US20210042804A1 - Data security system and method - Google Patents
Data security system and method Download PDFInfo
- Publication number
- US20210042804A1 US20210042804A1 US17/002,991 US202017002991A US2021042804A1 US 20210042804 A1 US20210042804 A1 US 20210042804A1 US 202017002991 A US202017002991 A US 202017002991A US 2021042804 A1 US2021042804 A1 US 2021042804A1
- Authority
- US
- United States
- Prior art keywords
- data
- customer
- application
- data store
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Qualifying participants for shopping transactions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the present invention relates to secure data storage and access in the area of Internet and other network access.
- the invention particularly relates to sensitive data which would, for example, be useful to those who exploit virus infections and other forms of malware to steal or otherwise exploit individual data.
- the invention further relates to making personal data available for legitimate use while all the time ensuring data security.
- United States Patent Application US2014164790 discloses methods and systems for administrative management of a secure data storage network are disclosed.
- One system includes a secure storage appliance configured to host a plurality of volumes, each volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices and having a plurality of volume management settings, wherein each volume is accessible by a group of one or more users, each user assigned an administrative access level, the volume management settings are editable by a first user from the group of one or more users associated with the volume and assigned an administrative access level sufficient to edit the volume management settings, and the volume management settings are inaccessible by a second user from outside the group of one or more users associated with the volume and assigned an administrative access level at least equal to that of the first user.
- the present invention seeks to provide improvement there over by providing greatly simplified data protection arrangements while allowing free and a varied access without risk of information divulgence.
- United States Patent Application US2014164777 discloses a remote device secure data file storage system and method of securely storing data files at a remote device, includes a host system having a database and a plurality of remote devices, each connected with the host system by a communication network. Each remote device and the host system is programmed with a time-based cryptography system that generates an encryption key (RVK) and initialization vector (IV) for encrypting and decrypting data on the remote device.
- the time-based cryptography system generates the encryption key (RVK) as a function of a parameter (PDPT) that is a function of a personal date (PD) and personal time (PT) of the user.
- PDPT parameter
- PD personal date
- PT personal time
- the personal date and personal time of the user being a function of personal data entered by the user on the remote device.
- the personal date (PD) is a function of the date of birth (DOB) of the user and the personal time (PT) is a function of the time of birth (TOB) of the user.
- DOB date of birth
- PT personal time
- TOB time of birth
- the present invention seeks to provide bidirectional company-to-customer secure communications to a central personal data store while minimising confidential information travelling by interceptable data such as packet.
- the present invention seeks to improve upon the situation by creating a “single customer view” by matching data in the personal Data store and multiple, disparate company systems, and associated challenge/response with the customer.
- a third problem occurs in that a user often complains that talking to the right person in the company is very error-prone and that the user constantly have to provide the same security or personal data at each step along the chain until the right person is found.
- the present invention seeks to provide improvement there over by ensuring routing of support calls based on an individuals attributes (for example, high-end worth, or having a relationship manager) and with authentication from the personal Data store.
- a fourth problem occurs when a user comes to purchase financial or other service-based products online, in that they often have to provide significant amounts of personal and identity/historic or payment details. Such information must be repeated for each supplier, although the data required from various only very slightly across each supplier.
- the present invention seeks to significantly reduce provision of personal data.
- a fifth problem can occur when users may wish to aggregate all of their existing policies or products with one or more suppliers into a website. However, this often entails supplying existing logon or identity information for each product which is manually entered by the user. This is both insecure and time-consuming and requires the user to have set up for access to each product previously.
- the present invention seeks to obviate multiple logons and to reduce the associated data-transfer risk.
- a sixth problem can occur when a user is in a physical retail outlet and once to purchase a product, they are then required to provide significant personal information verbally which is then entered by the agent. This is both time-consuming and error-prone, and is duplicated across lots of suppliers a customer may make purchases from.
- the present invention seeks to alleviate the data supply burden.
- a seventh problem occurs when often users are members of a number of loyalty programs for credit cards (e.g. nectar), petrol, stores, airlines and a never ending list.
- credit cards e.g. nectar
- petrol e.g. petrol
- stores e.g. petrol
- airlines e.g. airlines
- a never ending list e.g. a number of loyalty programs for credit cards (e.g. nectar), petrol, stores, airlines and a never ending list.
- Subsequent redemption of loyalty points is often seen difficultly after visiting a member store and hence the ability to redeem points at point of sale is wasted.
- the present invention seeks to allow loyalty transactions to be made employing a personal data store, allowing real-time loyalty offers via the point of sale. Also this would allow gathering evidence of purchase.
- the present invention consists in a system, including a network allowing bidirectional communication there through, the system comprising:
- a secure data storage server including a personal data store for storing user personal data and user private data relating to the user, the secure status storage server being able bidirectionally to communicate with at least one client device and at least one service provider client;
- the at least one service provider client communicates with the secure data storage server with data encrypted using a first encryption key
- the at least one client device communicates with the secure data storage server with data encrypted using a second encryption key
- the at least one service provider client stores private data in the personal data store encrypted using a third encryption key
- the at least one client device stores personal data in the personal data store encrypted using a fourth encryption key.
- the present invention consists in a method, including employing a network allowing bidirectional communication there through, the method comprising the steps:
- a step of providing a secure data storage server including a personal data store for storing user public personal data and user private data relating to the user, the secure status storage server being enababled bidirectionally to communicate with at least one client device and at least one service provider client;
- a step of the at least one client device stores personal data in the personal data store encrypted using a fourth encryption key.
- the invention further provides that the first encryption key can be a dedicated company communications encryption key.
- the invention further provides that the second encryption key can be a dedicated customer encryption key.
- the invention further provides that the third encryption key can be the first encryption key.
- the invention further provides that the fourth encryption key can be the second encryption key.
- the invention yet further provides that the second encryption key can be a company private encryption key.
- the invention yet further provides that the fourth encryption key can be a customer private data encryption key.
- the invention further provides that the at least one service provider client can access the personal data store(s) only from previously registered IP addresses.
- the invention further provides that the at least one service provider client alone can have rights to access and change data that at least one service provider client provides.
- the invention further provides that the secure data storage server can comprise a Crypt app server for cooperating with a client device, the crypt app server communicating, when used, with the secured data storage server to provide services.
- the secure data storage server can comprise a Crypt app server for cooperating with a client device, the crypt app server communicating, when used, with the secured data storage server to provide services.
- the invention further provides that the secure data storage server can be operable to compare company data with private data to assemble a single customer view wherein all company private data is assembled and can be displayed for an individual customer, and that the compared private data can be from a single service provider client. Multiple views for multiple companies data for the same customer can be created
- the invention further provides that a customer can contact the Crypt app server to link a service provider client supportable product to that customer, that the service provider client can then use the customer's individual public data to verify the customer's identity and then to store contact information in the private data store to enable the customer to contact the service provider client company with contact history.
- the invention provides that the customer can place a call to the Crypt app server and the Crypt app server can cause the contact information to be retrieved and the call automatically to be correctly relayed to the service provider client company at the same time causing the contact history to be made visible to the respondent at the service provider client company.
- the invention can further comprise a context data store that can be operable to store results from the crypt app server.
- the invention further provides that when the customer uses the client device to contact the Crypt app server to seek purchase of a service from a service provider client company, the service provider client company can access the customers public data to fill a validation template before accepting or rejecting the customer for sale or offer of a product.
- the invention further provides that the service provider client company, if the particular requirements for customer validation are not met, can request further data from the customer, satisfactory provision whereof allows progress towards sale or offer of the product.
- the invention further provides that a point of sale terminal can be coupled to the secure data storage server; that a client device can transfer data to the point of sale terminal identifying a customer; and that the point of sale terminal can transfer the customer identifying data to the secure data storage server for the customer's identity to be verified.
- the invention further provides that the client device can transfer data to the point of sale terminal by at least one of: near field transmission; and optical imaging of an image displayed on a display on the client device.
- optical image can be a one-dimensional or two dimensional barcode giving customer identification information.
- the invention further provides that a customer can access the Crypt app server to link products and sales to loyalty schemes.
- FIG. 1 is a schematic diagram illustrating one possible environment where in the present invention can be practised
- FIG. 2 is a schematic diagram illustrating in greater detail the arrangement of FIG. 1 when executing a task
- FIG. 3 provides an exemplary possible flow chart that can be executed using the apparatus of FIG. 2 ;
- FIG. 4 is a schematic diagram showing how the personal data store of FIGS. 1 and 2 stores two types of data
- FIG. 5 is an exemplary flow chart illustrating one way in which the secure data storage server can create a “single customer view” from diverse data;
- FIG. 6A is an exemplary flowchart illustrating one way in which the invention can be employed to create links between a product and a user;
- FIG. 6B an exemplary flow chart illustrating one way in which the app server coupled with a context data store can interact with a user making a call seeking product assistance from a company;
- FIG. 7 is an exemplary flow chart illustrating one possible way in which the present invention assists to resolve the fifth problem.
- FIG. 1 a schematic diagram showing an environment in which the present invention can be practised.
- a first example is here provided where in a company provides the input to the service provider client 14 to indicate to a customer, being the user, but not necessarily at that time, of a client device 12 .
- a network 10 such as the Internet, but not necessarily restricted thereto, is bidirectionally accessible by any one of a plurality of client devices 12 .
- Each of the client devices 12 can be, but is not limited to, a network enabled smart phone, tablet, or other computing device such as a laptop, palmtop, or desktop personal computer. As new types of computing devices are developed, these too can be employed as client devices 12 .
- Service provider clients 14 are also bidirectionally coupled to the network 12 .
- the service provider clients 14 provide services of interest to the users of the client devices 12 and can comprise, but are not limited to, insurance services, record keeping services, banking services, retail services and any other type of service that maintains records that may be of interest to the users of the client devices 12 .
- the client devices 12 are operable to connect with a secure data storage server 16 .
- the service provider clients are also operable to connect with the secure data storage server 16 .
- the secure data storage server 16 interacts with the client devices 12 and the service provider clients 14 to provide a data storage service that is both secure in what is stored and secure in its sending and receiving.
- FIG. 1 shows a plurality of client devices 12 and service provider clients 14
- the invention is hereafter explained as, for each task, employing just a single client device 12 interacting with the secure data storage server 16 together with a client device 12 user selected service provider clients 14 .
- each client device 12 may be operated in the presence of a point of sale terminal 13 with which it can be in near field communication 15 .
- the client device is, for preference, a portable devices such as a smart phone or tablet.
- the portable device 12 can provide information concerning the identity of the user to the point of sale terminal 13 either by near field communication 15 or by display of a two dimensional barcode to the point of sale terminal 13 .
- the secure data storage server 16 comprises an Crypt app server 17 that interacts with the client device 12 when required, and with the point of sale terminal 13 when required, to receive and send data and requests and commands from and to the point of sale terminal 13 (when it is involved and the client device 12 ).
- the Crypt app server 17 uses the contents and services of one or more personal data store(s) (PDS), described hereafter, to provide secure data storage and useful services derived therefrom.
- PDS personal data store
- a context data is stored 19 is associated with the crypt app server 17 and stores data derived and found from the use of the app.
- the crypt app server 17 also provides service for a plurality of apps (computer programmes accessed by a client device 12 using a graphical interface).
- the crypt app server 17 provides data decryption services to read the stored encrypted information from the service provider clients 14 and the stored encrypted information provided by the client device 12 .
