US20170264603A1 - Personal area network - Google Patents
Personal area network Download PDFInfo
- Publication number
- US20170264603A1 US20170264603A1 US15/606,516 US201715606516A US2017264603A1 US 20170264603 A1 US20170264603 A1 US 20170264603A1 US 201715606516 A US201715606516 A US 201715606516A US 2017264603 A1 US2017264603 A1 US 2017264603A1
- Authority
- US
- United States
- Prior art keywords
- entity
- sensor
- information
- data
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Definitions
- a payment device such as a credit card or a debit card.
- the payment device would have account numbers on it and these account number would be read by a vendor and verified by a trust party such as a card issuer.
- a trust party such as a card issuer.
- ensuring security for payment devices has become increasingly complex especially with more transactions being made over a network and a vendor not being able to physically examine a card and card holder to determine fraud.
- people that commit fraud have become more technically savvy.
- Network sites collect relevant data on users and use that data to target communications to the user without compensating the user for allow his/her data to be used.
- Some users may be fine sharing data with certain network sites and not others and the decision whether to share data may be influenced by how much someone is willing to pay to obtain the data.
- An entity may store various levels of sensitive and personal data in a secure computing environment.
- the entity may create permission rules which allow the data to be shared or not shared depending on the circumstances and situation.
- the entity may be in touch with numerous electronic devices that act like sensors such as wireless networks, photonic networks, Bluetooth networks, sound recorders, scent recorders, video recorders, etc.
- the entity may share a token which may allow a sensor or operator of the sensor to access various levels of the sensitive data stored in the secure computing environment.
- FIG. 1 illustrates a sample illustration of the sensors an entity may encounter
- FIG. 2 illustrates an entity with a personal computing network interaction with sensors
- FIG. 3 illustrates a method of controlling access to data about an entity
- FIG. 4 illustrates some sample attributes of an entity
- FIG. 5 a illustrates an input display for adding personal data to the trusted computing system
- FIG. 5 b illustrates an input display for creating permissions for a plurality of entities
- FIG. 6 illustrates a sample illustration of a personal network cloud interacting with a payment system
- FIG. 7 illustrates an entity with a portable computing device interfacing with a server type computing device
- FIG. 8 illustrates a portable computing device
- FIG. 9 illustrates a server type computing device.
- a new system, process and method of controlling data related to an entity is disclosed.
- the entity 100 may be in touch with numerous electronic devices that act like sensors 110 such as wireless networks, photonic networks, Bluetooth networks, sound recorders, scent receivers, video recorders, etc. Further, each of these sensors 110 are taking the data and trying to match it up with additional data on the entity 100 to create a profile on the entity 100 which may be useable for marketing, all without explicit permission from the entity 100 .
- sensors 110 such as wireless networks, photonic networks, Bluetooth networks, sound recorders, scent receivers, video recorders, etc.
- a personal network 120 attempts to address the problem of controlling access to sensitive data about an entity 100 .
- An entity 100 may create a list of sensors 110 , networks or operators of networks which the entity 100 is willing to communicate additional information.
- an entity 100 may also set thresholds for receiving offers from sensors 110 in order to exchange additional information. As illustrated in FIG. 1 , while moving through life, many sensors 110 may be encountered, from red light cameras to Bluetooth networks to wireless 802.11 type networks.
- a token from the entity 100 may be communicated to a trusted source where the desired information may be communicated to the network and the communication may again be in the form of a token.
- the token may contain sufficient data to enable a purchase transaction.
- FIG. 2 may be a high level illustration of one embodiment of the proposed system 200 .
- An entity 100 may move in range of a sensor 110 where attributes 210 of the entity may be collected.
- the attributes 210 may be communicated in the form of tokens 220 from the entity to the sensors 110 .
- the sensed attributes 210 may be translated into a token 220 .
- the token 220 may then be communicated to a central computing service 230 which may be considered a trusted computing system.
- the token 220 may be reviewed for fraud or other undesirable characteristics by a risk analysis application 240 .
- the central computing system 230 may review the token 220 to determine if the entity 100 has granted permission 250 for the sensor 110 (or operator of the sensor 110 ) to obtain additional information 260 about the entity 100 . If permission 250 has not been granted, the central computing system 230 may be silent or may send a reject message.
- attribute data 210 may be detected from the entity 100 at a sensory device 110 .
- the sensors 110 may be many and varied. While not trying to be exhaustive or limiting, some examples may include 802.11 wireless communication devices, wireless communication devices in different frequency bands such as infrared communication or 60 MHz, still cameras, video cameras, photonic sensors, Bluetooth communication devices, sound sensors (microphones), smell sensors, heat sensors and any other sensor 110 that may be non-intrusive but able to collect data on an entity 100 .
