[go: up one dir, main page]

WO2014042687A1 - Numéro mondial d'identification et technologie de plate-forme de portail - Google Patents

Numéro mondial d'identification et technologie de plate-forme de portail Download PDF

Info

Publication number
WO2014042687A1
WO2014042687A1 PCT/US2013/032046 US2013032046W WO2014042687A1 WO 2014042687 A1 WO2014042687 A1 WO 2014042687A1 US 2013032046 W US2013032046 W US 2013032046W WO 2014042687 A1 WO2014042687 A1 WO 2014042687A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
code
provider
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2013/032046
Other languages
English (en)
Inventor
Kevin M. BROPHY
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2014042687A1 publication Critical patent/WO2014042687A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Definitions

  • the present invention relates to systems and methods for identifying or authenticating an individual and more particularly related to systems and methods that provide a unique combination of one global identity number and, in some cases, unique personal QR codes or similar technologies such as near field communication (NFC) for every person on earth, and may also function as a portal for accessing services (a 'two-sided network').
  • NFC near field communication
  • Personal identification systems may be based on something someone has, such as a card or badge, something that someone knows, such as a personal identification number (PIN), or some characteristic of the individual, such as his fingerprints or speech pattern. Personal identification systems that rely on PIN are vulnerable since the PIN may be lost, stolen, or guessed by others. Identification systems that rely on a device carried by the user which generates a code for authentication is not convenient and can only be used at locations or websites that are controlled by a central server where these same numbers are generated.
  • PIN personal identification number
  • the Federation for Identity and Cross-Credentialing System is a personal identification system that includes a coalition of diverse companies and organizations that each may issue identity credentials (such as badge with an identification number) and secure personal identifying information (biometrics, social security numbers, etc.). This information is maintained in a federated manner (by the sponsoring party where the information was first secured) instead of a centralized database.
  • identity credentials such as badge with an identification number
  • secure personal identifying information biometrics, social security numbers, etc.
  • This information is maintained in a federated manner (by the sponsoring party where the information was first secured) instead of a centralized database.
  • a user after obtaining an identity credential, may request physical access to any other company/organization within the coalition. The request will be sent to the sponsoring party where the personal identification information is stored for verification. If the credentials are verified, physical access to the company/organization may be granted.
  • the party that sponsors a user has the authority to decide to which companies/organizations in the coalition the user may have access.
  • the system requires
  • OpenID The OpenID foundation, available at http://www.openid.net, maintains a personal identification system named OpenID that allows a user to use an existing account to sign into multiple different websites.
  • OpenID is a decentralized system where any identity providers may become a member free of charge.
  • a user that has an account at one identity provider may sign into any other website in the system through OpenID, without having to create a new account/password.
  • the user's information and password is only maintained at the identity provider where the user has an account and is not shared with other websites in the system.
  • IdentityX is a personal identification system that provides an identity to a user through a smart phone.
  • the identity credentials include a PIN, voice, face and palm images.
  • a smart phone application is used to enroll a user in the system, which takes information from the user, including biometric information.
  • IdentityX confirms the identity of the user by confirming the user's information.
  • U.S. Patent No. 7,685,629 discloses a system for authenticating users to reduce transaction risks.
  • the system obtains and stores personal data from a user.
  • the personal data may include demographic data and a communication device (such as smart phone) identifier.
  • the system issues a user identifier for future authentication of the user.
  • the user identifier may include a character string that may be any desired combination of letters, numbers, punctuation symbols and mathematical symbols.
  • the system prompts the user to enter the user identifier and confirms that the identifier of the communication device used to enter the user identifier matches the stored communication device identifier. The system then decides whether access should be granted.
  • U.S. Patent No. 8,224,727 discloses a method to authenticate and process transactions based on a social network. The method includes: receiving, at a server computer a request from a user authenticated by a social networking website; identifying a first phone number of the user; communicating by the server computer with a mobile phone at the first phone number to confirm the request; and in response to the request being confirmed by user via the mobile phone at the first phone number, processing the request using funds associated with the mobile phone at the first phone number.
  • a simple yet secure personal, global identification system that relies on mobile devices is needed to identify and authenticate individuals on a worldwide basis.
  • a system may act as a portal to unify a person's internet presence with multiple goods/service providers via a single portal.
  • the objective of the invention is to provide an enabling mechanism which will be utilized to bring the power of the internet back to the user from a bottom up (starting with the user) perspective.
  • data privacy, and Do- Not-Track requirements are becoming increasing concerns for digital technology users, corporations and governments.
  • the major benefits for a consumer utilizing this platform will be increased speed, enhanced convenience and more seamless movement across the internet and in between the virtual and physical world.
  • the major benefit for a business utilizing this platform will be decreased costs as businesses can potentially avoid a large portion of the costs associated with building their own proprietary identity management ecosystem.
