AU2021232943A1 - Method of securing a voting transaction - Google Patents
Method of securing a voting transaction Download PDFInfo
- Publication number
- AU2021232943A1 AU2021232943A1 AU2021232943A AU2021232943A AU2021232943A1 AU 2021232943 A1 AU2021232943 A1 AU 2021232943A1 AU 2021232943 A AU2021232943 A AU 2021232943A AU 2021232943 A AU2021232943 A AU 2021232943A AU 2021232943 A1 AU2021232943 A1 AU 2021232943A1
- Authority
- AU
- Australia
- Prior art keywords
- voting
- voter
- passcode
- securing
- selections
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000000977 initiatory effect Effects 0.000 claims abstract description 8
- 238000005516 engineering process Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000007639 printing Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 240000000015 Iris germanica Species 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 208000016339 iris pattern Diseases 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C13/00—Voting apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
In the specification and drawings a method of securing a voting transaction is described and shown that includes initiating a voting transaction; verifying the identity of a voter; generating a passcode by the voting system; transmitting the passcode from the voting system to the voter over the telecommunication network; entering the passcode into a voting station; making one or more voting selections by the voter; transmitting the one or more voting selections from the voting station to the voting system over the telecommunication network; transmitting the passcode from, the voting station to the voting system over the telecommunication network; verifying the authenticity of the passcode by the voting system; and declining to include the one or more voting selections in a vote count unless the passcode transmitted to the voting system by the voting station is verified authentic.
Description
METHOD OF SECURING A VOTING TRANSACTION
Dartanyon A. Williams
I. CROSS-REFERENCE TO RELATED APPLICATION
This application claims the benefit of U.S. Provisional Application No.
62/987,396, filed March 10, 2020, which is hereby incorporated by reference in its entirety.
II. TECHNICAL FIELD
An embodiment of the invention is in the field of election and voting systems, and can include features to protect the integrity and security of elections.
III . BACKGROUND
Election security and integrity has been and continues to be an important aspect of elections of all types. Efforts have been made to increase the security and integrity of elections.
IV. BRIEF DISCLOSURE OF AN EMBODIMENT OF THE INVENTION
An embodiment of the invention can include initiating a voting transaction; verifying the identity of a voter; generating a passcode by the voting system; transmitting the passcode from the voting system to the voter over the telecommunication network; entering the passcode into a voting station; making one or more voting selections by the voter, transmitting the one or more voting selections from the voting station to the voting system over the telecommunication network; transmitting the passcode from the voting station to the voting system over the telecommunication network; verifying the authenticity of the passcode by the voting system; and declining to include the one or
more voting selections in a vote count unless the passcode transmitted to the voting system by the voting station is verified authentic.
V. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
Figure 1 is a schematic showing the direction of the transfer of information in an embodiment described herein.
Figure 2 is a flow chart showing the steps of an embodiment described herein.
VI. DETAILED DESCRIPTION OF THE BEST MODE
As required, detailed embodiments of the present invention are disclosed herein.
However, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which can be embodied in various forms. As such, any feature(s) used in one embodiment can be used in another embodiment. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriately detailed structure.
Further, the terms and phrases used herein are not intended to be limiting, but rather, to provide an understandable description of the invention. While the specification concludes with claims defining the features of the invention that are regarded as novel, it is believed that the invention will be better understood from a consideration of the following description in conjunction with the drawing figures, in which like reference numerals are carried forward.
Alternate embodiments may be devised without departing from the spirit or the scope of the invention. Additionally, well-known elements of exemplary embodiments of the invention will not be described in detail or will be omitted so as not to obscure the relevant details of the invention.
Before the present invention is disclosed and described, it is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting. The terms “a” or “an,” as used herein, are defined as one or more than one. The term “plurality,” as used herein, is defined as two or more than two. The term “another,” as used herein, is defined as at least a second or more.
The terms “including” and/or “having,” as used herein, are defined as comprising (i.e., open language). The terms “connected” and/or “coupled,” as used herein, are defined as connected, although not necessarily directly, and not necessarily mechanically.
Relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising," or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises the element.
As used herein, the term “about” or “approximately” applies to all numeric values, whether or not explicitly indicated. These terms generally refer to a range of numbers that one of skill in the art would consider equivalent to the recited values (i.e., having the same function or result). In many instances these terms may include numbers that are rounded to the nearest significant figure.
The terms “program,” “software application,” and the like as used herein, are defined as a sequence of instructions designed for execution on a computer system. A
“program”, “ computer program,” or “software application” may include a subroutine, a function, a procedure, an object method, an object implementation, an executable application, an applet, a servlet, a source code, an object code, a shared library/dynamic load library and/or other sequence of instructions designed for execution on a computer system.
Herein various embodiments of the present invention are described. In many of the different embodiments, features are similar. Therefore, to avoid redundancy, repetitive description of these similar features may not be made in some circumstances.
It shall be understood, however, that description of a first-appearing feature applies to the later described similar feature and each respective description, therefore, is to be incorporated therein without such repetition.
Described now are exemplary embodiments of the present invention. Referring now to the drawings, in Figs. 1 and 2 an exemplary embodiment of a method of securing a voting transaction is shown and described.
In one embodiment, the disclosed system may be used to protect elections by securing voting transactions. In some embodiments, securing voting transactions can include features including, but not limited to verifying the identify of voters 50, verifying the authenticity of votes cast, encrypting voter information, voting selections, and other information, and minimizing or eliminating fraud. For example, in some embodiments the system may be used to secure a voter’s 50 voting selections by encrypting a voter’s
50 voting selections prior to transmitting the voting selections from a voting station 40 to
the voting system 30. In an embodiment, the voting station can include computers, voting booths, mobile devices, apps, web pages, voting ballots, or other devices or platforms on which the voter 50 is capable of making a voting selection.
In various embodiments, the disclosed system may consist of or include a telecommunications network enabled to communicate with a voter’s 50 mobile devices
(e.g. cell phones, smart watches, tablets, computers, etc.), a database of voter information
(e.g. name, address, voting precinct, etc.), and individual voting stations. In some embodiments, the database of voter information can include biometric data that can be used to verify the voter’s identity by biometric identifiers such as iris recognition, facial recognition, voice recognition and fingerprint recognition.
In some embodiments, the system can require three out of four biometric identifiers to authenticate and verify the identity of the voter 50. In other embodiments, the system can require more or less than three out of four biometric identifiers to authenticate and verify the identity of the voter 50. In some embodiments, a pictorial identification (e.g. driver’s license, passport, state ID, etc.) can be used as an additional method to authenticate and verify the identity of the voter 50. For example, a barcode on the back of a voter’s 50 pictorial identification can be scanned by the voting station 40
(e.g. a voter’s 50 mobile device) and transmitted over a telecommunications network to the voting system 30.
In the case of either biometric identifiers or pictorial identification, the voter’s personal identifiable information (e.g. iris pattern, facial pattern, voice pattern, fingerprint, or pictorial identification information) can be maintained in a database, and can be compared to corresponding personal identifiable information provided by the
voter 50 during or after the initiating of the voting transaction. In an embodiment, the database that maintains the voter’s SO personal identifiable information can be encrypted.
In some embodiments, the disclosed system may protect an election system by encrypting registered voter information. In various embodiments, the disclosed system may use blockchain technology to store encrypted information, where the system updates the blockchain, for example, every millisecond. In at least one embodiment, the disclosed system may send a passcode to a registered voter upon the registered voter’s arrival and checking in at a voting site. In one embodiment, the disclosed system sends the passcode via text message, email, phone call, or other like communication methods, to the registered voter’s mobile device.
In an embodiment, the passcode is a randomly generated number that is generated by the voting system 30, and is a unique passcode that is assigned only to a single voter
50. The passcode can be encrypted at various stages of the system, and the passcode can be unencrypted (e.g. prior to encryption or as a result of being decrypted) at various stages of the system. For example, the passcode can be encrypted (i.e. in an encrypted state) during the transmission of the passcode from the voting system 30 to the voter 50 over a telecommunication network. When the passcode reaches the voter, the passcode can be unencrypted, and the voter 50 can enter the passcode into the voting station 40.
The voter 50 can then make one or more voting selections. The passcode can then be re- encrypted prior to transmitting the passcode back to the voting system 30 along with the voter’s 50 voting selections, such that the passcode (and in some embodiments, the voting selections) is encrypted during the transmission of the passcode from the voting station 40 to the voting system 30.
In some embodiments, such as in some embodiments used in governmental elections, the voting system 30 does not store or otherwise retain any information that can be used to associate the voter 50 with any voting selections made by the voter 50. In other embodiments, such as in some embodiments where elections are held by businesses or other non-govemmental entities, the voting system 30 may store and/or retain information that can be used to associate the voter 50 with the voting selections made by the voter 50.
In some embodiments, the voter’s 50 mobile device receives the passcode and the voter enters the passcode into a voting station 40 before the voting station 40 authorizes the voter to make a voting selection (e.g. a selection in an election). In various embodiments, once the registered voter makes a selection in the election, the disclosed system may enter the voting selection onto one or more election blockchains, where a first blockchain may store only the voting selection, to be used for counting votes, and a second blockchain may store the registered voter’s information and election selection.
In at least one embodiment, the disclosed system may authenticate the registered voter’s voting selection by reading the information from the second blockchain, generating a communication that shows the voter’s 50 voting selection, and sending the communication to the voter’s 50 mobile device via text message, email, phone call, or other communication methods. In one embodiment, once the disclosed system receives the voting selection from the voter 50, the disclosed system may store information locally, wait for a specified period of time, then generate and send a communication to the voter’s 50 mobile device, where the registered voter 50 can then confirm with the system that the voting selection is correct by sending a communication back to the voting
system 30, where the system then enters the voter’s 50 voting selection into the one or more blockchains.
In some embodiments, the voter 50 is able to capture and maintain a record of the voter’s voting selection after the voter 50 has cast their vote(s). For example, in an embodiment, after the voter 50 has submitted their voting selections, an email, text message, or other communication can be generated by the voting system 30 and transmitted to the voter 50 that shows the voting selections that the voter 50 made, which can allow the voter 50 to verify the accuracy of the voter’s 50 voting selections as recorded by the voting system 30. In an embodiment, the voter 50 can have the option of receive an encrypted copy of their marked ballot showing the voter’s 50 voting selections. In some embodiments, the record of the voter’s voting selections can be generated locally, such as at or by the voting station 40. In an embodiment, the voter 50 is able to print and keep a copy of their marked ballot showing the voter’s 50 voting selections. In some embodiments, end-to-end voter verification can be accomplished, such that the voter 50 can check and verify that their voting selections are correct, and others are able to confirm that all ballots from all voters have been correctly recorded and counted.
In an embodiment, the system can be used to reduce or eliminate the potential for voter fraud. For example, in some embodiments, such as the embodiment discussed above where the registered voter confirms with the system that the election selection is correct by sending a communication back to the system, if the election selection is incorrect, the registered voter can send a communication back to the system that notifies the system that the election selection is incorrect. In such an event, the matter can be
investigatcd to determine if voter fraud has occurred, or if instead it is a result of voter error or other issues. In some embodiments, an investigation is triggered even if only one voter reports that their election selection is incorrect. In other embodiments, an investigation is only triggered once a threshold number of voters have reported that their election selection is incorrect.
In other embodiments, there is no communication that is generated and sent to the voter 50 that shows the voter’s 50 voting selection. Also, in some embodiments, the voter 50 is not provided with an opportunity to confirm with the system that the voting selection is correct by sending a communication back to the voting system 30.
In some embodiments, in addition to the voter 50 having the ability to print a copy of the voter’s 50 marked ballot showing the voter’s voting selections, the voting system
30 is also capable of printing a copy of some or all of the marked ballots in an election.
By printing a copy of all marked ballots in an election, the voting system 30 is able to provide a printable audit trail of all voting selections made in an election, which can be used to verify the accuracy of vote counts, to allow for recounts, or for other purposes.
In an embodiment, the system can satisfy and accommodate any jurisdictional requirements, laws, or regulations as to ballot design, language, or election programming.
For example, in some embodiments, the system can allow for multi-language support as may be required by applicable law. As another example, in some embodiments, the system can comply with the Americans with Disabilities act. The system can also allow for data import and export in a variety of formats (e.g. PDF, Excel, Text, etc.) in order to accommodate the varying formats that may be used across different jurisdictions and elections.
In operation of an embodiment, a method of securing a voting transaction can begin with the initiation of a voting transaction 1. For example, a voting transaction can be initiated 1 by detecting the arrival of a voter 50 at a voting station 40. Detecting the arrival of a voter 50 at a voting station 40 can be accomplished, for example, via one or more sensors scanning and recognizing biometric data of the voter 50, by using device- based location identification technology (e.g. the voter 50 carries devices such as RFID tags, mobile devices, etc. that is located by other devices), or by other means. In an embodiment, the voter can initiate the voting transaction 1 by checking in at the voting station 40, or by otherwise activating the voting station 40.
Next, the system attempts to verify the identity 2a of the voter 40. For example, the voting system 30 can maintain a database of voter information, which can include personally identifiable biometric information of the voter 50. The system can attempt to verify the identity 2a of the voter 50 by using the biometric data of the voter 50, such as by comparing voter biometric data provided by the voter 50 (e.g. biometric data provided by the voter during the initiation of the voting transaction 1) to the voter’s 50 corresponding biometric data contained in the database of the voting system 30.
If the system is not able to verify the identity of the voter 50 (e.g. if the biometric data provided by the voter does not match the corresponding biometric data contained in the database of the voting system 30), the voting transaction ends without any of the voter’s voting selections being included in the vote count of the election. If however the system is able to verify the identify of the voter 50, the voting transaction proceeds to the next step, in which the voting system 30 generates a random and unique passcode, which the voting system 30 then transmits 4 to the voter 50 over a telecommunications network
(such as by sending the passcode over a telecommunications network to the voter’s 50 mobile device).
Next, the voter 50 enters the passcode into the voting station 5. In some embodiments, this can result in the voting station 40 issuing (e.g. displaying) a ballot on which the voter 50 can make voting selections. The voter 50 can then proceed to make one or more voting selections 6. The voter 50 can then submit the ballot, which results in the transmission of the one or more voting selections from the voting station to the voting system 7 over a telecommunications network. Either separately or contemporaneously with the transmission of the one or more voting selections, the passcode can be transmitted from the voting station to the voting system over the telecommunications network 8. The authenticity of the passcode is then verified by the voting system 9, such as by the voting system 30 checking if the passcode transmitted to the voting system by the voting station 8 matches the passcode generated by the voting system.
If the voting system 30 fails to verify the authenticity of the passcode (e.g. if the passcode transmitted to the voting system 30 by the voting station 8 does not match the passcode generated by the voting system 30), the voting transaction ends without any voting selections being included in the vote count 10b. If however the passcode transmitted to the voting system 30 is verified by the voting system to be authentic 9, the one or more voting sections of the voter 40 are included in the vote count 10a.
The foregoing description and accompanying drawings illustrate the principles, exemplary embodiments, and modes of operation of the invention. However, the invention should not be construed as being limited to the particular embodiments discussed above. Additional variations of the embodiments discussed above will be
appreciated by those skilled in the art and the above-described embodiments should be regarded as illustrative rather than restrictive. Accordingly, it should be appreciated that variations to those embodiments can be made by those skilled in the art without departing from the scope of the invention.
Claims (20)
1. A method of securing a voting transaction conducted, at least in part, over a telecommunication network among a voter, a voting station, and voting system, wherein the method comprises: a) initiating a voting transaction; b) verifying the identity of the voter, c) generating a passcode by the voting system; c) transmitting the passcode from the voting system to the voter over the telecommunication network; d) entering the passcode into the voting station; e) making one or more voting selections by the voter; f) transmitting the one or more voting selections from the voting station to the voting system over the telecommunication network; g) transmitting the passcode from the voting station to the voting system over the telecommunication network; h) verifying the authenticity of the passcode by the voting system; and i) declining to include the one or more voting selections in a vote count unless the passcode transmitted to the voting system by the voting station is verified authentic.
2. The method of securing a voting transaction of claim 1 wherein said initiating a voting transaction further comprises detecting the voter’s arrival at a voting station.
3. The method of securing a voting transaction of claim 1 further comprising maintaining a database containing voter information.
4. The method of securing a voting transaction of claim 3 wherein said maintaining a database of voter information further comprises maintaining a database containing voter biometric data.
5. The method of securing a voting transaction of claim 4 wherein said verifying the identity of the voter further comprises verifying the identity of the voter using voter biometric data.
6. The method of securing a voting transaction of claim 5 wherein said verifying the identity of the voter using biometric data of the voter further comprises comparing the voter biometric data to the database of voter biometric data.
7. The method of securing a voting transaction of claim 6 further comprising storing the one or more voting selections in a blockchain without storing the voter information in the blockchain.
8. The method of securing a voting transaction of claim 6 further comprising storing the one or more voting selections in a blockchain and storing the voter information in the blockchain.
9. The method of securing a voting transaction of claim 6 further comprising: a) storing the one or more voting selections in a first blockchain without storing the voter information in the first blockchain; and b) storing the one or more voting selections in a second blockchain and storing the voter information in the second blockchain.
10. The method of securing a voting system of claim 9 further comprising using the one or more voting selections in the first blockchain to count votes in the vole count.
11. The method of securing a voting system of claim 9 further comprising using the one or more voting selections and the voter information in the second blockchain to confirm the one or more voting selections.
12. The method of securing a voting system of claim 11 wherein said using the one or more voting selections and the voter information in the second blockchain to confirm the one or more voting selections further comprises: a) generating a message to the voter that shows the voter’s one or more voting selections; and b) transmitting a message from the voter to the voting system that confirms the one or more voting selections.
13. The method of securing a voting transaction of claim 1, wherein said verifying the authenticity of the passcode by the voting system further comprises checking if the passcode transmitted to the voting system by the voting station matches the passcode generated by the voting system.
14. The method of securing a voting transaction of claim 13, wherein said declining to include the vote in a vote count unless the passcode transmitted to the voting system by the voting station is verified authentic further comprises declining to include the vote in a vote count unless the passcode transmitted to the voting system by the voting station matches the passcode generated by the voting system.
15. The method of securing a voting transaction of claim 1 wherein the passcode is encrypted during said transmitting the passcode from the voting system to the voter over the telecommunication network.
16. The method of securing a voting transaction of claim 1 wherein the passcode is encrypted during said transmitting the passcode from the voting station to the voting system over the telecommunication network.
17. The method of securing a voting transaction of claim 1 wherein the one or more voting selections are encrypted during said transmitting the one or more voting selections from the voting station to the voting system over the telecommunication network.
18. The method of securing a voting transaction of claim 1 further comprising using blockchain technology to store encrypted information.
19. The method of securing a voting transaction of claim 1 further comprising creating an association between the one or more voting selections and the passcode, and maintaining the association between the one or more voting selections and the passcode during said: a) transmitting the one or more voting selections to the voting system over the telecommunication network; and b) transmitting the passcode to the voting system over the telecommunication network.
20. The method of securing a voting transaction of claim 1 wherein said initiating a voting transaction further comprises checking in at a voting station by a user.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202062987396P | 2020-03-10 | 2020-03-10 | |
US62/987,396 | 2020-03-10 | ||
PCT/US2021/021761 WO2021183677A1 (en) | 2020-03-10 | 2021-03-10 | Method of securing a voting transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021232943A1 true AU2021232943A1 (en) | 2022-11-10 |
Family
ID=77670829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021232943A Pending AU2021232943A1 (en) | 2020-03-10 | 2021-03-10 | Method of securing a voting transaction |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP4118631A4 (en) |
AU (1) | AU2021232943A1 (en) |
CA (1) | CA3170878A1 (en) |
MX (1) | MX2022011102A (en) |
WO (1) | WO2021183677A1 (en) |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2469146A1 (en) * | 2000-11-20 | 2002-09-12 | Amerasia International Technology, Inc. | Electronic voting apparatus, system and method |
US7284700B1 (en) * | 2003-06-19 | 2007-10-23 | Populex Corp. | Advanced voting system and method |
US7197167B2 (en) * | 2001-08-02 | 2007-03-27 | Avante International Technology, Inc. | Registration apparatus and method, as for voting |
US8201738B2 (en) * | 2006-04-12 | 2012-06-19 | Energyield, Llc | Electronic voting system |
US8047435B2 (en) * | 2007-01-31 | 2011-11-01 | N.P. Johnson Family Limited Partnership | System and method for secured voting transactions |
US9836908B2 (en) * | 2014-07-25 | 2017-12-05 | Blockchain Technologies Corporation | System and method for securely receiving and counting votes in an election |
US9292987B1 (en) * | 2014-09-22 | 2016-03-22 | Makor Issues and Rights, Ltd. | System and method for fully encrypted remote web-based voting |
US20170109955A1 (en) * | 2015-10-20 | 2017-04-20 | Follow My Vote, Inc. | Blockchain electronic voting system and method |
-
2021
- 2021-03-10 EP EP21767789.7A patent/EP4118631A4/en active Pending
- 2021-03-10 WO PCT/US2021/021761 patent/WO2021183677A1/en unknown
- 2021-03-10 MX MX2022011102A patent/MX2022011102A/en unknown
- 2021-03-10 CA CA3170878A patent/CA3170878A1/en active Pending
- 2021-03-10 AU AU2021232943A patent/AU2021232943A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
EP4118631A1 (en) | 2023-01-18 |
MX2022011102A (en) | 2023-01-11 |
WO2021183677A1 (en) | 2021-09-16 |
CA3170878A1 (en) | 2021-09-16 |
EP4118631A4 (en) | 2024-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7377430B2 (en) | System for secure and accurate electronic voting | |
US7036730B2 (en) | Electronic voting apparatus, system and method | |
US7461787B2 (en) | Electronic voting apparatus, system and method | |
US7561724B2 (en) | Registration method, as for voting | |
US20030182182A1 (en) | Biometrics-based voting | |
EP3249616B1 (en) | An electronic voting method and system implemented in a portable device | |
US9082245B2 (en) | Electronic voter card and method for electronic voting | |
US20120037701A1 (en) | System and method for secured voting transactions | |
US20100312616A1 (en) | Multicomputer data transferring and file accessing to authenticate online voting and registration in a secure database system | |
US20090079538A1 (en) | Multicomputer Data Transferring and File Accessing to Authenticate Online Voting and Registration in a Secure Database System | |
US20210075599A1 (en) | Blockchain voting system and method with audit trail verification | |
US20230291747A1 (en) | Method of securing a voting transaction | |
EP4118631A1 (en) | Method of securing a voting transaction | |
RU2760440C2 (en) | System and method for counting votes in electronic voting system | |
CN112581678B (en) | System and method for voting in electronic voting system | |
Lakshmi et al. | E-Voting System using Biometrics | |
EP3872773A1 (en) | System and method of counting votes in an electronic voting system | |
WO2013182252A1 (en) | Voting method | |
RU2747450C2 (en) | System and method of voting in electronic voting system | |
WO2016118037A1 (en) | A method for electronic voting using biometric documents | |
Vanitha et al. | RFID based secure voting system with biometric authentication | |
Lai et al. | Design and Implementation of an Electronic Voting System with Contactless IC Cards | |
Jain et al. | Zero Human Contact Voting System |