[go: up one dir, main page]

WO2014042687A1 - A global identification number and portal platform technology - Google Patents

A global identification number and portal platform technology Download PDF

Info

Publication number
WO2014042687A1
WO2014042687A1 PCT/US2013/032046 US2013032046W WO2014042687A1 WO 2014042687 A1 WO2014042687 A1 WO 2014042687A1 US 2013032046 W US2013032046 W US 2013032046W WO 2014042687 A1 WO2014042687 A1 WO 2014042687A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
code
provider
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2013/032046
Other languages
French (fr)
Inventor
Kevin M. BROPHY
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2014042687A1 publication Critical patent/WO2014042687A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Definitions

  • the present invention relates to systems and methods for identifying or authenticating an individual and more particularly related to systems and methods that provide a unique combination of one global identity number and, in some cases, unique personal QR codes or similar technologies such as near field communication (NFC) for every person on earth, and may also function as a portal for accessing services (a 'two-sided network').
  • NFC near field communication
  • Personal identification systems may be based on something someone has, such as a card or badge, something that someone knows, such as a personal identification number (PIN), or some characteristic of the individual, such as his fingerprints or speech pattern. Personal identification systems that rely on PIN are vulnerable since the PIN may be lost, stolen, or guessed by others. Identification systems that rely on a device carried by the user which generates a code for authentication is not convenient and can only be used at locations or websites that are controlled by a central server where these same numbers are generated.
  • PIN personal identification number
  • the Federation for Identity and Cross-Credentialing System is a personal identification system that includes a coalition of diverse companies and organizations that each may issue identity credentials (such as badge with an identification number) and secure personal identifying information (biometrics, social security numbers, etc.). This information is maintained in a federated manner (by the sponsoring party where the information was first secured) instead of a centralized database.
  • identity credentials such as badge with an identification number
  • secure personal identifying information biometrics, social security numbers, etc.
  • This information is maintained in a federated manner (by the sponsoring party where the information was first secured) instead of a centralized database.
  • a user after obtaining an identity credential, may request physical access to any other company/organization within the coalition. The request will be sent to the sponsoring party where the personal identification information is stored for verification. If the credentials are verified, physical access to the company/organization may be granted.
  • the party that sponsors a user has the authority to decide to which companies/organizations in the coalition the user may have access.
  • the system requires
  • OpenID The OpenID foundation, available at http://www.openid.net, maintains a personal identification system named OpenID that allows a user to use an existing account to sign into multiple different websites.
  • OpenID is a decentralized system where any identity providers may become a member free of charge.
  • a user that has an account at one identity provider may sign into any other website in the system through OpenID, without having to create a new account/password.
  • the user's information and password is only maintained at the identity provider where the user has an account and is not shared with other websites in the system.
  • IdentityX is a personal identification system that provides an identity to a user through a smart phone.
  • the identity credentials include a PIN, voice, face and palm images.
  • a smart phone application is used to enroll a user in the system, which takes information from the user, including biometric information.
  • IdentityX confirms the identity of the user by confirming the user's information.
  • U.S. Patent No. 7,685,629 discloses a system for authenticating users to reduce transaction risks.
  • the system obtains and stores personal data from a user.
  • the personal data may include demographic data and a communication device (such as smart phone) identifier.
  • the system issues a user identifier for future authentication of the user.
  • the user identifier may include a character string that may be any desired combination of letters, numbers, punctuation symbols and mathematical symbols.
  • the system prompts the user to enter the user identifier and confirms that the identifier of the communication device used to enter the user identifier matches the stored communication device identifier. The system then decides whether access should be granted.
  • U.S. Patent No. 8,224,727 discloses a method to authenticate and process transactions based on a social network. The method includes: receiving, at a server computer a request from a user authenticated by a social networking website; identifying a first phone number of the user; communicating by the server computer with a mobile phone at the first phone number to confirm the request; and in response to the request being confirmed by user via the mobile phone at the first phone number, processing the request using funds associated with the mobile phone at the first phone number.
  • a simple yet secure personal, global identification system that relies on mobile devices is needed to identify and authenticate individuals on a worldwide basis.
  • a system may act as a portal to unify a person's internet presence with multiple goods/service providers via a single portal.
  • the objective of the invention is to provide an enabling mechanism which will be utilized to bring the power of the internet back to the user from a bottom up (starting with the user) perspective.
  • data privacy, and Do- Not-Track requirements are becoming increasing concerns for digital technology users, corporations and governments.
  • the major benefits for a consumer utilizing this platform will be increased speed, enhanced convenience and more seamless movement across the internet and in between the virtual and physical world.
  • the major benefit for a business utilizing this platform will be decreased costs as businesses can potentially avoid a large portion of the costs associated with building their own proprietary identity management ecosystem.
  • the present invention is directed to a system for a system for creating identities, for example, via issuance of a global identity numbers and/or QR codes, verification of the created identities, for example, via text to the person's mobile device to confirm that the person is who they say they are for each person that has been issued a global identity number, and authentication of a user using the created, verified identity, for example, in a manner that can be relied on by third parties such as providers of goods and/or services.
  • the system may include a memory coupled to a processor; a software application which, when installed on the user's device, enables the device to be communicably connected to the processor and to perform the step of enabling the user to enter information about the user and sending the information about the user and the phone number of the user' s device to the processor; the system further comprising code executable by the processor and stored on the memory which, when executed, enables the processor to perform the step of receiving the information about the user and an identification code for the user's device; storing the information about the user and the identification code the user's mobile phone (for validation) in the memory; assigning a unique global identification number to the user; creating and associating a unique QR code with the user or similar authentication technologies unique to the user's device for the purposes of Multi-Factor Authentication; and identifying or authenticating the user to a provider of goods and/or services by providing the user' s device, ID number, QR code or similar technology to the provider of goods and/or services.
  • Another aspect of the present invention is directed to a method of posting content to a website using the system of the present invention, comprising the steps of receiving the content from a user's device; identifying or authenticating the user and sending the content to the website for posting along with user identification information to identify or authenticate the user posting the content.
  • Yet another aspect of the present invention is directed to a method of identifying or authenticating a user including the steps of assigning a unique QR code, near field communication identifier, device hardware identifier or similar technology to a user and providing the user' s assigned identifier to a provider of goods and/or services for use in authentication of the user.
  • Figure 1 shows an embodiment of a sign-up screenshot with annotations indicating the different fields used in this embodiment.
  • Figure 2 shows a screen shot of an example of a screen that may be used in the system and methods of various embodiments of the present invention.
  • Figure 3 is a schematic representation of an exemplary identification number selection process.
  • Figure 4 is a schematic representation of the steps a processor of the system may perform during the sign-up process after the unique identification number is selected or assigned.
  • Figure 5 is a schematic representation of confirmation process which may be used to confirm a new user in some embodiments of the invention.
  • Figures 6 and7 are schematic representations of an embodiment of the invention wherein a provider of goods uses the system to facilitate distribution of goods and to confirm receipt of the goods.
  • Figure 8 is a schematic representation of an embodiment of method wherein the invention functions as a portal to enable a user to sign into and use a social media platform.
  • the present invention relates to a system for identifying or authenticating a user.
  • the system comprises a software application and a processor coupled to memory. There is code executable by the processor stored in the memory.
  • the system may identify or authenticate the user to a provider of goods or services and act as a portal to one or more providers of goods and/or services.
  • the system can be used to unify the user's presence in the online environment.
  • the software application may be an application that is available for download and can be installed on a user' s device, including a tablet, computer, or computerized enabled device such as a smart appliance, a mobile phone, a computer and similar devices (all collectively herein referred to as "devices").
  • the device is preferably a portable device or smart device.
  • the software application includes instructions that are executable by the device or device to perform various functions.
  • One function of the software application is to provide identification or
  • the application includes a signup function which allows new user to sign up to be included in the system of the invention.
  • Information about the user may be entered into multiple fields provided as part of the signup function. These fields are designated for different types of information.
  • the designation of certain signup fields is shown in Figure 3, with different fields for first name, last name, country, and phone number.
  • the phone number is preferably the registered phone number for the user' s mobile phone upon which the software application can be installed and will be used as the initial platform device. Alternatively, a unique identification code or number associated with the device on which the software application is installed may be employed.
  • a certain minimum amount of information should be provided by the user.
  • at least the first name, last name, country and preferably the identification code or number of the device upon which the application is installed should be provided by the user.
  • the device identifier can be obtained from the mobile number and/or text verification. This information is used to identify or authenticate the user to providers of goods and services.
  • Some exemplary types of information may include, for example, personal information of the user such as full name, mailing address, domicile address, phone number, age, date of birth, citizenship, marital status, other demographic information and one or more email addresses), user work information, such as, for example, employer
  • user health information such as, for example, medical history, prescriptions, allergies, insurance information and primary care physician
  • user social information such as, for example, club membership(s), hobbies, names of friends, interests, etc.
  • Figure 1 shows an example of an initial sign-up page for the end user, including a real-time global population counter and requesting preliminary information about the user including the user's mobile phone number for validation.
  • the software application collects the information about the user and sends it to the processor. Since the user's device is communicably connected to the processor when the software application is launched, the software application can directly send the information about the user to the processor. After the processor reviews the received information and determines that the information meets the requirements set by the system, the user is tentatively registered as a user in the system. A confirmation code is sent to the user, preferably by texting to the user. The user, upon receiving the confirmation code, may enter the confirmation code into the software application to complete the sign-up process. After the confirmation, the user is signed up as a user in the system.
  • the user's initial device is preferably a smart or mobile phone.
  • the device may use any operating system. Some examples include Android, Symbian, Apple iOS, RIM
  • the mobile phone is the preferred device for use initially in the present invention.
  • other devices such as personal computers, smart appliances such as intelligent home appliances, smart devices such as in car computers, laptops, tablets and PDA's may also be used instead of a mobile phone.
  • the processor may be any kind of microprocessor such as those manufactured by Intel Corporation or Advanced Micro Devices (AMD), Inc.
  • the processor is coupled to memory.
  • the processor and the memory may be part of a computer that also functions as a server.
  • the server may include components such as, but not limited to, a web server, a database server, an application server and a directory server.
  • the server typically includes a central processing unit including one or more microprocessors, random access memory (RAM), mechanisms and structures for performing I/O operations, a storage medium such as a magnetic hard disk drive(s), solid state drives and flash drives, and an operating system for execution on the central processing unit.
  • the hard disk drive of the server may be used for storing data, executable code, and policies of the system.