  • the present invention is directed to a system for a system for creating identities, for example, via issuance of a global identity numbers and/or QR codes, verification of the created identities, for example, via text to the person's mobile device to confirm that the person is who they say they are for each person that has been issued a global identity number, and authentication of a user using the created, verified identity, for example, in a manner that can be relied on by third parties such as providers of goods and/or services.
  • the system may include a memory coupled to a processor; a software application which, when installed on the user's device, enables the device to be communicably connected to the processor and to perform the step of enabling the user to enter information about the user and sending the information about the user and the phone number of the user' s device to the processor; the system further comprising code executable by the processor and stored on the memory which, when executed, enables the processor to perform the step of receiving the information about the user and an identification code for the user's device; storing the information about the user and the identification code the user's mobile phone (for validation) in the memory; assigning a unique global identification number to the user; creating and associating a unique QR code with the user or similar authentication technologies unique to the user's device for the purposes of Multi-Factor Authentication; and identifying or authenticating the user to a provider of goods and/or services by providing the user' s device, ID number, QR code or similar technology to the provider of goods and/or services.
  • Another aspect of the present invention is directed to a method of posting content to a website using the system of the present invention, comprising the steps of receiving the content from a user's device; identifying or authenticating the user and sending the content to the website for posting along with user identification information to identify or authenticate the user posting the content.
  • Yet another aspect of the present invention is directed to a method of identifying or authenticating a user including the steps of assigning a unique QR code, near field communication identifier, device hardware identifier or similar technology to a user and providing the user' s assigned identifier to a provider of goods and/or services for use in authentication of the user.
  • Figure 1 shows an embodiment of a sign-up screenshot with annotations indicating the different fields used in this embodiment.
  • Figure 2 shows a screen shot of an example of a screen that may be used in the system and methods of various embodiments of the present invention.
  • Figure 3 is a schematic representation of an exemplary identification number selection process.
  • Figure 4 is a schematic representation of the steps a processor of the system may perform during the sign-up process after the unique identification number is selected or assigned.
  • Figure 5 is a schematic representation of confirmation process which may be used to confirm a new user in some embodiments of the invention.
  • Figures 6 and7 are schematic representations of an embodiment of the invention wherein a provider of goods uses the system to facilitate distribution of goods and to confirm receipt of the goods.
  • Figure 8 is a schematic representation of an embodiment of method wherein the invention functions as a portal to enable a user to sign into and use a social media platform.
  • the present invention relates to a system for identifying or authenticating a user.
  • the system comprises a software application and a processor coupled to memory. There is code executable by the processor stored in the memory.
  • the system may identify or authenticate the user to a provider of goods or services and act as a portal to one or more providers of goods and/or services.
  • the system can be used to unify the user's presence in the online environment.
  • the software application may be an application that is available for download and can be installed on a user' s device, including a tablet, computer, or computerized enabled device such as a smart appliance, a mobile phone, a computer and similar devices (all collectively herein referred to as "devices").
  • the device is preferably a portable device or smart device.
  • the software application includes instructions that are executable by the device or device to perform various functions.
  • One function of the software application is to provide identification or
  • the application includes a signup function which allows new user to sign up to be included in the system of the invention.
  • Information about the user may be entered into multiple fields provided as part of the signup function. These fields are designated for different types of information.
  • the designation of certain signup fields is shown in Figure 3, with different fields for first name, last name, country, and phone number.
  • the phone number is preferably the registered phone number for the user' s mobile phone upon which the software application can be installed and will be used as the initial platform device. Alternatively, a unique identification code or number associated with the device on which the software application is installed may be employed.
  • a certain minimum amount of information should be provided by the user.
  • at least the first name, last name, country and preferably the identification code or number of the device upon which the application is installed should be provided by the user.
  • the device identifier can be obtained from the mobile number and/or text verification. This information is used to identify or authenticate the user to providers of goods and services.
  • Some exemplary types of information may include, for example, personal information of the user such as full name, mailing address, domicile address, phone number, age, date of birth, citizenship, marital status, other demographic information and one or more email addresses), user work information, such as, for example, employer
  • user health information such as, for example, medical history, prescriptions, allergies, insurance information and primary care physician
  • user social information such as, for example, club membership(s), hobbies, names of friends, interests, etc.
  • Figure 1 shows an example of an initial sign-up page for the end user, including a real-time global population counter and requesting preliminary information about the user including the user's mobile phone number for validation.