- secure data storage server 16 is shown in FIG. 1 and an integral whole, it is to be appreciated that the present invention also provides that the secure data storage server 16 can be implemented as a so-call “cloud” arrangement where a plurality of singly addressable inter-operative network sites co-operate with one another to provide the functions described.
- FIG. 2 a schematic diagram illustrating in greater detail the arrangement of FIG. 1 when executing a task. Where communications are shown, it is to be understood that those communications are provided through the network 10 .
- FIG. 2 contains many elements in common with those shown in FIG. 1 , and it is to be understood that like reference numerals denote like items.
- the secure data storage server 16 comprises, as well as the Crypt app server 17 , a change server 18 .
- the change server 18 communicates with the selected service provider client 14 by means of a service provider to change server connection 22 and the client device 12 communicates with the change server 18 by a client device to change server connection 20 .
- the secure data store server 16 also comprises one or more secure personal data store(s) (PDS) 24 where in data is stored in a hyper-secure manner.
- the service provider client 14 is coupled to the personal data store 24 by a service provider to personal data store connection 26 allowing encrypted data to be stored and recovered.
- the client device 12 is coupled to the personal data store 24 by means of a client device to personal data store connection 28 , allowing encrypted data to be stored and recovered.
- the secure data storage server 16 also comprises a crypt manager 30 operable to manage the information stored in the personal data store 24 .
- the service provider to personal data store connection 26 for preference employs a public key to access the personal data store 24 , with the restriction that communication can only be effected via known IP addresses.
- the client device to personal data store connection 28 for preference employs a private key to access the personal data store 24 .
- company data is stored within the personal data store 24 using the same public key access as is used in the service provider the personal data store connection 26 , thereby providing a technical advantage of avoiding decryption and re-encryption for storage.
- company data is stored within the personal data store 24 using a company private encryption key.
- personal data is encrypted using the same customer communication key as is used in the client device to personal data store connection 28 .
- This measure provides a technical improvement by avoiding the necessity of decryption and re-encryption of the personal data.
- personal data is encrypted using a customer private encryption key.
- the change server 18 provides two separate channels, a first channel being for informing the client device 12 of changes made by the service provider client 14 and a second channel being for the client device 12 informing the service provider clients 14 of changes made by the client device 12 .
- a supplier of data for storage in the personal data store 24 only has rights to access or change specific data.
- FIG. 2 Although only one personal data store 24 is shown in FIG. 2 , it is to be appreciated that the invention allows for the provision of multiple individual person data stores and data store elements, sufficient to accommodate the very large amounts of data to be stored and retrieved. Similarly a personal data store may be a subset or partition of another data store, with the appropriate access controls as described previously producing the same effect
- Encryption of stored data within the personal data store 24 with an unknown key means that no one else, not even the owners of the personal data store 25 and its peripheral parts, can read data stored therein. The data remains secure for all time. If a user forgets his ability to access, and has to start again, the customer is assured that his “lost” data cannot be accessed by others.
- the personal data store 24 is described hereafter as being employed by a user to create associations or link between suppliers and products and to establish product status. It is to be understood that the personal data store 24 is also employed to store identity of supplied products and status, as well as identification for the individual user.
- FIG. 3 illustrating exemplary data flow that can be undertaken using the apparatus of FIG. 2 .
- a pension company updates an individual customer's record with a new pension amount. It is to be understood that the invention is not limited to this example, and the company can be for any purpose and amend any record of any kind.
- a first test 34 checks to see if the insurance company is ready to update a customer entry. If there is no updating to be done, operation stays in the first test 34 . If the insurance company is ready to provide a customer update, a first operation 36 communicates to the service provider 14 client software an indication of the type of policy, the policy identifier and the new amount in the pension fund.
- the service provider 14 also comprises an adapter.
- a second operation 38 working through the encryption adapter software finds the customer and object identifier and a third operation 40 also provides data to be sent to the personal data store 24 such as indication of the nature of the data to be upgraded, the document identifier, the identity of the final user and the fund amount.
- a fourth operation 42 then has the information encrypted to be sent from the service provider client 14 to the personal data store 24 using the public key and IP address identification as described above.
- a fifth operation 44 then sends the information to the personal data store (PDS) 24 .
- the service provider client 14 in a sixth operation 46 , then contacts the change server 18 , shown in FIG. 2 , to indicate to the customer that a change has been made to the content of the personal data store 24 for data from the service provider 14 for the particular customer (as can be contacted through the client device 12 ).
- the message might be, for example, “fund amounts changed made to document ID 170 ”. Whatever the message actually is, the message reflects the nature of the change in a non-informative way to avoid giving out information to any eavesdroppers.
- the customer can activate the client device 12 to access the personal data store 24 to learn new information.
- the message provided to the customer by the sixth operation 46 is, for preference, encrypted both from the service provider client 14 and when delivered to the client device 12 .
- the personal data store 24 has the crypt manager 30 manage the personal and public data of the customer, and private and public data of the company.
- the present invention allows creation of a “single customer view” by matching data in the personal data store and company systems and associated challenge response with the customer.
- FIG. 4 a schematic diagram showing how the personal data store 24 stores two types of data.
- the personal data store 24 provides a store for each of two types of data.
- a first type of data is private data and is stored in a person's private company data memory 48 .
- the private data memory 48 stores such things as company data that is not available for public knowledge.
- a second type of data is persons public data stored in a user public data memory 50 .
- the public data memory 50 stores such things as names and addresses and other publicly available information that helps to identify a particular customer. Further data can be, but is not limited to, first name, surname, and date birth.
- Each item of private data held in the user private data memory 48 may have a corresponding item of persons public data held in the public data memory 50 , as indicated by association arrow 52 .
- the arrangement of the personal data store 24 is such that a company may define data to be private to the company, or made public and available to a specific customer.
- the arrangement of the personal data store 24 is such that a customer may define data to be private to the customer, or made public and available to a specific company.
- the status of customer data being made public or private can be changed at the discretion of the customer, either for a limited time/specific interaction, or ongoing
- FIG. 5 a flow chart illustrating one way in which the secure data storage server can create a “single customer view” from diverse data, referred to above as the second problem.
- a second test 56 looks to see if a single customer view is desired. If the second test 56 finds that a single customer view is desired, a seventh operation 58 selects the individual customer for whom a single customer view is to be created. The selection is achieved by selecting from the user public data memory 48 .
- An eighth operation 60 selects a product owned by the individual through the company which it has been decided to create a single customer view. This can be selected by the customer, or the single customer view selection started during a customer inspection session where both customers public and private details are available for a single product.
- a ninth operation 62 then scans the contents of the personal data store 24 , looking for matches between the selected individual customer, details of which are found in the persons public data memory 48 , and the selected company and products found in the persons five data memory 50 .
- a third test 64 checks to see if all of the records possible to the end of the personal data store 24 have been checked.
- a fourth test 66 checks to see if a match between the selected individual and the selected company has been found. If the fourth test 66 finds that no match has been found, control is passed back to the ninth operation 62 to continue checking for matches.
- a tenth operation 68 adds customer and company product details to an agglomerated single customer view. Control is then passed back to the ninth operation 62 to continue checking the personal data stores 24 for matches.
- eleventh operation 70 stores the aggregated single customer view, as collected in the tenth operation 68 , in, for preference, a customer personal program area such as an App allowing a customer to call up their single customer view at any time.
- the single customer view is used or maintained on each occasion that the customer updates are personal information (e.g. telephone number) and the personal program area (App) informs the company product systems of the changes.
- personal information e.g. telephone number
- App personal program area
- the present invention allows an individual to avoid such difficulties.
- a first set of data identifies the product that the customer needs support with.
- a second set of data is the details within that company specific to the product.
- a third set of data comprises authentication information to allow a support person to know they are dealing with the product owner.
- other information may be required such as whether or not the customer has been allocated a specific relation manager and details of any can previous communications that have been made around the product and around the support need.
- the secure data storage server 16 comprises a user public data memory 46 and a user private data memory 50 .
- the company links a product with a customer, thereby creating an object which is stored in the user private data memory 50 data to represent that product, the record containing all key information around that product.
- the company also adds extra information regarding support which is not typically displayed to the customer.
- Such information can include: which phone number or video call address is correct specific to the product, and the customer is in a specific segment, for example, “high net worth” or “must retain”.
- Please contact details may be personalised to phone numbers and/or addresses that have reduce queues or higher trained staff, to give but two examples.
- the extra information can also give details of whether the customer has a specific relationship manager, broker etc, and provide details of this, and associated contact information.
- the customer using the smart phone client device 12 , places a call through the crypt app server 17 , with the customer providing information as for which product they require support.
- the crypt app server 17 then employs the personal data store 24 to contain information relative to the company and product and to route the contact, which can be a voice call, a video call, a conference call or similar communication, to the correct part of the company, appropriate relationship manager, and so on.
- the public key for the customer can be passed the company which allows the company to retrieve identity and/or indication information from the personal data store 24 through integration with interactive voice systems, meaning that information does not require to be provided by the customer.
- the customer public key and personal data store 24 access allows information around the product the customer requires support for in any previous correspondence to be provided to the agent of the company automatically.
- FIG. 6A an exemplary flowchart illustrating one of many ways in which the invention can be employed to overcome the third problem.
- FIG. 6A shows how a Link is created between a product and a user.
- a fifth test 76 looks to see if an association or “link” is to be created between an individual user and a product. Such an association can be set up when the user first purchases a product, or can be set up later when a product requires assistance. In any event, the action shown in FIG. 6A takes place when the service provider 14 is online and has access to the personal data of a user.
- control is passed to the fifth test 76 . If an association or link is to be made, control is passed to a twelfth operation 78 that creates a product support object stored within the private data memory 50 .
- the support object includes information identifying the product that the customer needs support with, any data from the supplying company specific to the product, and authentication information to allow a support person to be aware whether or not they are dealing with the product owner. Other information can also be supplied, as stated, whether or not the customer has been allocated a specific relation manager, and details of any previous communication made around the product and around support need.
- Other information includes direction of any calls from the product customer to the product supplying company.
- FIG. 6B an exemplary flow chart illustrating one way in which the crypt app server 17 can interact with a user making a call seeking product assistance from a company.
- a sixth test 82 looks to see whether the crypt app server 17 call has received from a mobile telephone client device 12 seeking product assistance from a company. If the sixth test 82 finds that such a call has been received, a thirteenth operation 84 seeks to obtain the product identity from the user is seeking product assistance. If a seventh test 86 finds that no information that can be identified has been obtained, control is passed back to the sixth test 82 thereby effectively terminating the process. If the seventh test 86 finds that the product has been adequately identified, a fourteenth operation 88 gets the personal information and the product support object from the personal data stored 24 and a fifteenth operation 90 gets the retrieved data of the fourteenth operation 88 ready to show to the company call recipient when a call is made.
- a sixteenth operation 92 places the call to the company and to the designated individual from the product support object until an eighth test 92 detects that the caller has hung up. Control then passes to a seventeenth operation 96 that has the crypt app server terminate the call and passes control back to the six test 82 ready to receive any other incoming call seeking product assistance for my company.
- the company can add new information to the product support object giving details obtains during the course of the call that has been made.
- the present invention provides minimisation of data required to process product applications the use of the personal data store 24 , including (if required) authentication of the user.