  • the hard disk drive(s) of the server also are typically provided for purposes of booting and storing the operating system, other applications that are to be executed on the server, paging and swapping between the hard disk and the RAM. It is envisioned that the server can be or otherwise utilize multiple servers in cooperation to facilitate greater performance and stability of the subject invention by distributing memory and processing in a conventional manner.
  • the memory may be the hard disk drive(s) of the server.
  • the memory may also be a machine-readable media.
  • a machine-readable media shall be understood to mean any article of manufacture that contains data that can be read by a computer.
  • Such machine-readable media includes but is not limited to magnetic media, such as a floppy disk, a flexible disk, a hard disk, reel-to-reel tape, cartridge tape, cassette tape or cards; optical media such as CD-ROM, DVD-ROM and writeable compact disc; magneto-optical media in disc, tape or card form; paper media, such as punched cards and paper tape; cards, and flash memory devices (e.g., card, stick, key drive, etc.).
  • the machine-readable media are intended to comprise, without being limited to, these and any other suitable types of memory.
  • the machine-readable media can be a server, a database, a hard drive, and the like.
  • the processor and memory are still coupled, such that the processor can retrieve any data/information store in the memory, and store received information about the user to the memory, or read executable code stored in the memory.
  • the memory can also be remote storage such as cloud storage.
  • the processor may perform a series of tasks such as receiving the information about the user and the user's device; storing information and retrieving information in the associated memory; reviewing the information and ensuring that it meets minimum requirements; assigning a unique global identification number to the user; creating a quick response (QR) code to be associated with the user and associating the identification of the user's device, the user's information, the unique global identification number and the QR code with a single user.
  • QR quick response
  • Alternative identifiers such as near field communication identifiers, device hardware identifiers, etc. may alternatively be used, particularly when the user is employing a device not enable for use of QR codes.
  • QR code refers to a matrix barcode that may be read by an imaging device.
  • the code comprises black modules arranged in a square grid on a white background.
  • a QR code is read by an imaging device, such as a camera, and formatted algorithmically by underlying software until the image can be appropriately interpreted. Data is then extracted from patterns present in both horizontal and vertical components of the image.
  • multi-factor authentication or "two-factor authentication” refer to an approach to authentication which requires the presentation of two or more of the three authentication factors, a knowledge factor, i.e. something the user knows, a possession factor, i.e. something the user has, and an inherence factor, i.e. something the user is.
  • the processor after receiving the information about the user and the user' s mobile phone number, may perform some quality checks.
  • One such quality check ensures that the received information does not have internal conflicts. For example, confirming that the street or mailing address is consistent with the country and that the street or mailing address is consistent with the zip code. If any inconsistency is identified, the processor may send an error message to the user and/or request correction of the information.
  • Another quality check that the processor may perform is to ensure the received information meets the minimum requirements set by the system.
  • Another quality check that the processor may perform is to ensure the received information meets the minimum requirements set by the system.
  • the system requires at least the first and last name of the user, country, and optionally the user' s device identification code. However, the minimum requirements may vary in different embodiments. If the information received does not meet the minimum requirements, the processor may send a message to the user asking for any missing information that is required by the system.
  • the processor stores the received information in the memory.
  • the format of the stored information in the memory may be flat text.
  • the received information is preferably stored in a database that is installed in the memory, which is more efficient in storing and retrieving data from the memory.
  • the database may be any type that known to a person skilled in the art, such as Oracle, MySQL, PostgreSQL, MSSQL, and SQLite, and beyond relational database.
  • the processor after making the determination to sign up the user in the system, will assign a unique global identification number to the user.
  • the system may allow the user to request a specific number, in which case the user may optionally be required to pay a fee for obtaining the requested number. Otherwise, the user is automatically assigned the next available global identification number.
  • FIG. 3 a flow chart of a unique identification number selection process according to an exemplary embodiment of the present invention is shown.
  • a user downloads the software application and installs it on the user' s device. The user may then scroll to the next available unique identification number, and select it or pick another available number if desired. The system may require the user to pay for a number if one is selected. The system then proceeds to the signup process. After the user enters and sends the information into the system, the system scrolled to next available global identification number. The user is presented with the global identification number. If the user likes the global identification number, the sign-up process is over. If the user does not like the assigned global identification number, the user may choose a new number, which may require payment of a fee. After paying the fee, the user obtains the chosen number and the sign-up process may proceed. If the user does not wish to select an identification number, the system will assign one to allow the sign-up process to proceed.
  • FIG. 4 there is shown a flow chart of the steps taken by the system in an exemplary sign-up process according to the present invention.
  • the user' s name and contact number such as a mobile phone number is sent to the server to be stored in its database.
  • the processor then texts a confirmation code to the user at the user's device.
  • the user Upon receiving the confirmation code, the user enters the confirmation code using the software application installed initially on the mobile phone.
  • the confirmation is sent back to the system. If the confirmation code is not received by the system within certain period, such as 24 hours, a reminder may be texted to the user at the user's mobile phone.
  • the system assigns a global identification number to the user and creates a QR code or reserves the right to create a QR code for the user if the device does not function with a QR code or if the specific application does not make use of QR codes for Multi-Factor Authentication, alternative identifiers such as NFC or device hardware identity may be employed.
  • FIG. 5 there is shown a flow chart of the sign-up process on the user's device, e.g. , a. mobile phone, according to an exemplary embodiment of the present invention.
  • the created identity is then verified by the system.
  • a confirmation code on the user's device, preferably by text message.
  • the user copies and pastes or types the confirmation code into the software application (see also Figure 4).
  • the processor assigns a global identification number and creates a QR code in applications where it serves a function in Multi-Factor Authentication, the global identification number and QR code are both displayed by the software application on the screen of the user's device.
  • the QR code may be displayed on subsequent versions of the product. This may arise due to constraints imposed by various phone and tablet configurations. Another message may also be sent by the system to the user and displayed on the user' s device.
  • the processor creates a unique and portable QR code or alternative identifier, as discussed above, that is associated with the user.
  • the QR code may include different sets of information in various embodiments of the invention.
  • the QR code or alternative identifier includes one or more of a URL where more information about the user may be stored and retrieved and/or the name of the user.
  • one or more items of additional information about the user may be encoded in the QR code or alternative identifier, optionally together with a URL link to a web page maintained by the system.
  • the QR code or alternative identifier can be used for many purposes. One use enables the user to allow various providers of products and services to scan the QR code or alternative identifier and identify and/or authenticate the user. Examples include gaining access to premium clubs, accessing security areas, confirming identity when purchasing tickets, and similar activities.
  • the software application installed on the user' s device can also allow the user to review and/or modify the information about the user that is stored in the memory.
  • the information may be retrieved and displayed on the screen of the user' s device by the software application.
  • the user may edit the information and save the changes back to the system.
  • the system may also perform quality checks similar to these performed during the sign-up process.
  • the assigned global identification number which can be changed to a different number by the user with permission from the system, is a permanent identifier for the user and thus is designed to remain associated with a particular user throughout that system's lifetime, independent of the lifespan of the user (i.e. , the number and QR code may stay with the user forever).
  • all information included in the system, as well as the QR code, and the identification code of a user' s device may be associated with the unique global identification number. This allows all other information in the system to be modified, as needed, throughout the lifetime of the user providing flexibility to use different mobile and other devices, change user information when the user's name or address changes, or to encode different information in the QR code should this become desirable to, for example, adapt to new identification or authentication technologies.
  • the user' s name, device identification code, information and/or QR code could be modified. If the user changes his/her mobile device or adds a new device, the user may associate the new device with the unique user identification code using a process provided by the system for this purpose. The system will then associate the new device with the unique global identification number for that user.
  • the Internet of Things also known as Any Channel, Any Device, Anywhere
  • This invention may serve as the backbone for each of the users' devices, connecting and unifying the users' connected experience across all internet related connected devices, as individuals do not currently have one universal global identification number or system which can be used for this purpose.
  • the processor may identify or authenticate the user to a provider of goods and/or services.
  • the QR code alone may be sufficient to identify or authenticate the user in some embodiments.
  • the user's name may be encoded in the QR code and be used for identification or authentication when a low level of security is all that is necessary, e.g. , to ensure that the user is on the guest list at a party.
  • the QR code can direct the provider to a URL where the identification or authentication process can be completed.
  • the providers of goods and/or services should be registered with the system of the invention.
  • the system can then provide a process for providers to customize the identification or authentication process to their needs.
  • the providers may go directly to the URL encoded in the QR code via which information about the user is available for identifying or authenticating the user.
  • Each provider may be assigned a unique identifier which can be associated with an identification or authentication protocol for that provider.
  • the identification or authentication protocol may be used to determine what information about the user is needed by that provider to complete the identification or authentication process.
  • One or more of the user's name, likeness, address, zip code, country of citizenship, membership number, social security number, passport number, PIN code, password or any other information could be used as part of the identification or authentication process. This can be achieved by having the provider specify the information needed for its own customized identification or authentication process when it signs up with the system.
  • users of the system may be offered the opportunity to interact with that provider.
  • the user will have to approve of interaction with a particular provider before that provider will be able to access any information about that user. This allows the user to customize their experience with the system and thereby prevent unwanted solicitations, interactions or other activities.
  • the system can offer the user a variety of interfaces for selecting providers or activities. At its most basic, there will simply be a list of providers or activities from which the user may select. Alternatively, the system can group providers or activities into different groups to allow the user to more easily locate and identify providers or activities.
  • URL's or other information can be associated with each provider and activity in order to offer users information about the provider or activity that can be used by the user to determine whether the user will interact with a provider or participate in an activity. Users may also be offered the opportunity to inform the system of the types of providers or activities in which the user has an interest for the purpose of receiving notifications regarding the availability of such providers or activities.
  • the user will first be asked if the information requested by the provider can be provided to the provider by the system. If the user agrees, the user may then be prompted to provide any information needed by the provider that may be missing from the user' s profile in the system. Once the user has agreed to the requirements of the provider and has provided the required information to the system, that user can be identified or authenticated to that provider via the system.
  • the user has the ability to restrict the information provided to the system by only inputting or providing the information that the user wishes to share with the system, subject to the minimum requirements to participate in the system.
  • identity management this is called a proportional ID or 'prop ID' whereby only the required amount of specific information necessary to complete the specific transaction is actually provided.
  • the consequence of the user withholding certain information may be that the user will not be able to interact with certain providers or may be prevented from participating in certain activities that require information that was not shared by the user.
  • the system may provide an option for limited interaction with providers or limited participation in certain activities rather than completely refusing such interaction or participation if the user has not shared the information required for that provider or activity with the system.
