WO2020026021A1 - A platform for connecting plurality of users and method thereof - Google Patents
A platform for connecting plurality of users and method thereof Download PDFInfo
- Publication number
- WO2020026021A1 WO2020026021A1 PCT/IB2018/057674 IB2018057674W WO2020026021A1 WO 2020026021 A1 WO2020026021 A1 WO 2020026021A1 IB 2018057674 W IB2018057674 W IB 2018057674W WO 2020026021 A1 WO2020026021 A1 WO 2020026021A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- requestor
- server
- temporary password
- computing device
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
Definitions
- the present invention relates generally to a platform for connecting plurality of users and method thereof.
- the invention more particularly, relates to an improved system and method for connecting users on a computing platform without disclosing any contact information such as contact number, email id and the like, of the users.
- One of the convention techniques discloses about mimicking a fist bump by exchanging contact information between two people when their computing devices, such as mobile devices, touch each other.
- the mobile devices include an accelerometer that tracks the movement of the mobile devices and compares the signatures of each device to infer an intentional approval to pass contact information from one person to another.
- the backend server recognizes that the two mobile devices shake in the same pattern and that the movement is not random and is therefore intended as permission to exchange the relevant information.
- this is a limited solution that requires the necessity of physical contact between the two mobile devices.
- there are many conventional techniques available which has the facility to transfer the contact information of a person to another person.
- One of the various embodiments herein may include one or more systems and methods for connecting a plurality of users on a computing platform without disclosing their original information such as contact number, email id and the like.
- the connection of a plurality of users on a computing platform is initiated by capturing a plurality of images by the plurality of users simultaneously on their respective computing devices such as mobile phones.
- the computing devices of the plurality of users interacts with the server through an API to generate temporary passwords for the computing devices of the plurality of users.
- the server generates temporary passwords and stores the same in the cache memory of the processor or the database. Further, either of the two users shares the generated temporary password with the other user.
- the generated temporary password is available for a predetermined time interval. In the predetermined time interval, the user has to share the temporary password with the other user. If the user fails to share the temporary password within the predetermined time interval, then the temporary password becomes invalid and a new temporary password is generated by the server.
- the temporary password generated on a computing device of the user is validated on the computing device of the other user.
- the user provides the temporary password to the other user and said temporary password has to be inputted on the computing device of the other user.
- the server validates if the inputted temporary password is available in the cache memory of the processor or the database. If the temporary password is found in the cache memory of the processor or the database, then the computing devices of both the users are mapped. After successful mapping, a notification is sent to the computing device of the user wherein the notification is regarding the approval or rejection of the connection with the other user. Further, the two users are connected in response to the approval received for the notification from the user and contact link is established between the two users based on the pre-defmed rules.
- Fig. 1 illustrates an exemplary block diagram depicting a system for establishing a contact link between a plurality of users, according to an exemplary implementation of the presently claimed subject matter.
- Fig. 2 illustrates an operation of the server-network communication, according to an exemplary implementation of the presently claimed subject matter.
- Fig. 3 illustrates another operation of the communication between three computing devices, according to an exemplary implementation of the presently claimed subject matter.
- FIG 4 illustrates a flowchart of a method for establishing contact link between the users, according to an exemplary implementation of the presently claimed subject matter.
- the various embodiments of the present disclosure provide a platform for connecting plurality of users and method thereof. It further provides an improved system and method for connecting users on a computing platform without disclosing their contact information such as contact number, email id and the like, of the users.
- contact information such as contact number, email id and the like
- the various embodiments of the present disclosure provide a platform for connecting plurality of users and method thereof. It further provides an improved system and method for connecting users on a computing platform without disclosing their contact information such as contact number, email id and the like, of the users.
- contact information such as contact number, email id and the like
- One of the various embodiments herein may include one or more systems and methods for connecting a plurality of users on a computing platform without disclosing their contact information such as contact number, email id and the like.
- the connection of a plurality of users on a computing platform is initiated by capturing a plurality of images by the plurality of users simultaneously on their respective computing devices such as computing devices.
- the computing devices of the plurality of users interacts with the server through an API to generate temporary passwords for the computing devices of the plurality of users.
- the server generates temporary passwords and stores the same in the cache memory of the processor or the database. Further, either of the two users shares the generated temporary password with the other user.
- the generated temporary password is available for a predetermined time interval, for example say 30 to 40 seconds of time interval.
- a predetermined time interval for example say 30 to 40 seconds of time interval.
- the user has to share the temporary password with the other user. If the user fails to share the temporary password within the predetermined time interval, then the temporary password becomes invalid and a new temporary password is generated by the server.
- the temporary password generated on a computing device of the user is validated on the computing device of the other user.
- the user provides the temporary password to the other user and said temporary password has to be inputted on the computing device of the other user.
- the server validates if the inputted temporary password is available in the cache memory of the processor or the database. If the temporary password is found in the cache memory of the processor or the database, then the computing devices of both the users are mapped. After successful mapping, a notification is sent to the computing device of the user wherein the notification is regarding the approval or rejection of the connection with the other user. Further, the two users are connected in response to the approval received for the notification from the user and contact link is established between both the users based on the pre-defmed rules.
- the temporary password generated is a random number that includes special characters, alphabets, numerical and the like. Further, the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server.
- the cron task is an event scheduler which may schedule an event of flushing out the temporary password from the cache memory at the predetermined time interval.
- FIG. 1 illustrates an exemplary block diagram depicting a system for establishing a contact link between a plurality of users, according to an exemplary implementation of the presently claimed subject matter.
- the system 100 includes a server 102, a network 104, a plurality of computing devices 106 (l06a, l06b, l06c, l06d), a database 108, a memory 110, I/O interfaces 112, a processor 114, and a plurality of data 116.
- the network 104 interconnects the plurality of computing devices
- the network 104 includes wired and wireless networks.
- the wired networks include, but are not limited to, a Wide Area Network (WAN) or a Local Area Network (LAN), a client-server network, a peer-to-peer network, and so forth.
- the wireless networks include, but are not limited to, Wi-Fi, a Global System for Mobile communications (GSM) network, and a general Packet Radio Service (GPRS) network, an enhanced data GSM environment (EDGE) network, 802.5 communication networks, Code Division Multiple Access (CDMA) networks, or Bluetooth networks.
- the communication network 106 may be a combination of one or more wired and/or wireless networks.
- the database 108 may be implemented as, but not limited to, enterprise database, remote database, local database, and the like. Further, the database 108 may themselves be located either within the vicinity of each other or may be located at different geographic locations. Furthermore, the database 108 may be implemented inside the system 100 and the database 108 may be implemented as a single database.
- the computing devices 106 include, but are not limited to, mobile phones (for e.g. a smart phone), phablets, Personal Digital Assistants (PDAs), wearable devices (for e.g. smart watches and smart bands), tablet computers, laptops and the like.
- mobile phones for e.g. a smart phone
- PDAs Personal Digital Assistants
- wearable devices for e.g. smart watches and smart bands
- tablet computers laptops and the like.
- the memory 110 may be coupled to the processor 114.
- the memory 110 can include any computer-readable medium known in the art including, for example, volatile memory, such as static random- access memory (SRAM) and dynamic random-access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
- volatile memory such as static random- access memory (SRAM) and dynamic random-access memory (DRAM)
- non-volatile memory such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
- the I/O interface 112 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like.
- the I/O interface 112 may allow the server 102 to interact with a user directly or through the computing devices 106. Further, the I/O interface 112 may enable the server 102 to communicate with other computing devices, such as web servers and external data servers (not shown).
- the I/O interface 112 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite.
- the I/O interface 112 may include one or more ports for connecting a number of devices to one another or to another server.
- the server 102 includes one or more processors 114.
- the processor 114 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
- the at least one processor 114 is configured to fetch and execute computer- readable instructions stored in the memory 110.
- the system 100 is configured to connect a plurality of users on a computing platform by establishing a contact link which is exchanged between the plurality of users without disclosing their contact information such as the contact number, email id and the like.
- the plurality of users comprises a user and a requestor and these two identities can be interchangeable.
- the user and the requestor For establishing a connection for communication, the user and the requestor have to register themselves on the computing platform.
- the user and the requestor For registration, the user and the requestor have to input their details such as the contact number, email id, profile photo and the like.
- a profile is created for the user and the requestor and they can connect with each other on the computing platform after completing a predetermined process.
- the profiles of the plurality of users includes profile data such as the profile photo, contact number, email id and the like.
- the system includes the computing device 106 which is configured to capture an image of the user or the requestor. For capturing the image, both the user and the requestor have to open the instant contact screen on their respective computing devices 106 and capture each other’s image. In this case, we consider that the user captures the image of the requestor on the computing device, nonetheless the vice-versa is also possible.
- the processor 114 is configured to transmit the captured image of the requestor on the user’s computing device, to the server 102.
- the server 102 is configured to identify a request for generating a temporary password upon receiving the captured image of the requestor. The server 102 is further configured to generate the temporary password for the captured image of the requestor on the user’s computing device 106.
- the computing device 106 of the user interacts with the server 102 through an API.
- the temporary password is a random number that includes special characters, alphabets, numerical and the like.
- the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server. In the predetermined time interval, the user has to share the temporary password with the requestor. If the user fails to share the temporary password within the predetermined time interval, then it becomes invalid and a new temporary password is generated by the server.
- the generated temporary passwords are stored in the cache memory of the processor 114.
- the generated temporary passwords may also be stored in the cache memory of the database 108.
- the server 102 is configured to validate the generated temporary password on the requestor’s computing device 106. The validation process is explained in detail in the further embodiments.
- the processor 114 is configured to map the computing devices 106 of the user and the requestor upon successful validation. The server sends a connection notification to the user on its computing device 106, wherein the notification comprises the approval required to connect with the requestor.
- the processor 114 is further configured to connect the user and the requestor after receiving an approval from the user for the connection notification.
- the server is configured to connect the contacts of the user and the requestor for further communication by transmitting the user’s contact link to the requestor.
- the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules.
- the data 116 may include various data pertaining to the operation of the processor 114, and other data 122.
- the data 116 may serve as a repository for storing data that is processed, received, or generated as a result of the execution of one or more commands of the server 102.
- the data 116 is shown internal to the server 102, it may be understood that the data 116 can reside in an external repository or the database 108, which may be coupled to the server 102.
- the data 116 broadly includes a user data 118 and a system data 120.
- the user data 118 includes all the data pertaining to the user or the requestor such as a contact details, profile photo and the like.
- the system data 120 includes all other data except the user data 118.
- the user data 118 and the system data 120 both may be stored in the database 108.
- the other data 122 may include data generated as a result of the execution of one or more commands of the server 102.
- Fig. 2 illustrates an operation of the server-network communication, according to an exemplary implementation of the presently claimed subject matter.
- the server 102 provides services, for connecting the plurality of computing devices 106 of the plurality of users on a computing platform for communication between the plurality of users without disclosing the contact information such as the contact number, email id and the like, through a network 104.
- the server 102 includes at least one computing device adapted for communication with the network 104, and a database 108 for storing temporary passwords.
- the network 104 includes any system or systems capable of facilitating communications between the server 102 and the computing devices (202, 204) and in various embodiments may include a wired or a wireless network.
- Each computing device (202, 204) is adapted for communications with the server 102 through the network 104.
- the computing devices (202, 204) of the user and the requestor get connected to each other upon successful validation.
- the requestor requests for the temporary password generated on the user’s computing device, nonetheless the vice-versa is also possible.
- the user provides the generated temporary password to the requestor and said temporary password has to be inputted on the computing device (106, 202, 204) of the requestor.
- the system is configured to transmit the inputted temporary password on the requestor’s computing device (106, 202, 204) to the server.
- the server 102 is configured to verify whether the inputted temporary password is available in the cache memory of the processor 114 or the database 108.
- the processor is configured to identify the contact link of the requestor upon verification of the temporary password inputted on the requestor’s computing device.
- the processor is further configured to exchange the contact links with the user and the requestor based on the pre-defmed rules, for further communication.
- the contact links are provided in the form of call icons, mail icons and the like.
- a contact link is exchanged between the user and the requestor based on the pre-defmed rules.
- the pre-defmed rules include a requirement that the user and the requestor shall be sufficiently related on the same computing platform. This also includes that the user and the requestor shall be present on the same computing platform.
- the pre-defmed rules can also include a requirement that the user and the requestor should have a predetermined proximity from each other to capture the images of each other and exchange the temporary passwords with each other.
- the pre-defmed rules also include that the user and the requestor should store each other’s captured images on their respective computing devices (106, 202, 204) at the same time to receive the temporary passwords on their respective computing devices (106, 202, 204). Further, the pre-defmed rules can also include the requirement that the user and the requestor should exchange the temporary passwords with each other with a specified time limit, which if crossed will generate new temporary passwords. Once, these pre-defmed rules are satisfied, the server 102 transmits the contact links of the user and the requestor to each other without disclosing the contact information such as the contact number, email id and the like, of the user and the requestor.
- Fig. 3 illustrates another operation of the communication between three computing devices, according to an exemplary implementation of the presently claimed subject matter.
- a computing device 202 of a first user is configured to connect with a computing device 204 of a second user on a computing platform after completing a predetermined process.
- the computing device 204 of the second user is configured to connect with a computing device 206 of a third user on the computing platform after completing the predetermined process.
- the third user is not connected to the first user but they both share a common contact link which is the second user.
- the computing device 204 of the second user is configured to share the first user’s contact link with the third user.
- the computing device 202 of the first user is configured to receive a connection notification, upon sharing his/her contact link by the second user with the third user, wherein this link is withheld within the server before reaching the third user.
- the connection notification is regarding the second user sharing first user’s contact link with the third user.
- the first user approves or rejects the sharing of his/her contact link wherein the system is configured to call or to chat with the second user regarding the direct rejection or approval of the connection notification with the third user. If the first user approves the connection, then the server is configured to send a notification to the second user and the third user showing that the first user has approved the connection. If the first user rejects the connection, then the server is configured to send a notification to the second user showing that the first user has rejected the connection.
- the computing device 106 is configured to capture the image of the requestor on the user’s computing device, nonetheless the vice-versa is also possible.
- the system is configured to transmit the captured image of the requestor on the user’s computing device to the server 102.
- the server is configured to search for the images in the database and to compare the captured image of the requestor with its profile photo stored in the profile data of the requestor, upon receiving the captured image of the requestor.
- the system is configured to send an instruction to the server 102, upon successful said comparison, to generate the temporary password on the user’s computing device 106 and to share said temporary password with the requestor. Additionally, if said comparison is not successful, then the temporary passwords are not generated.
- the requestor inputs the temporary password generated on the user’s computing device 106 and the system is configured to transmit said temporary password from requestor’s computing device 106 to the server.
- the server 102 is configured to create a confirmation which includes that the contact links of the user and the requestor have agreed to share their contact link available with the server.
- the server is further configured to exchange the contact link, based on the pre-defmed rules, which does not disclose the contact number and email id but includes the profile photo, call icon, chat icon, mail icon for further communication.
- the present disclosure includes a system configured to establish a contact between the user and the requestor based on images to be captured and to create and exchange the temporary passwords.
- the computing devices 106 of the user and the requestor are configured to capture images of each other. The captured images are displayed on the screen of the computing devices 106 of the user and the requestor along with the indication to enter a temporary password.
- the user and the requestor create a temporary password of their own choice on their respective computing devices.
- the server 102 is configured to store the captured images along with the newly created temporary passwords of the user and the requestor in their respective computing devices 106.
- the system 102 is further configured to transmit these stored images along with the temporary passwords to the server.
- the server on receiving the stored images and temporary passwords, is configured to identify a request of the user and the requestor to exchange the created temporary passwords.
- the server 102 is further configured to send the user’s temporary password to the requestor and vice-versa. Further, the server 102 is configured to perform this exchange of temporary passwords after calculating predetermined proximity distance of the computing devices 106 of the user and the requestor. Additionally, the server 102 is configured to send a notification to the user and the requestor to exchange the temporary passwords created on the computing devices 106 that are to be connected. Further, the user shares his created temporary password with the requestor and vice-versa.
- the system is further configured to input the temporary passwords of the user and the requestor on their respective computing devices 106 and to transmit these inputted temporary passwords to the server.
- the server 102 is configured to identify the temporary password created by requestor on user’s computing device 106 and also to identify the temporary password created by user on requestor’s computing device 106. If the temporary passwords match, the server is configured to send a notification to the user and the requestor to confirm the connection request. Upon approval received by the user and the requestor, the server is configured to connect the user and the requestor together for further communication by exchanging the contact links with the user and the requestor. Hence, the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules.
- Fig 4 illustrates a flowchart of a method for establishing contact link between the users, according to an exemplary implementation of the presently claimed subject matter.
- the flowchart 400 of Fig. 4 is explained below with reference to Fig. 1 as described above.
- step 402 registering on the computing platform, by inputting details such as contact number, email id, profile photo and the like, by the user and the requestor.
- the system is configured to register the user and the requestor on the computing platform, and to create their respective profiles on the computing platform and wherein the user profile includes profile data such as the profile photo, contact number, email id and the like.
- step 404 capturing images of the user and the requestor by opening the instant contact screen on their respective computing devices.
- the system includes a computing device (106) that is configured to capture a plurality of images of the plurality of users simultaneously on their respective computing devices. [0045] At step 406, transmitting the captured images of the user and the requestor to the server.
- the system includes a processor (114) that is configured to transmit the captured images of the user and the requestor to a server (102). [0046] At step 408, identifying a request for a temporary password upon receiving the captured images of the user and the requestor. In another embodiment, the system includes a server 102 configured to identify the request for a temporary password after receiving the captured images of the user and the requestor.
- the system includes a server 102 configured to generate a plurality of temporary passwords for the user and the requestor on their respective computing devices (106).
- step 412 storing the generated temporary passwords in the cache memory of the processor.
- the generated temporary passwords may also be stored in the cache memory of the database.
- the system includes a server 102 configured to store the generated temporary passwords of the user and the requestor in a database 108.
- step 414 providing the temporary password generated on the user’s computing device to requestor in response to the request for this information by the requestor.
- the system includes a server 102 configured to provide the generated temporary password to the requestor by the user.
- the system includes a server 102 configured to input the generated temporary password on the computing device (106, 202, 204) of the requestor.
- the system includes a server 102 configured to transmit the inputted temporary password to the server 102.
- verifying the temporary password inputted on the requestor’s computing device in the server In another embodiment, the system includes a server 102 configured to verify the temporary password inputted on the requestor’s computing device (106, 202, 204) in the server 102.
- step 422 it is determined that if the verification is not successful, the plurality of temporary passwords is generated again for the user and the requestor on their respective computing devices.
- the system is configured to generate the plurality of temporary passwords again for the user and the requestor on their respective computing devices 106.
- step 424 it is determined that if the verification is successful, the contact link of the requestor is identified after verification of the temporary password.
- the system includes a processor 114 configured to identify the contact link of the requestor after verification of the temporary password.
- step 426 exchanging the contact link of the user and the requestor with each other based on pre-defmed rules.
- the system includes a server 102 configured to exchange the contact link of the user and the requestor with each other based on pre-defmed rules.
- a first user with a computing device 202 is connected to a second user with a computing device 204 on a computing platform after completing a predetermined process. Further, the second user with the computing device 204 is connected to a third user with a computing device 206 on the computing platform after completing the predetermined process.
- the third user is not connected to the first user but they both share a common contact link which is the second user.
- the second user with the computing device 204 shares the first user’s contact link with the third user. After sharing first user’s contact link by the second user with the third user, this link is withheld within the server before reaching the third user and the first user receives a connection notification on the computing device 202.
- the connection notification is regarding the second user sharing first user’s contact link with the third user.
- the first user approves or rejects the sharing of his/her contact link by calling or by chatting with the second user regarding the direct rejection or approval of the connection notification with the third user. If the first user approves the connection, then a notification is sent to the second user and the third user showing that the first user has approved the connection. If the first user rejects the connection, then a notification is sent to the second user showing that the first user has rejected the connection.
- the user captures the image of the requestor on the computing device, nonetheless the vice-versa is also possible.
- the captured image of the requestor on the user’s computing device is transmitted to the server 102.
- the server searches for the images in the database and compares the captured image of the requestor with its profile photo stored in the profile data of the requestor.
- an instruction is sent to the server 102 to generate the temporary password on the user’s computing device 106 and the same has to be shared with the requestor. Additionally, if said comparison is not successful, then the temporary passwords are not generated.
- the requestor inputs the temporary password generated on the user’s computing device 106 and the same is transmitted from requestor’s computing device 106 to the server. Further, a confirmation is created that contact links of the user and the requestor have agreed to share their contact link available with the server. The server then exchanges the contact link, based on the pre-defmed rules, which does not disclose the contact number and email id but includes the profile photo, call icon, chat icon, mail icon for further communication.
- the present disclosure includes a method for establishing a contact between the user and the requestor based on capturing images and creating and exchanging the temporary passwords.
- the method comprises capturing images of the user and the requestor on their respective computing devices 106.
- the captured images are displayed on the screen of the computing devices 106 of the user and the requestor along with the indication to enter a temporary password.
- the method further comprises creating a temporary password for the user and the requestor of their own choice on their respective computing devices 106.
- the captured images along with the newly created temporary passwords of the user and the requestor are stored in their respective computing devices 106. These stored images along with the temporary passwords are transmitted to the server.
- the server on receiving the stored images and temporary passwords identifies a request of the user and the requestor for exchanging the created temporary passwords.
- the server 102 further sends user’s temporary password to the requestor and vice-versa.
- the server 102 performs this exchange of temporary passwords after calculating predetermined proximity distance of the computing devices 106 of the user and the requestor.
- the server 102 also sends notification to the user and the requestor to exchange the temporary passwords created on the computing devices 106 that are to be connected. Further, the user shares his created temporary password with the requestor and vice-versa.
- the user and the requestor input the temporary password on their respective computing devices and these inputted temporary passwords are transmitted to the server.
- the server then identifies the temporary password created by requestor on user’s computing device 106 and also identifies the temporary password created by user on requestor’s computing device 106. If the temporary passwords match, the server sends a notification to the user and the requestor to confirm the connection request. Upon approval received by the user and the requestor, the server connects the user and the requestor together for further communication by exchanging the contact links with the user and the requestor. Hence, the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules.
- the temporary password generated is a random number that includes special characters, alphabets, numerical and the like. Further, the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN201821029259 | 2018-08-03 | ||
IN201821029259 | 2018-08-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020026021A1 true WO2020026021A1 (en) | 2020-02-06 |
Family
ID=69231517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2018/057674 WO2020026021A1 (en) | 2018-08-03 | 2018-10-03 | A platform for connecting plurality of users and method thereof |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020026021A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007111573A1 (en) * | 2006-03-29 | 2007-10-04 | Digital Info Technology Pte Ltd | Method and system for online access to a server |
KR20150094462A (en) * | 2014-02-10 | 2015-08-19 | 삼성전자주식회사 | Method for supporting cloud print service in computing device and computing device for performing thereof |
-
2018
- 2018-10-03 WO PCT/IB2018/057674 patent/WO2020026021A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007111573A1 (en) * | 2006-03-29 | 2007-10-04 | Digital Info Technology Pte Ltd | Method and system for online access to a server |
KR20150094462A (en) * | 2014-02-10 | 2015-08-19 | 삼성전자주식회사 | Method for supporting cloud print service in computing device and computing device for performing thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11588653B2 (en) | Blockchain-based smart contract call methods and apparatus, and electronic device | |
EP3701671B1 (en) | Cross-blockchain authentication method, apparatus, and electronic device | |
KR102095326B1 (en) | Communication method and communication device between blockchain nodes | |
AU2019222743B2 (en) | Asset management method and apparatus, and electronic device | |
CN108701177B (en) | Device-enabled identity authentication | |
US8868636B2 (en) | Apparatus for secured distributed computing | |
US11551224B2 (en) | Systems and methods for identifying mobile devices | |
US10789592B2 (en) | Transaction confirmation based on user attributes | |
US10812975B1 (en) | Methods and systems for blockchain smart contract in Hotspot 2.0 network for user authentication while roaming | |
EP3533247B1 (en) | Wireless network type detection method and electronic device | |
US20160295353A1 (en) | Terminal devices, information processing methods, and computer readable storage mediums | |
EP2477371A2 (en) | System for the definition and application of securely accessible geographical areas | |
US11381660B2 (en) | Selective information sharing between users of a social network | |
US20140090015A1 (en) | Information processing device and method | |
TWI515450B (en) | Passive wireless transmitter authentication used for receiver location determination | |
US11924636B2 (en) | System and method for authenticating using a multi-provider platform | |
CN111274563A (en) | Security authentication method and related device | |
WO2020026021A1 (en) | A platform for connecting plurality of users and method thereof | |
CN109543391B (en) | Biological characteristic information dynamic matching method and device and biological characteristic identification system | |
CN111461878A (en) | Block chain transaction processing method and system based on intelligent contracts outside chains | |
KR102358708B1 (en) | Method for substitute authentication using membership server and substitute authentication system using the same | |
CN112380230B (en) | Position parameter updating method and device, computer equipment and storage medium | |
WO2020133026A1 (en) | Dynamic matching method and apparatus for biometric information, and biometric identification system | |
Seymer et al. | Implementing fair wireless interfaces with off-the-shelf hardware in smart spaces | |
KR20230144182A (en) | Smart device registration business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18928605 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18928605 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18928605 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04.02.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18928605 Country of ref document: EP Kind code of ref document: A1 |