- the customer using the client device 12 via the crypt app server 17 , requests setting up a product (i.e. he/she would like to take up an offer to purchase the product or service).
- a product i.e. he/she would like to take up an offer to purchase the product or service.
- the customer In registering the product, the customer initially provides only indication of the type of product (e.g. car insurance) and indication for the product (for example, policy identification).
- the secure data storage server 16 informs the selected the supplier that they would like to link that supplier product to their website and/or application.
- the supplier requires additional information to ensure that the customer is who they say they are.
- Such information can include postcode, dates of birth, bank used for direct debits, and so on.
- This is a validation template, that is, template of the type of information that must be valid in order to pass security for the supplier, and typically, some items of information may be more important than others. For example, the date of birth may be more important the mobile phone numbers which can perform out of date.
- the secure data storage server 16 uses the personal data stored in the user public data memory 48 and elsewhere in the personal data store to match the validation template. Only when the validation data is not available in the personal data store 24 and/or does not match that held by the supplier, is the customer prompted to supply the correct data near the Or website. The vast majority of data will not need to be entered by the customer, and only when there is absence of data or a mismatch.
- the account becomes linked to the customer in the personal data store 24 , and appropriate product information is pushed to the customer via the personal data store 24 and the secure status storage service 16 and/or its app 17 .
- product information can include, in the case of insurance, policy details, policy documents, further office and so on.
- a fifth problem can be resolved where use of the personal data store 24 assists in customer transactions when a particular customer desires to aggregate all of their existing products or policies with one or more suppliers into a single application or website. To do this in the manner previously available, entails supplying existing logon and/or identity information for each product, being manually entered by the customer. Such a process is not only very insecure but is also time consuming and requires the customer to have set up full access for each product on previous occasions.
- the customer using the client device 12 has an account with the personal data store 24 .
- This account is hyper-secure with all data highly encrypted in the personal data store 24 and encrypted during transmission (e.g. using HTTPS).
- the personal data store access also has a scheme for identifying a user, for example but not limited to, provision of a user name and/or password.
- There is also a “private key” scheme for decrypting data whereby, as an example, the customer provides memorable words. The memorable words is then used as the encryption/decryption key for data from the customer.
- the personal data stores 24 personal information, such as date of birth, name, addresses, asset such as cars etc, in a persons public data memory 48 (shown in FIG. 4 ) and stores private information (such as bank accounts, insurance policies, mobile accounts and so on) in a user private data memory 50 , also shown in FIG. 4 .
- Other information can also be held such as communications from suppliers, policy documents, applications for product etc.
- any form of physical documents such as policy documents, statements and so on, can be printed with a two dimensional barcode (QR code), barcodes or similar identifying image.
- QR code two dimensional barcode
- the supplier can email them their identifying image, or can otherwise text or distribute to the customer.
- the identifying code such as a QR code, identifies the company, type of product and the product identifier, such as a policy number. For additional security, these identities may not be those publicly used, but maybe, instead be in internal identifying used by the company.
- the customer then uses the crypt app server 17 to send the identifying code.
- the sending of identifying code causes the product automatically to be linked. This is in contrast with the situation where the customer is communicating without the use of a QR code or similar, in which case the customer would have to manually enter the identifying product information.
- the company is able to securely access the customer's personal data store 24 and to review both the internal identifying information scanned from the image code (QR), and information useful to authenticate that a policy of product does indeed belong to the customer, such information including address, date of birth, and any other relevant personal identifiable data.
- QR image code
- the company then runs an appropriate risk-based data matching routine that determines if the customer information retrieved from the personal data store 24 matches that retrieved from the product or policy identified if the information does not match, but the mismatch is very close, the company asks the customer one or more questions, using the crypt app server 17 for correct data to match the selected policy or product.
- the company asks the customer one or more security questions using the crypt app server 17 that are not typically stored in the customer's personal data store 24 .
- FIG. 7 showing an exemplary flow chart illustrating one possible way in which the present invention assists to resolve the fifth problem.
- the left-hand column of FIG. 7 shows the activities that take place within the crypt app server 17 in its transactions with a user 12 .
- the right-hand column of FIG. 7 shows operations undertaken within the secure data storage server 16 .
- an eighteenth operation 100 the customer 12 contacts the crypt app server 17 and indicates in a nineteenth operation 102 what supplier is required and the type of product that is required from the supplier.
- a twentieth operation 104 then requests to the crypt app server 17 that a link be formed and passes the request to a twenty first operation 106 in the secure data storage server 16 .
- a twenty second operation 108 the supplier accesses the personal data, as described above, of the customer and applies the validation test to see if the customer is genuine.
- a ninth test 110 checks to see if data is needed from the customer, the customer Supply data also being as described above. If no data is required from the Customer, a tenth test 112 looks to see if the customers request has passed the validation test. If the customer's approach has not passed the validation test, the process ends via exit 116 . If the customer's approach has passed the validation test, the interaction between the supplier and the customer carries on through continuation 118 .
- the ninth test 110 finds that more details are needed from the customer to be applied to the validation test, the ninth test passes the request to a twenty third operation 114 of the crypt app server 17 which gathers stay requested information, as described above, and includes it in the criteria for the tenth test 112 to determine whether or not the validity test has been passed.
- a sixth problem in which the present invention, by use of the personal data store 24 , can assist occurs when a customer, at a retail outlet, desires to purchase a product. This often leads the customer to provide significant amounts of personal information, such provision being made by word-of-mouth and data entry being made by a person in attendance, typically at a point of sale terminal 13 . Such a time-consuming process that is often repeated, as will be seen, is unnecessary when the present invention is employed.
- the client device 12 is close by the point of sale terminal 13 .
- the client device 12 can provide near field communication 15 with the point of sale terminal 13 .
- the point of sale terminal 13 can capture an image displayed on the screen of the client device 13 . The image represents the identity of the client device 12 and points to personal data and company data related thereto.
- the point of sale terminal 13 is put into communication with the crypt app server 17 , indicated in FIG. 1 by broken line.
- the point of sale terminal 13 relays the near field communication 15 from the client device 12 , and/or transmits the captured image to the crypt app server 17 .
- the personal data store 24 stores the customers personal identification data in the user public data memory 48 (shown in FIG. 4 ) and stores the customers company memory in the user private data memory 50 .
- the crypt app server 17 employs the facilities of the secure data storage server 16 .
- the customer may desire to share their personal information (name address etc) and product information (bank account etc) with a retailer in order to simplify and speed up the purchase process, and to create a new policy or contract.
- Other information could also be useful for the retailer.
- Such information can include authentication tokens as proof of identity, credit history and credit rating, copies of existing contracts such as utility bills, and so on.
- the crypt app server 17 uses the customer public key to push a message to the customer telling the customer what information the retailer wishes to obtain in order to set up a contract. The customer then has the option to except this data requests, or to reject it.
- the retailer can create a contract or policy immediately, and can push the policy or contract into the crypt app server 17 . The customer may then see the purchased product information.
- the customers personal data store 24 does not contain all information required by the retailer, then further questions/obtain this data are displayed to the point of sale operator in the store prompting them to as the customer to provide the missing information. This is deemed to be more efficient than prompting the customer using messages from the crypt app server 17 , but may be done via the client device for some identifying information (e.g. provide fingerprint, or password) that should not be shared with the point of sale operator.
- identifying information e.g. provide fingerprint, or password
- this information is also stored in the customers personal data store 24 , assuming the customer's happy so to do, so that the need for the customer to be asked the same question again disappears.
- Yet another problem that can be solved by use of the personal data store 24 lies in, for example, loyalty programs.
- FIG. 1 Attention is once again redrawn to FIG. 1 .
- the personal data store 24 for a customer is hyper-secure with all of the data encrypted in the personal data store and encrypted during transmission to and from the personal data stored.
- the personal data store 24 also includes a scheme for identifying a customer, for example, a username combined with a password, and a private key scheme for decrypting data, such as employing a memorable word to act as an encryption key for that data. Further security schemes may also be put into place including registration of physical devices such as tablets, where phones and other apparatus.
- API application programming interface
- the customer can use this facility to associate one or more loyalty accounts with the personal data store 24 via the crypt app server 17 employing the secure data storage server 16 .
- the crypt app server 17 can then employ the app as part of one or more loyalty programs. This can include: registering that an appropriate purchase was made that is eligible within a particular loyalty program; registering that an appropriate access to services was made that is eligible within a particular loyalty program; pushing loyalty program offers to the crypt app server using the associated app including when and perhaps where purchase was made; and using redemption points from a loyalty program for associated discounts at a point of sale 13 .
- Each customer has a personal data store where data storage and access is secured by public/private key encryption, and encrypted communications using, for example, HTTPS encryption.
- Each company has a personal data store for each customer, where data and access is secured by public/private key encryption, and communication by using encryption.
- the service maintains a context data store of relationships between customers and companies and service/products provided where data store and access is secured by public/private key encryption and communications using encryption 4.
- VPN Virtual Private
- Further Security is provided by: the personal data store 24 being unique to an individual—access to one store does not provide access to any other store (and hence other customers data) 6. Further Security is also provided by the Personally identifiable customer data only being stored in the customer personal data store; and the requirement that the customer must give explicit read/write/create access to companies to access the customer personal data store; and companies must access through known IP address ranges. 7. Yet further security is provided by the product information for a customer being stored in a company personal data store specific to that customer, which the company may give explicit read access to some items of data to the customer. This personal data store does not have customer personally identifiable data—hence if compromised could not establish which customer the data is for 8.
- context data store that describes the relationship between customers, companies and products/services, for example that a particular customer has an identified product from a specified company, holds only internal representations of customer, company and product, hence if data compromised it could not be possible to establish customer, company or product
- the personal data stores can be virtual—e.g. a company personal data store may be a protected area within a customers personal data store.
- personal data stores are always individual to specific customers, and access to one PDS 24 does not provide information for other customers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
A system and method are disclosed for secure storage of customer's public and private data in a personal data store. Companies communicate with a secure data storage server using a public encryption key linked to a registered IP Address, customers communicate with a private encryption key, and encrypted data can be stored using a variety of encryption keys. The personal data store can be used for preparing customer product views, linking personal data to avoid repeated customer data entries, customer identification and loyalty card linking. Encrypted stored data ensures no other person can read it.
Description
- This application is continuation of U.S. Ser. No. 15/503,397 filed Feb. 12, 2017, now U.S. Pat. No. 10,762,543, which is a § 371 of International Application PCT/GB2015/000234 filed on Aug. 11, 2015, which in turn claims the benefit of Great Britain application GB1414302.8 filed on Aug. 12, 2014, which are hereby incorporated by reference in their entirety.
- The present invention relates to secure data storage and access in the area of Internet and other network access. The invention particularly relates to sensitive data which would, for example, be useful to those who exploit virus infections and other forms of malware to steal or otherwise exploit individual data. The invention further relates to making personal data available for legitimate use while all the time ensuring data security.
- United States Patent Application US2014164790 (A1) discloses methods and systems for administrative management of a secure data storage network are disclosed. One system includes a secure storage appliance configured to host a plurality of volumes, each volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices and having a plurality of volume management settings, wherein each volume is accessible by a group of one or more users, each user assigned an administrative access level, the volume management settings are editable by a first user from the group of one or more users associated with the volume and assigned an administrative access level sufficient to edit the volume management settings, and the volume management settings are inaccessible by a second user from outside the group of one or more users associated with the volume and assigned an administrative access level at least equal to that of the first user. The present invention seeks to provide improvement there over by providing greatly simplified data protection arrangements while allowing free and a varied access without risk of information divulgence.