  • Providers or activities can also be customized for varying levels of participation and/or interaction for users that wish to restrict the information that they are willing to provide.
  • the user may also be offered the ability to provide detailed information to the system and to restrict distribution of the information in a variety of ways. For example, providers can be grouped by the system into categories and users can be offered the ability to restrict distribution of certain information to particular categories of providers or activities. Alternatively, the user can be asked to identify the information that can be distributed to a particular provider.
  • each item of information is assigned a level of security and the user can assign a level of security to each provider or activity to determine what information is to be distributed.
  • the level one security may include only the user's name, the user's global identification number, and the user's country.
  • a higher level of security may further include address, user's mobile phone number, secondary phone number, and work information. Multi-factor authentication or two-factor
  • a knowledge factor i.e. something the user knows
  • a possession factor i.e. something the user has
  • an inherence factor i.e. something the user is
  • Another level of security may include health, financial or social information.
  • social information can include information known to the user such as information that is used in typical security questions that are posed by existing security systems.
  • Examples include mother-in-law' s maiden name, the name of the first pet, a favorite color, etc. As a result, each provider may have access only to particular information of a user.
  • information is grouped into types and the user decides which type(s) of information can be provided to a provider or for participation in an activity.
  • Types of information may be, for example, name and address, health information, insurance information, likeness, demographic information, tax information, philanthropic goods and service categories or specific entities the user would like to receive said information from.
  • the system according to the present invention may function as a portal or horizontal stream to providers or activities.
  • the user instead of a user having to log into FaceBook, Twitter and Linkedln separately to provide content, the user can create or provide the content in the present system, and then use the present system to stream the content to multiple service providers simultaneously creating the horizontal streaming over several vertical platforms.
  • the system may be enabled to allow the user to select where particular content will go and to create templates of provider selections from which the user can select when desiring to stream content, i.e. , a friends template, a social media template, a family template, etc.
  • Providers may include various social media platforms (FaceBook, Twitter, Linkedln), online retailers, web email providers (Yahoo Mail, Gmail, Hotmail), gaming providers (Farmville), etc.
  • the system is used to identify or authenticate the user to the provider.
  • the user may use the system of the present invention as a portal to sign up with providers and as a portal to return to the providers for services.
  • the system may share more information about the user with the provider in order to create an account for the user or to use the service. In subsequent visits to the provider, the system can identify or authenticate the user for the provider.
  • Horizontal streams differ from standard web verticals such as FaceBook where a users' profile is primarily housed within.
  • the horizontal stream system enables the horizontal viewing, use and streaming of web verticals, and displays such information on the main URL repository for the users' lifespan maintained by the system according to the present invention.
  • FIG 8 a simplified flow chart of the process of signing into a social media platform through the system according to an exemplary embodiment of the present invention is shown.
  • the user sets security level regarding the information about the user.
  • the system may sign a user into a social media platform.
  • One way to sign in is that the system may identify or authenticate the user at the website of the social media platform by sending the user' s QR code to the social media platform which can read the QR code and use it to obtain the information to sign in the user.
  • the QR code itself may contain the sign in information or the QR code may send the social media platform to a URL to obtain the required information to sign in.
  • Another way to sign in is that the system may approach the social media platform through a special sign in window created specifically to interact with the system of the present invention, where only the user' s global identification number is entered, instead of user name/password combination. The user can then start use the social media platform.
  • system of the present invention can be enabled to send certain information needed by the provider for identification or
  • Such information may include a required password, username, membership number, account number, social security number.
  • Other information includes a link to the users' personal repository webpage/URL maintained by the system, a list of the users' club memberships and/or work groups.
  • the system of the present invention may also be used to identify or authenticate users for participation in various activities. For example, delivery personnel could scan the QR code of the user at delivery of goods to verify delivery and to ensure that the goods are being delivered to the proper recipient.
  • the user may, through the system of the present invention, send comments or opinions to a provider, participate in surveys, vote, etc.
  • the system will identify or authenticate the user for this purpose so as to ensure that users only participate the allowed number of times.
  • the system can be used to select participants for such activities based on demographics or other information about the user.
  • the system can provide both a vote, opinion and/or comment of the user and additional information which allows categorization of the results by a variety of different types of information including demographics, locations or any other type of information available in the system which the user authorizes for distribution to provides or for participation in activities.
  • the user may, through the system of the present invention, send a request for or receipt notice of goods, e.g., goods distributed by a charity organization.
  • the system identifies or authenticates the user to the charity organization, which in turn sends a message through the system to the user about when and where to pick up the goods, or when to expect the goods to be delivered to the user's address (preferably the same address saved in the memory for the user).
  • the message is preferably text to the user's device.
  • the user receives the goods he/she may present the device with the user's QR code displayed on the screen for identification or authentication. Either the QR code or global identity number may be used to identify or authenticate the user.
  • the system can then confirm to the provider that the goods have been delivered to the intended recipient.
  • FIG. 6 and7 there are shown flow charts of an exemplary interaction between a user, the system and a charity organization distributing a product and/or service where the system is used as a portal from the user to the charity organization.
  • a charity may register with the system as a provider and then log into the system. In this case, the charity selects a region for distribution of the product/service.
  • a text is then sent to users of the system who have assented to receipt of such messages aboutthe intention to distribute the product/service.
  • the system collects and analyzes responses from users to the text about the product/service. If the response is negative, the system notes the user' s preference in the database for future use. If the response is positive, the system sends information in the form of a text to the provider to request the product/service. In this case, the regional office of the provider receives the information including a list of people requesting the
  • the user can simply either display their QR code on their device or give their global identity number to the provider for identification or authentication in order to collect the requested product/service.
  • the provider can encourage them to sign up using the sign-up process described above prior to delivery of the product/service. This would allow the provider, for example, to collect some additional information from the recipient of the product/service via the system of the invention via the product delivery process and to ensure that a particular person was not receiving the product/service multiple times.
  • the system according to the present invention can be used for users to conduct global voting on almost any subject, such as how to address climate change, what is the energy strategy of the future, should the government take a particular action, etc.
  • the system can also unify one's online presence by providing a portal to providers and activities and/or providing information to sign up with providers and activities from the user's single centralized profile.
  • the system can also be used to identify or authenticate the user.
  • the system can also be used as a core or integral component of personal near field communication (NFC), radio frequency identification (RFID) and related authentication and payment or access technologies.
  • NFC near field communication
  • RFID radio frequency identification
  • the system can transmit from the user's device the information required for such transactions, such as identification information, the user' s QR code, the global identity number etc.
  • the system can also be used as the backbone for the emerging Internet of Things, where consumers are demanding that all of their smart devices are identified and connected to the user via the Internet.
  • a user would not need to create a separate account for each provider.
  • the user can be identified or authenticated and information about the user can be distributed on an as needed basis to use the services provided by the providers.
  • the providers may also be offered the option to request and store locally some of the information about the user from the system.
  • the user does not need to go through the burdensome process of creating separate accounts with separate user names and passwords for each provider as is now required for interaction with various providers.
  • the system according to the present invention can also be used to enable and facilitate true internet streaming.
  • the system may function as a portal to send
  • This aspect of the present invention is needed to implement activity streams, where internet content is instantaneously and constantly added to a website as it is created by multiple users.
  • the system according to the present invention can also identify, chronicle and organize the global population.
  • the system will chronicle all transactions conducted by the users, as well as all transactions conducted by the providers. This information can be used by the user as a receipt or proof that a specific action was taken, a payment was timely made, that the user was at a particular location at a particular time, etc.
  • access to the system can allow companies (Ancestry.com, McKinsey, etc.) and NGO's/non-profits (Gates, WHO, etc.) to research the population, connect people, and identify potential target populations, all with the approval of each individual user in advance.
  • the system provides an organized database for every person on earth and issues a unique global identification number for each person.
  • the system according to the present invention can also be used to process payments.
  • the system may identify or authenticate the user at a retailer and pay with the credit card for any purchases the user has made.
  • the system itself can act as the payment processor rather than the retailer.
  • a transaction request may be sent to the system by a vendor, the system may then send a confirmation message to the user at his/her mobile phone or other devices. If the user confirms the transaction, the system forwards the credit card information to the vendor to complete the transaction.
  • Social media analytics is integral for companies and providers in understanding their users' real-time mood and sentiments. Said analytics also assist users in understanding their personal influence and status online.
  • This system when coupled with listening firm service providers such as General Sentiment and Attensity, greatly enhances said social media analytical capabilities.
  • the analytics allow providers to identify sentiment and identify trends in order to accommodate the user better.
  • the present system will chronicle all transactions of users and providers and thereby build up a valuable database of information which can be used for social analytics.
  • the system can be customized to provide varying levels of access to the data to take advantage of the information stored therein. Users will have the ability to pre-approve access to their personal data for this purpose.
  • the system enables the emerging Internet of Things trend by creating a core infrastructure at the command of the user, enabling connectivity of all devices tied to the users' global identification number or QR code (including phones, tablets, in home smart devices, in car smart devices, etc.).
  • QR code including phones, tablets, in home smart devices, in car smart devices, etc.
  • the system will handle authentication and/or identification of the user so that connection will be seamless and can be carried out by one or a few clicks by the user.
  • this will enable the user to save significant time and effort now expended for navigation to each provider, device or web site and logging in to each device, provider or web site separately. This will greatly enhance the user' s experience by allowing the user to focus on the particular transactions and eliminating the hassle that is currently required to access the devices, service providers and web sites used to conduct the transactions.
  • the system enhances the collection of large, or 'Big Data' sets relevant to the individual and providers using said system. Larger data sets including detailed, specific information about users and providers, allow greater understanding of mass behaviors and enable the identification of correlations related to business trends, disease prevention, crime activity, travel patterns, and more.
  • the system of the present invention can also implement various conventional security features to protect user's data and online presence. For example, biometrics identification can be implemented via the user' s device to ensure that a specific user is using the device when the present system is accessed. Usernames and passwords can also be used to log into the present system, as well as Public-key infrastructure (PKI) tokens and other conventional security measures. Due the power that is enabled by the present system, it may be advantageous to implement security measures such as these.
  • PKI Public-key infrastructure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Description

