal Financial statement detail page170, for a PFS which has been selected. On clicking on ‘Create’ suboption, create new PFS form page, a PFS Details page, such as shown, forexample, in FIG. 16, will open and user can enter all details in it. Inone embodiment, it can be either joint or individual PFS, which meansmore than one person can have access to a PFS.

Whenever a client selects, such as by clicking the Submit/Create buttonof the PFS form, entered data will be saved to DB, and will be saved asa PDF file as well.

Table VIII illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE VIII Field Manda- Name tory Type/Action Validations Back YesButton_Onclick It should take user to previous screen.

FIG. 6 shows an example of a Personal Financial statement form web page180.

Table IX illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE IX Field Manda- Name tory Type/Action Validations Name Yes Textboxto input It will allow user to enter alphabetic or alphanumeric valuesDate Yes Textbox to input It should allow user to enter date inprescribed format Create Yes Button_Onclick It will save the entereddata to create a new PFS Cancel No Button_Onclick It will take the userto previous screen. Different fields will allow user to enter values tofill in new PFS form

VII. Vaults—Vault List

On selecting, such as by clicking, on ‘Vaults’ option it will display avault list web page, which exists in the system. On selecting, such asby a mouseover, on any vaults it can show two sub options:

1. Default Vaults

2. Browse

3. Create

A web page can be provided to the user for selecting different vaults.

Table X illustrates examples of activation icons that can be included onthis page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE X Field Manda- Name tory Type/Action Validations Vault1 NoMouseover It should display the clickable options, Browse & Create.Vault2 No Mouseover It should display the clickable options, Browse &Create Vault . . . n No MouseOver It should display the clickableoptions, Browse & Create

VIII. Vaults—Vault Detail—Browse—Doc Detail Page

On selecting, such as by clicking, on ‘Vaults—Browse—Vault Details’option, there can display the vault documents details web page 200.Information regarding a document can include, for example, metadata suchas a date the document was added, who the document was added by, anytags, and/or access history information such as name of individual orentity that have accessed the document, the time and date of the access,and the title of the document. This web page can include the followingoptions.

Browse—ability to display the doc details under that vault

Add new Vault—Ability to add new vault

Vault email address—shows email address of particular vault

Trusted Parties—list of trusted parties related to particular vaults

Manage—ability to show how to manage the vaults

Table XI illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions:

TABLE XI Field Manda- Name tory Type/Action Validations Doc details yesonLoad Remove this No Button_Onclick On click, it will remove doc theexisting document, whose details are listed.

IX. Vaults—Default Vaults Page

On selecting, such as by clicking, on ‘Vaults—Default Vaults’ option,there can be displayed the default vaults details web page 210, such asshown, for example, in FIG. 20.

Table XII illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XII Field Manda- Name tory Type/Action Validations Back to YesButton_Onclick On click, it will take user Vault Details to vaultsdetail page.

X. Vaults—Vault Detail—Manage

On selecting, such as by clicking on ‘Vaults—Vaults—Manage’ option,there can be displayed the following four options that a client can useto manage the vaults:

-   -   Grant—ability to add access to friends/family/relatives    -   Archive—Archiving the Vault rather than delete    -   Invite—Invite people to join the vaults    -   Notifications—ability to send Notifications to trusted parties

On selection of Grant option, there will open a grant form web page 220.The grant form page can allow for entry of an email address, permissionsgranted, such as read only, add to, and/or remove form, and anexpiration date for the granted access.

Table XII illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XIII Field Manda- Name tory Type/Action Validations Email yes Textbox_Input It allows entering email, if it is not in email addressformat, it will not accept the value. Permis- Yes ComboBox_Selection Itallows to select yes/no sion - values Read Permis- YesComboBox_Selection It allows to select yes/no sion - values Add Permis-Yes ComboBox_Selection It allows to select yes/no sion - values RemoveSave Yes Button_Onclick It saves the grant from data to DB. Back NoButton_Onclick It takes the user to back page where they were earlier.

On selection of a Notifications option, there will open a Notificationform web page 230, which can allow entry of when to notify trustedparties, such as never, whenever documents are added, whenever documentsare removed, and/or other options.

Table XIV illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XIV Field Manda- Name tory Type/Action Validations Never YesComboBox_Selection It allows user to select the values yes/no forNotifications, Whenever docs Yes ComboBox_Selection It allows user toselect are added the values yes/no for Notifications, Whenever docs YesComboBox_Selection It allows user to select are removed the valuesyes/no for Notifications, Save Yes Button_Onclick It saves the grantfrom data to DB. Back No Button_Onclick It takes the user to back pagewhere they were earlier.

XI. Vaults—Vault Create Form

On selecting, such as by clicking, on ‘Vaults—Create Form’ option itwill display a Vault Create form web page 240, used to create a newvault and ask for document and trusted parties, such as shown, forexample, in FIG. 6.

Table XV illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XV Field Manda- Name tory Type/Action Validations Name of yes Textbox_Input — vault Initial Yes Multiline It should allow more than docstextbox input one line input while creating a new vault using existingdocs which are stored on hard disk Initial Yes Multiline It should allowmore than trusted textbox input one line input - user can parties addthe trusted parties details either they exist in system or can add newone Create Yes Button_Onclick It saves the new vault details data to DB.Back No Button_Onclick It takes the user to back page where they wereearlier.

XII. Members Home—Trusted Parties

On selecting, such as by clicking, on a ‘Members home—Trusted parties’option, there will display the trusted parties list web page 250, whichshows a list of individuals added/exists in system for the user whologged in.

Table XVI illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XVI Field Manda- Name tory Type/Action Validations Trusted NoMouseover It should allow user to check all parties the trusted partieslist exist in the system for the particular user. Trusted Yes MouseoverIt should allow user to show the party 1 ‘Browse’ & ‘Manage’ options touser so the user can get trusted party details and manage them. TrustedYes Mouseover It should allow user to show the party 2 ‘Browse’ &‘Manage’ options to user so the user can get trusted party details andmanage them. Trusted Yes Mouseover It should allow user to show theparty 3 ‘Browse’ & ‘Manage’ options to user so the user can get trustedparty details and manage them. Trusted Yes Mouseover It should allowuser to show the party . . . n ‘Browse’ & ‘Manage’ options to user sothe user can get trusted party details and manage them.

XIII. Members Home—Trusted Parties—Browse—Trusted Parties Details

On selecting, such as by clicking, on ‘Trusted parties—Browse’ option,there will display the particular trusted party details web page 260,which can show details such as the trusted parties' names, company,relationship to client, date added, and/or other information.

Table XVII illustrates examples of activation icons that can be includedon this page, such as, for example, in a submenu, including, but notlimited to data entry text boxes 27, mouse over buttons 29 or radiobuttons 28 in the display area 24 and example functions

TABLE XVII Field Manda- Name tory Type/Action Validations Back NoButton_Onclick It takes the user to back page where they were earlier.

XIV. Members Home—Trusted Parties—Manage—Grant Form

On selecting, such as by clicking, on ‘Trusted Parties—Manage’ option,there can be displayed options such as the three options:

-   -   Grant    -   Invite    -   Remove

In one embodiment, on selecting, such as by clicking, the ‘Grant’option, there will open a grant form web page, where a client can fillthe friends/family members/relative's details, whom they want to grantthe access to for this PFS. The granted access can be for read, adding,and/or removing documents and/or information, and can include a timelimit, a time period, and/or an expiration date for such access.

In one embodiment, on selecting, such as by clicking the ‘Invite’option, the client will be asked the email ID for the friends/familymembers/relative's whom client can invite to grant access for a PFS.

In one embodiment, on selecting, such as by clicking on ‘Remove’ option,a client will have the ability to remove the grant for particulartrusted parties for his PFS.