- the sensors 110 may be designed or intended for a different purpose but may be adapted to communicate with the system 200 . For example, a security camera may be initially installed for security purposes but may be adapted to be a sensor 110 in the described system 200 .
- wireless communication devices such as WiFi routers are not often thought of as sensors 110 .
- communication with wireless devices is often two ways and the entity 100 may have to provide information in order to communicate with the wireless device, even if the communication is to merely collect the name of the wireless device or an identity of the computing device in communication with the wireless device.
- the name of a device such as a MAC address, may be enough for a network to identify an entity 100 and begin to communicate targeted advertisements, even when the entity 100 is in communication with a new, unknown network as the MAC address may be matched to previous searches which may be used to guide targeted advertisements.
- the entity 100 may take control of its data 260 and ensure the data 260 is shared only when desired.
- an entity 100 may pass through a variety and plurality of sensors 110 in a day and each one of these sensors 110 may want to communicate with the central computing device 230 to determine if more information 260 is available about the entity 100 .
- the entity attributes 210 change as the entity 100 changes locations and different sensors 110 are in relevant range.
- an entity 100 may be in a car and may pass through a toll collection apparatus and may pass numerous Bluetooth connections and wireless connections.
- the car may provide unique attributes as it has a license plate, a distinctive look and may broadcast a unique identifier.
- the entity 100 may not be wearing a jacket in the car as the climate may be controlled within the car. Later in the day, the entity 100 may exit the car and put on a jacket.
- the attributes 210 of the car (license plate, color, id number) may no longer be available. However, the attributes 210 of the jacket may now be added. Further, the attributes 210 may change all through the year and through an entity's 100 lifetime.
- Attributes 210 may be detected to help identify entities 100 or differentiate among entities 100 . Attributes 210 are wide and varied and may be virtually any item or characteristic that may be sensed by the sensor 110 and used to differentiate among entities 100 . Obvious attribute 210 examples may be a face of an entity 100 , a MAC address of a portable computing device assigned to an entity 100 or an RF id of a pet. However, the attributes 210 may be less obvious and more obscure as users may not desire that they have created a personal area network 120 of attributes 210 . For example, an attribute 210 may include a hand, a piece of jewelry, a fabric, a scent, a sound, etc. Some attributes 210 may be active like a smart phone passing a MAC address, browser configuration, memory size, apps on the device, etc. while other attributes 210 may be passive such as the optical characteristics of a face or hand.
- Additional attributes 210 may result from purpose created items.
- a fabric may provide a given response when exposed to a certain radio frequency.
- piece of jewelry may provide a known response when it receives radio waves in a predetermined frequency.
- a dental filing may include a device that may provide a known response when it receives radio waves in a known frequency.
- FIG. 4 may illustrate some sample attributes 120 of an entity 100 .
- Attributes 210 related to images may take on a variety of dimensions such that recognition may occur in a variety of ways.
- a first dimension may be a mapping of the spacing of facial features.
- a second dimension may be added to further determine depth of facial features.
- a third dimension may be added by using multiple sensors or one sophisticated sensor. The use of multiple dimension may further enable entities to be further recognized with greater accuracy.
- the sensors 110 may be in communication with a computer network such that the image may be communicated to the central authority 230 to be verified.
- the sensed attribute 210 data may be communicated to a central authority 230 .
- the attribute 210 data may be converted into a compressed form.
- the compressed form may be converted into a token 220 that is communicated to the central computing authority 230 .
- the conversion occurs at the sensor device 110 .
- the conversion happens when the attribute 210 image is communicated to the central authority 230 .
- the conversion into a token 220 may occur in a variety of ways. At a high level, the tokenization may occur in such a way to obscure the source of the message and the message such as through encryption but allow the message and source to be unencrypted but the trusted central computing system 230 . Further, the token 220 may be reviewed by security software or risk analysis applications 240 to ensure that malicious content is not being delivered to the central computing system 230 .
- Entities 100 may be any person, organization or thing that may have information 260 that may be considered sensitive or personal. Logically, a person may be considered an entity 100 . In addition, a corporation or any other legal organization may be considered an entity 100 as sensitive information 260 about the organization may be available. Further, loosely organized groups may also be considered an entity 100 . As an example, a group of friends may play poker every week and the group may be considered an entity 100 . Logically, a larger entity 100 may be made up of a group of entities 100 . At an even smaller level, each computing device may contain information that may be considered sensitive and each computing device may be considered an entity 100 . For example, a user may have a smart phone solely for work purposes and that phone may be a first entity 100 and the user may have a second phone for personal uses which may have very different sensitive data 260 and the second phone may be considered an separate entity 100 .
