[go: up one dir, main page]

WO2010039021A2 - Personalize graphical id branding manager as the secret code and authentication to send vital messages - Google Patents

Personalize graphical id branding manager as the secret code and authentication to send vital messages Download PDF

Info

Publication number
WO2010039021A2
WO2010039021A2 PCT/MY2008/000110 MY2008000110W WO2010039021A2 WO 2010039021 A2 WO2010039021 A2 WO 2010039021A2 MY 2008000110 W MY2008000110 W MY 2008000110W WO 2010039021 A2 WO2010039021 A2 WO 2010039021A2
Authority
WO
WIPO (PCT)
Prior art keywords
type
graphical
branding
password
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/MY2008/000110
Other languages
French (fr)
Inventor
Poey Chin Lai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2010039021A2 publication Critical patent/WO2010039021A2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/201Accessories of ATMs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the invention is directed to methods and system of authenticating personal identity utilizing the customizable graphical ID branding that stores vital personal particulars as shown in Fig 1 in the system.
  • the present invention is directed to personalize graphical (ID) identity branding authentication system as the secret code to send the vital message to assigned parties.
  • the invention consists of a system (using string/algorithm and any other methods) for generating, identifying, authenticating the application process and programme.
  • This invention provides a safe process for users to authenticate themselves and tell someone in case an emergency arises using the Personalize Graphical ID branding as the secret code.
  • the messages need to be preset at the time of registration and changes can be done anytime at user request.
  • Type D authentication As shown in the Fig 6, a child or an elderly person can press on the picture of ambulance and the personalize Graphical ID branding set so that the response team from the operator or the affiliate parties can respond to the request. At the same time, the system will alert the family members.
  • Type D authentication (vital alert) system is able to be deployed on the mobile phone, Internet, a service provided by TV operators etc.
  • Type D authentication (vital alert) system can also be operated by pressing on the pictures with/without the personalize Graphical ID branding, it can also link to the location base services provided by telecommunications companies or using the GPS on the mobile phone to send the location to the alerted receivers.
  • the users can also use this application as the normal authentication just minus the use of personalized graphical ID branding.
  • the personalized graphical ID branding is the additional feature that acts as the secret code to send vital message.
  • the personalized graphical ID can also be used as an anti-phising solution for the Internet environment authentication.
  • Type B as shown in Fig 4 can be designed to overcome captcha issue beside anti-pishing and Type C as shown in Fig 5 will be able to overcome shoulder surfing attack beside captcha and anti-phising.
  • Graphical ID manager can help to overcome keyloggers activities.
  • the invention is able to identify the users' personal particulars. This allows the users to use this invention of the Personalize Graphical ID branding as an authentication for any applications that require their personal particulars. This will save time for the users to fill up their personal particulars again.
  • This invention can also be extended to be used as anti-spam so that it only allows authorized parties messages to pass through into the system at the users' requests.
  • Personalize Graphical ID branding can also be replaced by any other pictures, video, etc.