- United States Patent Application US2014164777 (A1) discloses a remote device secure data file storage system and method of securely storing data files at a remote device, includes a host system having a database and a plurality of remote devices, each connected with the host system by a communication network. Each remote device and the host system is programmed with a time-based cryptography system that generates an encryption key (RVK) and initialization vector (IV) for encrypting and decrypting data on the remote device. The time-based cryptography system generates the encryption key (RVK) as a function of a parameter (PDPT) that is a function of a personal date (PD) and personal time (PT) of the user. The personal date and personal time of the user being a function of personal data entered by the user on the remote device. The personal date (PD) is a function of the date of birth (DOB) of the user and the personal time (PT) is a function of the time of birth (TOB) of the user. The present invention seeks to provide improvement there over by simplifying the selection of keys whilst at the same time allowing free and varied access without risking data disclosure.
- A first problem exists in that a user's data through their commercial life is not available from any single website to be stored or accessed. Much relevant data exists for each of us. To give but a small sample, isolated files exist for each of us with regards to banks, insurance, telecommunications suppliers, utilities and national/local taxation details. To collect such data together today would require multiple logins to each company/product and potentially insecure passing of personal data between multiple suppliers systems and the website. The present invention seeks to provide bidirectional company-to-customer secure communications to a central personal data store while minimising confidential information travelling by interceptable data such as packet.
- It is to be noted that the UK government is implementing a service based on the use of individual personal data stores for just such a purpose, using a product from the community interest company “Mydex”.
- A second problem exists when a user may have several products from the same company, but, as the company or companies systems are arranged on a “product-silo” basis, it is often difficult to create a “single customer view” of all of the products a customer has. This often entails complex/error-prone matching of customer details across the systems. The present invention seeks to improve upon the situation by creating a “single customer view” by matching data in the personal Data store and multiple, disparate company systems, and associated challenge/response with the customer.
- A third problem occurs in that a user often complains that talking to the right person in the company is very error-prone and that the user constantly have to provide the same security or personal data at each step along the chain until the right person is found. The present invention seeks to provide improvement there over by ensuring routing of support calls based on an individuals attributes (for example, high-end worth, or having a relationship manager) and with authentication from the personal Data store.
- A fourth problem occurs when a user comes to purchase financial or other service-based products online, in that they often have to provide significant amounts of personal and identity/historic or payment details. Such information must be repeated for each supplier, although the data required from various only very slightly across each supplier. The present invention seeks to significantly reduce provision of personal data.
- A fifth problem can occur when users may wish to aggregate all of their existing policies or products with one or more suppliers into a website. However, this often entails supplying existing logon or identity information for each product which is manually entered by the user. This is both insecure and time-consuming and requires the user to have set up for access to each product previously. The present invention seeks to obviate multiple logons and to reduce the associated data-transfer risk.
- A sixth problem can occur when a user is in a physical retail outlet and once to purchase a product, they are then required to provide significant personal information verbally which is then entered by the agent. This is both time-consuming and error-prone, and is duplicated across lots of suppliers a customer may make purchases from. The present invention seeks to alleviate the data supply burden.
- A seventh problem occurs when often users are members of a number of loyalty programs for credit cards (e.g. nectar), petrol, stores, airlines and a never ending list. However, it is often a requirement to carry physical evidence of membership of a loyalty program, as well as having to submit proof of purchase. Subsequent redemption of loyalty points is often seen difficultly after visiting a member store and hence the ability to redeem points at point of sale is wasted. The present invention seeks to allow loyalty transactions to be made employing a personal data store, allowing real-time loyalty offers via the point of sale. Also this would allow gathering evidence of purchase.
- According to a first aspect, the present invention consists in a system, including a network allowing bidirectional communication there through, the system comprising:
- a secure data storage server including a personal data store for storing user personal data and user private data relating to the user, the secure status storage server being able bidirectionally to communicate with at least one client device and at least one service provider client;
- where the at least one service provider client communicates with the secure data storage server with data encrypted using a first encryption key;
- where the at least one client device communicates with the secure data storage server with data encrypted using a second encryption key;
- where the at least one service provider client stores private data in the personal data store encrypted using a third encryption key;
- and where the at least one client device stores personal data in the personal data store encrypted using a fourth encryption key.
- According to a second aspect, the present invention consists in a method, including employing a network allowing bidirectional communication there through, the method comprising the steps:
- a step of providing a secure data storage server including a personal data store for storing user public personal data and user private data relating to the user, the secure status storage server being enababled bidirectionally to communicate with at least one client device and at least one service provider client;
- a step of the at least one service provider client communicating with the secure data storage server with data encrypted using a first encryption key;
- a step of the at least one client device communicating with the secure data storage server with data encrypted using a second encryption key;
- a step of the at least one service provider client storing private data in the personal data store encrypted using a third encryption key;
- and a step of the at least one client device stores personal data in the personal data store encrypted using a fourth encryption key.
- The invention further provides that the first encryption key can be a dedicated company communications encryption key.
- The invention further provides that the second encryption key can be a dedicated customer encryption key.
- The invention further provides that the third encryption key can be the first encryption key.
- The invention further provides that the fourth encryption key can be the second encryption key.
- The invention yet further provides that the second encryption key can be a company private encryption key.
- The invention yet further provides that the fourth encryption key can be a customer private data encryption key.
- The invention further provides that the at least one service provider client can access the personal data store(s) only from previously registered IP addresses.
- The invention further provides that the at least one service provider client alone can have rights to access and change data that at least one service provider client provides.
- The invention further provides that the secure data storage server can comprise a Crypt app server for cooperating with a client device, the crypt app server communicating, when used, with the secured data storage server to provide services.
- The invention further provides that the secure data storage server can be operable to compare company data with private data to assemble a single customer view wherein all company private data is assembled and can be displayed for an individual customer, and that the compared private data can be from a single service provider client. Multiple views for multiple companies data for the same customer can be created
- The invention further provides that a customer can contact the Crypt app server to link a service provider client supportable product to that customer, that the service provider client can then use the customer's individual public data to verify the customer's identity and then to store contact information in the private data store to enable the customer to contact the service provider client company with contact history.
- The invention provides that the customer can place a call to the Crypt app server and the Crypt app server can cause the contact information to be retrieved and the call automatically to be correctly relayed to the service provider client company at the same time causing the contact history to be made visible to the respondent at the service provider client company.
- The invention can further comprise a context data store that can be operable to store results from the crypt app server.
- The invention further provides that when the customer uses the client device to contact the Crypt app server to seek purchase of a service from a service provider client company, the service provider client company can access the customers public data to fill a validation template before accepting or rejecting the customer for sale or offer of a product.
- The invention further provides that the service provider client company, if the particular requirements for customer validation are not met, can request further data from the customer, satisfactory provision whereof allows progress towards sale or offer of the product.
- The invention further provides that a point of sale terminal can be coupled to the secure data storage server; that a client device can transfer data to the point of sale terminal identifying a customer; and that the point of sale terminal can transfer the customer identifying data to the secure data storage server for the customer's identity to be verified.
- The invention further provides that the client device can transfer data to the point of sale terminal by at least one of: near field transmission; and optical imaging of an image displayed on a display on the client device.
- The invention further provides that the optical image can be a one-dimensional or two dimensional barcode giving customer identification information.
- The invention further provides that a customer can access the Crypt app server to link products and sales to loyalty schemes.
- The invention is described, by way of examples, to be read in conjunction with the appended drawings, in which:
-
FIG. 1 is a schematic diagram illustrating one possible environment where in the present invention can be practised; -
FIG. 2 is a schematic diagram illustrating in greater detail the arrangement ofFIG. 1 when executing a task; -
FIG. 3 provides an exemplary possible flow chart that can be executed using the apparatus ofFIG. 2 ; -
FIG. 4 is a schematic diagram showing how the personal data store ofFIGS. 1 and 2 stores two types of data; -
FIG. 5 , is an exemplary flow chart illustrating one way in which the secure data storage server can create a “single customer view” from diverse data; -
FIG. 6A is an exemplary flowchart illustrating one way in which the invention can be employed to create links between a product and a user; -
FIG. 6B , an exemplary flow chart illustrating one way in which the app server coupled with a context data store can interact with a user making a call seeking product assistance from a company; and -
FIG. 7 is an exemplary flow chart illustrating one possible way in which the present invention assists to resolve the fifth problem. - The invention is now described in detail by way of examples.
- Attention is drawn to
FIG. 1 , a schematic diagram showing an environment in which the present invention can be practised. - A first example is here provided where in a company provides the input to the
service provider client 14 to indicate to a customer, being the user, but not necessarily at that time, of aclient device 12. - A
network 10, such as the Internet, but not necessarily restricted thereto, is bidirectionally accessible by any one of a plurality ofclient devices 12. Each of theclient devices 12 can be, but is not limited to, a network enabled smart phone, tablet, or other computing device such as a laptop, palmtop, or desktop personal computer. As new types of computing devices are developed, these too can be employed asclient devices 12. -
Service provider clients 14 are also bidirectionally coupled to thenetwork 12. Theservice provider clients 14, in this instance, provide services of interest to the users of theclient devices 12 and can comprise, but are not limited to, insurance services, record keeping services, banking services, retail services and any other type of service that maintains records that may be of interest to the users of theclient devices 12. - The
client devices 12 are operable to connect with a securedata storage server 16. The service provider clients are also operable to connect with the securedata storage server 16. - As will be described hereafter, the secure
data storage server 16 interacts with theclient devices 12 and theservice provider clients 14 to provide a data storage service that is both secure in what is stored and secure in its sending and receiving. - While
FIG. 1 shows a plurality ofclient devices 12 andservice provider clients 14, the invention is hereafter explained as, for each task, employing just asingle client device 12 interacting with the securedata storage server 16 together with aclient device 12 user selectedservice provider clients 14. - In examples explained hereafter, each
client device 12 may be operated in the presence of a point ofsale terminal 13 with which it can be innear field communication 15. In the examples given hereafter, the client device is, for preference, a portable devices such as a smart phone or tablet. Theportable device 12 can provide information concerning the identity of the user to the point ofsale terminal 13 either bynear field communication 15 or by display of a two dimensional barcode to the point ofsale terminal 13. - The secure
data storage server 16 comprises anCrypt app server 17 that interacts with theclient device 12 when required, and with the point ofsale terminal 13 when required, to receive and send data and requests and commands from and to the point of sale terminal 13 (when it is involved and the client device 12). TheCrypt app server 17 uses the contents and services of one or more personal data store(s) (PDS), described hereafter, to provide secure data storage and useful services derived therefrom. A context data is stored 19 is associated with thecrypt app server 17 and stores data derived and found from the use of the app. - The
crypt app server 17 also provides service for a plurality of apps (computer programmes accessed by aclient device 12 using a graphical interface). Thecrypt app server 17 provides data decryption services to read the stored encrypted information from theservice provider clients 14 and the stored encrypted information provided by theclient device 12. - While the secure
data storage server 16 is shown inFIG. 1 and an integral whole, it is to be appreciated that the present invention also provides that the securedata storage server 16 can be implemented as a so-call “cloud” arrangement where a plurality of singly addressable inter-operative network sites co-operate with one another to provide the functions described. - Attention is next drawn to
FIG. 2 , a schematic diagram illustrating in greater detail the arrangement ofFIG. 1 when executing a task. Where communications are shown, it is to be understood that those communications are provided through thenetwork 10.FIG. 2 contains many elements in common with those shown inFIG. 1 , and it is to be understood that like reference numerals denote like items. - The secure
data storage server 16 comprises, as well as theCrypt app server 17, achange server 18. Thechange server 18 communicates with the selectedservice provider client 14 by means of a service provider to changeserver connection 22 and theclient device 12 communicates with thechange server 18 by a client device to changeserver connection 20. - The secure
data store server 16 also comprises one or more secure personal data store(s) (PDS) 24 where in data is stored in a hyper-secure manner. Theservice provider client 14 is coupled to thepersonal data store 24 by a service provider to personaldata store connection 26 allowing encrypted data to be stored and recovered. Theclient device 12 is coupled to thepersonal data store 24 by means of a client device to personaldata store connection 28, allowing encrypted data to be stored and recovered. - The secure
data storage server 16 also comprises acrypt manager 30 operable to manage the information stored in thepersonal data store 24. - The service provider to personal
data store connection 26 for preference employs a public key to access thepersonal data store 24, with the restriction that communication can only be effected via known IP addresses. - The client device to personal
data store connection 28 for preference employs a private key to access thepersonal data store 24. - According to a first option for stored company data encryption, company data is stored within the
personal data store 24 using the same public key access as is used in the service provider the personaldata store connection 26, thereby providing a technical advantage of avoiding decryption and re-encryption for storage. - According to a second option for stored company data encryption, company data is stored within the
personal data store 24 using a company private encryption key. - According to a first option for stored personal data encryption, personal data is encrypted using the same customer communication key as is used in the client device to personal
data store connection 28. This measure provides a technical improvement by avoiding the necessity of decryption and re-encryption of the personal data. - According to a second option for stored personal data encryption, personal data is encrypted using a customer private encryption key.