Table XVIII illustrates examples of activation icons that can beincluded on this page, such as, for example, in a submenu, including,but not limited to data entry text boxes 27, mouse over buttons 29 orradio buttons 28 in the display area 24 and example functions

TABLE XVIII Field Manda- Name tory Type/Action Vaiidations Email yesText box_Input It allows entering email, if it is not in email addressformat, it will not accept the value. Permis- Yes ComboBox_Selection Itallows to select yes/no sion - values Read Permis- YesComboBox_Selection It allows to select yes/no sion - values Add Permis-Yes ComboBox_Selection It allows to select yes/no sion - values Remov

Expiration Yes Date field It allows the user to set date the grantedaccess expiration date for particular person. Save Yes Button_Onclick Itsaves the grant from data to DB. Back No Button_Onclick It takes theuser to back page where they were earlier.

indicates data missing or illegible when filed

FIG. 9 shows the user levels that can be implemented by a specificembodiment. An administrator can have power to interact withprofessionals, such as create and/or delete a professional, and can havethe power to interact with the client, such as to create and/or delete aclient. Professionals can be, for example, one of several categories ofprofessional, such as a CPA, banker (not shown), lawyer, insuranceagent, financial advisor (not shown), broker, realtor, or other. In thisembodiment, all professionals have the same powers. In alternativeembodiments, multiple classes of professionals can be created, eachclass with a specific set of powers. areas an example, CPA's that aretrusted can be given access to financial documents, but not otherdocuments. Likewise, lawyers that are trusted can be given access tolegal documents and not other documents. Such differentiated powers canalso be applied to insurance agents, brokers, realtors, bankers, and/orother sorts of professionals. In a further specific embodiment,documents can be categorized and each profession can selectively begiven access to documents under each category. As an example, a certainprofessional could be given access to financial, and tax documents, butnot to insurance, brokerage, real estate, or other documents, whileother professionals have different permutations of access. The thirduser level is the client. The administrator has power over theprofessionals and the client, indicated by the one-way arrows. Theprofessionals and the client have a two-way relationship, shown bydouble headed arrows, where the professional can take actions on behalfof the client, such as upload files and change personal information, andthe client can take actions affecting the professionals, such as add oneor more permissions. Accordingly, FIG. 9 shows how multipleprofessionals, such as CPA's and bankers, can be connected through theclient. The client can create a trusted relationship with the CPA, andcreate a trusted relationship with the banker, and then the CPA and thebanker have a mediated relationship through the client.

Referring to FIG. 10A, in a specific embodiment, the primary serverinfrastructure is a cloud infrastructure. The bottom of FIG. 10A showsvarious ways the user can interact with the system, such as an HTTPbrowser, a web browser, a desktop application, and a mobile, phone, ortablet application. The HTTP browsers, other applications, or other userinterface that the user interfaces with connects through World Wide Webinfrastructure to a reverse proxy. The reverse proxy then connects to anN-tier application server. There can be as many application servers asare necessary. The reverse proxy performs load balancing and sendingfiles to the appropriate application servers as needed. Then, actionsthat need to be taken on the application servers may involve queryingthe databases. When such queries occur, these application servers, asshown by the arrow to the right, fire off to the Amazon S3. As anexample, the application server can put cached requests over in AmazonS3 or keep cached requests on the application server. Databases can bepooled across each other in replication. There is also, on all levels,the stack from the database server, the application server, and thereverse proxy. To the left, there are backups being done for thedifferent server configurations. The application server writes to AmazonS3, which can be files uploaded from the user, cache, and/or differentassets. Amazon S3 is also shown to be backed up to an Amazon S3 backup,and Amazon S3 can serve many of the files straight to the reverse proxy,so that for many actions, if the data or files are cached, the actionhas been done before, the application or database servers may not needto be involved.