  • the mechanism of the invention is to generate the unique personalized graphical ID as the personal branding when the user register the Personal ID as shown in Fig 1 using the system specially programmed for this application. If the Personal ID is Joan Lai as shown in Fig 2, Joan Lai graphical ID will appear. Then, the users will be given a list of vital messages to the assigned parties which are customizable for personal use or provided by the operators.
  • the users can select their preference of authentication provided by the operators like Type A shown in Fig 3 or Type B shown in Fig 4 or Type C shown in Fig 5 and Type D as shown in Fig 6 with their personalized graphical ID branding.
  • the personalize ID branding e.g Joan Lai graphical ID
  • the personalized ID e.g Joan Lai graphical ID
  • the personalized ID e.g Joan Lai graphical ID
  • the personalize ID can be used first or last depends on the pre-set during registration to use the vital message.
  • aware-unaware password is used to relate aware password and unaware password.
  • the users will need to press on the personalized ID branding (e.g Joan Lai graphical ID) then key in the (e.g alphanumeric)/any local language password that act as the one time password on the Pre-selected Pictures. If the users select to use the (e.g alphanumeric)/any local language function on the personalized ID (e.g Joan Lai graphical ID) picture to send the vital message instead of pressing on the personalized ID, the users need to pre-set whether to use it first or last before selecting the picture authentication password with ASCII string.
  • the personalized ID branding e.g Joan Lai graphical ID
  • process (a) takes place and the information will be processed in system (b). If the process requires a payment transaction (e.g. using credit card, etc), process (c) will take place where the users ID branding will be used to verify as member before the payment is processed. Then, the processed transaction will be updated at system (b) before going through to the retailers system (d) for process and the notification will be sent back to system (e) for update and notify users (f). The retailers will notify the payment to loyalty program organization (g)
  • the personalized graphical ID branding will only be used as the secret code to send vital messages or else it will be used as ordinary authentication.
  • the message will be "Do you want to use your personalized graphical ID branding to register for the contest etc? If your reply is yes, then the authentication either Type A or Type B or Type C will appear depending on your pre selected Types for the use as personal particular for registration set during the creation of the personalized graphical ID branding. Usually, this will happen when the users click on the affiliate parties branding or advertising.
  • the users can just use the # to call out the Type D or pre-set it as screen saver or any other easy methods to the users' preference.
  • the users can call our Type D by pressing on # 1 or any other method provided by the TV operators. The methods will vary depending on the operators since this section is customizable.
  • the users only require calling out Type D authentication and pressing on the photos/pictures for the vital messages to be sent to relevant parties as speed ID branding authentication to identify the person and the requested services from the parties pre-set.
  • the invention can be implemented not only in PCs, complex networked systems, and Satellite/Cable TV systems but also in stand-alone systems, resource limited devices, like mobile phone, PDA etc. It may be applied as a revenue generating branding component to an integrated authentication solution. It can be optionally integrated into existing business and authentication processes. Therefore, different aspects of the invention can be appreciated individually, collectively or as a combination of both.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Description