- The
change server 18 provides two separate channels, a first channel being for informing theclient device 12 of changes made by theservice provider client 14 and a second channel being for theclient device 12 informing theservice provider clients 14 of changes made by theclient device 12. - A supplier of data for storage in the
personal data store 24 only has rights to access or change specific data. - Although only one
personal data store 24 is shown inFIG. 2 , it is to be appreciated that the invention allows for the provision of multiple individual person data stores and data store elements, sufficient to accommodate the very large amounts of data to be stored and retrieved. Similarly a personal data store may be a subset or partition of another data store, with the appropriate access controls as described previously producing the same effect - Encryption of stored data within the
personal data store 24 with an unknown key (for example the customer's well known word) means that no one else, not even the owners of the personal data store 25 and its peripheral parts, can read data stored therein. The data remains secure for all time. If a user forgets his ability to access, and has to start again, the customer is assured that his “lost” data cannot be accessed by others. - The
personal data store 24 is described hereafter as being employed by a user to create associations or link between suppliers and products and to establish product status. It is to be understood that thepersonal data store 24 is also employed to store identity of supplied products and status, as well as identification for the individual user. - Attention is drawn to
FIG. 3 illustrating exemplary data flow that can be undertaken using the apparatus ofFIG. 2 . In this example, a pension company updates an individual customer's record with a new pension amount. It is to be understood that the invention is not limited to this example, and the company can be for any purpose and amend any record of any kind. - From a start 32 a
first test 34 checks to see if the insurance company is ready to update a customer entry. If there is no updating to be done, operation stays in thefirst test 34. If the insurance company is ready to provide a customer update, afirst operation 36 communicates to theservice provider 14 client software an indication of the type of policy, the policy identifier and the new amount in the pension fund. Theservice provider 14 also comprises an adapter. Asecond operation 38 working through the encryption adapter software finds the customer and object identifier and athird operation 40 also provides data to be sent to thepersonal data store 24 such as indication of the nature of the data to be upgraded, the document identifier, the identity of the final user and the fund amount. It is to be understood that in other circumstances different types of data would be selected for storage in thepersonal data store 24. Afourth operation 42 then has the information encrypted to be sent from theservice provider client 14 to thepersonal data store 24 using the public key and IP address identification as described above. Afifth operation 44 then sends the information to the personal data store (PDS) 24. - The
service provider client 14, in asixth operation 46, then contacts thechange server 18, shown inFIG. 2 , to indicate to the customer that a change has been made to the content of thepersonal data store 24 for data from theservice provider 14 for the particular customer (as can be contacted through the client device 12). The message might be, for example, “fund amounts changed made to document ID 170”. Whatever the message actually is, the message reflects the nature of the change in a non-informative way to avoid giving out information to any eavesdroppers. - Thereafter, the customer can activate the
client device 12 to access thepersonal data store 24 to learn new information. The message provided to the customer by thesixth operation 46 is, for preference, encrypted both from theservice provider client 14 and when delivered to theclient device 12. - The
personal data store 24 has thecrypt manager 30 manage the personal and public data of the customer, and private and public data of the company. - In a second example, the situation is shown where a customer may have several products from the same company. Unfortunately, in this instance the company or company systems are arranged on a “product-silo” basis, and it is often difficult to create a quote single customer view” of all of the products a customer has. In the past, the customer was required to employ complex and error-prone matching of customer data across many company systems.
- The present invention allows creation of a “single customer view” by matching data in the personal data store and company systems and associated challenge response with the customer.
- Attention is next drawn to
FIG. 4 , a schematic diagram showing how thepersonal data store 24 stores two types of data. - The
personal data store 24 provides a store for each of two types of data. - A first type of data is private data and is stored in a person's private
company data memory 48. Theprivate data memory 48 stores such things as company data that is not available for public knowledge. - A second type of data is persons public data stored in a user
public data memory 50. Thepublic data memory 50 stores such things as names and addresses and other publicly available information that helps to identify a particular customer. Further data can be, but is not limited to, first name, surname, and date birth. - Each item of private data held in the user
private data memory 48 may have a corresponding item of persons public data held in thepublic data memory 50, as indicated byassociation arrow 52. - While there is only one
personal data store 24 shown inFIG. 4 , It is to be appreciated that the invention provides for more that onepersonal data store 24 to be provided. The invention also provides that eachpersonal data store 24 can accommodate only one, or more than one of each type private 48 and public 50 data memories. The invention merely requires that the different data can be stored and retrieved as described. - The arrangement of the
personal data store 24, is such that a company may define data to be private to the company, or made public and available to a specific customer. - Similarly the arrangement of the
personal data store 24, is such that a customer may define data to be private to the customer, or made public and available to a specific company. - The status of customer data being made public or private can be changed at the discretion of the customer, either for a limited time/specific interaction, or ongoing
- Similarly the status of company data being made public or private can be changed at the discretion of the company, either for a limited time/specific interaction, or ongoing.
- Attention is next drawn to
FIG. 5 , a flow chart illustrating one way in which the secure data storage server can create a “single customer view” from diverse data, referred to above as the second problem. - The solution to this the second problem is dependent upon the prior solution of the fifth problem as described hereafter with reference to
FIG. 7 . - From a start 54 a
second test 56 looks to see if a single customer view is desired. If thesecond test 56 finds that a single customer view is desired, aseventh operation 58 selects the individual customer for whom a single customer view is to be created. The selection is achieved by selecting from the userpublic data memory 48. - An
eighth operation 60 then selects a product owned by the individual through the company which it has been decided to create a single customer view. This can be selected by the customer, or the single customer view selection started during a customer inspection session where both customers public and private details are available for a single product. - What ever way the company and individual are selected, at the end of the
eighth operation 60 all the information necessary to create a single customer view is available. Aninth operation 62 then scans the contents of thepersonal data store 24, looking for matches between the selected individual customer, details of which are found in the personspublic data memory 48, and the selected company and products found in the persons fivedata memory 50. - A
third test 64 checks to see if all of the records possible to the end of thepersonal data store 24 have been checked. - If the
third test 64 finds that there are still records remaining to be searched in thepersonal data store 24, afourth test 66 checks to see if a match between the selected individual and the selected company has been found. If thefourth test 66 finds that no match has been found, control is passed back to theninth operation 62 to continue checking for matches. - If the
fourth test 66 finds that a match has been found between the selected individual and a selected company, atenth operation 68 adds customer and company product details to an agglomerated single customer view. Control is then passed back to theninth operation 62 to continue checking thepersonal data stores 24 for matches. - If the
third test 64 finds that thepersonal data store 24 has been totally checked and no further matches will be found, andeleventh operation 70 stores the aggregated single customer view, as collected in thetenth operation 68, in, for preference, a customer personal program area such as an App allowing a customer to call up their single customer view at any time. - For preference, the single customer view is used or maintained on each occasion that the customer updates are personal information (e.g. telephone number) and the personal program area (App) informs the company product systems of the changes.
- A third problem arises when a customer requires to communicate with the right person in the company. Finding the right person to talk to can be very error prone and a customer is required constantly to provide the same security of personal data at each step along the chain until the right person is reached.
- The present invention allows an individual to avoid such difficulties.
- To obtain access to the right support from a company, typically at least three sets of data are required. A first set of data identifies the product that the customer needs support with. A second set of data is the details within that company specific to the product. A third set of data comprises authentication information to allow a support person to know they are dealing with the product owner. In addition, other information may be required such as whether or not the customer has been allocated a specific relation manager and details of any can previous communications that have been made around the product and around the support need.
- The secure
data storage server 16, as earlier described, comprises a userpublic data memory 46 and a userprivate data memory 50. The company links a product with a customer, thereby creating an object which is stored in the userprivate data memory 50 data to represent that product, the record containing all key information around that product. - If available, the company also adds extra information regarding support which is not typically displayed to the customer. Such information can include: which phone number or video call address is correct specific to the product, and the customer is in a specific segment, for example, “high net worth” or “must retain”. Please contact details may be personalised to phone numbers and/or addresses that have reduce queues or higher trained staff, to give but two examples. The extra information can also give details of whether the customer has a specific relationship manager, broker etc, and provide details of this, and associated contact information.
- The customer, using the smart
phone client device 12, places a call through thecrypt app server 17, with the customer providing information as for which product they require support. - The
crypt app server 17 then employs thepersonal data store 24 to contain information relative to the company and product and to route the contact, which can be a voice call, a video call, a conference call or similar communication, to the correct part of the company, appropriate relationship manager, and so on. In addition, the public key for the customer can be passed the company which allows the company to retrieve identity and/or indication information from thepersonal data store 24 through integration with interactive voice systems, meaning that information does not require to be provided by the customer. - Furthermore, when an agent of the company is connected with the call, the customer public key and
personal data store 24 access allows information around the product the customer requires support for in any previous correspondence to be provided to the agent of the company automatically. - Attention is drawn to
FIG. 6A , an exemplary flowchart illustrating one of many ways in which the invention can be employed to overcome the third problem.FIG. 6A shows how a Link is created between a product and a user. - From a start 74 a
fifth test 76 looks to see if an association or “link” is to be created between an individual user and a product. Such an association can be set up when the user first purchases a product, or can be set up later when a product requires assistance. In any event, the action shown inFIG. 6A takes place when theservice provider 14 is online and has access to the personal data of a user. - If no association is to be made, control is passed to the
fifth test 76. If an association or link is to be made, control is passed to atwelfth operation 78 that creates a product support object stored within theprivate data memory 50. As earlier stated, the support object includes information identifying the product that the customer needs support with, any data from the supplying company specific to the product, and authentication information to allow a support person to be aware whether or not they are dealing with the product owner. Other information can also be supplied, as stated, whether or not the customer has been allocated a specific relation manager, and details of any previous communication made around the product and around support need. - Other information includes direction of any calls from the product customer to the product supplying company.