- What is sensitive data 260 worth protecting may depend on the entity 100 .
- Certain data 260 may be needed to execute fraudulent transactions such as a name and an account number.
- some entities 100 may consider even more information to be sensitive 260 and worthy of being protected.
- an address or phone number may be considered to be sensitive data 260 to a famous actor while other entities 100 such as a vendor may actively encourage the dissemination of a phone number and an address.
- the famous actor may mark the address and phone number as being sensitive 260 and it may only be communicated under direction of the actor.
- a vendor may share a phone number and an address with as many people as possible.
- a user interface may be used to enable an entity 100 to specify that certain data is sensitive 260 and should only be shared with permission while other data may be shared to virtually anyone.
- FIG. 5 a may be an illustration of a display for entering sensitive data 260 .
- Entities 100 may have the option to enter as much or as little information as they desire. For example, a vendor may enter a want to enter lots of information that may be shared with prospective customers while a famous actor that desires privacy may enter the bare minimum necessary to work productively in modern life.
- the computer system 230 may be illustrated in FIG. 7 and may include a trusted computing system that is in communication with a variety of sensors 110 .
- the trusted computing system 230 may also provide an analysis of the tokens 220 to address any concern over fraud.
- the trusted computing system 230 may be considered the gatekeeper of entity information 260 and unless the entity 100 has authorized the release of information 260 to a sensor 110 (or sensor owner), the sensor 110 is only left with the information it may be able to gather on its own.
- the computing system 230 may have a single location or may be spread among a variety of locations. To the system 230 users, the system 230 may appear to be a single computer but the system 230 may be spread among a plurality of computing systems 230 which may be spread across the world as a type of cloud computing design.
- FIG. 7 may be a high level illustration of some of the elements in a sample computing system 230 that may be physically configured to execute the various embodiments of the method.
- the computing system 230 may be a dedicated computing device 141 , a dedicated portable computing device 101 , an application on the computing device 141 , an application on the portable computing device 101 or a combination of all of these.
- FIG. 8 may be a high level illustration of a portable computing device 101 communicating with a remote computing device 141 through a sensor 110 but the application may be stored and accessed in a variety of ways.
- the application may be obtained in a variety of ways such as from an app store, from a web site, from a store WiFi system, etc.
- a portable computing device 101 may be a device that operates using a portable power source 155 such as a battery ( FIG. 8 ).
- the portable computing device 101 may also have a display 102 which may or may not be a touch sensitive display. More specifically, the display 102 may have a capacitance sensor, for example, that may be used to provide input data to the portable computing device 101 .
- an input pad 104 such as arrows, scroll wheels, keyboards, etc., may be used to provide inputs to the portable computing device 101 .
- the portable computing device 101 may have a microphone 106 which may accept and store verbal data, a camera 108 to accept images and a speaker 110 to communicate sounds.
- the portable computing device 101 may be able to communicate with a computing device 141 or a plurality of computing devices 141 that make up a cloud of computing devices 111 .
- the portable computing device 101 may be able to communicate in a variety of ways.
- the communication may be wired such as through an Ethernet cable, a USB cable or RJ6 cable.
- the communication may be wireless such as through Wi-Fi (802.11 standard), Bluetooth, cellular communication or near field communication devices.
- the communication may be direct to the computing device 141 or may be through a communication device or network of devices such as cellular service, through the Internet, through a private network, through Bluetooth, through near field communications, etc.
- FIG. 8 may be a simplified illustration of the physical elements that make up a portable computing device 101
- FIG. 9 may be a simplified illustration of the physical elements that make up a server type computing device 141 .
- a sample portable computing device 101 may be physically configured according to a method to be part of the system.
- the portable computing device 101 may have a processor 150 that is physically configured according to computer executable instructions. It may have a portable power supply 155 such as a battery which may be rechargeable. It may also have a sound and video module 160 which assists in displaying video and sound and may turn off when not in use to conserve power and battery life.
- the portable computing device 101 may also have volatile memory 165 and non-volatile memory 170 . There also may be an input/output bus 175 that shuttles data to and from the various user input devices such as the microphone 106 , the camera 108 and other inputs 102 , etc.
- the portable computing device 101 may act as the display 102 or may be a part of the display 102 .
- the computing device 141 may include a digital storage such as a magnetic disk, an optical disk, flash storage, non-volatile storage, etc. Structured data may be stored in the digital storage such as in a database.
- the server 141 may have a processor 300 that is physically configured according to computer executable instructions. It may also have a sound and video module 305 which assists in displaying video and sound and may turn off when not in use to conserve power and battery life.
- the server 141 may also have volatile memory 310 and non-volatile memory 315 .