  • the software application collects the information about the user and sends it to the processor. Since the user's device is communicably connected to the processor when the software application is launched, the software application can directly send the information about the user to the processor. After the processor reviews the received information and determines that the information meets the requirements set by the system, the user is tentatively registered as a user in the system. A confirmation code is sent to the user, preferably by texting to the user. The user, upon receiving the confirmation code, may enter the confirmation code into the software application to complete the sign-up process. After the confirmation, the user is signed up as a user in the system.
  • the user's initial device is preferably a smart or mobile phone.
  • the device may use any operating system. Some examples include Android, Symbian, Apple iOS, RIM
  • the mobile phone is the preferred device for use initially in the present invention.
  • other devices such as personal computers, smart appliances such as intelligent home appliances, smart devices such as in car computers, laptops, tablets and PDA's may also be used instead of a mobile phone.
  • the processor may be any kind of microprocessor such as those manufactured by Intel Corporation or Advanced Micro Devices (AMD), Inc.
  • the processor is coupled to memory.
  • the processor and the memory may be part of a computer that also functions as a server.
  • the server may include components such as, but not limited to, a web server, a database server, an application server and a directory server.
  • the server typically includes a central processing unit including one or more microprocessors, random access memory (RAM), mechanisms and structures for performing I/O operations, a storage medium such as a magnetic hard disk drive(s), solid state drives and flash drives, and an operating system for execution on the central processing unit.
  • the hard disk drive of the server may be used for storing data, executable code, and policies of the system.
  • the hard disk drive(s) of the server also are typically provided for purposes of booting and storing the operating system, other applications that are to be executed on the server, paging and swapping between the hard disk and the RAM. It is envisioned that the server can be or otherwise utilize multiple servers in cooperation to facilitate greater performance and stability of the subject invention by distributing memory and processing in a conventional manner.
  • the memory may be the hard disk drive(s) of the server.
  • the memory may also be a machine-readable media.
  • a machine-readable media shall be understood to mean any article of manufacture that contains data that can be read by a computer.
  • Such machine-readable media includes but is not limited to magnetic media, such as a floppy disk, a flexible disk, a hard disk, reel-to-reel tape, cartridge tape, cassette tape or cards; optical media such as CD-ROM, DVD-ROM and writeable compact disc; magneto-optical media in disc, tape or card form; paper media, such as punched cards and paper tape; cards, and flash memory devices (e.g., card, stick, key drive, etc.).
  • the machine-readable media are intended to comprise, without being limited to, these and any other suitable types of memory.
  • the machine-readable media can be a server, a database, a hard drive, and the like.
  • the processor and memory are still coupled, such that the processor can retrieve any data/information store in the memory, and store received information about the user to the memory, or read executable code stored in the memory.
  • the memory can also be remote storage such as cloud storage.
  • the processor may perform a series of tasks such as receiving the information about the user and the user's device; storing information and retrieving information in the associated memory; reviewing the information and ensuring that it meets minimum requirements; assigning a unique global identification number to the user; creating a quick response (QR) code to be associated with the user and associating the identification of the user's device, the user's information, the unique global identification number and the QR code with a single user.
  • QR quick response
  • Alternative identifiers such as near field communication identifiers, device hardware identifiers, etc. may alternatively be used, particularly when the user is employing a device not enable for use of QR codes.
  • QR code refers to a matrix barcode that may be read by an imaging device.
  • the code comprises black modules arranged in a square grid on a white background.
  • a QR code is read by an imaging device, such as a camera, and formatted algorithmically by underlying software until the image can be appropriately interpreted. Data is then extracted from patterns present in both horizontal and vertical components of the image.
  • multi-factor authentication or "two-factor authentication” refer to an approach to authentication which requires the presentation of two or more of the three authentication factors, a knowledge factor, i.e. something the user knows, a possession factor, i.e. something the user has, and an inherence factor, i.e. something the user is.
  • the processor after receiving the information about the user and the user' s mobile phone number, may perform some quality checks.
  • One such quality check ensures that the received information does not have internal conflicts. For example, confirming that the street or mailing address is consistent with the country and that the street or mailing address is consistent with the zip code. If any inconsistency is identified, the processor may send an error message to the user and/or request correction of the information.
  • Another quality check that the processor may perform is to ensure the received information meets the minimum requirements set by the system.
  • Another quality check that the processor may perform is to ensure the received information meets the minimum requirements set by the system.
  • the system requires at least the first and last name of the user, country, and optionally the user' s device identification code. However, the minimum requirements may vary in different embodiments. If the information received does not meet the minimum requirements, the processor may send a message to the user asking for any missing information that is required by the system.
  • the processor stores the received information in the memory.
  • the format of the stored information in the memory may be flat text.
  • the received information is preferably stored in a database that is installed in the memory, which is more efficient in storing and retrieving data from the memory.