i
[Documentation Name] Description (Invention Details)
[Invention Name]
Personalize Graphical ID Branding Manager as the secret code and authentication to send vital messages.
[Field of Invention]
[0001 ]
The invention is directed to methods and system of authenticating personal identity utilizing the customizable graphical ID branding that stores vital personal particulars as shown in Fig 1 in the system. In particular, the present invention is directed to personalize graphical (ID) identity branding authentication system as the secret code to send the vital message to assigned parties. The invention consists of a system (using string/algorithm and any other methods) for generating, identifying, authenticating the application process and programme.
[Background]
[0002]
The evolution of the Internet, mobile, bank ATM and cable/satellite TV has greatly influenced the way individuals, society, companies and institutions communicate, educate, conduct transactions, and store and retrieve documents, images, music, and video etc. Today's world of communication with convenience, ease of use, speed, and low overhead costs are contributing factors to the widespread use of these technologies.
[0003]
These technologies are useful for communications, education, purchasing goods as well as conducting confidential transactions. Nevertheless, this has also contributed to the crime rate with the use of these technologies. Therefore, Personalize Graphical ID branding manager as the secret code and authentication to send vital messages becomes essential during time of need to communication with loved ones and/or assigned parties.
[Invention Introduction]
[Solved Issues]
[0004]
This invention provides a safe process for users to authenticate themselves and tell someone in case an emergency arises using the Personalize Graphical ID branding as the secret code. The messages need to be preset at the time of registration and changes can be done anytime at user request. [Documentation Name] Description (Invention Details)
[0005]
In the case of bank using it for transaction, an individual can set in such a way that the bank will be informed to cancel the next transaction since the person doing it at this point in time is not on his/her free will. This will send an alert to the banking system and someone should look into it urgently. At the same time, the system will alert the relevant parties set in the system requesting for assistance. This is done to safe-guard the person who does the transaction involuntarily. For example a person may be forced to conduct transaction at knife/gun point?
[0006]
In the case of Type D authentication as shown in the Fig 6, a child or an elderly person can press on the picture of ambulance and the personalize Graphical ID branding set so that the response team from the operator or the affiliate parties can respond to the request. At the same time, the system will alert the family members. Type D authentication (vital alert) system is able to be deployed on the mobile phone, Internet, a service provided by TV operators etc. Type D authentication (vital alert) system can also be operated by pressing on the pictures with/without the personalize Graphical ID branding, it can also link to the location base services provided by telecommunications companies or using the GPS on the mobile phone to send the location to the alerted receivers.
[0007]
The users can also use this application as the normal authentication just minus the use of personalized graphical ID branding. The personalized graphical ID branding is the additional feature that acts as the secret code to send vital message. The personalized graphical ID can also be used as an anti-phising solution for the Internet environment authentication. Type B as shown in Fig 4 can be designed to overcome captcha issue beside anti-pishing and Type C as shown in Fig 5 will be able to overcome shoulder surfing attack beside captcha and anti-phising. Graphical ID manager can help to overcome keyloggers activities.
[0008]
The invention is able to identify the users' personal particulars. This allows the users to use this invention of the Personalize Graphical ID branding as an authentication for any applications that require their personal particulars. This will save time for the users to fill up their personal particulars again.
[0009]
This invention can also be extended to be used as anti-spam so that it only allows authorized parties messages to pass through into the system at the users' requests. [Documentation Name] Description (Invention Details)
[0010] Personalize Graphical ID branding can also be replaced by any other pictures, video, etc.
[How the systems work?]
[0011 ]
The mechanism of the invention is to generate the unique personalized graphical ID as the personal branding when the user register the Personal ID as shown in Fig 1 using the system specially programmed for this application. If the Personal ID is Joan Lai as shown in Fig 2, Joan Lai graphical ID will appear. Then, the users will be given a list of vital messages to the assigned parties which are customizable for personal use or provided by the operators.
[0012]
The users can select their preference of authentication provided by the operators like Type A shown in Fig 3 or Type B shown in Fig 4 or Type C shown in Fig 5 and Type D as shown in Fig 6 with their personalized graphical ID branding.
[0013]
In the case of Type A, by typing the http://www.picsecureid.com/joanlai, the personalize ID branding (e.g Joan Lai graphical ID) will appear together with the user log in and password as shown in Fig 3. The users will press the personalized ID (e.g Joan Lai graphical ID) first before typing in their usual pictures authentication password so that the vital message set will be sent together with normal User ID and password.