FIG. 10B shows an embodiment similar to the embodiment of FIG. 10A,utilizing dedicated servers instead of cloud servers. The same stack isused as was used in FIG. 10A, of reverse proxy, N application servers,database servers, and the stack is in the same general configuration,with dedicated hardware replacing the cloud hardware. A dedicated serverinfrastructure can be used, for example, when a company wants to runin-house or behind whatever firewall they desire, as the Amazon S3 isreplaced with a dedicated file server with its own backup file server.

FIG. 11 shows a flow chart for the professional workflow, which showshow a professional interacts with the system. At the bottom left of FIG.11, a welcome screen or dashboard of existing clients is shown to theprofessional after logging on. The professional dashboard can show alist of clients with email links and a field showing whether client isactive, and can have a tab for adding a client and a tab for downloadinga basic document. If it is the first login, the professional has toagree to a terms of service, change his/her password, which istemporarily set by the administrator when the administrator sets up theaccount for the professional. The professional has to confirminformation, in the example of a CPA this might be his/her firm'sinformation, addresses, phone numbers, and signature, which would beused in other parts of the work flow. After the confirmations, thesystem takes them back to the dashboard of existing clients. If theprofessional wants to add a client, the professional can do so on thisscreen. The client contact information can be entered. In an embodiment,the client's email address is required. Once the client has been addedand the client's contact information entered, an invitation email, orother form of invitation, is sent to the client, offering to create anaccount and have a trusted relationship with the professional who isrequesting to add the client. Referring back to FIG. 11, if theprofessional has an existing customer, then the professional can clickon that client and go to a client profile, which shows the client'sshared documents. seethe client profile shows the documents that areshared with the professional. The client can have other documents thatare not shared with the professional that logged in, but the logged-inprofessional is only shown the documents that are shared with theprofessional that is logged in.

If the document exists, the professional can click on, and view, thedocument. Certain information about the document is shown. The encryptedversion can be retrieved. The finalized document can be viewed, as wellas other details not indicated in FIG. 11, and the professional caninput comments regarding the document. about the document can beencrypted and the creation of, viewing of, amending of, the document canbe time stamped. The professional can also see what other professionalshave access to this document, as well as who uploaded this document andwhen. For example, the document may have been uploaded by the client, oruploaded by this or another professional on behalf of the client. Thiscan be very important for the audit trail, so it is clear exactly whouploaded the file and when and/or who viewed and/or amended the file ordocument.

Referring back to FIG. 11, the client profile, if the document does notexist, the professional can add document. The professional can click atab for adding a document. Further, the professional can select one ofthe vaults the document is going to go into, and some other options forsome meta. The professional then chooses a file or document type. Theprofessional saves changes, and uploads the document. Encryption of thedocument can occur upon loading the document, and the document can beplaced into Amazon S3 or other server. In this way, only the client hasaccess to that the document, as well as professionals with a trustedrelationship to this specific client, who have access through theclient. When the professional requests the document, the system checkswho (which client) owns this document, and checks whether theprofessional requesting the document has a trusted relationship with theclient who owns the document. If the professional has a trustedrelationship, the professional can see the document, and, if not, theprofessional cannot see the document. In further embodiments, theprofessional may not be able to see all of the client's documents eventhough the professional is in a trusted relationship, but, rather, theprofessional is only able to see documents that are of a type theprofessional has been granted access to, such as legal versus financial,or specific documents for which the professional has been grantedaccess.

Referring to FIG. 12, a flow chart for a client login is shown. Afterlogin, the client goes to a welcome screen. The client follows a similarpath to the professional when it is a first login, namely, create termsof service, change password, and confirm personal information. Once theclient logs in, the client is brought back to the welcome screen. Theclient is shown the existing documents and can click on one to view it.The client can also share the document with a professional. A list ofprofessionals can be shown to the client, broken down into a list ofprofessionals that the client has a trusted relationship with and a listof other professionals in the system that the client does not currentlyhave a trusted relationship. with. These professionals that do not havea trusted relationship with the client do not have access to thedocument. If the client wants to share, or create a trustedrelationship, with a specific professional who does not currently have atrusted relationship with the client, the client can click the sharebutton. Once the client clicks the share button, the professional isshown as having a trusted relationship with the client. The client thenhas the option to unshared with this professional, or any otherprofessional the client has a trusted relationship with.