A GLOBAL IDENTIFICATION NUMBER AND PORTAL
PLATFORM TECHNOLOGY
BACKGROUND OF THE INVENTION
1. Field of the Invention
[0001] The present invention relates to systems and methods for identifying or authenticating an individual and more particularly related to systems and methods that provide a unique combination of one global identity number and, in some cases, unique personal QR codes or similar technologies such as near field communication (NFC) for every person on earth, and may also function as a portal for accessing services (a 'two-sided network').
2. Description of the Related Technology
[0002] Personal identification systems may be based on something someone has, such as a card or badge, something that someone knows, such as a personal identification number (PIN), or some characteristic of the individual, such as his fingerprints or speech pattern. Personal identification systems that rely on PIN are vulnerable since the PIN may be lost, stolen, or guessed by others. Identification systems that rely on a device carried by the user which generates a code for authentication is not convenient and can only be used at locations or websites that are controlled by a central server where these same numbers are generated.
[0003] The Federation for Identity and Cross-Credentialing System (FiXs), available at http://www.fixs.org, is a personal identification system that includes a coalition of diverse companies and organizations that each may issue identity credentials (such as badge with an identification number) and secure personal identifying information (biometrics, social security numbers, etc.). This information is maintained in a federated manner (by the sponsoring party where the information was first secured) instead of a centralized database. A user, after obtaining an identity credential, may request physical access to any other company/organization within the coalition. The request will be sent to the sponsoring party where the personal identification information is stored for verification. If the credentials are verified, physical access to the company/organization may be granted. The party that sponsors a user has the authority to decide to which companies/organizations in the coalition the user may have access. The system requires rigorous auditing of the
companies/organizations to ensure compliance with the rules and standards. Currently, most of the companies/organizations in the coalition are the Department of Defense and its contractors, as well as other federal/state agencies.
[0004] The OpenID foundation, available at http://www.openid.net, maintains a personal identification system named OpenID that allows a user to use an existing account to sign into multiple different websites. OpenID is a decentralized system where any identity providers may become a member free of charge. A user that has an account at one identity provider may sign into any other website in the system through OpenID, without having to create a new account/password. The user's information and password is only maintained at the identity provider where the user has an account and is not shared with other websites in the system.
[0005] IdentityX is a personal identification system that provides an identity to a user through a smart phone. The identity credentials include a PIN, voice, face and palm images. A smart phone application is used to enroll a user in the system, which takes information from the user, including biometric information. When a service provider sends a request to IdentityX to verify the identity of a user, IdentityX confirms the identity of the user by confirming the user's information.
[0006] U.S. Patent No. 7,685,629 discloses a system for authenticating users to reduce transaction risks. At the initial stage, the system obtains and stores personal data from a user. The personal data may include demographic data and a communication device (such as smart phone) identifier. The system issues a user identifier for future authentication of the user. The user identifier may include a character string that may be any desired combination of letters, numbers, punctuation symbols and mathematical symbols. When a request for access to a protected resource is sent to the system, the system prompts the user to enter the user identifier and confirms that the identifier of the communication device used to enter the user identifier matches the stored communication device identifier. The system then decides whether access should be granted.
[0007] U.S. Patent No. 8,224,727 discloses a method to authenticate and process transactions based on a social network. The method includes: receiving, at a server computer a request from a user authenticated by a social networking website; identifying a first phone number of the user; communicating by the server computer with a mobile phone at the first phone number to confirm the request; and in response to the request being confirmed by user via the mobile phone at the first phone number, processing the request using funds associated with the mobile phone at the first phone number.
[0008] A simple yet secure personal, global identification system that relies on mobile devices is needed to identify and authenticate individuals on a worldwide basis. In addition, such a system may act as a portal to unify a person's internet presence with multiple goods/service providers via a single portal. The objective of the invention is to provide an enabling mechanism which will be utilized to bring the power of the internet back to the user from a bottom up (starting with the user) perspective. Additionally, data privacy, and Do- Not-Track requirements are becoming increasing concerns for digital technology users, corporations and governments. The major benefits for a consumer utilizing this platform will be increased speed, enhanced convenience and more seamless movement across the internet and in between the virtual and physical world. The major benefit for a business utilizing this platform will be decreased costs as businesses can potentially avoid a large portion of the costs associated with building their own proprietary identity management ecosystem.
SUMMARY OF THE INVENTION
[0009] In a first aspect, the present invention is directed to a system for a system for creating identities, for example, via issuance of a global identity numbers and/or QR codes, verification of the created identities, for example, via text to the person's mobile device to confirm that the person is who they say they are for each person that has been issued a global identity number, and authentication of a user using the created, verified identity, for example, in a manner that can be relied on by third parties such as providers of goods and/or services. The system may include a memory coupled to a processor; a software application which, when installed on the user's device, enables the device to be communicably connected to the processor and to perform the step of enabling the user to enter information about the user and sending the information about the user and the phone number of the user' s device to the processor; the system further comprising code executable by the processor and stored on the memory which, when executed, enables the processor to perform the step of receiving the information about the user and an identification code for the user's device; storing the information about the user and the identification code the user's mobile phone (for validation) in the memory; assigning a unique global identification number to the user; creating and associating a unique QR code with the user or similar authentication technologies unique to the user's device for the purposes of Multi-Factor Authentication; and identifying or authenticating the user to a provider of goods and/or services by providing the user' s device, ID number, QR code or similar technology to the provider of goods and/or services.
[00010] Another aspect of the present invention is directed to a method of posting content to a website using the system of the present invention, comprising the steps of receiving the content from a user's device; identifying or authenticating the user and sending the content to the website for posting along with user identification information to identify or authenticate the user posting the content.
[00011] Yet another aspect of the present invention is directed to a method of identifying or authenticating a user including the steps of assigning a unique QR code, near field communication identifier, device hardware identifier or similar technology to a user and providing the user' s assigned identifier to a provider of goods and/or services for use in authentication of the user.
BRIEF DESCRIPTION OF THE DRAWINGS
[00012] Figure 1 shows an embodiment of a sign-up screenshot with annotations indicating the different fields used in this embodiment.
[00013] Figure 2 shows a screen shot of an example of a screen that may be used in the system and methods of various embodiments of the present invention.
[00014] Figure 3 is a schematic representation of an exemplary identification number selection process.
[00015] Figure 4 is a schematic representation of the steps a processor of the system may perform during the sign-up process after the unique identification number is selected or assigned.
[00016] Figure 5 is a schematic representation of confirmation process which may be used to confirm a new user in some embodiments of the invention.
[00017] Figures 6 and7 are schematic representations of an embodiment of the invention wherein a provider of goods uses the system to facilitate distribution of goods and to confirm receipt of the goods.
[00018] Figure 8 is a schematic representation of an embodiment of method wherein the invention functions as a portal to enable a user to sign into and use a social media platform.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
[00019] For illustrative purposes, the principles of the present invention are described by referencing various exemplary embodiments. Although certain embodiments of the invention are specifically described herein, one skilled in the art will readily recognize that the same principles are equally applicable to, and can be employed in other systems and methods. Before explaining the disclosed embodiments of the present invention in detail, it is to be understood that the invention is not limited in its application to the details of any particular embodiment shown. Additionally, the terminology used herein is for the purpose of description and not of limitation. Furthermore, although certain methods are described with reference to steps that are presented herein in a certain order, in many instances, these steps may be performed in any order as may be appreciated by one skilled in the art; the novel method is therefore not limited to the particular arrangement of steps disclosed herein.
[00020] It must be noted that as used herein and in the appended claims, the singular forms "a", "an", and "the" include plural references unless the context clearly dictates otherwise. Furthermore, the terms "a" (or "an"), "one or more" and "at least one" can be used interchangeably herein. The terms "comprising", "including", "having" and "constructed from" can also be used interchangeably.
[00021] In a first aspect, the present invention relates to a system for identifying or authenticating a user. The system comprises a software application and a processor coupled to memory. There is code executable by the processor stored in the memory. The system may identify or authenticate the user to a provider of goods or services and act as a portal to one or more providers of goods and/or services. In addition, the system can be used to unify the user's presence in the online environment.
[00022] The software application may be an application that is available for download and can be installed on a user' s device, including a tablet, computer, or computerized enabled device such as a smart appliance, a mobile phone, a computer and similar devices (all collectively herein referred to as "devices"). The device is preferably a portable device or smart device. The software application includes instructions that are executable by the device or device to perform various functions.
[00023] One function of the software application is to provide identification or