[0014]
In the case of Type B, by typing the http://www.picsecureid.com/joanlai, the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos as shown in Fig 4. The personalize ID (e.g Joan Lai graphical ID) can be used first or last depends on the pre-set during registration to use the vital message.
[0015]
In the case of Type C, by typing the http://www.picsecureid.com/ioanlai, the personalize ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos with (e.g alphanumeric)/any local language on the pictures/photos as shown in Fig 5. This novelty invention divided the original password to 3 parts, aware password, unaware password and reference of aware-unaware passwords. Aware password uses random ASCII string as its expression. Aware password is a temporary password for input. Unaware password uses the indirect visible objects, like graphical objects, positions and phrases etc. These indirect visible [Documentation Name] Description (Invention Details)
objects used as unaware password should only be catcher and familiar to the valid users, but against to non- valid users. Reference of aware-unaware password is used to relate aware password and unaware password.
[0016]
As users of Type C who want to send the vital messages, the users will need to press on the personalized ID branding (e.g Joan Lai graphical ID) then key in the (e.g alphanumeric)/any local language password that act as the one time password on the Pre-selected Pictures. If the users select to use the (e.g alphanumeric)/any local language function on the personalized ID (e.g Joan Lai graphical ID) picture to send the vital message instead of pressing on the personalized ID, the users need to pre-set whether to use it first or last before selecting the picture authentication password with ASCII string.
[0017]
The moment the users make a transaction using personalized ID branding either Type A or Type B or Type C as shown in Fig 7, process (a) takes place and the information will be processed in system (b). If the process requires a payment transaction (e.g. using credit card, etc), process (c) will take place where the users ID branding will be used to verify as member before the payment is processed. Then, the processed transaction will be updated at system (b) before going through to the retailers system (d) for process and the notification will be sent back to system (e) for update and notify users (f). The retailers will notify the payment to loyalty program organization (g)
[0018]
The personalized graphical ID branding will only be used as the secret code to send vital messages or else it will be used as ordinary authentication. In the case of personal particular registration, the message will be "Do you want to use your personalized graphical ID branding to register for the contest etc? If your reply is yes, then the authentication either Type A or Type B or Type C will appear depending on your pre selected Types for the use as personal particular for registration set during the creation of the personalized graphical ID branding. Usually, this will happen when the users click on the affiliate parties branding or advertising.
[0019]
In the case of Type D, by typing the http://www.sos.picsecureid.com/ioanlai for Internet, the personalized ID branding (e.g Joan Lai graphical ID) will appear together with the pre-selected affiliations photos/pictures for speed authentication to send pre-set vital messages for services [Documentation Name] Description (Invention Details)
required by pressing on the pictures/photos. As for the case of mobile phone, the users can just use the # to call out the Type D or pre-set it as screen saver or any other easy methods to the users' preference. In the case of TV cable provider station, the users can call our Type D by pressing on # 1 or any other method provided by the TV operators. The methods will vary depending on the operators since this section is customizable. The users only require calling out Type D authentication and pressing on the photos/pictures for the vital messages to be sent to relevant parties as speed ID branding authentication to identify the person and the requested services from the parties pre-set.
[Best Utilization]
[0020]
The invention can be implemented not only in PCs, complex networked systems, and Satellite/Cable TV systems but also in stand-alone systems, resource limited devices, like mobile phone, PDA etc. It may be applied as a revenue generating branding component to an integrated authentication solution. It can be optionally integrated into existing business and authentication processes. Therefore, different aspects of the invention can be appreciated individually, collectively or as a combination of both.
[Conclusion] [0021 ]
Please note that while the particular applications have been illustrated and described, various modifications can be made thereto and are contemplated herein. It should be understood that the invention is not intended and be limited by the specific examples provided within the specification. The descriptions and illustrations herein are not meant to be interpreted in a limiting sense. These are described as examples in relation to the drawings, texts attached hereto and further modifications, apart from those shown or suggested herein, may be made within the spirit and scope of the invention. Furthermore, it shall be understood that all aspects of the invention are not limited to the specific configurations set forth herein which depend upon a variety of conditions and variables. This include various modifications in any form of the invention will be apparent to a person's skill and creativity. It is therefore contemplated that the invention shall also cover any such modifications, variations and equivalents.

Claims

[ Documentation Name ] Claim
1. A method that generates the customizable personalizes graphical ID branding that store vital personal particulars for authentication during registration as shown in Fig 1.
2. According to claim 1, the invention is an algorithm/string or any other methods that generate personalize graphical ID branding from the registration system. Personalize Graphical ID branding can also be in the form of any other pictures, video, etc.
3. According to claim 1, after generating the Personalized Graphical ID branding as shown in Fig 2, an authentication of Type A shown in Fig 3 or Type B shown in Fig 4 or Type C shown in Fig 5 will be provided for selection.
4. According to claim 1, a method of setting the vital messages attached to the selected pictures provides link to the operators for Type D speed authentication shown in Fig 6 after the task in claim 3 is completed.
5. The method for authenticating a user as recited in claim 1 and 3 further comprises: denying access to the user as shown in Fig 8, Fig 9 and Fig 10 if the input is determined does not match the authentication preset for Type A or Type B or Type C.
6. The method of Personalized Graphical ID branding authenticating for Type A as shown in Fig 3 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the user log in and password as shown in Fig 3. The users will press the personalized ID (e.g Joan Lai graphical ID) first before typing in their usual user ID and authentication password so that the vital message set will be send together with the pictures authentication password.
7. The method of Personalized Graphical ID branding authenticating for Type B as shown in Fig 4 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos as shown in Fig 4. The personalized ID (e.g Joan Lai graphical ID) can be used first or last depends on the pre-set during registration to use the vital message.
8. The method of Personalized Graphical ID branding authenticating for Type C as shown in Fig 5 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos with (e.g numeric) on the pictures/photos as shown in Fig 5. [ Documentation Name ] Claim
9. According to claim 8, the type C novelty invention has divided the original password to 3 parts, aware password, unaware password and reference of aware-unaware passwords. Aware password uses random ASCII string as its expression. Aware password is a temporary password for input. Unaware password uses the indirect visible objects, like graphical objects, positions and phrases etc. These indirect visible objects used as unaware password should only be catcher and familiar to the valid users, but against to non-valid users. Reference of aware-unaware password is used to relate aware password and unaware password.
10. According to claim 9, type C novelty invention process as shown in Fig 7 start with the Picture One Time Password sign on initial selection, and then the system will be on standby. Next new screen of ASCII string pictures will appear, the user will need to key in the new (e.g alphanumeric)/any local language on the Picture for authentication.
11. According to claim 8, the users will need to press on the personalized ID branding (e.g Joan Lai graphical ID) then key in the (e.g alphanumeric)/any local language password that act as the one time password on the Pre-selected Pictures. If the users select to use the (e.g alphanumeric)/any local language function on the personalized ID (e.g Joan Lai graphical ID) picture to send the vital message instead of pressing on the personalized ID, the users need to pre-set whether to use it first or last before selecting the picture authentication password with ASCII string.
12. The method of Personalized Graphical ID branding authenticating for Type B and Type C photos/pictures can also be used as corporate branding or advertising platform for organizations. Corporate branding or advertising can be done on the pictures/photos itself or by flipping on the chosen pictures/photos once the users are prepared to enter their passwords.
13. The method of Personalized Graphical ID branding authenticating for Type A, Type B, Type C and Type D can also be linked to advertiser or sponsor information pop-ups once the authentication is entered as part of the advertisers or sponsorship programme.
14. The method of Personalized Graphical ID branding authenticating as shown in Fig 8 for Type A, Type B, Type C and Type D will be activated once the logo of PicsecureID is pressed if this particular look and feel is pre-select at the time of registration. The advertisers branding or sponsorship programme can be custom designed for the look and feel in Fig 8. The section (i) allow captions etc for corporation branding or advertising while section (ii) [ Documentation Name ] Claim
can add corporation promotional tagline, contest questions, etc and section (iii) can be replaced with corporation branding.
15. The method of Personalized Graphical ID branding authenticating for Type A, Type B and Type C can be used to make transaction as shown in Fig 9 for Internet, mobile and other methods of transactions.
16. According to claim 15 with reference to Fig 9, the moment the users make a transaction using Type A or Type B, or Type C authentication, process (a) takes place and the information will be processed in system (b). If the process requires a payment transaction (e.g. using credit card, etc), process (c) will take place where the users ID will be used to verify as member before the payment is processed. Then, the processed transaction will be updated at system (b) before going through to the retailers system (d) for process and the notification will be sent back to system (e) for update and notify users (f). The retailers will notify the payment to loyalty program organization (g)
17. The method for authenticating a user as recited in claim 6 or 7 or 8 provides user access to confidential information and allow users to provide their personal particulars for registration for any sign up or contest etc as shown in Fig 10 submit particulars.
18. According to claim 1 and 3, the authentication can be used as a single log in (Master key) process that allow users to aggregate more of their proprietary content from the website, e-mails, database, and so on.
19. According to claim 18 where the picture authentication in claim 7, 8 , 9 and 10 is used as single log in (Master key), the Graphic ID manager uses a hash function to generate a sequence of characters from the images that the user has picked, and supplies this to the website as a character based password. The hash function is duplicatable, so that every hash function applied to the same sequence of graphic images will generate the same sequence of characters. In this way, the user only deals with graphic passwords at the interface level, and no longer needs to concern the user with memorizing character based passwords.
20. According to claim 19, extending on the hash function concept, the user can (in his/her memory) assign specific icons to specific websites that he/she has registered with. For example, the user could file an amazon-related icon or image with the graphic ID manager. When he/she registers with the amazon website for the first time and needs to enter a personal password, he/she precedes his/her own personal graphic password sequence with [Documentation Name] Claim
the amazon icon (graphically indicating that he/she wants to login to amazon). The graphic ID manager then generates a character based keyword sequence which becomes his/her amazon password. He/She proceeds to do the same for all other websites (get an icon for yahoo, another icon for google, etc, etc).
21. According to claim 20, the user can now effectively generate different character passwords using exactly the same personal graphic password sequence, simply by preceding his graphic password sequence with an icon appropriate or corresponding to the various websites he wishes to log into. This in effect creates a single sign on functionality.
22. According to claim 20, Periodically, the internal implementation of the hash function will change to allow a chosen password sequence to change. This means that the sequence of characters generated from a given sequence of pictures will change. At this point in time, graphic manager will, without user intervention, connect to the various websites that the user has a registered account with and change the passwords there manually. Of course, from the user's point of view, he/she still uses the same sequence of graphical passwords that he has been using all along, only that this time the sequence of characters generated from it change, effectively changing the password as far as the different websites are concerned.
23. The method for authenticating a user as recited in claim 6 or 7 or 8, the authentication can be used as anti-spam system where the users will allow the messages to pass through after the authentication is done.
24. The method for authenticating a user as recited in claim 1 and 3 provides the user the option to use the personal graphical ID branding as secret code to send vital messages in case of emergency during authentication process as shown in Fig 10.
25. According to claim 24, type D display shown in Fig 6 and the application process shown in Fig 10 are good way to use the Personalized Graphical ID branding as the secret code and speed authentication to send vital message during time of need to communication with loved ones and/or assigned parties. For example a child or an elderly person can press on the picture of ambulance and the personalized Graphical ID branding set so that the response team from the operator or the affiliate parties can respond to the request. At the same time, the system will alert the family members. [ Documentation Name ] Claim
26. According to claim 24, type D as shown in Fig 6 speed authentication to send vital messages can be called out by typing the http://www.sos.picsecureid.com/ioanlai on the Internet, the personalized ID branding (e.g Joan Lai graphical ID) will appear together with the pre-selected affiliations photos/pictures.
27. According to claim 24, as for the case of mobile phone, the users can just use the # to call out the Type D or pre-set it as screen saver or other easy methods to the users' preference. In the case of TV cable provider station, the users can call our Type D by pressing on # 1 or any other method provided by the TV operators. The methods will vary depending on the operators since this section is customizable.
28. The type D authentication (vital alert) systems are able to be deployed on the mobile phone, Internet, a service provided by TV operators etc. Type D authentication (vital alert) system, it can also work by pressing on the pictures with/without the personalized Graphical ID branding that link to the location base services provided by telecommunications companies or using the GPS on the mobile phone to send the location to the alert receivers.
29. A program that causes the system to function as personal graphical ID branding authentication and acts as secret code to send vital messages that is automated with application process described in the documents.
PCT/MY2008/000110 2008-09-30 2008-09-30 Personalize graphical id branding manager as the secret code and authentication to send vital messages Ceased WO2010039021A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20083892 2008-09-30
MYPI20083892 2008-09-30

Publications (1)

Publication Number Publication Date
WO2010039021A2 true WO2010039021A2 (en) 2010-04-08

Family

ID=42074044

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2008/000110 Ceased WO2010039021A2 (en) 2008-09-30 2008-09-30 Personalize graphical id branding manager as the secret code and authentication to send vital messages

Country Status (1)

Country Link
WO (1) WO2010039021A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2495580A (en) * 2011-08-11 2013-04-17 Nowww Us Pty Ltd Image based authentication for a log-in
WO2018040831A1 (en) * 2016-08-31 2018-03-08 腾讯科技(深圳)有限公司 Graphic identification code generation method and apparatus
CN108390862A (en) * 2018-01-29 2018-08-10 丹露成都网络技术有限公司 A kind of graphic verification method based on image data encrypted indexes

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2495580A (en) * 2011-08-11 2013-04-17 Nowww Us Pty Ltd Image based authentication for a log-in
WO2018040831A1 (en) * 2016-08-31 2018-03-08 腾讯科技(深圳)有限公司 Graphic identification code generation method and apparatus
US10311348B2 (en) 2016-08-31 2019-06-04 Tencent Technology (Shenzhen) Company Limited Graphic identification code generation method and apparatus
US11120317B2 (en) 2016-08-31 2021-09-14 Tencent Technology (Shenzhen) Company Limited Graphic identification code generation method and apparatus
CN108390862A (en) * 2018-01-29 2018-08-10 丹露成都网络技术有限公司 A kind of graphic verification method based on image data encrypted indexes
CN108390862B (en) * 2018-01-29 2021-04-27 丹露成都网络技术有限公司 Graph verification method based on picture data encryption index

Similar Documents

Publication Publication Date Title
US9118673B2 (en) Methods and systems for secure key entry via communication networks
KR101049646B1 (en) Automatic input method of personal information using network address book and its system
US10387873B2 (en) Systems, methods, and computer program products for integrating third party services with a mobile wallet
US8364711B2 (en) Contact management system and method
US9876793B2 (en) Offline methods for authentication in a client/server authentication system
US8468576B2 (en) System and method for application-integrated information card selection
CN100466509C (en) Information content distribution method and device based on secret and/or personal information
US20090204622A1 (en) Visual and non-visual cues for conveying state of information cards, electronic wallets, and keyrings
US20150046557A1 (en) System, method and apparatus for using a virtual bucket to transfer electronic data
CN104737175A (en) Method and system for browser identity
US20090007245A1 (en) System and method for controlled content access on mobile devices
US9112847B2 (en) Authentication method
US20230319027A1 (en) Apparatus and method for automated email and password creation and curation across multiple websites
US20100070375A1 (en) Personal Information Applications, Personal Information Access Devices, and Methods of Accessing Personal Information
CN103270732B (en) Communicator, suggestion device and information recording carrier
US20180097811A1 (en) System and method for delegation of permissions to a third party
JP6898680B2 (en) Information processing equipment and programs
WO2010039021A2 (en) Personalize graphical id branding manager as the secret code and authentication to send vital messages
WO2009154635A1 (en) System and method for controlled content access on mobile devices
JP2004341832A (en) Personal information management method and system, disclosure identifier issuing device, personal information disclosure device
US20160343055A1 (en) System and method for recommending a set of products for purchase to a client
KR20010103240A (en) certification of contents/attestation method using internet
JP2020144633A (en) Information processing equipment and programs
US20090272797A1 (en) Dynamic information card rendering
WO2021065550A1 (en) Program, information provision system, and information provision method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08812670

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct app. not ent. europ. phase

Ref document number: 08812670

Country of ref document: EP

Kind code of ref document: A1