- Attention is next drawn to
FIG. 6B , an exemplary flow chart illustrating one way in which thecrypt app server 17 can interact with a user making a call seeking product assistance from a company. - From a start 80 a
sixth test 82 looks to see whether thecrypt app server 17 call has received from a mobiletelephone client device 12 seeking product assistance from a company. If thesixth test 82 finds that such a call has been received, athirteenth operation 84 seeks to obtain the product identity from the user is seeking product assistance. If aseventh test 86 finds that no information that can be identified has been obtained, control is passed back to thesixth test 82 thereby effectively terminating the process. If theseventh test 86 finds that the product has been adequately identified, afourteenth operation 88 gets the personal information and the product support object from the personal data stored 24 and afifteenth operation 90 gets the retrieved data of thefourteenth operation 88 ready to show to the company call recipient when a call is made. Asixteenth operation 92 then places the call to the company and to the designated individual from the product support object until aneighth test 92 detects that the caller has hung up. Control then passes to aseventeenth operation 96 that has the crypt app server terminate the call and passes control back to the sixtest 82 ready to receive any other incoming call seeking product assistance for my company. - At the end of this process the company can add new information to the product support object giving details obtains during the course of the call that has been made.
- A fourth problem arises when a customer comes to purchase financial or other service-based products online. In such circumstances, the customer often has to provide a significant amount of personal details, identity details, historic and perhaps payment details. Such information must be repeated for each new supplier although the data required often varies only slightly, if at all, across the supplier. The present invention provides minimisation of data required to process product applications the use of the
personal data store 24, including (if required) authentication of the user. - The customer, using the
client device 12 via thecrypt app server 17, requests setting up a product (i.e. he/she would like to take up an offer to purchase the product or service). In registering the product, the customer initially provides only indication of the type of product (e.g. car insurance) and indication for the product (for example, policy identification). - At this point, the secure
data storage server 16 informs the selected the supplier that they would like to link that supplier product to their website and/or application. To prevent the possibility of fraud, the supplier requires additional information to ensure that the customer is who they say they are. Such information can include postcode, dates of birth, bank used for direct debits, and so on. This is a validation template, that is, template of the type of information that must be valid in order to pass security for the supplier, and typically, some items of information may be more important than others. For example, the date of birth may be more important the mobile phone numbers which can perform out of date. - The secure
data storage server 16 uses the personal data stored in the userpublic data memory 48 and elsewhere in the personal data store to match the validation template. Only when the validation data is not available in thepersonal data store 24 and/or does not match that held by the supplier, is the customer prompted to supply the correct data near the Or website. The vast majority of data will not need to be entered by the customer, and only when there is absence of data or a mismatch. - If all the validation is passed, then the account becomes linked to the customer in the
personal data store 24, and appropriate product information is pushed to the customer via thepersonal data store 24 and the securestatus storage service 16 and/or itsapp 17. Such information can include, in the case of insurance, policy details, policy documents, further office and so on. - A fifth problem can be resolved where use of the
personal data store 24 assists in customer transactions when a particular customer desires to aggregate all of their existing products or policies with one or more suppliers into a single application or website. To do this in the manner previously available, entails supplying existing logon and/or identity information for each product, being manually entered by the customer. Such a process is not only very insecure but is also time consuming and requires the customer to have set up full access for each product on previous occasions. - The customer using the
client device 12 has an account with thepersonal data store 24. This account, as earlier stated, is hyper-secure with all data highly encrypted in thepersonal data store 24 and encrypted during transmission (e.g. using HTTPS). The personal data store access also has a scheme for identifying a user, for example but not limited to, provision of a user name and/or password. There is also a “private key” scheme for decrypting data whereby, as an example, the customer provides memorable words. The memorable words is then used as the encryption/decryption key for data from the customer. - Further security schemes may also be provided including registration of physical devices such as tablets and phones running an application interface (App). Once a user has authenticated themselves, they can push or pull information into and out of the
personal data store 24 via an appropriate interface program (app) or website accessing the application program interface (API) for thepersonal data store 24, using the customer private key. - As was earlier stated, the
personal data stores 24 personal information, such as date of birth, name, addresses, asset such as cars etc, in a persons public data memory 48 (shown inFIG. 4 ) and stores private information (such as bank accounts, insurance policies, mobile accounts and so on) in a userprivate data memory 50, also shown inFIG. 4 . Other information can also be held such as communications from suppliers, policy documents, applications for product etc. - For each product or policy that a customer has, then any form of physical documents such as policy documents, statements and so on, can be printed with a two dimensional barcode (QR code), barcodes or similar identifying image. Where a customer does not have any physical documents, then the supplier can email them their identifying image, or can otherwise text or distribute to the customer. The identifying code, such as a QR code, identifies the company, type of product and the product identifier, such as a policy number. For additional security, these identities may not be those publicly used, but maybe, instead be in internal identifying used by the company.
- The customer then uses the
crypt app server 17 to send the identifying code. The sending of identifying code causes the product automatically to be linked. This is in contrast with the situation where the customer is communicating without the use of a QR code or similar, in which case the customer would have to manually enter the identifying product information. - Using the customer's public key, the company is able to securely access the customer's
personal data store 24 and to review both the internal identifying information scanned from the image code (QR), and information useful to authenticate that a policy of product does indeed belong to the customer, such information including address, date of birth, and any other relevant personal identifiable data. - The company then runs an appropriate risk-based data matching routine that determines if the customer information retrieved from the
personal data store 24 matches that retrieved from the product or policy identified if the information does not match, but the mismatch is very close, the company asks the customer one or more questions, using thecrypt app server 17 for correct data to match the selected policy or product. - In those circumstances where the match is not perfect, or the additional security questions do not create a match, the company asks the customer one or more security questions using the
crypt app server 17 that are not typically stored in the customer'spersonal data store 24. - Assuming there is sufficient match to positively identify the customer is the owner of the product or policy, then an appropriate “product/policy object” is created in the personal data stored 24, together with associated documentation. This then enables the customer to interact and manage with the product policy object using the
crypt app server 17 without further authentication being required. - Attention is drawn to
FIG. 7 showing an exemplary flow chart illustrating one possible way in which the present invention assists to resolve the fifth problem. - The left-hand column of
FIG. 7 shows the activities that take place within thecrypt app server 17 in its transactions with auser 12. The right-hand column ofFIG. 7 shows operations undertaken within the securedata storage server 16. - From a start and 98, in an
eighteenth operation 100 thecustomer 12 contacts thecrypt app server 17 and indicates in anineteenth operation 102 what supplier is required and the type of product that is required from the supplier. Atwentieth operation 104 then requests to thecrypt app server 17 that a link be formed and passes the request to a twentyfirst operation 106 in the securedata storage server 16. - In a twenty
second operation 108 the supplier accesses the personal data, as described above, of the customer and applies the validation test to see if the customer is genuine. Aninth test 110 checks to see if data is needed from the customer, the customer Supply data also being as described above. If no data is required from the Customer, atenth test 112 looks to see if the customers request has passed the validation test. If the customer's approach has not passed the validation test, the process ends viaexit 116. If the customer's approach has passed the validation test, the interaction between the supplier and the customer carries on throughcontinuation 118. - If the
ninth test 110 finds that more details are needed from the customer to be applied to the validation test, the ninth test passes the request to a twentythird operation 114 of thecrypt app server 17 which gathers stay requested information, as described above, and includes it in the criteria for thetenth test 112 to determine whether or not the validity test has been passed. - A sixth problem in which the present invention, by use of the
personal data store 24, can assist occurs when a customer, at a retail outlet, desires to purchase a product. This often leads the customer to provide significant amounts of personal information, such provision being made by word-of-mouth and data entry being made by a person in attendance, typically at a point ofsale terminal 13. Such a time-consuming process that is often repeated, as will be seen, is unnecessary when the present invention is employed. - Returning attention briefly back to
FIG. 1 , in such a sales situation theclient device 12 is close by the point ofsale terminal 13. As a first option, theclient device 12 can providenear field communication 15 with the point ofsale terminal 13. As another option, the point ofsale terminal 13 can capture an image displayed on the screen of theclient device 13. The image represents the identity of theclient device 12 and points to personal data and company data related thereto. - The point of
sale terminal 13 is put into communication with thecrypt app server 17, indicated inFIG. 1 by broken line. The point ofsale terminal 13 relays thenear field communication 15 from theclient device 12, and/or transmits the captured image to thecrypt app server 17. - As earlier stated, the
personal data store 24 stores the customers personal identification data in the user public data memory 48 (shown inFIG. 4 ) and stores the customers company memory in the userprivate data memory 50. - The
crypt app server 17 employs the facilities of the securedata storage server 16. The customer may desire to share their personal information (name address etc) and product information (bank account etc) with a retailer in order to simplify and speed up the purchase process, and to create a new policy or contract. Other information could also be useful for the retailer. Such information can include authentication tokens as proof of identity, credit history and credit rating, copies of existing contracts such as utility bills, and so on. - The
crypt app server 17 uses the customer public key to push a message to the customer telling the customer what information the retailer wishes to obtain in order to set up a contract. The customer then has the option to except this data requests, or to reject it. - If the customer chooses to accept the request to access this information, this is provided to the retailer. If all of the information is available in the customers
personal data store 24, then the retailer can create a contract or policy immediately, and can push the policy or contract into thecrypt app server 17. The customer may then see the purchased product information. - If the customers
personal data store 24 does not contain all information required by the retailer, then further questions/obtain this data are displayed to the point of sale operator in the store prompting them to as the customer to provide the missing information. This is deemed to be more efficient than prompting the customer using messages from thecrypt app server 17, but may be done via the client device for some identifying information (e.g. provide fingerprint, or password) that should not be shared with the point of sale operator. - Once a missing data is provided by the customer, this information is also stored in the customers
personal data store 24, assuming the customer's happy so to do, so that the need for the customer to be asked the same question again disappears. - Yet another problem that can be solved by use of the
personal data store 24 lies in, for example, loyalty programs. - Attention is once again redrawn to
FIG. 1 . - The
personal data store 24 for a customer is hyper-secure with all of the data encrypted in the personal data store and encrypted during transmission to and from the personal data stored. Thepersonal data store 24 also includes a scheme for identifying a customer, for example, a username combined with a password, and a private key scheme for decrypting data, such as employing a memorable word to act as an encryption key for that data. Further security schemes may also be put into place including registration of physical devices such as tablets, where phones and other apparatus. Once a customer has authenticated themselves they may pull or push information into thepersonal data store 24 with an appropriate app, website and application programming interface (API), using the customer private key. - The customer can use this facility to associate one or more loyalty accounts with the
personal data store 24 via thecrypt app server 17 employing the securedata storage server 16. - The
crypt app server 17 can then employ the app as part of one or more loyalty programs. This can include: registering that an appropriate purchase was made that is eligible within a particular loyalty program; registering that an appropriate access to services was made that is eligible within a particular loyalty program; pushing loyalty program offers to the crypt app server using the associated app including when and perhaps where purchase was made; and using redemption points from a loyalty program for associated discounts at a point ofsale 13. - To summarise the invention as described:
- 1. Each customer has a personal data store where data storage and access is secured by public/private key encryption, and encrypted communications using, for example, HTTPS encryption.