authentication of one or more users to providers of goods and/or services. The application includes a signup function which allows new user to sign up to be included in the system of the invention. Information about the user may be entered into multiple fields provided as part of the signup function. These fields are designated for different types of information. In one exemplary embodiment, the designation of certain signup fields is shown in Figure 3, with different fields for first name, last name, country, and phone number. The phone number is preferably the registered phone number for the user' s mobile phone upon which the software application can be installed and will be used as the initial platform device. Alternatively, a unique identification code or number associated with the device on which the software application is installed may be employed.
[00024] For a user to sign up to use the system of the invention, a certain minimum amount of information should be provided by the user. In an exemplary embodiment, at least the first name, last name, country and preferably the identification code or number of the device upon which the application is installed should be provided by the user. In some cases, the device identifier can be obtained from the mobile number and/or text verification. This information is used to identify or authenticate the user to providers of goods and services.
[00025] There are other types of information about the user that may be entered using the software application. Some exemplary types of information may include, for example, personal information of the user such as full name, mailing address, domicile address, phone number, age, date of birth, citizenship, marital status, other demographic information and one or more email addresses), user work information, such as, for example, employer
information, profession, experience, contact information, professional memberships and other qualifications, user health information such as, for example, medical history, prescriptions, allergies, insurance information and primary care physician, and user social information such as, for example, club membership(s), hobbies, names of friends, interests, etc.).
[00026] Figure 1 shows an example of an initial sign-up page for the end user, including a real-time global population counter and requesting preliminary information about the user including the user's mobile phone number for validation.
[00027] The software application collects the information about the user and sends it to the processor. Since the user's device is communicably connected to the processor when the software application is launched, the software application can directly send the information about the user to the processor. After the processor reviews the received information and determines that the information meets the requirements set by the system, the user is tentatively registered as a user in the system. A confirmation code is sent to the user, preferably by texting to the user. The user, upon receiving the confirmation code, may enter the confirmation code into the software application to complete the sign-up process. After the confirmation, the user is signed up as a user in the system.
[00028] The user's initial device is preferably a smart or mobile phone. The device may use any operating system. Some examples include Android, Symbian, Apple iOS, RIM
BlackBerry, MeeGo, Windows Phone, and Bada. The mobile phone is the preferred device for use initially in the present invention. However, other devices, such as personal computers, smart appliances such as intelligent home appliances, smart devices such as in car computers, laptops, tablets and PDA's may also be used instead of a mobile phone.
[00029] The processor may be any kind of microprocessor such as those manufactured by Intel Corporation or Advanced Micro Devices (AMD), Inc. The processor is coupled to memory. In an exemplary embodiment, the processor and the memory may be part of a computer that also functions as a server. The server may include components such as, but not limited to, a web server, a database server, an application server and a directory server. The server typically includes a central processing unit including one or more microprocessors, random access memory (RAM), mechanisms and structures for performing I/O operations, a storage medium such as a magnetic hard disk drive(s), solid state drives and flash drives, and an operating system for execution on the central processing unit. The hard disk drive of the server may be used for storing data, executable code, and policies of the system. The hard disk drive(s) of the server also are typically provided for purposes of booting and storing the operating system, other applications that are to be executed on the server, paging and swapping between the hard disk and the RAM. It is envisioned that the server can be or otherwise utilize multiple servers in cooperation to facilitate greater performance and stability of the subject invention by distributing memory and processing in a conventional manner.
[00030] The memory may be the hard disk drive(s) of the server. Alternatively the memory may also be a machine-readable media. A machine-readable media shall be understood to mean any article of manufacture that contains data that can be read by a computer. Such machine-readable media includes but is not limited to magnetic media, such as a floppy disk, a flexible disk, a hard disk, reel-to-reel tape, cartridge tape, cassette tape or cards; optical media such as CD-ROM, DVD-ROM and writeable compact disc; magneto-optical media in disc, tape or card form; paper media, such as punched cards and paper tape; cards, and flash memory devices (e.g., card, stick, key drive, etc.). The machine-readable media are intended to comprise, without being limited to, these and any other suitable types of memory. In addition, it is to be appreciated that the machine-readable media can be a server, a database, a hard drive, and the like.
[00031] In some embodiments where the processor and memory are not part of a computer, they are still coupled, such that the processor can retrieve any data/information store in the memory, and store received information about the user to the memory, or read executable code stored in the memory. Thus, the memory can also be remote storage such as cloud storage.
[00032] The processor may perform a series of tasks such as receiving the information about the user and the user's device; storing information and retrieving information in the associated memory; reviewing the information and ensuring that it meets minimum requirements; assigning a unique global identification number to the user; creating a quick response (QR) code to be associated with the user and associating the identification of the user's device, the user's information, the unique global identification number and the QR code with a single user. Alternative identifiers such as near field communication identifiers, device hardware identifiers, etc. may alternatively be used, particularly when the user is employing a device not enable for use of QR codes.
[00033] The phrase "QR code" as used herein refers to a matrix barcode that may be read by an imaging device. The code comprises black modules arranged in a square grid on a white background. A QR code is read by an imaging device, such as a camera, and formatted algorithmically by underlying software until the image can be appropriately interpreted. Data is then extracted from patterns present in both horizontal and vertical components of the image.
[00034] The phrases "multi-factor authentication" or "two-factor authentication" refer to an approach to authentication which requires the presentation of two or more of the three authentication factors, a knowledge factor, i.e. something the user knows, a possession factor, i.e. something the user has, and an inherence factor, i.e. something the user is.
[00035] The processor, after receiving the information about the user and the user' s mobile phone number, may perform some quality checks. One such quality check ensures that the received information does not have internal conflicts. For example, confirming that the street or mailing address is consistent with the country and that the street or mailing address is consistent with the zip code. If any inconsistency is identified, the processor may send an error message to the user and/or request correction of the information.
[00036] Another quality check that the processor may perform is to ensure the received information meets the minimum requirements set by the system. In an exemplary
embodiment, the system requires at least the first and last name of the user, country, and optionally the user' s device identification code. However, the minimum requirements may vary in different embodiments. If the information received does not meet the minimum requirements, the processor may send a message to the user asking for any missing information that is required by the system.
[00037] The processor stores the received information in the memory. The format of the stored information in the memory may be flat text. However, the received information is preferably stored in a database that is installed in the memory, which is more efficient in storing and retrieving data from the memory. The database may be any type that known to a person skilled in the art, such as Oracle, MySQL, PostgreSQL, MSSQL, and SQLite, and beyond relational database.
[00038] The processor, after making the determination to sign up the user in the system, will assign a unique global identification number to the user. The system may allow the user to request a specific number, in which case the user may optionally be required to pay a fee for obtaining the requested number. Otherwise, the user is automatically assigned the next available global identification number.
[00039] Referring to Figure 3, a flow chart of a unique identification number selection process according to an exemplary embodiment of the present invention is shown. A user downloads the software application and installs it on the user' s device. The user may then scroll to the next available unique identification number, and select it or pick another available number if desired. The system may require the user to pay for a number if one is selected. The system then proceeds to the signup process. After the user enters and sends the information into the system, the system scrolled to next available global identification number. The user is presented with the global identification number. If the user likes the global identification number, the sign-up process is over. If the user does not like the assigned global identification number, the user may choose a new number, which may require payment of a fee. After paying the fee, the user obtains the chosen number and the sign-up process may proceed. If the user does not wish to select an identification number, the system will assign one to allow the sign-up process to proceed.
[00040] Referring to Figure 4, there is shown a flow chart of the steps taken by the system in an exemplary sign-up process according to the present invention. In this exemplary embodiment, the user' s name and contact number such as a mobile phone number is sent to the server to be stored in its database. The processor then texts a confirmation code to the user at the user's device. Upon receiving the confirmation code, the user enters the confirmation code using the software application installed initially on the mobile phone. The confirmation is sent back to the system. If the confirmation code is not received by the system within certain period, such as 24 hours, a reminder may be texted to the user at the user's mobile phone. Once the confirmation code is received, the system assigns a global identification number to the user and creates a QR code or reserves the right to create a QR code for the user if the device does not function with a QR code or if the specific application does not make use of QR codes for Multi-Factor Authentication, alternative identifiers such as NFC or device hardware identity may be employed.
[00041] Referring to Figure 5, there is shown a flow chart of the sign-up process on the user's device, e.g. , a. mobile phone, according to an exemplary embodiment of the present invention. The created identity is then verified by the system. In one example of verification, after the user enters and submits the information using the device, he/she receives a confirmation code on the user's device, preferably by text message. The user then copies and pastes or types the confirmation code into the software application (see also Figure 4). The processor then assigns a global identification number and creates a QR code in applications where it serves a function in Multi-Factor Authentication, the global identification number and QR code are both displayed by the software application on the screen of the user's device. In cases where the device is not enabled for a QR code, the QR code may be displayed on subsequent versions of the product. This may arise due to constraints imposed by various phone and tablet configurations. Another message may also be sent by the system to the user and displayed on the user' s device.