  • the database may be any type that known to a person skilled in the art, such as Oracle, MySQL, PostgreSQL, MSSQL, and SQLite, and beyond relational database.
  • the processor after making the determination to sign up the user in the system, will assign a unique global identification number to the user.
  • the system may allow the user to request a specific number, in which case the user may optionally be required to pay a fee for obtaining the requested number. Otherwise, the user is automatically assigned the next available global identification number.
  • FIG. 3 a flow chart of a unique identification number selection process according to an exemplary embodiment of the present invention is shown.
  • a user downloads the software application and installs it on the user' s device. The user may then scroll to the next available unique identification number, and select it or pick another available number if desired. The system may require the user to pay for a number if one is selected. The system then proceeds to the signup process. After the user enters and sends the information into the system, the system scrolled to next available global identification number. The user is presented with the global identification number. If the user likes the global identification number, the sign-up process is over. If the user does not like the assigned global identification number, the user may choose a new number, which may require payment of a fee. After paying the fee, the user obtains the chosen number and the sign-up process may proceed. If the user does not wish to select an identification number, the system will assign one to allow the sign-up process to proceed.
  • FIG. 4 there is shown a flow chart of the steps taken by the system in an exemplary sign-up process according to the present invention.
  • the user' s name and contact number such as a mobile phone number is sent to the server to be stored in its database.
  • the processor then texts a confirmation code to the user at the user's device.
  • the user Upon receiving the confirmation code, the user enters the confirmation code using the software application installed initially on the mobile phone.
  • the confirmation is sent back to the system. If the confirmation code is not received by the system within certain period, such as 24 hours, a reminder may be texted to the user at the user's mobile phone.
  • the system assigns a global identification number to the user and creates a QR code or reserves the right to create a QR code for the user if the device does not function with a QR code or if the specific application does not make use of QR codes for Multi-Factor Authentication, alternative identifiers such as NFC or device hardware identity may be employed.
  • FIG. 5 there is shown a flow chart of the sign-up process on the user's device, e.g. , a. mobile phone, according to an exemplary embodiment of the present invention.
  • the created identity is then verified by the system.
  • a confirmation code on the user's device, preferably by text message.
  • the user copies and pastes or types the confirmation code into the software application (see also Figure 4).
  • the processor assigns a global identification number and creates a QR code in applications where it serves a function in Multi-Factor Authentication, the global identification number and QR code are both displayed by the software application on the screen of the user's device.
  • the QR code may be displayed on subsequent versions of the product. This may arise due to constraints imposed by various phone and tablet configurations. Another message may also be sent by the system to the user and displayed on the user' s device.
  • the processor creates a unique and portable QR code or alternative identifier, as discussed above, that is associated with the user.
  • the QR code may include different sets of information in various embodiments of the invention.
  • the QR code or alternative identifier includes one or more of a URL where more information about the user may be stored and retrieved and/or the name of the user.
  • one or more items of additional information about the user may be encoded in the QR code or alternative identifier, optionally together with a URL link to a web page maintained by the system.
  • the QR code or alternative identifier can be used for many purposes. One use enables the user to allow various providers of products and services to scan the QR code or alternative identifier and identify and/or authenticate the user. Examples include gaining access to premium clubs, accessing security areas, confirming identity when purchasing tickets, and similar activities.
  • the software application installed on the user' s device can also allow the user to review and/or modify the information about the user that is stored in the memory.
  • the information may be retrieved and displayed on the screen of the user' s device by the software application.
  • the user may edit the information and save the changes back to the system.
  • the system may also perform quality checks similar to these performed during the sign-up process.
  • the assigned global identification number which can be changed to a different number by the user with permission from the system, is a permanent identifier for the user and thus is designed to remain associated with a particular user throughout that system's lifetime, independent of the lifespan of the user (i.e. , the number and QR code may stay with the user forever).
  • all information included in the system, as well as the QR code, and the identification code of a user' s device may be associated with the unique global identification number. This allows all other information in the system to be modified, as needed, throughout the lifetime of the user providing flexibility to use different mobile and other devices, change user information when the user's name or address changes, or to encode different information in the QR code should this become desirable to, for example, adapt to new identification or authentication technologies.
  • the user' s name, device identification code, information and/or QR code could be modified. If the user changes his/her mobile device or adds a new device, the user may associate the new device with the unique user identification code using a process provided by the system for this purpose. The system will then associate the new device with the unique global identification number for that user.
  • the Internet of Things also known as Any Channel, Any Device, Anywhere
  • This invention may serve as the backbone for each of the users' devices, connecting and unifying the users' connected experience across all internet related connected devices, as individuals do not currently have one universal global identification number or system which can be used for this purpose.