- the database 325 may be stored in the memory 310 or 315 or may be separate.
- the database 325 may also be part of a cloud of computing device 141 and may be stored in a distributed manner across a plurality of computing devices 141 .
- the input/output bus 320 also may control of communicating with the networks, either through wireless or wired devices.
- the application may be on the local computing device 101 and in other embodiments, the application may be remote 141 . Of course, this is just one embodiment of the server 141 and the number and types of computing devices 141 is limited only by the imagination.
- the attribute data 210 may be communicated through a computer network to a trusted computing system 230 to verify the attribute data 210 satisfies permission rules 250 created by the user to permit additional data 260 to be communicated.
- the attribute data 210 may be converted into a token 220 that may be communicated through the network.
- the conversion may provide comfort to entities 100 that their personal data 260 may not be communicated in a manner that is easily understood by nefarious entities that may attempt to hack into the computer network.
- the conversion may occur through an encryption type scheme or through another manner such that the additional data 260 may be understood by the trusted computing system 230 but not by others that may have access to the computer network.
- the tokens 220 that are communicated through the computer network may be reviewed for security reasons. In this way, attempts to break into the secure computing service 230 may be minimized.
- the attribute data 210 may be analyzed for fraudulent characteristics. Further, entities 100 that use the system 230 may have more comfort in knowing that messages on the network are being reviewed for security.
- the fraud analysis 240 may view the transaction in terms of risk.
- the tokens 220 and the data represented by the token 220 may be analyzed to determine if the data is more likely to be fraudulent.
- the fraud analysis 240 may use neural network or artificial intelligence to continually improve the analysis. For example, the analysis may determine over time that it is impossible for a single user to be in different places at the same time. Similarly, it would be highly likely that someone that is allergic to gluten would be buying products that contained gluten and the analysis may learn this over time.
- a plurality of attributes 210 may be examined to determine if a token 220 is fraudulent.
- a first sensor 110 may observe a first attribute 210 of the entity 100 and a second sensor 110 may observe a second attribute 210 of the entity 100 .
- Both of the attributes 210 observed of the entity 100 may be reviewed and cross-matched to ensure a proper and reliable identification of the entity 100 .
- a first attribute 210 facial features
- a second attribute 210 phone MAC address
- the accumulation of attribute data 210 for an entity 100 may occur over a period of time and the attributes 210 observed in close time proximity may be compared to ensure that the same entity 100 is being observed.
- the risk service 240 may accumulate the relevant attribute 210 data observed and may perform one or more analysis algorithms to determine if fraud is likely.
- the risk service 240 may be part of the central trusted computing device 230 but may also examine communications such as tokens 220 that occur over the network. By reviewing communications before reaching the trusted network, nefarious communications may be determined and located even before reaching the trusted server 230 .
- the risk analysis service 240 may take on a variety of physical forms.
- a computing system is physically configured to operate as the risk service 240 .
- Computing chips may be physically configured and installed as part of the risk service 240 .
- the computing chips may be physically configured according to computer executable instructions and the instructions may change or be updated over time. As a result, the computing chips such as a processor or memory may change their physical structure as a result of the updated computer executable instructions.
- the risk service 240 may be spread across the network. For example, if a sensor 110 desired to communicate attribute 210 data to the central computing system 230 , the attribute data 210 may first have to be analyzed by the risk service 240 which may reside on a computing device 230 at or near the sensor 110 location. In this way, fraudulent or nefarious communications may be stopped before making much inroad into the network.
- the attributes 210 may be analyzed to determine if the entity 100 has preset permissions to allow additional data to be communicated about the entity 100 .
- the entity 100 may use an application with a user interface to determine how and when additional data regarding the entity 100 is communicated to other people that use the network.
- the permissions 250 may be specified in a variety of ways. In one example, the permissions 250 may be sensor 110 specific. As an example, if an entity consistently buys coffee at the Coffee House at the corner of Maple Avenue and River Road in a Anytown, US, the entity 100 may allow additional information such as payment information to be shared with the video camera (sensor) 110 and related computing equipment for operating the payment system at the Coffee House.
- the permission may be more broad and may be location specific. Referring again to the Coffee House example, all the sensors 110 at the Coffee House at Maple & River such as the WiFi system, the video cameras, the still cameras, the scent sensors, etc. may be granted permission to obtain additional information 260 about the entity 100 such as payment information.
- the permission 250 may be sensor 110 owner specific.
- the entity 100 may trust all the Coffee Houses in the United States and may wish to share additional information with all the Coffee Houses in the United States. In this way, the entity 100 may be able to walk into any Coffee House across the United States and the Coffee House may be able to obtain additional information about the entity 100 , including payment information.