2. Each company has a personal data store for each customer, where data and access is secured by public/private key encryption, and communication by using encryption.
3. The service maintains a context data store of relationships between customers and companies and service/products provided where data store and access is secured by public/private key encryption and communications using encryption
4. Furthermore there are IP address restrictions and/or the use of Virtual Private |Network) (VPN) tunnels for accessing customer, company and context data stores (e.g. company can only access customers data store where request originates from a specific known IP range/VPN)
5. Further Security is provided by: thepersonal data store 24 being unique to an individual—access to one store does not provide access to any other store (and hence other customers data)
6. Further Security is also provided by the Personally identifiable customer data only being stored in the customer personal data store; and the requirement that the customer must give explicit read/write/create access to companies to access the customer personal data store; and companies must access through known IP address ranges.
7. Yet further security is provided by the product information for a customer being stored in a company personal data store specific to that customer, which the company may give explicit read access to some items of data to the customer. This personal data store does not have customer personally identifiable data—hence if compromised could not establish which customer the data is for
8. Still more security is provided by the context data store, that describes the relationship between customers, companies and products/services, for example that a particular customer has an identified product from a specified company, holds only internal representations of customer, company and product, hence if data compromised it could not be possible to establish customer, company or product - In addition, the personal data stores can be virtual—e.g. a company personal data store may be a protected area within a customers personal data store. However personal data stores are always individual to specific customers, and access to one
PDS 24 does not provide information for other customers - The invention has so far been described with reference to specific examples. It is to be appreciated that those skilled in the art will be aware of many variants and modifications that can be applied in the examples given above without deviating from the invention as claimed.
- The invention is further explained and clarified by the claims appended hereafter.
Claims (21)
1.-40. (canceled)
41. A system for controlling bidirectional communication comprising:
a server communicatively connected to at least one data store comprising application data having public data and private data;
a security mechanism coupled to the server; and
an application capable of bidirectionally communicating with the server via the security mechanism, the security mechanism further comprising,
an application programming interface that can be used by the application to interact with the server;
a security condition, wherein the security mechanism determines if the security condition is met, the determination including at least using first application data from the application, wherein the first application data is encrypted and stored using a first private key, and using second service provider data from the server, wherein the second service provider data is encrypted and stored using a second private key.
42. The system according to claim 41 , wherein the determination that a security condition is met includes receiving and sending application data, service provider data, requests and commands.
43. The system according to claim 41 , wherein the server accesses the at least one data store only from a previously registered IP address, or a token.
44. The system of claim 41 , wherein the security mechanism is configured to make a determination whether the application supplied a password or a token, as a condition for the security condition being met.
45. The system of claim 41 , wherein the security mechanism is capable of encrypting one or more of the first and second private keys.
46. The system of claim 45 , wherein the security mechanism stores the encrypted first or the second private keys in the data store.
47. The system of claim 46 , wherein the password or the token is used by the security mechanism to determine whether to decrypt the first or the second private keys from the data store.
48. A device, comprising:
a server communicatively connected to at least one data store comprising application data having public data and private data;
a security device coupled to the server; and
an application capable of bidirectionally communicating with the server via the security mechanism, the security mechanism further comprising,
an application programming interface that can be used by the application to interact with the server when a security condition is determined to be met by the security device, the determination including at least using first application data from the application, wherein the first application data is encrypted and stored using a first private key, and using second service provider data from the server, wherein the second service provider data is encrypted and stored using a second private key.
49. The device according to claim 48 , wherein the determination that a security condition is met includes receiving and sending application data, service provider data, requests and commands.
50. The device according to claim 48 , wherein the server accesses the at least one data store only from a previously registered IP address or a token.
51. The device of claim 48 , wherein the security mechanism is configured to make a determination whether the application supplied a password or a token, as a condition for the security condition being met.
52. The device of claim 51 , wherein the security device is capable of encrypting one or more of the first and second private keys.
53. The device of claim 52 , wherein the security device stores the encrypted first or the second private keys in the data store.
54. The device of claim 53 , wherein the password or the token is used by the security device to determine whether to decrypt the first or the second private keys from the data store.
55. A method for controlling bidirectional communication, the method comprising the steps of:
providing at least one server communicatively connected to at least one data store comprising first data having public data and private data relating to an application, wherein the server is bidirectionally communicating with the application and a third-party device;
obtaining the first data from the at application, wherein the first data is encrypted and stored using a first private key;
obtaining second data from the at least one third-party device, wherein the second data is encrypted and stored using a second private key;
receiving a request via an application programming interface from the application to interact with the third party device; and
using a security mechanism capable of determining if the application can interact with the third-party device.
56. The method of claim 55 , wherein the step of using a security mechanism further comprises:
receiving a password or a token that is used to determine if a security condition has been met.
57. The method of claim 55 , wherein the step of receiving a request further comprises:
providing a user interface to the application and receiving the request via the user interface.
58. The method of claim 57 , wherein the step of using further comprises encrypting one or more of the first and second private keys.
59. The method of claim 58 , wherein the step of using further comprises storing the encrypted first or the second private keys in the data store.
60. The method of claim 59 , wherein the step of using further comprises using the password or the token to determine whether to decrypt the first or the second private keys from the data store.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/002,991 US20210042804A1 (en) | 2014-08-12 | 2020-08-26 | Data security system and method |
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB1414302.8 | 2014-08-12 | ||
| GBGB1414302.8A GB201414302D0 (en) | 2014-08-12 | 2014-08-12 | Data security system and method |
| PCT/GB2015/000234 WO2016024076A1 (en) | 2014-08-12 | 2015-08-11 | Data security system and method |
| US201715503397A | 2017-02-12 | 2017-02-12 | |
| US17/002,991 US20210042804A1 (en) | 2014-08-12 | 2020-08-26 | Data security system and method |
Related Parent Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/503,397 Continuation US10762543B2 (en) | 2014-08-12 | 2015-08-11 | Data security system and method |
| PCT/GB2015/000234 Continuation WO2016024076A1 (en) | 2014-08-12 | 2015-08-11 | Data security system and method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20210042804A1 true US20210042804A1 (en) | 2021-02-11 |
Family
ID=51629679
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/503,397 Active 2036-02-21 US10762543B2 (en) | 2014-08-12 | 2015-08-11 | Data security system and method |
| US17/002,991 Abandoned US20210042804A1 (en) | 2014-08-12 | 2020-08-26 | Data security system and method |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/503,397 Active 2036-02-21 US10762543B2 (en) | 2014-08-12 | 2015-08-11 | Data security system and method |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US10762543B2 (en) |
| EP (1) | EP3180899A1 (en) |
| CN (1) | CN107111721A (en) |
| AU (1) | AU2015303012A1 (en) |
| GB (1) | GB201414302D0 (en) |
| WO (1) | WO2016024076A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11620888B2 (en) | 2021-04-19 | 2023-04-04 | Bank Of America Corporation | System for detecting and tracking an unauthorized person |
| US11769324B2 (en) | 2021-04-19 | 2023-09-26 | Bank Of America Corporation | System for detecting unauthorized activity |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7533808B2 (en) | 2005-02-09 | 2009-05-19 | Yuh-Shen Song | Privacy protected cooperation network |
| CN107871086A (en) * | 2017-10-13 | 2018-04-03 | 平安科技(深圳)有限公司 | Sensitive information screen method, application server and computer-readable recording medium |
| US12125054B2 (en) | 2018-09-25 | 2024-10-22 | Valideck International Corporation | System, devices, and methods for acquiring and verifying online information |
| US11029875B2 (en) * | 2018-09-28 | 2021-06-08 | Dell Products L.P. | System and method for data storage in distributed system across multiple fault domains |
| US11374922B2 (en) | 2018-12-03 | 2022-06-28 | At&T Intellectual Property I, L.P. | Generation of a persona key |
| CN110012107B (en) * | 2019-04-15 | 2022-07-26 | 深圳市网心科技有限公司 | A data communication method, device, device, system and storage medium |
| CN110661786B (en) * | 2019-09-04 | 2021-10-08 | 杭州利项科技有限公司 | A User Data System Based on Chain Relationship |
| US11403649B2 (en) | 2019-09-11 | 2022-08-02 | Toast, Inc. | Multichannel system for patron identification and dynamic ordering experience enhancement |
| CN112612922A (en) * | 2020-12-16 | 2021-04-06 | 平安普惠企业管理有限公司 | Method and device for safely storing mobile phone number, computer equipment and medium |
| US11922515B1 (en) * | 2023-04-28 | 2024-03-05 | Peppercorn AI Technology Limited | Methods and apparatuses for AI digital assistants |
Citations (33)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
| US20030158960A1 (en) * | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
| US20030226024A1 (en) * | 2002-06-04 | 2003-12-04 | Qwest Communications International Inc. | Secure internet documents |
| US20040030887A1 (en) * | 2002-08-07 | 2004-02-12 | Harrisville-Wolff Carol L. | System and method for providing secure communications between clients and service providers |
| US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
| US6856975B1 (en) * | 2000-03-30 | 2005-02-15 | Verify & Protect Inc. | System, method, and article of manufacture for secure transactions utilizing a computer network |
| US20060004674A1 (en) * | 2001-02-09 | 2006-01-05 | International Business Machines Corporation | System and method for maintaining customer privacy |
| US20060047966A1 (en) * | 2004-08-24 | 2006-03-02 | Canon Kabushiki Kaisha | Data-processing system and method for controlling same, computer program, and computer-readable recording medium |