  • the processor may identify or authenticate the user to a provider of goods and/or services.
  • the QR code alone may be sufficient to identify or authenticate the user in some embodiments.
  • the user's name may be encoded in the QR code and be used for identification or authentication when a low level of security is all that is necessary, e.g. , to ensure that the user is on the guest list at a party.
  • the QR code can direct the provider to a URL where the identification or authentication process can be completed.
  • the providers of goods and/or services should be registered with the system of the invention.
  • the system can then provide a process for providers to customize the identification or authentication process to their needs.
  • the providers may go directly to the URL encoded in the QR code via which information about the user is available for identifying or authenticating the user.
  • Each provider may be assigned a unique identifier which can be associated with an identification or authentication protocol for that provider.
  • the identification or authentication protocol may be used to determine what information about the user is needed by that provider to complete the identification or authentication process.
  • One or more of the user's name, likeness, address, zip code, country of citizenship, membership number, social security number, passport number, PIN code, password or any other information could be used as part of the identification or authentication process. This can be achieved by having the provider specify the information needed for its own customized identification or authentication process when it signs up with the system.
  • users of the system may be offered the opportunity to interact with that provider.
  • the user will have to approve of interaction with a particular provider before that provider will be able to access any information about that user. This allows the user to customize their experience with the system and thereby prevent unwanted solicitations, interactions or other activities.
  • the system can offer the user a variety of interfaces for selecting providers or activities. At its most basic, there will simply be a list of providers or activities from which the user may select. Alternatively, the system can group providers or activities into different groups to allow the user to more easily locate and identify providers or activities.
  • URL's or other information can be associated with each provider and activity in order to offer users information about the provider or activity that can be used by the user to determine whether the user will interact with a provider or participate in an activity. Users may also be offered the opportunity to inform the system of the types of providers or activities in which the user has an interest for the purpose of receiving notifications regarding the availability of such providers or activities.
  • the user will first be asked if the information requested by the provider can be provided to the provider by the system. If the user agrees, the user may then be prompted to provide any information needed by the provider that may be missing from the user' s profile in the system. Once the user has agreed to the requirements of the provider and has provided the required information to the system, that user can be identified or authenticated to that provider via the system.
  • the user has the ability to restrict the information provided to the system by only inputting or providing the information that the user wishes to share with the system, subject to the minimum requirements to participate in the system.
  • identity management this is called a proportional ID or 'prop ID' whereby only the required amount of specific information necessary to complete the specific transaction is actually provided.
  • the consequence of the user withholding certain information may be that the user will not be able to interact with certain providers or may be prevented from participating in certain activities that require information that was not shared by the user.
  • the system may provide an option for limited interaction with providers or limited participation in certain activities rather than completely refusing such interaction or participation if the user has not shared the information required for that provider or activity with the system.
  • Providers or activities can also be customized for varying levels of participation and/or interaction for users that wish to restrict the information that they are willing to provide.
  • the user may also be offered the ability to provide detailed information to the system and to restrict distribution of the information in a variety of ways. For example, providers can be grouped by the system into categories and users can be offered the ability to restrict distribution of certain information to particular categories of providers or activities. Alternatively, the user can be asked to identify the information that can be distributed to a particular provider.
  • each item of information is assigned a level of security and the user can assign a level of security to each provider or activity to determine what information is to be distributed.
  • the level one security may include only the user's name, the user's global identification number, and the user's country.
  • a higher level of security may further include address, user's mobile phone number, secondary phone number, and work information. Multi-factor authentication or two-factor
  • a knowledge factor i.e. something the user knows
  • a possession factor i.e. something the user has
  • an inherence factor i.e. something the user is
  • Another level of security may include health, financial or social information.
  • social information can include information known to the user such as information that is used in typical security questions that are posed by existing security systems.
  • Examples include mother-in-law' s maiden name, the name of the first pet, a favorite color, etc. As a result, each provider may have access only to particular information of a user.
  • information is grouped into types and the user decides which type(s) of information can be provided to a provider or for participation in an activity.
  • Types of information may be, for example, name and address, health information, insurance information, likeness, demographic information, tax information, philanthropic goods and service categories or specific entities the user would like to receive said information from.
  • the system according to the present invention may function as a portal or horizontal stream to providers or activities.