- the entity 100 may allow ALL users of the network that serve coffee to have permission to obtain additional information about the entity 100 .
- the entity 100 may then allow data to be communicated to any coffee serving location and the entity 100 may obtain coffee at any of these locations.
- FIG. 5 b may be an illustration of a sample permission 250 creation display 600 .
- the permission display 600 may be created on any computing device that has network access and is capable of displaying and receiving input information including portable computing devices. There may be a plurality of input fields such as a sensor owner name 610 , a fee required to obtain additional data 620 , a location to be granted data 630 and a level of permissions 640 which may start at a high level and may allow an entity 100 to make the permissions 250 progressively more specific. Further, permissions 250 that have been created while at vendor/sensor 110 locations may also be listed and may be modified.
- the entity 100 may set up the permissions 250 while on the go. For example, if a user is at the airport, the user may set the permissions 250 to communicate with limo drivers but not with taxi drivers. As another example, if the user desires Chinese food, the user may set up the permissions to communicate with restaurants that serve Chinese food but not restaurants that serve pizza.
- the permission 250 rules may set a monetary value minimum and if the sensor 110 owner is willing to pay the monetary value minimum, a token 220 for the additional data 260 may be provided. In this way, the entity 100 may be compensated for sharing additional information 260 .
- the permission 250 rules may be created in many different ways with a variety of limitations.
- an entity 100 may select to receive offers for discounts from vendors in exchange for releasing some personal information 260 .
- the percentage discount may also be set by the entity 100 and information 260 may only be shared with vendors willing to bid more than the discount percentage.
- an entity 100 may select to receive a benefit (discount, compensation, special offers) in exchange for only receiving advertisements (or setting up payment) at a single vendor or vendor line for a period of time. If the offer from the vendor does not meet a threshold, the offer may be rejected and the data 260 on the entity 100 may continue to remain private.
- additional information 260 may be communicated.
- the additional data 260 may take on a variety of forms or levels and the form and level may be set by the entity 100 . As mentioned previously, what one entity 100 considers to be private or sensitive data 260 may vary depending on the entity 100 and these factors may be reflected in the permissions 250 set and the data 260 that is willing to be shared. Further, some entities 100 may have more additional data 260 to provide than other entities 100 .
- the additional data 260 may include data regarding the entity's 100 income level which the vendor may be able to use determine if the entity 100 is likely to be a customer.
- the additional data 260 may include payment information data such as whether the entity 100 has a valid account or whether the account has room for additional purchases.
- the entity 100 may set the level of additional data in advance. For example, the entity 100 may determine that a vendor willing to pay $5 may see a zip code related to an entity 100 and a vendor willing to pay $50 may view income level information about the entity 100 .
- the level of information 260 may be set by the entity 100 while at the vendor.
- an entity 100 may wander into a new store for which the entity 100 has not set up a permission level and the entity 100 may desire to make a purchase at the vendor.
- the entity 100 may look into a security camera (sensor 110 ) where the security camera 110 may communicate the image as authentication data at the central server 230 .
- the authentication data which may include the image and WiFi obtained data, may be validated as being non-fraudulent.
- the entity 100 through one of the sensors 110 , may indicate to the central authority 230 the entity 100 grants permission 250 to purchase data to be communicated to the vendor.
- the entity 100 may make the indication in a variety of ways which may be preset by the entity 100 .
- the entity 100 may preset that a deliberate thumbs up gesture may mean that permission is granted for payment data 260 to be communicated to this vendor.
- the user may speak a preset phrase into the camera 110 which may also have sound capabilities, the sound and image may be verified as attributes 210 and the payment data 260 may then be communicated to the vendor.
- the entity 100 may use a portable computing device such as a smart phone to communicate to the central authority 230 that payment data may be communicated to a specific vendor.
- the communication may be to a trusted domain.
- the communication may be in the form of tokens 220 .
- the tokens 220 are passed from the entity 100 to the sensor 110 where the tokens 220 are then communicated to the trusted authority 230 .
- the token 220 is communicated in a form of entity name.domain where domain may be the name of the trusted network provider. In yet another embodiment, the token 220 may be communicated in a form of token.domain where the domain may be the name of the trusted network provider. In some versions of the Internet Protocol, the token 220 itself may be part of the address and the token 220 may be dynamic.
- the communication from the central computing system 230 to the sensor 110 with the results of the determination if permission is granted may be in the form of a token 220 .
- the token 220 may indicate the level of data the entity 100 has permitted the vendor or sensor 110 owner to view.
- the token 220 may also contain some preliminary information about the entity 100 if permission was granted and the vendor/sensor owner 110 may then decide whether additional data 260 would be useful.
