GB2465545A - A system and method of identifying a first person to a second person - Google Patents

A system and method of identifying a first person to a second person Download PDF

Info

Publication number
GB2465545A
GB2465545A GB0821027A GB0821027A GB2465545A GB 2465545 A GB2465545 A GB 2465545A GB 0821027 A GB0821027 A GB 0821027A GB 0821027 A GB0821027 A GB 0821027A GB 2465545 A GB2465545 A GB 2465545A
Authority
GB
United Kingdom
Prior art keywords
ticket
representative
display
application
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0821027A
Other versions
GB0821027D0 (en
Inventor
Colin Green
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SECARTA Ltd
Original Assignee
SECARTA Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SECARTA Ltd filed Critical SECARTA Ltd
Priority to GB0821027A priority Critical patent/GB2465545A/en
Publication of GB0821027D0 publication Critical patent/GB0821027D0/en
Priority to PCT/GB2009/051419 priority patent/WO2010058190A1/en
Priority to GB1107884A priority patent/GB2477246A/en
Publication of GB2465545A publication Critical patent/GB2465545A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)

Abstract

A system for enabling a user to securely identify a first person 6 to a second person 8, comprises: a means for communicating between a user interface and an application, said application comprising a renderer 24 for generating signals which when loaded for display are representative of a ticket, and a password generator 22 for generating a password 58 to be displayed on the ticket; a database 16 for storing identity information pertaining to said first and second persons, including name, telephone number and photograph; means for communicating between said database and said application; a means for communication between said application and ticket delivery means; and ticket delivery means 32,36 for delivering signals which when loaded for display are representative of a first and second ticket for display on first and second ticket reception devices respectively. The invention is preferably for use by an employment agency for assigning a job to be carried out for an employer by a contractor.