  • the user instead of a user having to log into FaceBook, Twitter and Linkedln separately to provide content, the user can create or provide the content in the present system, and then use the present system to stream the content to multiple service providers simultaneously creating the horizontal streaming over several vertical platforms.
  • the system may be enabled to allow the user to select where particular content will go and to create templates of provider selections from which the user can select when desiring to stream content, i.e. , a friends template, a social media template, a family template, etc.
  • Providers may include various social media platforms (FaceBook, Twitter, Linkedln), online retailers, web email providers (Yahoo Mail, Gmail, Hotmail), gaming providers (Farmville), etc.
  • the system is used to identify or authenticate the user to the provider.
  • the user may use the system of the present invention as a portal to sign up with providers and as a portal to return to the providers for services.
  • the system may share more information about the user with the provider in order to create an account for the user or to use the service. In subsequent visits to the provider, the system can identify or authenticate the user for the provider.
  • Horizontal streams differ from standard web verticals such as FaceBook where a users' profile is primarily housed within.
  • the horizontal stream system enables the horizontal viewing, use and streaming of web verticals, and displays such information on the main URL repository for the users' lifespan maintained by the system according to the present invention.
  • FIG 8 a simplified flow chart of the process of signing into a social media platform through the system according to an exemplary embodiment of the present invention is shown.
  • the user sets security level regarding the information about the user.
  • the system may sign a user into a social media platform.
  • One way to sign in is that the system may identify or authenticate the user at the website of the social media platform by sending the user' s QR code to the social media platform which can read the QR code and use it to obtain the information to sign in the user.
  • the QR code itself may contain the sign in information or the QR code may send the social media platform to a URL to obtain the required information to sign in.
  • Another way to sign in is that the system may approach the social media platform through a special sign in window created specifically to interact with the system of the present invention, where only the user' s global identification number is entered, instead of user name/password combination. The user can then start use the social media platform.
  • system of the present invention can be enabled to send certain information needed by the provider for identification or
  • Such information may include a required password, username, membership number, account number, social security number.
  • Other information includes a link to the users' personal repository webpage/URL maintained by the system, a list of the users' club memberships and/or work groups.
  • the system of the present invention may also be used to identify or authenticate users for participation in various activities. For example, delivery personnel could scan the QR code of the user at delivery of goods to verify delivery and to ensure that the goods are being delivered to the proper recipient.
  • the user may, through the system of the present invention, send comments or opinions to a provider, participate in surveys, vote, etc.
  • the system will identify or authenticate the user for this purpose so as to ensure that users only participate the allowed number of times.
  • the system can be used to select participants for such activities based on demographics or other information about the user.
  • the system can provide both a vote, opinion and/or comment of the user and additional information which allows categorization of the results by a variety of different types of information including demographics, locations or any other type of information available in the system which the user authorizes for distribution to provides or for participation in activities.
  • the user may, through the system of the present invention, send a request for or receipt notice of goods, e.g., goods distributed by a charity organization.
  • the system identifies or authenticates the user to the charity organization, which in turn sends a message through the system to the user about when and where to pick up the goods, or when to expect the goods to be delivered to the user's address (preferably the same address saved in the memory for the user).
  • the message is preferably text to the user's device.
  • the user receives the goods he/she may present the device with the user's QR code displayed on the screen for identification or authentication. Either the QR code or global identity number may be used to identify or authenticate the user.
  • the system can then confirm to the provider that the goods have been delivered to the intended recipient.
  • FIG. 6 and7 there are shown flow charts of an exemplary interaction between a user, the system and a charity organization distributing a product and/or service where the system is used as a portal from the user to the charity organization.
  • a charity may register with the system as a provider and then log into the system. In this case, the charity selects a region for distribution of the product/service.
  • a text is then sent to users of the system who have assented to receipt of such messages aboutthe intention to distribute the product/service.
  • the system collects and analyzes responses from users to the text about the product/service. If the response is negative, the system notes the user' s preference in the database for future use. If the response is positive, the system sends information in the form of a text to the provider to request the product/service. In this case, the regional office of the provider receives the information including a list of people requesting the
  • the user can simply either display their QR code on their device or give their global identity number to the provider for identification or authentication in order to collect the requested product/service.
  • the provider can encourage them to sign up using the sign-up process described above prior to delivery of the product/service. This would allow the provider, for example, to collect some additional information from the recipient of the product/service via the system of the invention via the product delivery process and to ensure that a particular person was not receiving the product/service multiple times.