- the relevant cost for the information 260 or the current bid status may be communicated as part of the token 220 .
- all of the communication takes place using tokens 220 .
- the various tokens 220 may be dynamic.
- the entity 100 may communicate a first token 220 to a first sensor 110 and may communicate a different token 220 to a different sensor 110 .
- a vendor cannot use a previous token 220 to attempt to communicate with an entity 100 .
- the token 220 may change or be dynamic.
- the token 220 may change according to a clock which synchronizes the central computer 230 and the sensors 110 .
- all the communication to the trusted computing system 230 may be reviewed for fraud or anomalies by the risk analysis system 240 .
- the tokens 220 may enable a transaction over a traditional payment network.
- An entity 100 may establish trust with a sensor 110 or vendor. Assuming the entity 100 has granted access to payment information 260 , the payment information 260 stored in the trusted computing store 230 may be communicated through the traditional payment network such as through the acquirer 700 to the issuer processor 710 and then to the issuer 720 .
- the payment information may remain in the trusted computing store 230 and a token 220 that represents payment information may be passed through the traditional payment system 700 - 720 where it may be recognized and used to access the relevant payment information 260 . In this embodiment, the payment information 260 may be kept within the secure system, thereby reducing risk.
- the tokens 220 may be exchanged for a variety of purposes.
- a token 220 may permit a transaction to occur.
- the token 220 may allow additional information to be delivered.
- the token 220 may deny additional information 260 .
- the token 220 may indicate that fraud may be occurring and that the present inquiry is likely fraudulent.
- a first vendor/sensor owner 110 may be responsible for drawing entities 100 to a particular geographic location.
- an ice cream store may be responsible for drawing large crowds during warm days. The crowds may also shop at additional vendors 110 after buying ice cream.
- a percentage of sales by the additional vendors 110 may be shared to the first vendor 110 .
- the transfer of funds may also use the trusted computing network 230 as vendors/sensor owners 110 may also be members of the trusted computing system 230 .
- the shared percentage may be negotiated among the parties.
- the increase in sales by the additional vendors may be determined and may be automatically be apportioned.
- a sensor 110 owner may be a primary sensor 110 owner and the primary sensor 110 owner may receive compensation from secondary sensor 110 owners in a logical proximity to the primary sensor 110 owner if a transaction occurs.
- the sensors 110 of the various vendors 110 may track the movements of customers and if the customers were drawn to a first vendor/sensor owner and then makes purchases at additional stores, the additional stores may share a portion of the revenue with the primary vendor.
- the system may also provide additional abilities for entities 100 to challenge fraudulent charges.
- entity 100 likely encountered numerous sensors 110 before enacting a transaction, there may be numerous inquiries at the central computing location whether an entity 100 has agreed to provide additional information. If a purchase is made and the additional inquiries were not made, the probability that fraud occurred is higher. Similarly, if fraud did occur, it is likely the person that committed the fraud was sensed by numerous sensors 110 on the network.
- the sensed attributes 210 of the fraud perpetrator may be used to chase down the fraud. Further, the sensed data may be used to illustrate the entity 110 may have been at a different location when the purchase was made. As the personal cloud 120 will have many unique attributes, it will be especially difficult to replicate. Similarly, if a fraudster tries to duplicate the attributes 210 of a personal network 120 , some of the attributes 210 of the fraudster may be obtained and may be used to trace the fraudster.
- the entity 100 may use the network to do more than make purchases.
- An entity 100 may set permissions 250 such that the entity 100 may be recognized and can access additional functionality of the network.
- an entity 100 may give permission for certain vendors to have access to personal data 260 .
- the entity 100 may use the sensor 110 as a sort of input device to the secure computing network 230 to perform tasks like any computing system.
- the entity 100 may look into a security camera 110 and request that an email be sent to her assistant that her train is late.
- the entity 100 may use the camera or other sensor 110 like an input into a computing device and virtually all the options available using a computer may be available.
- the entity 100 may use a sensor 110 such as a camera in a portable computing device 101 to create a task and the task may be executed at a time in the future when adequate computer network access is available.
- a sensor 110 such as a camera in a portable computing device 101
- the task may be executed at a time in the future when adequate computer network access is available.
- the entity 100 may be on public transportation and may wish to create a new level of permissions for a store.
- the user may create and store a message using the image sensor 108 on the portable computing device 101 and once the user is off public transportation and near satisfactory computing network access, the message may be sent.
- a vendor may set up a communication spot similar to a phone booth.
- an entity 100 like a customer may have privacy and may access private information all after being recognized by the system.
- an entity 100 may be recognized by appropriate attributes 210 and may access its email in the communication spot.