Referring again to FIG. 12, if a client wants to share a document with aprofessional, and the professional has a trusted relationship with theclient, the client can click the share button and it toggles the shareon. If there is not an existing trusted relationship with theprofessional, the client can create a trusted relationship by utilizingthe manage relationships screen, which shows other professionals in thesystem that the client does not yet have a trusted relationship with. Ifthe professional who the client wants to share the document with is notin the system, to the client can prompt an invitation to be sent to theprofessional, for example via email. In another embodiment, clients canonboard a professional to the system. In the embodiment shown in FIGS.11 and 12, only professionals can onboard clients, and administratorshave to onboard professionals.

In an embodiment, if the client wants to share one or more documentswith a professional for a limited time, because there is a specific typeof a transaction or other reason, such as there is a real estate dealand the client wants to remove the documents after it closes or wants toremove access to the realtor, the access by the professional can belimited in time. The limitations in time can be, for example, until acertain date, no access after a certain date, and/or access only for acertain amount of time. When the client creates the trustedrelationship, an ability can be provided for the client to add a timeconstraint to the access, and the access based on the trustedrelationship will automatically be removed at the appropriate time. Anemail, or other communication can be sent to the professional indicatingClient X has shared this document with you, and asking the professionalto accept the relationship. When the client chooses to share for alimited amount of time, an option to choose when the sharing will end,and to confirm it, can be provided to the client, and then aconfirmation email, or other communication can be sent to the client.

Referring again to FIG. 12, from the welcome screen the client canselect an existing document. Further, at the welcome screen, when thereis not an existing document, the client can add a document. The clientselects the vault the document will go in by indicating what type ofvault, and/or selecting a specific vault. The client chooses a file ordocument and hits the upload button. The encryption of the documentoccurs and the system saves the document to the vault, which can be inAmazon S3 in the client infrastructure (FIG. 10A), or in the dedicatedfile servers in the dedicated infrastructure version (FIG. 10B).

Referring to FIG. 13, a flow chart is shown for saving a personalfinancial statement to a vault. The welcome screen for the client orprofessional is to the lower left. From the welcome screen, the clientcan view a PDF that is an exported personal financial statement. Thewelcome screen can shown a tab for a vault that is labeled financialstatements, and the client can click on the tab, and view the personalfinancial statement. The documents can be stored as encrypted PDF's, orin another desired format. If the client wants to edit some information,to the client can go to settings, and there is a button for editingpersonal financial information, such as information that goes on apersonal financial statement. Form fields can be provided to the clientfor entering information. Schedules can also be provided andcalculations can be performed by the system, so the client does notactually have to create the entire personal financial statement fromhand or use Excel to do the calculations, as the system calculates muchof the numbers from the numbers entered into the forms. The client canupdate whatever the client wishes to update and add or edit anyinformation the client wishes. The client can then choose to finalize apersonal financial statement, which creates a PDF version that is timestamped, and saved to a vault, as shown in FIG. 13. If the client is notready to finalize the personal financial statement then the client cango back to the settings, or home. A button can be on the personalfinancial statement screen that can allow the client to choose tofinalize the personal financial statement. The client can also go to adda document, at the vault, and can put information into the client'spersonal financial statement. The client can create a financialstatement for personal or for a business entity.

Referring to FIG. 13, at the top middle, if the action is being taken bya professional on behalf of the client, then the professional goes togenerate a compilation report letter. When the client creates the PDF ofthe personal financial statement, the system takes all the databasefields for the personal financial statement and generates a PDF. A timestamp is added into the system and an indication that it was the clientthat generated the personal financial statement, and what time it wasuploaded. In specific embodiments, encryption is performed and thepersonal financial statement is put it into, for example, the Amazon S3or proprietary server and then saved into the vault.

Again, if a professional is logged in, to the professional goes to theparticular client, and adds the document for the client just asdiscussed before, and the professional then chooses the financialstatements, personal or business. The professional can then edit thepersonal financial statement of the client (see right side of FIG. 13).The professional can edit the personal financial statement on behalf ofthe client and select the tab to finalize the personal financialstatement. If the action is taken by the professional, then the systemgenerates a compilation report letter. This is a letter that can havethe professional's name and/or the professional's firm's name on theletter, and can have an image of the professional's signature. Theletter can have other indications that the personal financial statementwas created by a CPA or other professional. The system can create aletter that meets various CPA industry specific standards. Thecompilation report letter is generated and a PDF of the personalfinancial statement is generated. to the system can then append thecompilation report letter, or prepend the compilation report letter tothe personal financial statement, so that both of these documents arenow one PDF. The system can add a time stamp to the PDF, the PDF can beencrypted, the encrypted PDF can then be saved into the vault of theclient. The professional can do all of this on behalf of the client.When the professional generates the personal financial statement onbehalf of a client, this special compilation report letter is prependedto the PDF, the time stamp information is performed, and the PDF isstored in the client's vault.

Aspects of the invention, such as creating, storing, sharing, andorganizing a DSDB can be described in the general context ofcomputer-executable instructions, such as program modules, beingexecuted by a computer. Generally, program modules include routines,programs, objects, components, data structures, etc., that performparticular tasks or implement particular abstract data types. Suchprogram modules can be implemented with hardware components, softwarecomponents, or a combination thereof. Moreover, those skilled in the artwill appreciate that the invention can be practiced with a variety ofcomputer-system configurations, including multiprocessor systems,microprocessor-based or programmable-consumer electronics,minicomputers, mainframe computers, and the like. Any number ofcomputer-systems and computer networks are acceptable for use with thepresent invention.

Specific hardware devices, programming languages, components, processes,protocols, formats, and numerous other details including operatingenvironments and the like are set forth to provide a thoroughunderstanding of the present invention. In other instances, structures,devices, and processes are shown in block-diagram form, rather than indetail, to avoid obscuring the present invention. But anordinary-skilled artisan would understand that the present invention canbe practiced without these specific details. Computer systems, servers,work stations, and other machines can be connected to one another acrossa communication medium including, for example, a network or networks.

As one skilled in the art will appreciate, embodiments of the presentinvention can be embodied as, among other things—a method, system, orcomputer-program product. Accordingly, the embodiments can take the formof a hardware embodiment, a software embodiment, or an embodimentcombining software and hardware. In an embodiment, the present inventiontakes the form of a computer-program product that includescomputer-useable instructions embodied on one or more computer-readablemedia. Methods, data structures, interfaces, and other aspects of theinvention described above can be embodied in such a computer-programproduct.

Computer-readable media include both volatile and nonvolatile media,removable and nonremovable media, and contemplate media readable by adatabase, a switch, and various other network devices. By way ofexample, and not limitation, computer-readable media incorporate mediaimplemented in any method or technology for storing information.Examples of stored information include computer-useable instructions,data structures, program modules, and other data representations. Mediaexamples include, but are not limited to, information-delivery media,RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM,digital versatile discs (DVD), holographic media or other optical discstorage, magnetic cassettes, magnetic tape, magnetic disk storage, andother magnetic storage devices. These technologies can store datamomentarily, temporarily, or permanently. In an embodiment,non-transitory media are used.

The invention can be practiced in distributed-computing environmentswhere tasks are performed by remote-processing devices that are linkedthrough a communications network or other communication medium. In adistributed-computing environment, program modules can be located inboth local and remote computer-storage media including memory storagedevices. The computer-useable instructions fowl an interface to allow acomputer to react according to a source of input. The instructionscooperate with other code segments or modules to initiate a variety oftasks in response to data received in conjunction with the source of thereceived data.

The present invention can be practiced in a network environment such asa communications network. Such networks are widely used to connectvarious types of network elements, such as routers, servers, gateways,and so forth. Further, the invention can be practiced in a multi-networkenvironment having various, connected public and/or private networks.

Communication between network elements can be wireless or wireline(wired). As will be appreciated by those skilled in the art,communication networks can take several different forms and can useseveral different communication protocols.

Embodiments of the subject invention can be embodied in a processingsystem. Components of the processing system can be housed on a singlecomputer or distributed across a network as is known in the art. In anembodiment, components of the processing system are distributed oncomputer-readable media. In an embodiment, a user can access theprocessing system via a client device. In an embodiment, some of thefunctions or the processing system can be stored and/or executed on sucha device. Such devices can take any of a variety of forms. By way ofexample, a client device may be a desktop, laptop, or tablet computer, apersonal digital assistant (PDA), an MP3 player, a communication devicesuch as a telephone, pager, email reader, or text messaging device, orany combination of these or other devices. In an embodiment, a clientdevice can connect to the processing system via a network. As discussedabove, the client device may communicate with the network using variousaccess technologies, both wireless and wireline. Moreover, the clientdevice may include one or more input and output interfaces that supportuser access to the processing system. Such user interfaces can furtherinclude various input and output devices which facilitate entry ofinformation by the user or presentation of information to the user. Suchinput and output devices can include, but are not limited to, a mouse,touch-pad, touch-screen, or other pointing device, a keyboard, a camera,a monitor, a microphone, a speaker, a printer, a scanner, among othersuch devices. As further discussed above, the client devices can supportvarious styles and types of client applications.

All patents, patent applications, provisional applications, andpublications referred to or cited herein are incorporated by referencein their entirety, including all figures and tables, to the extent theyare not inconsistent with the explicit teachings of this specification.

It should be understood that the examples and embodiments describedherein are for illustrative purposes only and that various modificationsor changes in light thereof will be suggested to persons skilled in theart and are to be included within the spirit and purview of thisapplication.

1. A method of storing and controlling access to electronic documents,comprising: storing at least one electronic document in a system havingan interface and an electronic storage element; allowing access by afirst one or more person and/or entity to a first one or more of the atleast one electronic document by inputting first control information tothe interface, wherein the first control information causes the systemto allow access to the first one or more person and/or entity and denyaccess to persons or entities other than the first one or more personand/or entities.
 2. The method according to claim 1, wherein the atleast one electronic document is associated with a client, whereininputting the first control information comprises the client inputtinghe first control information.
 3. The method according to claim 1,further comprising: allowing access by a second one or more personand/or entity to a second one or more of the at least one electronicdocument by inputting second control information to the interface,wherein the second control information causes the system to allow accessto the second one or more person and/or entity and causes the system todeny access to persons and/or entities other than the second one or moreperson and/or entity.
 4. The method according to claim 1, wherein atleast one of the at least one electronic document is encrypted.
 5. Themethod according to claim 1, further comprising: creating at least oneof the at least one electronic document.
 6. The method according toclaim 5, wherein the at least one electronic document is associated witha client, wherein creating the at least one of the at least oneelectronic document comprises the client creating the at least one ofthe at least one electronic document.
 7. The method according to claim2, wherein the first one or more person and/or entity comprises aprofessional.
 8. The method according to claim 1, wherein one of the atleast one electronic document is a personal financial statement.
 9. Themethod according to claim 5, wherein the at least one of the at leastone electronic document is time stamped upon creation.
 10. The methodaccording to claim 1, further comprising: editing at least one of the atleast one electronic document.
 11. The method according to claim 10,wherein the at least one of the at least one electronic document is timestamped upon completion of editing.