Description

Systems and methods of communication
Field of the Invention
The invention relates to systems for enabling a user to securely identify a first person to a second person, and methods for enabling a user to securely identify a first person to a second person.
Background to the invention
It is coniinon in both the public sector and commercial service economy for organisations or individuals, as "clients", to request the services of individuals as "contractors', through third parties acting as "agents. Clear examples of this tripartite relationship include employment agencies providing temporary staff for businesses, education authorities providing supply teachers for schools and technology suppliers providing engineers for the maintenance of their customers' equipment.
Typically, clients have security constraints and concerns about contractors coming to their premises. Most businesses have physical assets which they wish to protect from those who might wish to take them, while schools and the like watch out for those who might pose as support staff in order to gain access and subsequently cause harm to children. The client will therefore want to ensure that a contractor is authorised before he can perform his assignment. Commonly, in order for a contractor to be authorised, his identity must he authenticated.
A number of technical prior art systems are known in the field of identity recognition amongst these are: 1) scanning body parts such as finger tips or retina, 2) printing single copy passports with password and holograms etc.; 3) and voice recognition.
Conventional means are often complex and cumbersome. Identification cards can, of course, be faked, and moreover simply cannot be made and supplied quickly enough to cover the situation where a contractor is called to do an emergency job or even for the day to day ad hoc supply of contractors to do an ongoing job.
It is of course possible to send the identification details of a person by post or manually -but again, this is generally too slow for the scenarios outlined above.
A system of fast and effective identity authentification is clearly therefore much desired, not only by the security conscious client, but also by the agent and contractor, who through such a system may engage in all manner of profitable labour. In particular, such a system will be advantageous to the "jobbing workman", who may rely on such short notice jobs as his principal source of income.
There is therefore a clear need for a system and method for allowing the fast transmission of authentification and identification information to both client and agent without the complexity and encumbrances of the scanning systems or the printing and distribution systenls.
It is one of the objects of the inventions disclosed to provide a solution to this problem, amongst others.
Summary of the invention
In a broad independent aspect, the invention provides a system for enabling a user to securely identify a first person to a second person, comprising; one or more user interfaces for interfacing with an application.
communication means, for communication between said user interfaces and said application, a database storing, in use, signals representative of identity information, means for communication between said database and said application, an application comprising a password generator and a renderer for generating signals which when loaded for display are representative of a ticket, means for communication between said application and ticket delivery means, and ticket delivery means for delivering signals which when loaded for display are representative of a first ticket for display on a first ticket reception device and for delivering signals which when loaded for display are representative of a second ticket for display on a second ticket reception device.
The technical advantages of the broad configuration are at least: 1) improved security by the generation of two independently viewable machine-generated tickets for visual comparison; 2) improved speed of distribution in the field of secure identity recognition; and 3) reduces the use of material such as plastics, electronic chips and paper by solely employing electronic displays in the field of secure identity recognition.
In a subsidiary aspect, said database is configured to store at least one photographic image. This allows speedy distribution of identity without requiring printing.
Furthermore, it allows distribution to multiple recipients.
In a further subsidiary aspect, the ticket delivery means are configured to simultaneously deliver the first ticket and the second ticket.
In a further subsidiary aspect, the ticket delivery means is configured to employ an MMS gateway to send signals representative of tickets to ticket reception devices. This improves the probability of delivery to a recipient.
In a further subsidiary aspect, said system is configured to generate signals representative of a validity period determined by the user.
In a further subsidiary aspect, said system is configured to generate signals representative of the expiry of said ticket and to prevent access to a ticket subsequent to the expiry.
In a further subsidiary aspect, the system is configured to generate a signal representative of a password.
In a broad independent aspect, the invention provides a method for enabling a user to securely identify a first person to a second person, comprising the steps of; selecting data from a database storing, in use, signals representative of identity information; generating signals which when loaded for display are representative of a ticket comprising identity information, delivering signals which when loaded for display are representative of a first ticket for display on a first ticket reception device; and delivering signals which when loaded for display are representative of a second ticket for display on a second ticket reception device.
In a subsidiary aspect, the method further comprises the step of storing at least one photographic image.
In a subsidiary aspect, the method further comprises the step of simultaneously delivering the tickets to both the first and second ticket reception devices.
In a subsidiary aspect, the method further comprises the steps of employing an MMS gateway to send signals representative of tickets to ticket reception devices.
In a subsidiary aspect, the method further comprises the step of generating signals representative of a validity period determined by the user.
In a subsidiary aspect, the method further comprises the step of preventing access to a ticket subsequent to the expiry.
In a subsidiary aspect, the method further comprises the step of generating a signal representative of a password.
In a broad, independent aspect, the invention comprises a system for enabling a user to securely identify a first person to a second person, comprising one or more user interfaces for interfacing with an application, communication means, for communication between said user interfaces and said application, a database comprising, in use, identity information, means for communication between said database and said application, an application comprising a password generator and a renderer for making tickets, means for communication between said application and ticket delivery means, and ticket delivery means for delivering a first ticket to a first ticket reception device and a second ticket to a second ticket reception device.
The technical advantages of the broad configuration are at least: 1) improved security by the generation of two independently viewahie machine-generated tickets for visual comparison; 2) improved speed of distribution in the field of secure identity recognition; and 3) reduces the use of material such as plastics, electronic chips and paper by solely employing electronic displays in the field of secure identity recognition.
The use of mobile internet technology in this way allows contractors to he chosen for clients and authentification data can be sent to clients or their agents in a few moments.
This is advantageous for both contractor and client, since it allows jobs to be apportioned and therefore problems to he solved very quickly. Clearly the use of mobile phone technology is particularly useful in the very common scenario where the contractor is a jobbing workman, because said workman is likely to be situated at a place unknown to either agent or client at any given time but is likely to have a mobile telephone, given that the telephone is already a important tool for said jobbing workman.
Further, by giving the authentification details straight to the parties which require them, time, money and energy is saved. A material manifestation of the authentication details, such as an identification card or a photograph, does not have to be given to contractor or client.
un the case where the client is a big company, the circumventing of the administrative aspects of getting an identification card or the like to an individual, makes this solution all the more desirable.
The system is further advantageous because since there is no requirement of exchange of physical credentials between agent, client and contractor, there is therefore nothing to be stolen or lost in the post. for example.
Clearly also, the system is advantageous because it presents more obstacles to those attackers who may wish to create fake authentification details. It presents more obstacles to would-be attackers than ID cards, which are easily forged.
This service enables an agent to authenticate a contractor to a client, where clients assign security privileges to contractors according to their identity. In preferred embodiments, it can take the form of an online service that can be used to authenticate the identity of a person requesting authorization under security constraints.
In a subsidiary aspect the identity information comprises at least one photographic image.
The provision of a photographic image to the client allows for the client to use the image to check the identity of the contractor when they come into contact. Alternatively, the supply of an identical image to both the client and the contractor provides the added advantage that the possession of the image itself provides further means for the checking of the identity of the contractor. This could stop a bogus contractor who nonetheless resembled the contractor in the photographic image from being accepted, or conversely may allow for a contractor whose image has changed since the picture was taken to be accepted by the client. The provision of the image therefore increases the flexibility of and the security provided by the system.
In a subsidiary aspect the ticket delivery means begins the delivery of the first ticket and the delivery of the second ticket simultaneously.
Simultaneous delivery allows for the setting up of a relationship between a given contractor and a given client as quickly as possible, which in the case of emergency work is a great advantage.
In a subsidiary aspect at least one user interface to the application is a website and website operation means.
In a subsidiary aspect the website operation means is a mobile telephone.
This is advantageous in that it allows the user to operate the system away from a computer, which further enhances the utility of a system designed to allow for the quick finding of labour and subsequent job allocation.
In a subsidiary aspect, the ticket delivery means is an MMS gateway and the ticket reception devices are mobile telephone handsets.
The use of mobile telephones is advantageous because they are extremely commonly available and are likely to be carried by both contractors and clients or their agents. This still further enhances the utility of a system designed to allow for the quick finding of labour and subsequent job allocation.
In a subsidiary aspect, the system utilises the internet protocol multimedia subsystem.
The use of the IMS system has the advantage of allowing for further sophistication in the ticket, since it allows the parties to download applications which they can then run on their telephones and which will subsequently facilitate the display of the ticket. By requiring that an application be run on a given telephone, an extra level of security is also generated.
in a subsidiary aspect, wherein at least one ticket has a validity period determined by the user and wherein at the end of the validity period, the ticket expires.
The incorporation of the validity period further secures the system.
In a subsidiary aspect if a person tries to access a ticket subsequent to the expiration of that ticket, notice is given to the person accessing that ticket that it has expired.
The giving of notice secures the system still further, by discouraging a potential bogus contractor from using the ticket after expiration.
In a subsidiary aspect the ticket further comprises a password.
Because there are two tickets, linked together by a password, it is the case that a ticket which is compromised will not be useful for anything other than that job, since the password is unique and will thus not be correct for any other job.
The invention also comprises a system substantially as described herein with reference to and as illustrated by any appropriate combination of the accompanying drawings.
In a broad independent aspect, the invention comprises a method for enabling a user to securely identify a first person to a second person, comprising the steps of electing data from a database, generating a ticket, adding the selected data to the ticket, sending a first ticket to a first person, and sending a second ticket to a second person thus facilitating the use of the data by the first person to authenticate the identity of the second person when the first person and the second person come into contact.
The method has all of the advantages of the system described above.
In a first subsidiary aspect of the second broad independent aspect the ticket are sent simultaneously.
The invention also comprises a method substantially as described herein with reference to and as illustrated by any appropriate combination of the accompanying drawings.
Brief description of the figures
Figure 1 is a block diagram illustrating the relationships between the data entities in the system.
Figure 2 is a block diagram showing the main steps in the system.
Figure 3 is a block diagram showing the system in detail.
Figure 4 is a front view of the visual presentation of a ticket.
Figure 5 is a block diagram illustrating an example of the deployment of the system.
Figure 6 is a block diagram illustrating a further example of the deployment of the system.
Detailed description of the prefened enibodinients
At figure 1, the component data entities in the system indicated generally at 2 are shown.
They are the application 12, which facilitates the operation of the system 2 by the user 4.
The user 4 will often be an agent seeking to unite a first person 6, who is often a contractor, with a second person 8, who is often a client. These labels -"agent", "client", and contractor" -will be used subsequently in this specification. The user 4 is able to communicate with the first and second persons 6, 8 via the application 12. The application 12 may he used to generate one or more tickets 26, containing various pieces of information pertaining to the identity and preferences of the second person 8, as well as optionally the identity, skills and preferences of the first person 6 and details relating to the assignment 9. A set of information relating to a particular person or assignment is grouped together as a data record 11. In the embodiment shown, the data record 11 of the second person 8 comprises a name and a mobile telephone number, while the first person's 6 data record 11 comprises a mobile number, a name and a photographic image (not shown), and the assignment 9 data record 11 simply contains a reference number.
Other details may be added in all three cases -substantive information relating to the nature of a given assignment as well as to the particular skills and general location of a given contractor, or the preferences and location of a given client will all be helpful. A ticket 26, when assembled, will contain some or all of the above data, as well as, optionally a password 58 and, again optionally, a validity period.
The application 12 uses a database 16 (not shown) to store a plurality of data records ii (not shown). The agent may attach a photographic image 36 of each contractor 6 that he has verified as a likeness.
The details of client 8, contractor 6 and jobf assignment 9 could he drawn from other existing databases. Because the service does not need to update an external database, an alternative means of database provision would be to write adaptors for external databases where a legible exchange format exists. Alternative embodiments may be to offer a public application program interface, enabling developers to embed the service into their own application.
Figure 2 shows the typical "worktlow" of the system 2, i.e. the order in which the system 2 performs tasks. Any actions inside a given column are done by the person after whom the column is labelled.
Before the system 2 is entered, a client 8 arranges an assignment 9 or otherwise realises that he needs work to be done. He contacts agent 4 in order that he can get agent 4 to find at least one contractor 6 who will be able to do the assignment or work 9. What the agent 4 then does is to create one or more tickets 26, using a user interface 10 which may be a website 40 and website operation means 42. The website operation means 42 may for example be a mobile telephone or a computer terminal. The interface 10 is then used to interface with the application 12. The agent 4 must then choose client 8, assignment 9 and contractor 6. The agent 4 may then optionally set or determine a validity period for the ticket 26, at the end of which the ticket 26 may expire. Such expiration may take the form of the ticket 26 ceasing to exist or function, or it may take the form of a notice (not shown) appended to the ticket 26 which alerts one or more of the contractor 6, agent 4 or client 8 to the expiration. The ticket 26 may then be sent via ticket delivery means 30, which may be either an MMS gateway or preferably an IMS system. The invention could be adapted to work on any mobile telephone network. In preferred embodiments, the ticket 26 will be sent simultaneously to all intended destinations, although near simultaneous and staggered delivery are both also options. In the illustrated embodiment, a first ticket 32 is sent to a first ticket reception device 34 and a second ticket 36 is sent to a second ticket reception device 38. The contractor 6 can now visit the site of the client 8, where he may have his identity authenticated. This can be done by checking the photographic image 36, the validity period and/or the password 58. The client 8 or his representative may then authorise the activity, which the contractor 6 will be subsequently free to perform.
Figure 3 shows the making of the ticket 26 in more detail. Again, the diagram is divided, this time into two columns, for ease of understanding. The first column shows actions performed by the user 4 and the second column shows actions performed by the application 12.
The user 4 begins by instructing the application 12 to create a new ticket 26. The application 12 creates a new ticket record 100 which it keeps in temporary storage, either on a database 16 (not shown) or via supplementary memory means (also not shown). The user is then presented with a page 102 from which he chooses details to add to the ticket 26. These details comprise details relating to client 8, contractor 6, and assignment 9 records, as shown in Figure 1 and discussed above. The application then looks up the chosen details from its database 16 and adds the chosen details to the ticket record 100.
The user chooses the validity period by inputting two timestamps marking the beginning and end of the validity period. The user is presented with a page 103 from which he can choose to revise the pending ticket record 100, or proceed to issuing it 104.
The user 4 instructs the application 12 to issue the ticket 26. The application 12 then invokes its password generator component 106. In a preferred embodiment the operating environment of the application provides a source of random or pseudorandom data. In this embodiment, the password generator 106 encodes a string of random data as alphanumeric characters, producing a string of text, which may include numbers and other symbols and which may be used as a password 58 (not shown). The length of the string; and the algorithms used to generate the source data, and encode it as alphanumeric text, are outside the scope of this invention. The generated password 58 (not shown) is added to the Ticket record 100, The ticket record 100 is now complete and the application 12 stores it in database 16.
The application next invokes its renderer component 24. The renderer 24 creates an image file 108 containing a visual representation of the ticket record 100, or "ticket image" 112 (not shown). At first the image file 108 is empty. The renderer 24 then locates and loads data constitutive of a background or background image 110. It adds this background image 110 to the image file 108. In preferred embodiments, the renderer 24 uses the reference within the ticket 26 to a given contractor's record to locate a photographic image 39 of the contractor 6. This contractor 6 photographic image 39 is added to the Ticket image 112. Optionally, an image of the client and other images such as maps and directions may be added to the ticket 26. Details from the ticket record 100 are rendered as text and added to the ticket image 112 and image file 108. This can be seen at figure 4 -these details of the ticket image 112 will include the name from the contractor record 114, the reference token from the assignment record 116, the validity period timestamps 118, and the password 58. In embodiments using a photographic image 36, that image 36 will also be present.
The ticket image 112 is encoded for example as bitmap data and returned to the application 12. The application 12 then prepares to deliver the ticket to the client 8 and Contractor 6. It looks up from its database 16, the mobile telephone number associated with the data records 11 of both client and contractor. It then invokes the ticket delivery means 30 -in this example, once to send a first ticket 32 to a first ticket reception device 34, which may be the clients mobile telephone, and once to send a second ticket 36 to a second ticket reception device 38 which may be a contractor's mobile telephone. The application presents means to interface with a separate ticket delivery software. The operation of the ticket delivery 30 will be provided by a third party software component.
An example deployment of the system 2 is to be found at figure 5. Here the agent 4 uses his interface 10 which is a web browser to connect to and communicate with a web server 120. He is able to then interface with an application 14 which comprises a user interface 122, a password generator 22 and a renderer 24. The application 14 is in communication with a database 16, which in this instance takes the form of a database server. A ticket 26 is generated and communicated to ticket delivery means 30, which is this instance comprises an IMS service. Ticket delivery means 30 then delivers a first ticket 32 to a first ticket reception device 34, which comprises a client application, and is held by a contractor 6 and a second ticket 36 to a second ticket reception device 38 which also comprises a client application 124 and is held by a client 8. In preferred embodiments, the client application 124 may be downloaded to the ticket reception device 34, 38 at any time it is needed, The ticket reception devices 34, 38 in the embodiment are mobile telephones, although the system 2 could be made to work with other portable and non-portable devices, such as laptop and desktop computers.
At figure 6, we see a further embodiment of the system. This embodiment differs from the previous embodiments in that the ticket delivery means 30 comprises a Multimedia messaging service interface connected to a multimedia messaging service 126, and the first and second tickets 32, 36 which in this case are MMS messages are sent to ticket reception devices 34, 38 which do not require separate client applications.
Additional data may be added to the ticket 26, for a variety of reasons, including the increasing of security. For example, a token meaningful to both the client 6 and agent 4 may be added to the ticket as a reference to the current assignment 9.
A further example of useful data to be added to the ticket is a representation of dates marking the start and end of the period during which the authentication ticket is valid.
This representation may either be connected to or separate from any expiration device built into the ticket.
With regard to the password 58 (not shown), an alternative to the provision of the password 58 (not shown) by a random or pseudorandom number generator would he to take a fixed number of characters from a text representation of an HMAC (hashed message authentication code) of the ticket data elements (for example the contractor's name, the job reference, the validity period and the verified photographic image).
In this alternative embodiment, the ticket password acts as a checksum, or message authentication code for the ticket. Optionally, the client's ticket reception device and the agent's account could both be configured with an identical shared secret, allowing them both to create an identical IIMAC of the ticket data, keyed by the shared secret. When the ticket reception device (such as a mobile telephone) receives the ticket it can recreate the HMAC and verify the integrity of the ticket by checking that the password matches the recreated HMAC. The image portion used as an input to the HMAC computation would be the area of the image that remains unmodified by the ticket creation process, for example the upper half of the image representing the contractor's face, hut not the image portion designated to contain the subsequently generated password. This embodiment would require that the complete message transmission process does not transform or re-encode the image in a non-reversible way, to ensure the integrity of the inputs to the HMAC computation.
The application 12 could be offered as a public application programming interface that would enable developers to embed the service in their own applications.
if a given ticket reception device had public key cryptography features, a digital feature could be attached to the ticket which the ticket reception device could verify, thus advantageously adding another layer of security.
Enhancements such as that above rely on an application installed on the ticket reception device that is able to connect directly to the service using HTTP. IMS would be a way of providing this capability. Such enhancements may also advantageously require elements of the ticket to be delivered separately and without content adaptation by the MMS gateway. The ticket could, for example be sent as SMIL (synchronised multimedia integration language) data. The fragmenting of the delivery in this way may also have security advantages.
Also, digital watermarks could be added to the verified photographic image(s) that is/are used in the ticket(s). This could protect against attempts to fake tickets.
The term "signal" is to he interpreted broadly to include any form of data, electronic transmission, and storage which is machine readable or may he processed to be so.

Claims (16)

  1. CLAIMS1. A system for enabling a user to securely identify a first person to a second person, comprising; one or more user interfaces for interfacing with an application.communication means, for communication between said user interfaces and said application, a database for storing, in use, signals representative of identity information, means for communication between said database and said application, an application comprising a password generator and a renderer for generating signals which when loaded for display are representative of a ticket, means for communication between said application and ticket delivery means, and ticket delivery means for delivering signals which when loaded for display are representative of a first ticket for display on a first ticket reception device and for delivering signals which when loaded for display are representative of a second ticket for display on a second ticket reception device.
  2. 2. A system according to claim 1, wherein said database is configured to store at least one photographic image.
  3. 3. A system according to either of claims 1 or 2, wherein the ticket delivery means are configured to simultaneously deliver the first ticket and the second ticket.
  4. 4. A system according to any of the preceding claims, wherein the ticket delivery means is configured to employ an MMS gateway to send signals representative of tickets to ticket reception devices.
  5. 5. A system according to any of the preceding claims, wherein said system is configured to generate signals representative of a validity period determined by the user.
  6. 6. A system according to claim 5, wherein said system is configured to generate signals representative of the expiry of said ticket and to prevent access to a ticket subsequent to the expiry.
  7. 7. A system according to any of the previous claims wherein the system is configured to generate a signal representative of a password.
  8. 8. A system substantially as described herein with reference to and as illustrated by any appropriate combination of the accompanying text and/or figures.
  9. 9. A method for enabling a user to securely identify a first person to a second person, comprising the steps of; selecting data from a database storing, in use, signals representative of identity information; generating signals which when loaded for display are representative of a ticket comprising identity information, delivering signals which when loaded for display are representative of a first ticket for display on a first ticket reception device; and delivering signals which when loaded for display are representative of a second ticket for display on a second ticket reception device.
  10. 10. A method according to claim 9. further comprising the step of storing at least one photographic image.
  11. 11. A method according to either of the preceding claims, further comprising the step of simultaneously delivering the tickets to both the first and second ticket reception devices.
  12. 12. A method according to any of claims 9-11, further comprising the steps of employing an MMS gateway to send signals representative of tickets to ticket reception devices.
  13. 13. A method according to any of claims 9-12, further comprising the step of generating signals representative of a validity period determined by the user.
  14. 14. A method according to claim 13, further comprising the step of preventing access to a ticket subsequent to the expiry.
  15. 15. A method according to any of claims 9-14, further comprising the step of generating a signal representative of a password.
  16. 16. A method substantially as described herein with reference to and as illustrated by any appropriate combination of the accompanying drawings.
GB0821027A 2008-11-18 2008-11-18 A system and method of identifying a first person to a second person Withdrawn GB2465545A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0821027A GB2465545A (en) 2008-11-18 2008-11-18 A system and method of identifying a first person to a second person
PCT/GB2009/051419 WO2010058190A1 (en) 2008-11-18 2009-10-21 Systems and methods of communication
GB1107884A GB2477246A (en) 2008-11-18 2009-10-21 Systems and methods of communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0821027A GB2465545A (en) 2008-11-18 2008-11-18 A system and method of identifying a first person to a second person

Publications (2)

Publication Number Publication Date
GB0821027D0 GB0821027D0 (en) 2008-12-24
GB2465545A true GB2465545A (en) 2010-05-26

Family

ID=40194779

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0821027A Withdrawn GB2465545A (en) 2008-11-18 2008-11-18 A system and method of identifying a first person to a second person
GB1107884A Withdrawn GB2477246A (en) 2008-11-18 2009-10-21 Systems and methods of communication

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB1107884A Withdrawn GB2477246A (en) 2008-11-18 2009-10-21 Systems and methods of communication

Country Status (2)

Country Link
GB (2) GB2465545A (en)
WO (1) WO2010058190A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2417355A (en) * 2004-08-12 2006-02-22 Robert Culyer Method for sending PIN protected mobile phone based tickets and coupons
GB2420436A (en) * 2004-11-20 2006-05-24 Trinity Mobile Ltd Mobile phone displaying a photograph combined with a bar code for user identification
US20080016054A1 (en) * 2006-07-11 2008-01-17 Vitruva Approach to matching profiles and accessing contact information
GB2449284A (en) * 2007-05-17 2008-11-19 Yourrail Ltd Mobile ticket authentication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0111286D0 (en) * 2001-05-09 2001-06-27 Entertainment Internat Ltd Ticketing system
FR2894099A1 (en) * 2005-11-30 2007-06-01 Christian Pierre Geo Chabrerie Data e.g. name, transmitting method for e.g. mobile telephone, involves identifying mobile terminal in remote memory by direct point-to-point connection between terminal and third party terminal, based on localization of former terminal
US20070192590A1 (en) * 2006-02-10 2007-08-16 M-Systems Flash Disk Pioneers Ltd. Mobile Presentable Certificate (MPC)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2417355A (en) * 2004-08-12 2006-02-22 Robert Culyer Method for sending PIN protected mobile phone based tickets and coupons
GB2420436A (en) * 2004-11-20 2006-05-24 Trinity Mobile Ltd Mobile phone displaying a photograph combined with a bar code for user identification
US20080016054A1 (en) * 2006-07-11 2008-01-17 Vitruva Approach to matching profiles and accessing contact information
GB2449284A (en) * 2007-05-17 2008-11-19 Yourrail Ltd Mobile ticket authentication

Also Published As

Publication number Publication date
GB2477246A (en) 2011-07-27
GB0821027D0 (en) 2008-12-24
GB201107884D0 (en) 2011-06-22
WO2010058190A1 (en) 2010-05-27

Similar Documents

Publication Publication Date Title
JP7187532B2 (en) System and method for concluding and delivering electronic documents
EP3804220B1 (en) Blockchain-based trusted platform
EP1393144B1 (en) Web-based method and system for applying a legally enforceable signature on an electronic document
US8959595B2 (en) Methods and systems for providing secure transactions
US7010569B2 (en) Method of information display and communication system using the method
US11900493B2 (en) Blockchain-based dispute resolution
CN101305375A (en) System and method for controlling distribution of electronic information
CN111213139A (en) Paperless document processing based on block chain
US20090271321A1 (en) Method and system for verification of personal information
WO2008030184A1 (en) Improved authentication system
EP3794475B1 (en) Generating electronic signatures
KR102164413B1 (en) System and Method for Electronic Labor Contract and Labor Management using QR code
US20040015699A1 (en) Identification and contact information
JP2006048390A (en) Method and system for authenticating two-dimensional code user
CN112288409B (en) Application method of electronic certificate entrusted among multiple roles
WO2020226531A2 (en) Method for remotely verifying documents
KR20200126313A (en) Method and System for authenticating documents using inquiry history notice
van den Broek et al. Securely derived identity credentials on smart phones via self-enrolment
US20120300246A1 (en) Token Generation From A Printer
GB2465545A (en) A system and method of identifying a first person to a second person
JP2003187067A (en) Stockholder information control method and stockholder information control program
JP2006107099A (en) Creator terminal, browser terminal and program
JP2002259897A (en) Electronic document processing device and method
TWM580720U (en) System for assisting a network service user in setting password for the first time
JP2002215827A (en) Storage and utilization method of electoronic document

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)