- an entity 100 may request a map to an additional store and the map may be displayed in the communication spot.
- the map (or other computer based object) may be downloaded to another computing device associated with the entity 100 such as a portable computing device 101 .
- an entity may look at a camera and request a change in access for a specific vendor in question such as allowing the vendor to have access to payment data.
- the trusted network may be a public network such as the Internet with sufficient safeguards or it may be a private network or a combination of public and private networks with appropriate security applied. If the network is a private network such as a payment processing network, entities may have more faith that their personal and sensitive information is being stored and maintained in a secure fashion and thus the entities may be more likely to take advantage of more aspects of the system.
- the described network, process and system may allow entities 100 to better control access to sensitive data 260 about the entity 100 . Instead of multiple parties collecting data 260 and using it as the parties see fit, the entity 100 will have control of such data. The entity 100 may then use the data 260 as the entity 100 sees fit, from authorizing payments, to accepting bids for additional information to denying access to such information 260 .
Abstract
Description
- This application is a continuation of patent application Ser. No. 14/737,267, filed on Jun. 11, 2015, which is a continuation of International Application No. PCT/US2015/33214, filed May 29, 2015, which claims the benefit of U.S. Provisional Application No. 62/005,504 filed May 30, 2014 .
- In the past, entities that desired to make payments would use a payment device such as a credit card or a debit card. The payment device would have account numbers on it and these account number would be read by a vendor and verified by a trust party such as a card issuer. However, ensuring security for payment devices has become increasingly complex especially with more transactions being made over a network and a vendor not being able to physically examine a card and card holder to determine fraud. In addition, people that commit fraud have become more technically savvy.
- In addition, as people use networks more, the ability to control data that relates to them has diminished. Network sites collect relevant data on users and use that data to target communications to the user without compensating the user for allow his/her data to be used. Finally, some users may be fine sharing data with certain network sites and not others and the decision whether to share data may be influenced by how much someone is willing to pay to obtain the data.
- A new system, process and method of controlling data related to an entity is disclosed. An entity may store various levels of sensitive and personal data in a secure computing environment. The entity may create permission rules which allow the data to be shared or not shared depending on the circumstances and situation. As an entity such as a human moves through life, the entity may be in touch with numerous electronic devices that act like sensors such as wireless networks, photonic networks, Bluetooth networks, sound recorders, scent recorders, video recorders, etc. The entity may share a token which may allow a sensor or operator of the sensor to access various levels of the sensitive data stored in the secure computing environment.
-
FIG. 1 illustrates a sample illustration of the sensors an entity may encounter; -
FIG. 2 illustrates an entity with a personal computing network interaction with sensors; -
FIG. 3 illustrates a method of controlling access to data about an entity; -
FIG. 4 illustrates some sample attributes of an entity; -
FIG. 5a illustrates an input display for adding personal data to the trusted computing system; -
FIG. 5b illustrates an input display for creating permissions for a plurality of entities; -
FIG. 6 illustrates a sample illustration of a personal network cloud interacting with a payment system; -
FIG. 7 illustrates an entity with a portable computing device interfacing with a server type computing device; -
FIG. 8 illustrates a portable computing device; and -
FIG. 9 illustrates a server type computing device. - At a high level, a new system, process and method of controlling data related to an entity is disclosed. As illustrated in
FIG. 1 , as anentity 100 such as a human moves through life, theentity 100 may be in touch with numerous electronic devices that act likesensors 110 such as wireless networks, photonic networks, Bluetooth networks, sound recorders, scent receivers, video recorders, etc. Further, each of thesesensors 110 are taking the data and trying to match it up with additional data on theentity 100 to create a profile on theentity 100 which may be useable for marketing, all without explicit permission from theentity 100. - A
personal network 120 attempts to address the problem of controlling access to sensitive data about anentity 100. Anentity 100 may create a list ofsensors 110, networks or operators of networks which theentity 100 is willing to communicate additional information. In addition, anentity 100 may also set thresholds for receiving offers fromsensors 110 in order to exchange additional information. As illustrated inFIG. 1 , while moving through life,many sensors 110 may be encountered, from red light cameras to Bluetooth networks to wireless 802.11 type networks. For networks which theentity 100 has allowed, a token from theentity 100 may be communicated to a trusted source where the desired information may be communicated to the network and the communication may again be in the form of a token. The token may contain sufficient data to enable a purchase transaction. -