| US20060229959A1 (en) * | 2005-04-07 | 2006-10-12 | Yaacov Heidingsfeld | Customized automation of financial asset trading |
| US20070106892A1 (en) * | 2003-10-08 | 2007-05-10 | Engberg Stephan J | Method and system for establishing a communication using privacy enhancing techniques |
| US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
| US7254569B2 (en) * | 2004-05-12 | 2007-08-07 | Microsoft Corporation | Intelligent autofill |
| US20070204329A1 (en) * | 2005-03-16 | 2007-08-30 | Dt Labs, Llc | System, Method and Apparatus for Electronically Protecting Data Associated with RFID Tags |
| US20080152149A1 (en) * | 2006-12-21 | 2008-06-26 | Frederic Bauchot | Secure data distribution |
| US20080228867A1 (en) * | 2007-01-24 | 2008-09-18 | Boston Virtual Imaging, Llc | System and Methods for Synchronizing Data and Media with Third Party Websites and Marketing Materials |
| US20090132813A1 (en) * | 2007-11-08 | 2009-05-21 | Suridx, Inc. | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones |
| US20090292641A1 (en) * | 2007-02-21 | 2009-11-26 | Weiss Kenneth P | Universal secure registry |
| US7793141B1 (en) * | 2008-05-15 | 2010-09-07 | Bank Of America Corporation | eCommerce outage customer notification |
| US20100228987A1 (en) * | 2009-03-06 | 2010-09-09 | Sony Corporation | System and method for securing information using remote access control and data encryption |
| US7832646B1 (en) * | 2006-11-20 | 2010-11-16 | David Leason | Universal contactless gateway for point of sale terminal |
| US20110010340A1 (en) * | 2009-04-08 | 2011-01-13 | Research In Motion Limited | System and Method for Managing Items in a List Shared by a Group of Mobile Devices |
| US20110066452A1 (en) * | 2009-09-14 | 2011-03-17 | Eldon Technology Limited | Systems and methods for insuring digital media download transactions |
| US20110153512A1 (en) * | 2005-03-16 | 2011-06-23 | Dt Labs, Llc | Apparatus for Customer Authentication of an Item |
| US20130111217A1 (en) * | 2011-10-28 | 2013-05-02 | Logmein, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
| US20130159699A1 (en) * | 2011-12-16 | 2013-06-20 | F-Secure Corporation | Password Recovery Service |
| US20130208893A1 (en) * | 2012-02-13 | 2013-08-15 | Eugene Shablygin | Sharing secure data |
| US20140143838A1 (en) * | 2012-11-21 | 2014-05-22 | Solomo Identity, Llc | Personal Data Management System With Global Data Store |
| US20140164777A1 (en) * | 2012-12-12 | 2014-06-12 | Richard J. Wielopolski | Remote device secure data file storage system and method |
| US20140164790A1 (en) * | 2012-12-06 | 2014-06-12 | David Dodgson | Storage security using cryptographic splitting |
| US20140201331A1 (en) * | 2011-05-24 | 2014-07-17 | Corethree Limited | Platform for the delivery of content and services to networked connected computing devices |
| US8924724B2 (en) * | 2010-02-10 | 2014-12-30 | SecurenCrypt, LLC | Document encryption and decryption |
| US20150161350A1 (en) * | 2013-12-06 | 2015-06-11 | International Business Machines Corporation | Selectable message barcode for healthcare |
| US20150293980A1 (en) * | 2014-04-11 | 2015-10-15 | Cellco Partnership (D/B/A Verizon Wireless) | Data compass |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0917119A3 (en) * | 1997-11-12 | 2001-01-10 | Citicorp Development Center, Inc. | Distributed network based electronic wallet |
| US7162451B2 (en) | 2001-11-30 | 2007-01-09 | International Business Machines Corporation | Information content distribution based on privacy and/or personal information |
| CN100518072C (en) | 2006-12-27 | 2009-07-22 | 华为技术有限公司 | A method and system for processing the client request |
| WO2010090822A2 (en) * | 2009-01-20 | 2010-08-12 | Titanium Fire Ltd. | Personal data manager systems and methods |
| US9563778B2 (en) | 2011-11-14 | 2017-02-07 | St-Ericsson Sa | Method for managing public and private data input at a device |
| CN102655508B (en) * | 2012-04-19 | 2015-03-04 | 华中科技大学 | Method for protecting privacy data of users in cloud environment |
| CN103795780A (en) * | 2013-12-06 | 2014-05-14 | 中国科学院深圳先进技术研究院 | Cloud storage data protection method and device |
-
2014
- 2014-08-12 GB GBGB1414302.8A patent/GB201414302D0/en not_active Ceased
-
2015
- 2015-08-11 WO PCT/GB2015/000234 patent/WO2016024076A1/en not_active Ceased
- 2015-08-11 AU AU2015303012A patent/AU2015303012A1/en not_active Abandoned
- 2015-08-11 US US15/503,397 patent/US10762543B2/en active Active
- 2015-08-11 EP EP15754279.6A patent/EP3180899A1/en not_active Withdrawn
- 2015-08-11 CN CN201580055437.8A patent/CN107111721A/en active Pending
-
2020
- 2020-08-26 US US17/002,991 patent/US20210042804A1/en not_active Abandoned
Patent Citations (42)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
| US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
| US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
| US8271336B2 (en) * | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
| US6856975B1 (en) * | 2000-03-30 | 2005-02-15 | Verify & Protect Inc. | System, method, and article of manufacture for secure transactions utilizing a computer network |
| US20030158960A1 (en) * | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
| US20060004674A1 (en) * | 2001-02-09 | 2006-01-05 | International Business Machines Corporation | System and method for maintaining customer privacy |
| US7222100B2 (en) * | 2001-02-09 | 2007-05-22 | International Business Machines Corporation | System and method for maintaining customer privacy |
| US20030226024A1 (en) * | 2002-06-04 | 2003-12-04 | Qwest Communications International Inc. | Secure internet documents |
| US20040030887A1 (en) * | 2002-08-07 | 2004-02-12 | Harrisville-Wolff Carol L. | System and method for providing secure communications between clients and service providers |
| US20070106892A1 (en) * | 2003-10-08 | 2007-05-10 | Engberg Stephan J | Method and system for establishing a communication using privacy enhancing techniques |
| US7254569B2 (en) * | 2004-05-12 | 2007-08-07 | Microsoft Corporation | Intelligent autofill |
| US20060047966A1 (en) * | 2004-08-24 | 2006-03-02 | Canon Kabushiki Kaisha | Data-processing system and method for controlling same, computer program, and computer-readable recording medium |
| US20070204329A1 (en) * | 2005-03-16 | 2007-08-30 | Dt Labs, Llc | System, Method and Apparatus for Electronically Protecting Data Associated with RFID Tags |
| US8613107B2 (en) * | 2005-03-16 | 2013-12-17 | Dt Labs Development, Llc | System, method and apparatus for electronically protecting data associated with RFID tags |
| US8359271B2 (en) * | 2005-03-16 | 2013-01-22 | Dt Labs, Llc | Apparatus for customer authentication of an item |
| US20110153512A1 (en) * | 2005-03-16 | 2011-06-23 | Dt Labs, Llc | Apparatus for Customer Authentication of an Item |
| US20060229959A1 (en) * | 2005-04-07 | 2006-10-12 | Yaacov Heidingsfeld | Customized automation of financial asset trading |
| US7832646B1 (en) * | 2006-11-20 | 2010-11-16 | David Leason | Universal contactless gateway for point of sale terminal |
| US7933414B2 (en) * | 2006-12-21 | 2011-04-26 | International Business Machines Corporation | Secure data distribution |
| US20080152149A1 (en) * | 2006-12-21 | 2008-06-26 | Frederic Bauchot | Secure data distribution |
| US20080228867A1 (en) * | 2007-01-24 | 2008-09-18 | Boston Virtual Imaging, Llc | System and Methods for Synchronizing Data and Media with Third Party Websites and Marketing Materials |
| US20090292641A1 (en) * | 2007-02-21 | 2009-11-26 | Weiss Kenneth P | Universal secure registry |
| US20130061055A1 (en) * | 2007-11-08 | 2013-03-07 | SurlDx, Inc. | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones |
| US20090132813A1 (en) * | 2007-11-08 | 2009-05-21 | Suridx, Inc. | Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones |
| US7793141B1 (en) * | 2008-05-15 | 2010-09-07 | Bank Of America Corporation | eCommerce outage customer notification |
| US20100228987A1 (en) * | 2009-03-06 | 2010-09-09 | Sony Corporation | System and method for securing information using remote access control and data encryption |
| US8254890B2 (en) * | 2009-04-08 | 2012-08-28 | Research In Motion Limited | System and method for managing items in a list shared by a group of mobile devices |
| US20110010340A1 (en) * | 2009-04-08 | 2011-01-13 | Research In Motion Limited | System and Method for Managing Items in a List Shared by a Group of Mobile Devices |
| US20110066452A1 (en) * | 2009-09-14 | 2011-03-17 | Eldon Technology Limited | Systems and methods for insuring digital media download transactions |
| US8924724B2 (en) * | 2010-02-10 | 2014-12-30 | SecurenCrypt, LLC | Document encryption and decryption |
| US20140201331A1 (en) * | 2011-05-24 | 2014-07-17 | Corethree Limited | Platform for the delivery of content and services to networked connected computing devices |
| US20130111217A1 (en) * | 2011-10-28 | 2013-05-02 | Logmein, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
| US8788843B2 (en) * | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
| US20130159699A1 (en) * | 2011-12-16 | 2013-06-20 | F-Secure Corporation | Password Recovery Service |
| US20130208893A1 (en) * | 2012-02-13 | 2013-08-15 | Eugene Shablygin | Sharing secure data |
| US20140143838A1 (en) * | 2012-11-21 | 2014-05-22 | Solomo Identity, Llc | Personal Data Management System With Global Data Store |
| US20140164790A1 (en) * | 2012-12-06 | 2014-06-12 | David Dodgson | Storage security using cryptographic splitting |
| US20140164777A1 (en) * | 2012-12-12 | 2014-06-12 | Richard J. Wielopolski | Remote device secure data file storage system and method |
| US8930700B2 (en) * | 2012-12-12 | 2015-01-06 | Richard J. Wielopolski | Remote device secure data file storage system and method |
| US20150161350A1 (en) * | 2013-12-06 | 2015-06-11 | International Business Machines Corporation | Selectable message barcode for healthcare |
| US20150293980A1 (en) * | 2014-04-11 | 2015-10-15 | Cellco Partnership (D/B/A Verizon Wireless) | Data compass |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11620888B2 (en) | 2021-04-19 | 2023-04-04 | Bank Of America Corporation | System for detecting and tracking an unauthorized person |
| US11769324B2 (en) | 2021-04-19 | 2023-09-26 | Bank Of America Corporation | System for detecting unauthorized activity |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2015303012A1 (en) | 2017-03-16 |
| WO2016024076A1 (en) | 2016-02-18 |
| US20170243267A1 (en) | 2017-08-24 |
| CN107111721A (en) | 2017-08-29 |
| EP3180899A1 (en) | 2017-06-21 |
| US10762543B2 (en) | 2020-09-01 |
| GB201414302D0 (en) | 2014-09-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20210042804A1 (en) | Data security system and method | |
| US12073402B2 (en) | User and entity authentication through an information storage and communication system | |
| US9430767B2 (en) | Tokenization in mobile environments | |
| CN100422988C (en) | A User-Centric Context-Aware Transition Model | |
| JP5850587B1 (en) | Personal information account banking | |
| RU2662404C2 (en) | Systems and methods for personal identity verification and authentication | |
| JP2005512234A6 (en) | Customer-centric context-aware switching model | |
| US20130013507A1 (en) | System to Create and Manage Payment Accounts | |
| US12120238B2 (en) | Secure digital information infrastructure | |
| US12321970B2 (en) | Systems and methods for transferring a gift using an information storage and communication system | |
| US20160335608A1 (en) | Virtual Payment Device Including a Scannable Code | |
| US9384330B2 (en) | Providing user attributes to complete an online transaction | |
| CN113590930A (en) | System and method for data access control using short-range transceivers | |
| US12074979B2 (en) | Secure digital information infrastructure | |
| WO2019130809A1 (en) | Transaction management system, transaction management device, transaction management method, and transaction management program | |
| US11087321B2 (en) | Securely upgrading an untrusted channel into a trusted channel | |
| US20210133760A1 (en) | Multi-factor authentication for business to consumer transactions | |
| WO2019173081A1 (en) | Systems and methods for digitizing payment card accounts | |
| US20240146795A1 (en) | Sharing contact informataion | |
| US20260050917A1 (en) | Payment Credential Protection | |
| JP2020187570A (en) | Document preparation system, document preparation method and server device | |
| JP2002133096A (en) | Authenticating system, transaction person side system, business unit side system, authenticating method and recording medium recording the same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |