[go: up one dir, main page]

WO2016103109A1 - Système et procédé pour stocker et partager de manière sécurisée des informations par l'intermédiaire d'un identificateur (id) unique - Google Patents

Système et procédé pour stocker et partager de manière sécurisée des informations par l'intermédiaire d'un identificateur (id) unique Download PDF

Info

Publication number
WO2016103109A1
WO2016103109A1 PCT/IB2015/059611 IB2015059611W WO2016103109A1 WO 2016103109 A1 WO2016103109 A1 WO 2016103109A1 IB 2015059611 W IB2015059611 W IB 2015059611W WO 2016103109 A1 WO2016103109 A1 WO 2016103109A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
tag
pin
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2015/059611
Other languages
English (en)
Inventor
Janardana HOSUR VENKATESHAPPA
Karthik HOSUR
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2016103109A1 publication Critical patent/WO2016103109A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Definitions

  • the embodiments herein generally relate to storing, accessing and sharing of information related to individuals and business entities. More specifically, the embodiments described herein relate to a system and method for providing secure, traceable and dynamic information sharing through a unique short ID. Particularly, the embodiments described herein relate to a system and method for sharing information with a unique ID along with at least a Tag wherein each Tag is linked to a secure PIN.
  • Sharing of information related to identification, traceability and documentary evidence is a common thing in a day to day life. It is observed that we spend significant time and efforts in sharing the common information such as name, contact information, GPS location, land mark, commonly used documents like address proof document, ID proof, and similar documents for performing our day to day activities like booking tickets for travelling, exchange business profile information during meetings, doing a buying or a selling activity in online, making a reservation of a product or a service, filling a form with personal information repeatedly etc.
  • cloud storage and file synchronization across multiple devices has been increasingly popular because of its greater advantage in viewing and sharing information files.
  • Many of the services such as Dropbox, Google Drive, OneDrive and others promotes increasing tendency in humankind to share multiple files to anyone at anytime and anywhere.
  • some of the services mentioned above support multiuser version control, which enables several users to edit files without overwriting versions of the same file created by other users.
  • Another major difficulty includes files deleted or edited on one machine (such as laptop) may be recovered from any of the other synced machine (such as smart phone).
  • a main object of the present invention is to provide a system and method for providing secure, traceable and dynamic sharing of information through a unique ID.
  • Another object of the present invention is to provide a unique ID, wherein each category of information is categorized or identified by a key called tag and each tag is linked to a secure PIN.
  • Still another object of the present invention is to provide an update PIN for updating the information.
  • Yet another object of the present invention is to provide a reading PIN to retrieve the information for respective Tag.
  • Another object of the present invention is to provide a system which facilitates individuals to allow other users or public people who are not users of the system to access the information.
  • Another object of the present invention is to provide a system which tracks the history of computer internet addresses from where the information was retrieved and also track the users who accessed personal information.
  • Another object of the present invention is to store and share information such as personal information, business profile, GPS location information, medical record, academic information, emergency information and the like can be shared through the system.
  • Another object of the present invention is to provide a system which integrates internal or third party communication tools like Chat Messengers, Video Conferencing/vide chat systems, Mailboxes, group mailing or messaging or video systems to interact with groups to facilitate effective communication between users.
  • internal or third party communication tools like Chat Messengers, Video Conferencing/vide chat systems, Mailboxes, group mailing or messaging or video systems to interact with groups to facilitate effective communication between users.
  • Another object of the present invention is to provide a trusted user creation which comprises creating trusted users and to provide functionality by trusting an another user by adding those users into the trusted users list with a relationship attached, so that those trusted users can access the information of all Tags or specific Tags as trusted.
  • Another object of the present invention is to provide a system to show the address and location map for users and further, the system shows context advertisements based on user search patterns.
  • the present invention discloses a system and method for providing secure, traceable and dynamic sharing of information files which links and shares information of individual persons and business entities on demand by others through an unique ID [herein after also referred as "EZE ID"]. Accordingly, each category of the information is categorized or identified by a key called “Tag” and each Tag is linked to a secure PIN.
  • the architecture of the system deployment to share and protect the information can include one or more user interfaces, communication network for example internet connectivity, a mail server, a firewall, an application server and a database server, wherein the application server includes a EZE ID application configured to allow an user create an unique ID, allow the user to create Tag for each category of information of the user, allow the user to set a secure PIN for each Tag, allow the user to feed, manage, update the information or file for respective Tag, store the information in the database server, and allow access to retrieve the information by user or others using the unique ID with at least a Tag and respective secure PIN, wherein the secure PIN includes a Update PIN to update the information for respective Tag, and a Reading PIN to retrieve the information for respective Tag, thus allowing the users to share the information to others using the unique ID with at least a Tag and respective secure PIN.
  • the system can include API's 105 for use of external software systems.
  • the method of creating User ID and storing information comprising signing up by a user on web portal or mobile application, checking for availability of Unique ID [herein after also referred as User ID] and selecting the User ID, allowing the user to enter profile information for all data section/category [herein referred as Tag] for available User ID, optionally providing a secure PIN for each Tag, linking GPS location of the user location and addresses, clicking on save button to save information data on to a database server, sending notification link to user e-mail ID for activation and activating an account by clicking on the link; and sharing the stored information by providing Unique ID, at least a Tag and respective PIN to anyone.
  • the method of sharing information comprising sharing a unique ID, at least Tag and respective PIN with other users, entering the unique ID, Tag, PIN of a concerned person information by other users in web portal or mobile application or send a request through own software to unique ID API, checking validation and matching of user ID and PIN, displaying requested information for a validated matching for requested user on web portal or mobile application or returns the information to requested software in XML format, denying access for invalidated matches for the requested user who made invalid attempts for retrieving the data and informing the concerned user about the invalid attempt issue to take security measures.
  • the method of updating information for identified by Tag comprising clicking on update information by a user on web portal or mobile smart phone, typing unique ID, at least a Tag and Update PIN and also changes in the information to update, sending request by the external system to update information by providing unique ID, Tag, update PIN and information to be updated, sending update request through e-mail, validating and matching provided unique ID, Tag and Update PIN for ensuring validity of the same, updating the information on to the system for the respective Tag for a validated matching ID, Tag and PIN, returning error stating "Invalid Request" for invalidated matching, and displaying the status of the update.
  • the method of providing trusted user creation comprising logging in to EZE ID system and clicking on add to trusted users list button, entering the User ID and specific Tags to that trusted user, sharing the information to the trusted user without asking PIN during retrieval, checking Tags & PIN of the user ID match, updating the trusted user list and providing lifetime access to the trusted user for a valid match; and denying to assign the trusted user for the user who took invalid attempts to provide Tags & PIN of the user ID match, and informing concerned user about the invalid attempt issue to take security measures.
  • FIG. 1 illustrates an architecture of the system deployment to share and protect the information accessed through the system, according to an embodiment herein;
  • FIG. 2 is a flow chart depicting a method employed for creation of user ID and storing of information, according to an embodiment herein;
  • FIG. 3 is a flow chart depicting a method employed for sharing of information, according to an embodiment herein;
  • FIG. 4 is a flow chart depicting a method employed for updating information identified by Tag, according to an embodiment herein;
  • FIG. 5 is a flow chart depicting a method employed for trusted user creation, according to an embodiment herein;
  • Fig. 6 is a flow chart depicting a method employed for generic communication tools and user relationships of the system, according to an embodiment herein;
  • Fig. 7 is a flow chart depicting a method employed of advertisement shown to users at the time of retrieving the information, according to an embodiment herein.
  • each category of information is categorized or identified by a key called 'Tag' and each Tag has an option to set a secure PIN. More particularly to FIGS. 1 though 7, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments.
  • a system and method for providing secure and traceable information sharing through a short unique ID along with at least a Tag which can link information of individual persons and business entities and shares information on demand by others with a short unique ID along with at least a Tag, and PIN.
  • Each category of the information is categorized or identified by a key called 'Tag' and each Tag has an option to set a secure PIN.
  • the secure PIN can include a "Reading PIN” to retrieve the information, and an "Update PIN" to update the information of the respective Tags and also changing PIN codes for one or more Tags, which can be accessed by the user or any person who has access to the unique ID with at least a Tag and respective secure PIN.
  • the information can include but not limited to personal profile, address, location, medical records, academic information, resume information for job seekers to share resume on demand, emergency information, business profile, business classified and so on.
  • the system can facilitate individuals to allow other users or public people who are not users of the system also to access the information in the format of "Unique ID.Tag.PIN" or in the form of Unique ID, Tag and PIN separately entered into the system on demand.
  • the system can help in sharing the information with a secure PIN so that the information shared is accessible as long as the PIN is matching with system. Therefore the owner of information has control over sharing of latest information by changing the PIN when required and share it only with the required people/user.
  • the system can provide tools to create and share the information through a user interface including but limited to Web Portal, Mobile Application for users to create, manage, update or retrieve the information.
  • the system further includes Application Programming Interfaces (API's) to enable creation and retrieval of information through another software application.
  • the information update onto the ID through create process can be GPS location, picture, name and contact information, user category information, primary location and other locations of the individual or business like keywords to identify, picture & contact information of individual or business or a venue to identify and reach where venue can be a public meeting place, town hall, park, stadium, beach location etc. to which there are now owners create & manage ID.
  • architecture of the system deployment to share and protect the information accessed through user interface 100 is illustrated in Figure 1.
  • the architecture of the system deployment to share and protect the information can include one or more user interfaces 102/103, communication network like internet connectivity 104, a mail server 106, a firewall 107, an application server 108 and a database server 109, wherein the application server 108 includes a EZE ID application configured to allow an user create a unique ID, allow the user to create Tag for each category of information of the user, allow the user to optionally set a secure PIN for each Tag, allow the user to feed, manage, update the information for respective Tag, store the information in the database server, and allow access to retrieve the information by user or others using the unique ID with Tag and respective secure PIN, wherein the secure PIN includes a Update PIN to update the information for respective Tag, and a Reading PIN to retrieve the information for respective Tag, thus allowing the users to share the information to others using the unique ID with at least a Tag and respective secure PIN.
  • the application server 108 includes
  • the system developed and deployed onto the web portal http://www.ezeid.com and the same system has mobile application user interface available for user of smart phone to download the same and use instead of using web portal and APIs to enable other software applications (through APIs) or devices to interacts with system [herein referred as EZE ID system] and perform all tasks performed through web portal or smart phone user interface.
  • EZE ID system system [herein referred as EZE ID system] and perform all tasks performed through web portal or smart phone user interface.
  • the same system may be extended onto any other domain name (web site name) or a part of another web site to increase visibility or for any other reasons or extend the user interface onto any other type of devices as and when required or a new innovation take place in user interface technology where it becomes a business necessity to extend the system onto new technology.
  • the system can include various hardware, software, internet connectivity 104 and firewall 107 to protect the information from misuse.
  • the EZE ID application can be accessed through user interfaces including web portal or mobile application or use the API by any external software systems or devices.
  • the system can track the history of internet IP addresses from where the information was retrieved and also track the users who accessed the information.
  • the exemplary methods are illustrated as a collection of operations in a logical flow diagrams representing sequence of operations for the implementation of the stated embodiments.
  • the order in which the methods are described is not intended to be construed as a limitation, and any number of described methods, blocks can be combined in any order to implement the methods or alternate methods. Additionally, the methods or process may be extended for any useful functionality or value addition to extend the use of system from time to time or the methods may be altered or deleted to suit the system, but without departing from the spirit and scope of the subject matter described herein.
  • Fig. 2 is a flow chart depicting a method employed for creation of unique ID and storing of information, according to an embodiment.
  • the creation of information can be performed by one or more users who are individual persons or representative of business entities.
  • a user can click 201 on sign up button on web portal or through mobile application to create unique short ID [herein referred as user ID] .
  • the user types 202 a user ID of choice and check for availability, if the user ID is available 203, then the system allow user to enter 204 profile information for all data sections (referred as Tags) and set secure reading PIN and update PIN for each section of data.
  • Tags profile information for all data sections
  • the system can inform user that user ID is not available and try with another user ID.
  • the data can be saved on to web server, particularly on database server 109.
  • a notification link can be send 207 to user e-mail ID to activate the account by clicking on the link.
  • the user can share 208 the EZE ID link to anyone and share the stored information with a set secure PIN.
  • the method employed for creation of user ID and creation of information can enable the user to claim a short user ID that checks for the availability and if not available, the system informs the user to try another user ID. Once the user ID entered is available, then the system proceeds to information entry sections where one or more sections/category called Tags are shown, so that the user can enter the information to for the necessary Tags and saves the information into the system along with a "Reading PIN” and a "Update PIN” by clicking on the button provided to save the information.
  • the same process may be followed using APIs.
  • a personal information or file can include his/her name, address, work phone number, home phone number, cellular phone number, email addresses, web page URL, GPS location for home location and also comprises customized fields or document files.
  • a user can create, edit or update his/her profile.
  • a business profile can include business name, picture of business, address, work phone number, fax number, cellular phone number, email addresses, web page URL, GPS location for office location and customized fields, etc.
  • a user can create, edit or update business profile.
  • GPS location information Tag link can enable the user to store, edit or update location information of the home or work location of the user, that can enable the user to share the accurate location to others to reach the location with no assistance, but with the aid of the web portal or mobile application provided by EZEID system or enable an external automated/drone based delivery system to reach the exact location and also floor of a building, facing direction of door and picture of the door to recognize entry point .
  • medical record Tag link can provide all the information regarding the medical history.
  • This link can include basic personal information, prescription details, X-ray & scan report images, uptaking medicine names, primary physician's information etc.
  • Jobseeker Resume of the user to share the same on demand to the user of a potential employer or a consultant to apply for a job can save in a respect tag and a secure PIN to set so that only shared users can retrieve the Resume as long as the PIN is valid.
  • academic information Tag link can provide information about schooling and college information with graduating class. Further, university / collage information with graduating class and major & minor degrees and digital copies of education documents.
  • a unique ID.Tag link can be created to store ID Card scanned document and can be shared with others. Further, the information present in the link can be edited / updated at anytime by the concerned user.
  • Figure 3 is a flow chart depicting a method employed for sharing of information.
  • the process flow of method of sharing the information can include a user sharing 301 the unique ID and a secure PIN with all their associates, if it is personal information.
  • the business information particularly public information can be accessed 301 by the public without the need of secure PIN, and can locate it from the unique ID web portal or mobile application.
  • the system allows 302 a person to enter the unique ID with a secure PIN in the web portal or using mobile application or send a request through your own software to unique ID API. Then, the system can check 303, whether the user ID and PIN are valid & matching.
  • the requested information is displayed 304 on web portal or mobile application or returns the information to the requested software in XML format.
  • the system can count 305 the number of invalid attempts by the person trying to retrieving the data. Then, the system can check 306 whether the count exceeds the set limit. If the count exceeds the set limit, then the system may inform the user as "Access Denied” and take action 307 to deny access to the system a set amount of time and take other security measures to protect from intruders / robots. If the count set limit is not exceeded, then the process can start from the step 302.
  • the method employed for sharing information enables the user to enter unique ID and the respective Tag along with a secure PIN to retrieve the information through web portal or mobile smart phone.
  • Input information is validated to ensure the unique ID is available and Tag and PIN provided match the existing information in the system. Once the unique ID and PIN matches, then the system would return the requested information and display the same in the user interface of web portal or mobile smart phone or return to the external software application or a device from where the request is initiated.
  • the system may further facilitate the reader of the information to view the information in easy to understand and augmented by geographical systems like geographical maps to show the GPS location of the user to enable the user who has the ID can reach the location using maps provided in the software system or enable an external system like drone based delivery system to use this location to reach the location.
  • GPS location service enabled by the system can provide additional feature of nearby lanes based on a user's request and the additional required information captured and shared to support drone based delivery systems or requesters of the information to locate and reach the location with ease or show the location of the EZE Id on the map as Marker and on click of the same, a popup having detailed information and functional support to perform various communication tasks defined in subsequent embodiments.
  • the system can enable the user to provide certain information which can be accessed by the public without the secure PIN. However, it is necessary for the public to know the unique ID and Tag.
  • Fig. 4 illustrates a flow chart depicting a method employed for updating information identified by Tag, according to an embodiment.
  • the method of updating information identified by Tag enables a user to click 401 on update information on web portal or mobile smart phone and by providing the unique ID, Tag and update PIN and also change in information for update.
  • the external system can also send request 402 to update information by providing unique ID, Tag, update PIN and information to be updated.
  • an update request 403 can be send through e-mail or through SMS or through any communication means by providing unique ID, Tag, update PIN and information to be updated.
  • the system can validate 404 for ensuring valid information update.
  • the system can check whether Unique ID & PIN are valid or not. In case, the check is not valid, then the system can return 406 error stating "Invalid Request". In case, the check is valid, then the information is updated 407 on to the system for the respective Tag. Finally, the system can display 408 the status, if the input update method is manual or otherwise returns the success rate to the software system through API as return data.
  • the method employed for updating the information can be able to perform without entering the system to edit complete information.
  • the user can directly enter the updated information using unique ID, respective Tag and Update PIN either through web portal or mobile application or using external software interfaces through APIs.
  • the user can send an e-mail to pre-set e-mail ID of the system with unique ID, Tag and PIN mentioned in the subject line of an e-mail and sending the information to be updated in the body of the e-mail or as an attachment.
  • an E-mail can be sent from any valid e-mail system used by the user.
  • an E- mail can be sent on behalf of the user to the specific e-mail of EZE ID system provided in the instruction to the user that can created/communicated during creation of unique ID.
  • Fig. 5 illustrates a flow chart depicting a method employed for trusted user creation, according to an embodiment.
  • the user can log 501 in to EZE ID system and click on Add to trusted users list button. Thereafter, the user enters 502 the User ID and Specific Tags to trusted user, so that the information can be shared to that trusted user without asking PIN during retrieval.
  • the system can verify 503 whether all Tags & PIN of that user ID matches or not. In case, the Tags & PIN matches, then the system can perform updating 504 trusted user and give lifetime access to that trusted user. In case, the Tags & PIN is not matched, then the system counts 505 number of times of invalid attempts by the user. Thus, in case the count exceeds 506 the set limit, then the system can inform the user that maximum counts reached and take necessary action to protect the system from misuse. If the count has not exceeded set limit, then the system can continue from step 507.
  • a method employed for creating trusted users and to provide functionality by trusting an another user by adding those users into the trusted users list with a relationship attached so that those trusted users can access the information of all Tags or specific Tags as trusted. So that the trusted user can retrieve the information any time directly and by skipping the PIN (ID.Tag format). Therefore, the system can allow a trusted person to access the information of permitted Tags without PIN to retrieve the information.
  • the system can have facilities to communicate between the trusted and connected users by relationship like Friend, Colleagues, Family Relationship and the like and user can communicate using chat tools, messaging tools, notifications, video chats between the users using the same platform, providing Mailbox to each user or bringing tools like bulletin boards, RSS Feeds and the like standard communication tools.
  • a method employed herein provides a tool to enable Business Entities to implement full cycle security entry/exit system.
  • the system and method enables from initiating a request for entry by an user to another users who is the meeting point and who approves the same and all approved entry access transactions are visible to security personal who can print visitor badge or ID Card if required and post the entry/exit information onto security register.
  • the system Entry/Exit Security Register
  • Visitor ID Card creates Visitor ID Card for each guest user having unique ID and track each user as guest in Entry/Exit register for security and traceability purpose. This register of entry/exit activities can be saved for future reference & records purpose, thus saving time by the people who are entering the business entity as guests who can visit just by sharing ID.Tag.PIN.
  • the system can act as an advertisement platform and also provides search facilities in specific fields by categories to explore various available services in particular field.
  • the system and method can provide tools and techniques to enhance the use of this information to make it as a standard form of information sharing, communication tools and methods to group or share the IDs and help each user to link to other users to individuals or groups of users based on relationship.
  • Figure 6 illustrates a flow chart depicting a method employed for generic communication tools and user relationships of the system.
  • the system can integrate internal or third party communication tools like Chat Messengers, Video Conferencing/Video chat systems, Mailboxes, group mailing or messaging or video systems, sales enquiry pages, creating meeting request task to request the owner of that EZE ID to either accept or reject the meeting request and user interface to enable requester or EZE ID owner to view and track meeting tasks, e-Mailing, sending CV as a Jobseeker, send purchase requests, plot route on map to the location of the EZE ID user, to interact with groups or individuals to facilitate effective communication between users of the system.
  • chat Messengers Video Conferencing/Video chat systems
  • Mailboxes group mailing or messaging or video systems
  • sales enquiry pages creating meeting request task to request the owner of that EZE ID to either accept or reject the meeting request and user interface to enable requester or EZE ID owner to view and track meeting tasks
  • e-Mailing sending CV as a Jobseeker
  • send purchase requests plot route on map to
  • a user can log 601 into EZE ID system through web portal or mobile application or using APIs and can use all tools and facilities provided to the user.
  • the system and method provides an ID card printing system 602 for business entities can be used to provide printed ID 603 card for guests.
  • the system and method provides a user to send sales 604 enquires by logging in or without logging in and further, the sales enquiry can be sent 605 to business mailbox, a CV as a Job seeker can be sent to the respective manager if the EZE is a business entity or if it is an individual, then it delivers to the individual, notification or calendar requests can be sent.
  • system and method also allows chat messenger or video conference 606 to facilitate to chat or conducts video conference 607 with one or more users or a group. Additionally, the system and method provides mailbox, voicemail & video mail tools 608 available for users to make all communications 609 provided to users for effective communication. And also the system and method allows the user to create groups & relationships 610 for communicating 611 with the user groups by group name or by relationship through chat, video chat, mail, messenger, notification, dial, request a meeting schedule, Send CV as a Job seeker to deliver the CV to the respective configured mail ID in that EZE ID etc.,
  • Figure 7 illustrates a flow chart depicting a method employed of advertisement shown to users at the time of retrieving the information, according to an embodiment.
  • the system can allow each user to create one or more groups of Users and each user linked to a relationship type (like Friend, Colleague, All types of personal relationships like Son, Daughter, Sister, Brothers, Cousin, Niece, Father , Mother, Aunt, Uncle, Grand Father, Grand Mother, etc.,).
  • a user can enter 701 EZE ID to locate an address or enter keywords to locate a business in the address bar.
  • the EZE ID system can show 702 the address and location map.
  • the EZE ID system can also show 704 context advertisements based on user search patterns.
  • a user can also click 703 on the map link to plot route from present location of any entered address to the destination of the EZE ID being located.
  • user can also type a keyword like "coffee shop” in the filter to see all the nearest shops having the keyword "coffee shop” in their services list and view all of them on the map view 705. Based on the entered keyword, the system can also show advertisements sponsored by the concerned business entities linked to keywords 706.
  • the system can help the user to view the exact location of the user based on unique ID, plot the route map from the present location or an entered location to the unique ID destination for easy reaching using third party map tools or own built tools. While locating the information, user can also see the context advertisements around specified areas who have sponsored context advertisements based on logged in user or by the keywords types in the search bar. Further, the system can also plot multiple marks on the map based on the keywords entered by the user to locate Business Entities matching the entered keyword or actual business name.
  • EZE ID.Tag.PIN data on Web Web portal www.ezeid.com and smart phone Portal or Mobile Application to retrieve the mobile application has user interface where the information user can enter EZEID.Tag.PIN to retrieve the
  • the system can inform the person who is retrieving the information as "Access denied, as required credentials not provided”. For more than 2 invalid attempts, the system can take appropriate actions to secure invalid attempts.
  • a visitor can search for user by providing the EZE ID of that user on the user interface or using APIs to locate an individual or a business entity or to get all business entities matching the keywords by typing keywords in search interface and by category and/or proximity to locate business entities or an individual or a venue. Once the search finds one or more items, the same can be plotted onto geographical map as map markers.
  • the user can able to retrieve these messages from EZE ID system and act upon the same.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un système et un procédé pour permettre un partage sécurisé, pouvant être tracé et dynamique de fichiers d'informations qui relie et partage des informations de personnes individuelles et d'entités commerciales à la demande par d'autres par l'intermédiaire d'un identificateur (ID) unique court [désigné également si après par « EZE ID »]. En conséquence, chaque catégorie des informations est catégorisée ou identifiée par une clé appelée « étiquette » et chaque étiquette est reliée à un PIN sécurisé. Le système comprend des interfaces utilisateur, un réseau de communication, un serveur de courrier, un pare-feu, un serveur d'application et un serveur de base de données, le serveur d'application comprenant une application EZE ID. Le système est développé et déployé sur le portail Internet ou par l'intermédiaire d'une application mobile ou les interfaces de programmation d'application (API) peuvent être utilisées pour permettre à d'autres applications logicielles d'interagir avec le système EZE ID. L'invention concerne également un procédé de création d'informations, de partage d'informations, de mise à jour d'informations et de création d'utilisateur de confiance.
PCT/IB2015/059611 2014-12-26 2015-12-15 Système et procédé pour stocker et partager de manière sécurisée des informations par l'intermédiaire d'un identificateur (id) unique Ceased WO2016103109A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN6622CH2014 2014-12-26
IN6622/CHE/2014 2014-12-26

Publications (1)

Publication Number Publication Date
WO2016103109A1 true WO2016103109A1 (fr) 2016-06-30

Family

ID=56149348

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2015/059611 Ceased WO2016103109A1 (fr) 2014-12-26 2015-12-15 Système et procédé pour stocker et partager de manière sécurisée des informations par l'intermédiaire d'un identificateur (id) unique

Country Status (1)

Country Link
WO (1) WO2016103109A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050065950A1 (en) * 2000-01-07 2005-03-24 Naren Chaganti Online repository for personal information

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050065950A1 (en) * 2000-01-07 2005-03-24 Naren Chaganti Online repository for personal information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Similar Documents

Publication Publication Date Title
JP5016101B2 (ja) デジタル写真のコンテンツ情報サービス
CN110163663B (zh) 基于地理位置的事件画廊
CN1573765B (zh) 数据处理系统、电子邮件系统、附加数据管理方法和程序
US20150188856A1 (en) Curating communications
US20100153284A1 (en) Methods and systems to use an aggregated contact list for sharing online information
US20090217199A1 (en) Information Retrieving and Displaying Method and Computer-Readable Medium
US20160117383A1 (en) Methods and Systems for Incentivizing, Exchanging and Tracking Expressions of Gratitude Within a Network
US9881322B2 (en) Data transfer between mobile computing devices using short-range communication systems
WO2018150244A1 (fr) Enregistrement et auto-génération d'un ou de plusieurs mots uniques, et accès à celui-ci ou à ceux-ci, ledit ou lesdits mots uniques comprenant des géomarques uniques
US9384212B2 (en) Geographic identification system
JP2008276564A (ja) データベースの更新方法
CN102859513A (zh) 文档上的流水线式合作
US20140136996A1 (en) Virtual remembrance system
AU2013204921A1 (en) Improved System and Method for Advertising
US20080307512A1 (en) Property Centric Real Estate Maps with Personalized Points of Interest
KR20080059347A (ko) 지리적 위치 확인 장치 및 방법
JP2018106336A (ja) 配送サービスシステム、サーバ装置及びプログラム
US20040015699A1 (en) Identification and contact information
US9697350B1 (en) Electronic signing of content
US20130227040A1 (en) Method and system for sending messages
US20040080534A1 (en) Front Message exchange system and method
US20130237249A1 (en) Providing and using map tags
US20130198619A1 (en) Methods and apparatuses for handling corporate documents
US20130332313A1 (en) Electronic Marketplace For Commercial Real Estate
WO2016103109A1 (fr) Système et procédé pour stocker et partager de manière sécurisée des informations par l'intermédiaire d'un identificateur (id) unique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15872058

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15872058

Country of ref document: EP

Kind code of ref document: A1