  • the system according to the present invention can be used for users to conduct global voting on almost any subject, such as how to address climate change, what is the energy strategy of the future, should the government take a particular action, etc.
  • the system can also unify one's online presence by providing a portal to providers and activities and/or providing information to sign up with providers and activities from the user's single centralized profile.
  • the system can also be used to identify or authenticate the user.
  • the system can also be used as a core or integral component of personal near field communication (NFC), radio frequency identification (RFID) and related authentication and payment or access technologies.
  • NFC near field communication
  • RFID radio frequency identification
  • the system can transmit from the user's device the information required for such transactions, such as identification information, the user' s QR code, the global identity number etc.
  • the system can also be used as the backbone for the emerging Internet of Things, where consumers are demanding that all of their smart devices are identified and connected to the user via the Internet.
  • a user would not need to create a separate account for each provider.
  • the user can be identified or authenticated and information about the user can be distributed on an as needed basis to use the services provided by the providers.
  • the providers may also be offered the option to request and store locally some of the information about the user from the system.
  • the user does not need to go through the burdensome process of creating separate accounts with separate user names and passwords for each provider as is now required for interaction with various providers.
  • the system according to the present invention can also be used to enable and facilitate true internet streaming.
  • the system may function as a portal to send
  • This aspect of the present invention is needed to implement activity streams, where internet content is instantaneously and constantly added to a website as it is created by multiple users.
  • the system according to the present invention can also identify, chronicle and organize the global population.
  • the system will chronicle all transactions conducted by the users, as well as all transactions conducted by the providers. This information can be used by the user as a receipt or proof that a specific action was taken, a payment was timely made, that the user was at a particular location at a particular time, etc.
  • access to the system can allow companies (Ancestry.com, McKinsey, etc.) and NGO's/non-profits (Gates, WHO, etc.) to research the population, connect people, and identify potential target populations, all with the approval of each individual user in advance.
  • the system provides an organized database for every person on earth and issues a unique global identification number for each person.
  • the system according to the present invention can also be used to process payments.
  • the system may identify or authenticate the user at a retailer and pay with the credit card for any purchases the user has made.
  • the system itself can act as the payment processor rather than the retailer.
  • a transaction request may be sent to the system by a vendor, the system may then send a confirmation message to the user at his/her mobile phone or other devices. If the user confirms the transaction, the system forwards the credit card information to the vendor to complete the transaction.
  • Social media analytics is integral for companies and providers in understanding their users' real-time mood and sentiments. Said analytics also assist users in understanding their personal influence and status online.
  • This system when coupled with listening firm service providers such as General Sentiment and Attensity, greatly enhances said social media analytical capabilities.
  • the analytics allow providers to identify sentiment and identify trends in order to accommodate the user better.
  • the present system will chronicle all transactions of users and providers and thereby build up a valuable database of information which can be used for social analytics.
  • the system can be customized to provide varying levels of access to the data to take advantage of the information stored therein. Users will have the ability to pre-approve access to their personal data for this purpose.
  • the system enables the emerging Internet of Things trend by creating a core infrastructure at the command of the user, enabling connectivity of all devices tied to the users' global identification number or QR code (including phones, tablets, in home smart devices, in car smart devices, etc.).
  • QR code including phones, tablets, in home smart devices, in car smart devices, etc.
  • the system will handle authentication and/or identification of the user so that connection will be seamless and can be carried out by one or a few clicks by the user.
  • this will enable the user to save significant time and effort now expended for navigation to each provider, device or web site and logging in to each device, provider or web site separately. This will greatly enhance the user' s experience by allowing the user to focus on the particular transactions and eliminating the hassle that is currently required to access the devices, service providers and web sites used to conduct the transactions.
  • the system enhances the collection of large, or 'Big Data' sets relevant to the individual and providers using said system. Larger data sets including detailed, specific information about users and providers, allow greater understanding of mass behaviors and enable the identification of correlations related to business trends, disease prevention, crime activity, travel patterns, and more.
  • the system of the present invention can also implement various conventional security features to protect user's data and online presence. For example, biometrics identification can be implemented via the user' s device to ensure that a specific user is using the device when the present system is accessed. Usernames and passwords can also be used to log into the present system, as well as Public-key infrastructure (PKI) tokens and other conventional security measures. Due the power that is enabled by the present system, it may be advantageous to implement security measures such as these.
  • PKI Public-key infrastructure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
PCT/US2013/032046 2012-09-14 2013-03-15 Numéro mondial d'identification et technologie de plate-forme de portail Ceased WO2014042687A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261700904P 2012-09-14 2012-09-14
US61/700,904 2012-09-14