[00042] The processor creates a unique and portable QR code or alternative identifier, as discussed above, that is associated with the user. The QR code may include different sets of information in various embodiments of the invention. In one embodiment, the QR code or alternative identifier includes one or more of a URL where more information about the user may be stored and retrieved and/or the name of the user. In some embodiments one or more items of additional information about the user may be encoded in the QR code or alternative identifier, optionally together with a URL link to a web page maintained by the system. The QR code or alternative identifier can be used for many purposes. One use enables the user to allow various providers of products and services to scan the QR code or alternative identifier and identify and/or authenticate the user. Examples include gaining access to premium clubs, accessing security areas, confirming identity when purchasing tickets, and similar activities.
[00043] The software application installed on the user' s device can also allow the user to review and/or modify the information about the user that is stored in the memory. The information may be retrieved and displayed on the screen of the user' s device by the software application. The user may edit the information and save the changes back to the system. Upon receiving the edited information about the user, the system may also perform quality checks similar to these performed during the sign-up process.
[00044] The assigned global identification number, which can be changed to a different number by the user with permission from the system, is a permanent identifier for the user and thus is designed to remain associated with a particular user throughout that system's lifetime, independent of the lifespan of the user (i.e. , the number and QR code may stay with the user forever). Thus, all information included in the system, as well as the QR code, and the identification code of a user' s device may be associated with the unique global identification number. This allows all other information in the system to be modified, as needed, throughout the lifetime of the user providing flexibility to use different mobile and other devices, change user information when the user's name or address changes, or to encode different information in the QR code should this become desirable to, for example, adapt to new identification or authentication technologies.
[00045] For example, the user' s name, device identification code, information and/or QR code could be modified. If the user changes his/her mobile device or adds a new device, the user may associate the new device with the unique user identification code using a process provided by the system for this purpose. The system will then associate the new device with the unique global identification number for that user. The Internet of Things (also known as Any Channel, Any Device, Anywhere) is a new concept describing where data are transferred to and from mobile devices, cars with computer processors installed and even home appliances. This invention may serve as the backbone for each of the users' devices, connecting and unifying the users' connected experience across all internet related connected devices, as individuals do not currently have one universal global identification number or system which can be used for this purpose.
[00046] The processor may identify or authenticate the user to a provider of goods and/or services. Depending on what information is encoded in the QR code, the QR code alone may be sufficient to identify or authenticate the user in some embodiments. For example, the user's name may be encoded in the QR code and be used for identification or authentication when a low level of security is all that is necessary, e.g. , to ensure that the user is on the guest list at a party. In other embodiments, the QR code can direct the provider to a URL where the identification or authentication process can be completed.
[00047] It is intended that the providers of goods and/or services should be registered with the system of the invention. The system can then provide a process for providers to customize the identification or authentication process to their needs. For example, the providers may go directly to the URL encoded in the QR code via which information about the user is available for identifying or authenticating the user. Each provider may be assigned a unique identifier which can be associated with an identification or authentication protocol for that provider. The identification or authentication protocol may be used to determine what information about the user is needed by that provider to complete the identification or authentication process.
[00048] One or more of the user's name, likeness, address, zip code, country of citizenship, membership number, social security number, passport number, PIN code, password or any other information could be used as part of the identification or authentication process. This can be achieved by having the provider specify the information needed for its own customized identification or authentication process when it signs up with the system.
[00049] Once the provider is signed up, users of the system may be offered the opportunity to interact with that provider. Typically, the user will have to approve of interaction with a particular provider before that provider will be able to access any information about that user. This allows the user to customize their experience with the system and thereby prevent unwanted solicitations, interactions or other activities. The system can offer the user a variety of interfaces for selecting providers or activities. At its most basic, there will simply be a list of providers or activities from which the user may select. Alternatively, the system can group providers or activities into different groups to allow the user to more easily locate and identify providers or activities. Descriptions, URL's or other information can be associated with each provider and activity in order to offer users information about the provider or activity that can be used by the user to determine whether the user will interact with a provider or participate in an activity. Users may also be offered the opportunity to inform the system of the types of providers or activities in which the user has an interest for the purpose of receiving notifications regarding the availability of such providers or activities.
[00050] If the user elects to interact with a particular provider, the user will first be asked if the information requested by the provider can be provided to the provider by the system. If the user agrees, the user may then be prompted to provide any information needed by the provider that may be missing from the user' s profile in the system. Once the user has agreed to the requirements of the provider and has provided the required information to the system, that user can be identified or authenticated to that provider via the system.
[00051] Thus, in the present invention, the user has the ability to restrict the information provided to the system by only inputting or providing the information that the user wishes to share with the system, subject to the minimum requirements to participate in the system. In identity management, this is called a proportional ID or 'prop ID' whereby only the required amount of specific information necessary to complete the specific transaction is actually provided. The consequence of the user withholding certain information may be that the user will not be able to interact with certain providers or may be prevented from participating in certain activities that require information that was not shared by the user. Alternatively, the system may provide an option for limited interaction with providers or limited participation in certain activities rather than completely refusing such interaction or participation if the user has not shared the information required for that provider or activity with the system. Providers or activities can also be customized for varying levels of participation and/or interaction for users that wish to restrict the information that they are willing to provide. [00052] The user may also be offered the ability to provide detailed information to the system and to restrict distribution of the information in a variety of ways. For example, providers can be grouped by the system into categories and users can be offered the ability to restrict distribution of certain information to particular categories of providers or activities. Alternatively, the user can be asked to identify the information that can be distributed to a particular provider.
[00053] In another embodiment, each item of information is assigned a level of security and the user can assign a level of security to each provider or activity to determine what information is to be distributed. For example, the level one security (basic level) may include only the user's name, the user's global identification number, and the user's country. A higher level of security may further include address, user's mobile phone number, secondary phone number, and work information. Multi-factor authentication or two-factor
authentication requiring the presentation of two or more of the three authentication factors, a knowledge factor, i.e. something the user knows, a possession factor, i.e. something the user has, and an inherence factor, i.e. something the user is may also be employed.
[00054] Another level of security may include health, financial or social information. For example, social information can include information known to the user such as information that is used in typical security questions that are posed by existing security systems.
Examples include mother-in-law' s maiden name, the name of the first pet, a favorite color, etc. As a result, each provider may have access only to particular information of a user.
[00055] In another embodiment, information is grouped into types and the user decides which type(s) of information can be provided to a provider or for participation in an activity. Types of information may be, for example, name and address, health information, insurance information, likeness, demographic information, tax information, philanthropic goods and service categories or specific entities the user would like to receive said information from.
[00056] The system according to the present invention may function as a portal or horizontal stream to providers or activities. Thus, instead of a user having to log into FaceBook, Twitter and Linkedln separately to provide content, the user can create or provide the content in the present system, and then use the present system to stream the content to multiple service providers simultaneously creating the horizontal streaming over several vertical platforms. The system may be enabled to allow the user to select where particular content will go and to create templates of provider selections from which the user can select when desiring to stream content, i.e. , a friends template, a social media template, a family template, etc. [00057] Providers may include various social media platforms (FaceBook, Twitter, Linkedln), online retailers, web email providers (Yahoo Mail, Gmail, Hotmail), gaming providers (Farmville), etc. The system is used to identify or authenticate the user to the provider. The user may use the system of the present invention as a portal to sign up with providers and as a portal to return to the providers for services. The system may share more information about the user with the provider in order to create an account for the user or to use the service. In subsequent visits to the provider, the system can identify or authenticate the user for the provider. Horizontal streams differ from standard web verticals such as FaceBook where a users' profile is primarily housed within. The horizontal stream system enables the horizontal viewing, use and streaming of web verticals, and displays such information on the main URL repository for the users' lifespan maintained by the system according to the present invention.