Publications (1)

Publication Number Publication Date
WO2014042687A1 true WO2014042687A1 (fr) 2014-03-20

Family

ID=50278585

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/032046 Ceased WO2014042687A1 (fr) 2012-09-14 2013-03-15 Numéro mondial d'identification et technologie de plate-forme de portail

Country Status (1)

Country Link
WO (1) WO2014042687A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841119A (zh) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 基于Home-IOT云关实现设备接入认证的方法及系统
DE102014118373A1 (de) * 2014-12-10 2016-06-16 Globalkey Ag Verfahren zur Vereinfachung der Verwaltung und Handhabung von Ausweisen
DE102017102332A1 (de) 2017-02-07 2018-08-09 Rational Aktiengesellschaft Verfahren zum Verknüpfen eines Gargeräts mit einer Serveranwendung
WO2019050599A1 (fr) * 2017-09-11 2019-03-14 Bentley Systems, Incorporated Techniques de coordination de codes permettant une modélisation d'infrastructure
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
US11374922B2 (en) 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
US12210506B2 (en) 2022-12-07 2025-01-28 Bentley Systems, Incorporated Serverless code service
US12292955B2 (en) * 2019-04-22 2025-05-06 Bread Financial Payments, Inc. Digital pass with user verification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2161873C2 (ru) * 1995-04-17 2001-01-10 ТЕЛЕФОНАКТИЕБОЛАГЕТ ЛМ ЭРИКССОН (пабл.) Способ временной идентификации кадров для автоматического запроса на повторение в протоколе поинтервально-резервирующего типа системы "алоха"
US20090138953A1 (en) * 2005-06-22 2009-05-28 Dennis Bower Lyon User controlled identity authentication
US7578432B2 (en) * 2005-12-07 2009-08-25 Bml Medrecords Alert Llc Method for transmitting medical information identified by a unique identifier barcode to a hospital
US20090224889A1 (en) * 2003-12-12 2009-09-10 Abhinav Aggarwal System and method for universal identity verification of biological humans
US20120109734A1 (en) * 2009-10-15 2012-05-03 Visa U.S.A. Inc. Systems and Methods to Match Identifiers
US20120173311A1 (en) * 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2161873C2 (ru) * 1995-04-17 2001-01-10 ТЕЛЕФОНАКТИЕБОЛАГЕТ ЛМ ЭРИКССОН (пабл.) Способ временной идентификации кадров для автоматического запроса на повторение в протоколе поинтервально-резервирующего типа системы "алоха"
US20090224889A1 (en) * 2003-12-12 2009-09-10 Abhinav Aggarwal System and method for universal identity verification of biological humans
US20090138953A1 (en) * 2005-06-22 2009-05-28 Dennis Bower Lyon User controlled identity authentication
US7578432B2 (en) * 2005-12-07 2009-08-25 Bml Medrecords Alert Llc Method for transmitting medical information identified by a unique identifier barcode to a hospital
US20120109734A1 (en) * 2009-10-15 2012-05-03 Visa U.S.A. Inc. Systems and Methods to Match Identifiers
US20120173311A1 (en) * 2010-12-31 2012-07-05 Nautilus Hyosung Inc. Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841119A (zh) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 基于Home-IOT云关实现设备接入认证的方法及系统
CN103841119B (zh) * 2014-03-25 2017-12-01 广州物联家信息科技股份有限公司 基于Home‑IOT云关实现设备接入认证的方法及系统
DE102014118373A1 (de) * 2014-12-10 2016-06-16 Globalkey Ag Verfahren zur Vereinfachung der Verwaltung und Handhabung von Ausweisen
DE102017102332A1 (de) 2017-02-07 2018-08-09 Rational Aktiengesellschaft Verfahren zum Verknüpfen eines Gargeräts mit einer Serveranwendung
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
WO2019050599A1 (fr) * 2017-09-11 2019-03-14 Bentley Systems, Incorporated Techniques de coordination de codes permettant une modélisation d'infrastructure
CN111316297A (zh) * 2017-09-11 2020-06-19 本特利系统有限公司 用于协调用于基础设施建模的代码的技术
US11138529B2 (en) 2017-09-11 2021-10-05 Bentley Systems, Incorporated Techniques for coordinating codes for infrastructure modeling
CN111316297B (zh) * 2017-09-11 2024-04-23 本特利系统有限公司 用于协调用于基础设施建模的代码的技术
US11374922B2 (en) 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
US12292955B2 (en) * 2019-04-22 2025-05-06 Bread Financial Payments, Inc. Digital pass with user verification
US12210506B2 (en) 2022-12-07 2025-01-28 Bentley Systems, Incorporated Serverless code service

Similar Documents

Publication Publication Date Title
US20210383377A1 (en) Decentralized identity verification platforms
US8312097B1 (en) Segmenting access to electronic message boards
US20200050793A1 (en) Consumer and brand owner data management tools and consumer privacy tools
WO2014042687A1 (fr) Numéro mondial d'identification et technologie de plate-forme de portail
CN103986688B (zh) 认证外围设备的用户的方法和系统、外围设备及移动装置
JP2021519488A (ja) ブロックチェーン内でコード及びイメージを用いるためのシステム及び方法
US20150088744A1 (en) Transaction Authentication
US20180048652A1 (en) Generating and utilizing digital visual codes to grant privileges via a networking system
US20190147505A1 (en) System for electronic management of fundraising campaigns
US20170124606A1 (en) Integrating Online Ratings and Reviews for Businesses with Point of Sale (POS) or EPOS (Electronic Point of Sale) Systems to Increase Integrity and Authenticity
KR102297192B1 (ko) 위치 기반 일자리 추천 시스템 및 방법
EP2338268A1 (fr) Système de transaction pour réseautage d'affaires et social
US20150150100A1 (en) Integrated profile creation for a social network environment
TWI247514B (en) Secure messaging center
CN101291217A (zh) 网络身份认证方法
US20250232313A1 (en) Systems and methods for deterring bot access of computer resource
JP6871296B2 (ja) 仲介サーバ、プログラム、及び情報処理方法
US20200074566A1 (en) System and method for allocation, management and peer review based transfer of electronic tokens
US20230247018A1 (en) System and method for secure electronic document exchange and execution of contracts via a secure electronic platform with biometric access verification
US11494738B2 (en) Re-engineering user login / registration process for job applicants
CN115735206A (zh) 用于确定基于知识的认证问题的系统和方法
JP6175735B1 (ja) SNSを利用したWebサイトの中継サーバ、システム、方法及びプログラム
KR102692961B1 (ko) 디지털 명함 서비스 제공 방법, 이를 구현한 시스템, 사용자 단말 및 어플리케이션
KR20220156390A (ko) 액세스 카드를 이용한 서비스 필터링 방법 및 상기 방법을 수행하는 장치
WO2017209758A1 (fr) Outils de gestion de données de consommateur et de propriétaire de marque et outils de confidentialité de consommateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13836390

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13836390

Country of ref document: EP

Kind code of ref document: A1