[00058] Referring to Figure 8, a simplified flow chart of the process of signing into a social media platform through the system according to an exemplary embodiment of the present invention is shown. After signing up with the system of the invention, the user sets security level regarding the information about the user. There are several ways the system may sign a user into a social media platform. One way to sign in is that the system may identify or authenticate the user at the website of the social media platform by sending the user' s QR code to the social media platform which can read the QR code and use it to obtain the information to sign in the user. The QR code itself may contain the sign in information or the QR code may send the social media platform to a URL to obtain the required information to sign in. Another way to sign in is that the system may approach the social media platform through a special sign in window created specifically to interact with the system of the present invention, where only the user' s global identification number is entered, instead of user name/password combination. The user can then start use the social media platform.
[00059] In some exemplary embodiments, the system of the present invention can be enabled to send certain information needed by the provider for identification or
authentication. Such information may include a required password, username, membership number, account number, social security number. Other information includes a link to the users' personal repository webpage/URL maintained by the system, a list of the users' club memberships and/or work groups.
[00060] The system of the present invention may also be used to identify or authenticate users for participation in various activities. For example, delivery personnel could scan the QR code of the user at delivery of goods to verify delivery and to ensure that the goods are being delivered to the proper recipient.
[00061] In an exemplary embodiment, the user may, through the system of the present invention, send comments or opinions to a provider, participate in surveys, vote, etc. The system will identify or authenticate the user for this purpose so as to ensure that users only participate the allowed number of times. Also, the system can be used to select participants for such activities based on demographics or other information about the user. Further, the system can provide both a vote, opinion and/or comment of the user and additional information which allows categorization of the results by a variety of different types of information including demographics, locations or any other type of information available in the system which the user authorizes for distribution to provides or for participation in activities.
[00062] In another exemplary embodiment, the user may, through the system of the present invention, send a request for or receipt notice of goods, e.g., goods distributed by a charity organization. The system identifies or authenticates the user to the charity organization, which in turn sends a message through the system to the user about when and where to pick up the goods, or when to expect the goods to be delivered to the user's address (preferably the same address saved in the memory for the user). The message is preferably text to the user's device. When the user receives the goods, he/she may present the device with the user's QR code displayed on the screen for identification or authentication. Either the QR code or global identity number may be used to identify or authenticate the user. The system can then confirm to the provider that the goods have been delivered to the intended recipient.
[00063] Referring to Figures 6 and7, there are shown flow charts of an exemplary interaction between a user, the system and a charity organization distributing a product and/or service where the system is used as a portal from the user to the charity organization. A charity may register with the system as a provider and then log into the system. In this case, the charity selects a region for distribution of the product/service. A text is then sent to users of the system who have assented to receipt of such messages aboutthe intention to distribute the product/service. The system then collects and analyzes responses from users to the text about the product/service. If the response is negative, the system notes the user' s preference in the database for future use. If the response is positive, the system sends information in the form of a text to the provider to request the product/service. In this case, the regional office of the provider receives the information including a list of people requesting the
product/service and then the users arrive to collect the product/service from the charity organization. [00064] As shown in Figure 7, if the user is already registered with the system, then the user can simply either display their QR code on their device or give their global identity number to the provider for identification or authentication in order to collect the requested product/service. For persons that show up to obtain the product/service that are not already signed up for the system of the present invention, the provider can encourage them to sign up using the sign-up process described above prior to delivery of the product/service. This would allow the provider, for example, to collect some additional information from the recipient of the product/service via the system of the invention via the product delivery process and to ensure that a particular person was not receiving the product/service multiple times.
[00065] The system according to the present invention can be used for users to conduct global voting on almost any subject, such as how to address climate change, what is the energy strategy of the future, should the government take a particular action, etc. The system can also unify one's online presence by providing a portal to providers and activities and/or providing information to sign up with providers and activities from the user's single centralized profile. The system can also be used to identify or authenticate the user.
[00066] The system can also be used as a core or integral component of personal near field communication (NFC), radio frequency identification (RFID) and related authentication and payment or access technologies. Throughout this application, wherever there is a reference to a 'QR code' any of the above technologies such as NFC or other digital authentication technologies that enable Multi-Factor Authentication can be used instead of the QR code. Thus, the system can transmit from the user's device the information required for such transactions, such as identification information, the user' s QR code, the global identity number etc. The system can also be used as the backbone for the emerging Internet of Things, where consumers are demanding that all of their smart devices are identified and connected to the user via the Internet.
[00067] In one embodiment, by using the system of the present invention, a user would not need to create a separate account for each provider. Using the information about the user saved in the system, the user can be identified or authenticated and information about the user can be distributed on an as needed basis to use the services provided by the providers. The providers may also be offered the option to request and store locally some of the information about the user from the system. In any event, the user does not need to go through the burdensome process of creating separate accounts with separate user names and passwords for each provider as is now required for interaction with various providers. [00068] The system according to the present invention can also be used to enable and facilitate true internet streaming. The system may function as a portal to send
opinions/comments from a user directly to an internet website to be posted live. Because the system is able to identify or authenticate the user for the website, the user can directly and instantly add content to the internet. This aspect of the present invention is needed to implement activity streams, where internet content is instantaneously and constantly added to a website as it is created by multiple users.
[00069] The system according to the present invention can also identify, chronicle and organize the global population. Thus, the system will chronicle all transactions conducted by the users, as well as all transactions conducted by the providers. This information can be used by the user as a receipt or proof that a specific action was taken, a payment was timely made, that the user was at a particular location at a particular time, etc. Also, access to the system can allow companies (Ancestry.com, McKinsey, etc.) and NGO's/non-profits (Gates, WHO, etc.) to research the population, connect people, and identify potential target populations, all with the approval of each individual user in advance. The system provides an organized database for every person on earth and issues a unique global identification number for each person.
[00070] The system according to the present invention can also be used to process payments. When a user enters a credit card number as part of the information about the user, the system may identify or authenticate the user at a retailer and pay with the credit card for any purchases the user has made. The system itself can act as the payment processor rather than the retailer.
[00071] In another embodiment, a transaction request may be sent to the system by a vendor, the system may then send a confirmation message to the user at his/her mobile phone or other devices. If the user confirms the transaction, the system forwards the credit card information to the vendor to complete the transaction.
[00072] Social media analytics is integral for companies and providers in understanding their users' real-time mood and sentiments. Said analytics also assist users in understanding their personal influence and status online. This system, when coupled with listening firm service providers such as General Sentiment and Attensity, greatly enhances said social media analytical capabilities. The analytics allow providers to identify sentiment and identify trends in order to accommodate the user better. The present system will chronicle all transactions of users and providers and thereby build up a valuable database of information which can be used for social analytics. The system can be customized to provide varying levels of access to the data to take advantage of the information stored therein. Users will have the ability to pre-approve access to their personal data for this purpose.
[00073] The system enables the emerging Internet of Things trend by creating a core infrastructure at the command of the user, enabling connectivity of all devices tied to the users' global identification number or QR code (including phones, tablets, in home smart devices, in car smart devices, etc.). Thus, the user will be able to connect to a variety of different devices, service providers, web sites, etc. via the portal function of the present system. The system will handle authentication and/or identification of the user so that connection will be seamless and can be carried out by one or a few clicks by the user. As a result, this will enable the user to save significant time and effort now expended for navigation to each provider, device or web site and logging in to each device, provider or web site separately. This will greatly enhance the user' s experience by allowing the user to focus on the particular transactions and eliminating the hassle that is currently required to access the devices, service providers and web sites used to conduct the transactions.
[00074] The system enhances the collection of large, or 'Big Data' sets relevant to the individual and providers using said system. Larger data sets including detailed, specific information about users and providers, allow greater understanding of mass behaviors and enable the identification of correlations related to business trends, disease prevention, crime activity, travel patterns, and more.
[00075] The system of the present invention can also implement various conventional security features to protect user's data and online presence. For example, biometrics identification can be implemented via the user' s device to ensure that a specific user is using the device when the present system is accessed. Usernames and passwords can also be used to log into the present system, as well as Public-key infrastructure (PKI) tokens and other conventional security measures. Due the power that is enabled by the present system, it may be advantageous to implement security measures such as these.
[00076] It is to be understood, however, that even though numerous characteristics and advantages of the present invention have been set forth in the foregoing description, together with details of the structure and function of the invention, the disclosure is illustrative only, and changes may be made in detail, especially in matters of shape, size and arrangement of parts within the principles of the invention to the full extent indicated by the broad general meanings of the terms in which the appended claims are expressed.

Claims

WHAT IS CLAIMED IS:
1. A system for creating an identity, verification of said created identity and
authentication of a user using the verified identity, the system comprising:
memory coupled to a processor;
a software application which, when installed on the user's device, enables the device to be communicably connected to the processor and to perform the steps of:
enabling the user to enter information about the user; and
sending the information about the user and an identification code of the user's device to the processor;
code executable by the processor and stored on the memory which, when executed, enables the processor to perform the steps of:
receiving the information about the user and the identification code of the user's device;
storing the information about the user and the identification code of the user's device in the memory;
assigning a unique global identification number to the user;
creating a unique QR code, near field communication identifier or using a hardware identity of said user's device;
associating the unique QR code, near field communication identifier or hardware identity of said user' s device with the global identification number and identification number of the user's device; and identifying or authenticating the user to a provider of goods and/or services using either the global identity number, the QR code or the near field communication identifier.
2. The system of claim 1 , wherein the user' s device is a mobile phone, tablet, computer, or computerized enabled device.
3. The system of claim 1, wherein the user's device is a mobile phone and the
identification code of the user' s device is the phone number of the mobile phone.
4. The system of claim 1 , wherein different security criteria are set for different types of information about the user.
5. The system of claim 1, wherein the system is configured to share information about the user with providers of goods and/or services and the system is enabled to allow the user to determine what information is shared with a particular provider.
6. The system of claim 1, wherein the processor enables the user to select an available unique global identification number.
7. The system of claim 1, wherein the QR code includes an URL link encoded therein, and information about the user is available at a URL corresponding to the URL link.
8. The system of claim 1, wherein the QR code includes the user's global identification number encoded therein.
9. The system of claim 1 , wherein the user is able to review and edit the information about the user stored in the memory.
10. The system of claim 1, wherein the processor is capable of sending the global
identification number of the user to the provider of goods and/or services to identify or authenticate the user.
11. The system of claim 1 , wherein the processor is capable of initiating communication with the user through the user's device.
12. The system of claim 1, wherein the system enables the user to request goods or services available from a provider of goods or services.
13. The system of claim 1, wherein the system enablesaprovider of goods or services to send a notice of available goods or services to users.
14. The system of claim 13, wherein notices are sent to users selected based on specific criteria.
15. The system of claim 11, wherein notices are sent to users which have pre-authorized receipt of such notices.
16. A method of identifying or authenticating a user at a provider using the system of claim 1, comprising the step of:
sending either the user's global identity number or the user's QR code to the provider.
17. The method of claim 16, further comprising step of sending the user's global
identification number to the provider.
18. A method of posting content to a website using the system of claim 1, comprising the steps of:
receiving the content by the system from a user's device;
identifying or authenticating the user;
sending the content with user information to the website, and
posting the content to the website.
19. The method of claiml8, wherein identifying or authenticating the user comprises sending the user' s QR code to the website.
20. The method of claim 18, wherein identifying or authenticating the user comprises sending the user's global identification number to the website.
21. A method of identifying or authenticating a user using the system of claim 1,
comprising the steps of:
scanning the user's QR code displayed on a screen of the user's device, and identifying or authenticating the user using information obtained from the scanned QR code.
22. The method of claim 21, further comprising the step of matching the mobile phone number encoded in the QR code with the phone number registered for the user' s mobile phone.
PCT/US2013/032046 2012-09-14 2013-03-15 A global identification number and portal platform technology Ceased WO2014042687A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261700904P 2012-09-14 2012-09-14
US61/700,904 2012-09-14

Publications (1)

Publication Number Publication Date
WO2014042687A1 true WO2014042687A1 (en) 2014-03-20

Family

ID=50278585

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/032046 Ceased WO2014042687A1 (en) 2012-09-14 2013-03-15 A global identification number and portal platform technology

Country Status (1)

Country Link
WO (1) WO2014042687A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841119A (en) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 Method and system for achieving equipment access authentication based on Home-IOT cloud gateway
DE102014118373A1 (en) * 2014-12-10 2016-06-16 Globalkey Ag Procedure for simplifying the management and handling of ID cards
DE102017102332A1 (en) 2017-02-07 2018-08-09 Rational Aktiengesellschaft Method of associating a cooking appliance with a server application
WO2019050599A1 (en) * 2017-09-11 2019-03-14 Bentley Systems, Incorporated Techniques for coordinating codes for infrastructure modeling
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
US11374922B2 (en) 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
US12210506B2 (en) 2022-12-07 2025-01-28 Bentley Systems, Incorporated Serverless code service
US12292955B2 (en) * 2019-04-22 2025-05-06 Bread Financial Payments, Inc. Digital pass with user verification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2161873C2 (en) * 1995-04-17 2001-01-10 ТЕЛЕФОНАКТИЕБОЛАГЕТ ЛМ ЭРИКССОН (пабл.) Method for data-frame time identification to automatically request iteration in space-oriented redundancy protocol of alokha system
US20090138953A1 (en) * 2005-06-22 2009-05-28 Dennis Bower Lyon User controlled identity authentication
US7578432B2 (en) * 2005-12-07 2009-08-25 Bml Medrecords Alert Llc Method for transmitting medical information identified by a unique identifier barcode to a hospital
US20090224889A1 (en) * 2003-12-12 2009-09-10 Abhinav Aggarwal System and method for universal identity verification of biological humans
US20120109734A1 (en) * 2009-10-15 2012-05-03 Visa U.S.A. Inc. Systems and Methods to Match Identifiers
US20120173311A1 (en) * 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2161873C2 (en) * 1995-04-17 2001-01-10 ТЕЛЕФОНАКТИЕБОЛАГЕТ ЛМ ЭРИКССОН (пабл.) Method for data-frame time identification to automatically request iteration in space-oriented redundancy protocol of alokha system
US20090224889A1 (en) * 2003-12-12 2009-09-10 Abhinav Aggarwal System and method for universal identity verification of biological humans
US20090138953A1 (en) * 2005-06-22 2009-05-28 Dennis Bower Lyon User controlled identity authentication
US7578432B2 (en) * 2005-12-07 2009-08-25 Bml Medrecords Alert Llc Method for transmitting medical information identified by a unique identifier barcode to a hospital
US20120109734A1 (en) * 2009-10-15 2012-05-03 Visa U.S.A. Inc. Systems and Methods to Match Identifiers
US20120173311A1 (en) * 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841119A (en) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 Method and system for achieving equipment access authentication based on Home-IOT cloud gateway
CN103841119B (en) * 2014-03-25 2017-12-01 广州物联家信息科技股份有限公司 The method and system for realizing equipment access authentication are closed based on Home IOT clouds
DE102014118373A1 (en) * 2014-12-10 2016-06-16 Globalkey Ag Procedure for simplifying the management and handling of ID cards
DE102017102332A1 (en) 2017-02-07 2018-08-09 Rational Aktiengesellschaft Method of associating a cooking appliance with a server application
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
WO2019050599A1 (en) * 2017-09-11 2019-03-14 Bentley Systems, Incorporated Techniques for coordinating codes for infrastructure modeling
CN111316297A (en) * 2017-09-11 2020-06-19 本特利系统有限公司 Techniques for coordinating code for infrastructure modeling
US11138529B2 (en) 2017-09-11 2021-10-05 Bentley Systems, Incorporated Techniques for coordinating codes for infrastructure modeling
CN111316297B (en) * 2017-09-11 2024-04-23 本特利系统有限公司 Techniques for harmonizing code for infrastructure modeling
US11374922B2 (en) 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
US12292955B2 (en) * 2019-04-22 2025-05-06 Bread Financial Payments, Inc. Digital pass with user verification
US12210506B2 (en) 2022-12-07 2025-01-28 Bentley Systems, Incorporated Serverless code service

Similar Documents

Publication Publication Date Title
US20210383377A1 (en) Decentralized identity verification platforms
US8312097B1 (en) Segmenting access to electronic message boards
US20200050793A1 (en) Consumer and brand owner data management tools and consumer privacy tools
WO2014042687A1 (en) A global identification number and portal platform technology
CN103986688B (en) Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
JP2021519488A (en) Systems and methods for using code and images within the blockchain
US20150088744A1 (en) Transaction Authentication
US20180048652A1 (en) Generating and utilizing digital visual codes to grant privileges via a networking system
US20190147505A1 (en) System for electronic management of fundraising campaigns
US20170124606A1 (en) Integrating Online Ratings and Reviews for Businesses with Point of Sale (POS) or EPOS (Electronic Point of Sale) Systems to Increase Integrity and Authenticity
KR102297192B1 (en) System and method for providing job matching based on location
EP2338268A1 (en) A transaction system for business and social networking
US20150150100A1 (en) Integrated profile creation for a social network environment
TWI247514B (en) Secure messaging center
CN101291217A (en) Network identity authentication method
US20250232313A1 (en) Systems and methods for deterring bot access of computer resource
JP6871296B2 (en) Mediation server, program, and information processing method
US20200074566A1 (en) System and method for allocation, management and peer review based transfer of electronic tokens
US20230247018A1 (en) System and method for secure electronic document exchange and execution of contracts via a secure electronic platform with biometric access verification
US11494738B2 (en) Re-engineering user login / registration process for job applicants
CN115735206A (en) Systems and methods for determining knowledge-based authentication questions
JP6175735B1 (en) Web site relay server, system, method and program using SNS
KR102692961B1 (en) Method for providing digital name card service, system, user device, and application implementing the method
KR20220156390A (en) Service providing method using access card and apparatus for performing the method
WO2017209758A1 (en) Consumer and brand owner data management tools and consumer privacy tools

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13836390

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13836390

Country of ref document: EP

Kind code of ref document: A1