FIG. 2 may be a high level illustration of one embodiment of the proposedsystem 200. Anentity 100 may move in range of asensor 110 whereattributes 210 of the entity may be collected. Theattributes 210 may be communicated in the form oftokens 220 from the entity to thesensors 110. In other embodiments, thesensed attributes 210 may be translated into atoken 220. Thetoken 220 may then be communicated to acentral computing service 230 which may be considered a trusted computing system. Thetoken 220 may be reviewed for fraud or other undesirable characteristics by arisk analysis application 240. Assuming thetoken 220 is not fraudulent, thecentral computing system 230 may review thetoken 220 to determine if theentity 100 has grantedpermission 250 for the sensor 110 (or operator of the sensor 110) to obtainadditional information 260 about theentity 100. Ifpermission 250 has not been granted, thecentral computing system 230 may be silent or may send a reject message. - More specifically, referring to
FIG. 3 , a computer based method, process and system for controlling access to data about anentity 100 may be illustrated. Atblock 100,attribute data 210 may be detected from theentity 100 at asensory device 110. - The
sensors 110 may be many and varied. While not trying to be exhaustive or limiting, some examples may include 802.11 wireless communication devices, wireless communication devices in different frequency bands such as infrared communication or 60 MHz, still cameras, video cameras, photonic sensors, Bluetooth communication devices, sound sensors (microphones), smell sensors, heat sensors and anyother sensor 110 that may be non-intrusive but able to collect data on anentity 100. Thesensors 110 may be designed or intended for a different purpose but may be adapted to communicate with thesystem 200. For example, a security camera may be initially installed for security purposes but may be adapted to be asensor 110 in the describedsystem 200. - Of note, wireless communication devices such as WiFi routers are not often thought of as
sensors 110. However, communication with wireless devices is often two ways and theentity 100 may have to provide information in order to communicate with the wireless device, even if the communication is to merely collect the name of the wireless device or an identity of the computing device in communication with the wireless device. The name of a device, such as a MAC address, may be enough for a network to identify anentity 100 and begin to communicate targeted advertisements, even when theentity 100 is in communication with a new, unknown network as the MAC address may be matched to previous searches which may be used to guide targeted advertisements. Thus, by controlling the data shared with wireless sources, theentity 100 may take control of itsdata 260 and ensure thedata 260 is shared only when desired. - Logically, an
entity 100 may pass through a variety and plurality ofsensors 110 in a day and each one of thesesensors 110 may want to communicate with thecentral computing device 230 to determine ifmore information 260 is available about theentity 100. - Related, the
entity attributes 210 change as theentity 100 changes locations anddifferent sensors 110 are in relevant range. For example, anentity 100 may be in a car and may pass through a toll collection apparatus and may pass numerous Bluetooth connections and wireless connections. The car may provide unique attributes as it has a license plate, a distinctive look and may broadcast a unique identifier. Further, theentity 100 may not be wearing a jacket in the car as the climate may be controlled within the car. Later in the day, theentity 100 may exit the car and put on a jacket. Thus theattributes 210 of the car (license plate, color, id number) may no longer be available. However, theattributes 210 of the jacket may now be added. Further, theattributes 210 may change all through the year and through an entity's 100 lifetime. -
Attributes 210 may be detected to help identifyentities 100 or differentiate amongentities 100.Attributes 210 are wide and varied and may be virtually any item or characteristic that may be sensed by thesensor 110 and used to differentiate amongentities 100.Obvious attribute 210 examples may be a face of anentity 100, a MAC address of a portable computing device assigned to anentity 100 or an RF id of a pet. However, theattributes 210 may be less obvious and more obscure as users may not desire that they have created apersonal area network 120 ofattributes 210. For example, anattribute 210 may include a hand, a piece of jewelry, a fabric, a scent, a sound, etc. Some attributes 210 may be active like a smart phone passing a MAC address, browser configuration, memory size, apps on the device, etc. whileother attributes 210 may be passive such as the optical characteristics of a face or hand. -
Additional attributes 210 may result from purpose created items. As an example, a fabric may provide a given response when exposed to a certain radio frequency. As another example, piece of jewelry may provide a known response when it receives radio waves in a predetermined frequency. In another example, a dental filing may include a device that may provide a known response when it receives radio waves in a known frequency.FIG. 4 may illustrate some sample attributes 120 of anentity 100. -
Attributes 210 related to images may take on a variety of dimensions such that recognition may occur in a variety of ways. A first dimension may be a mapping of the spacing of facial features. A second dimension may be added to further determine depth of facial features. A third dimension may be added by using multiple sensors or one sophisticated sensor. The use of multiple dimension may further enable entities to be further recognized with greater accuracy. - Logically, the
sensors 110 may be in communication with a computer network such that the image may be communicated to thecentral authority 230 to be verified. As mentioned previously, the sensedattribute 210 data may be communicated to acentral authority 230. In some embodiments, theattribute 210 data may be converted into a compressed form. In some embodiments, the compressed form may be converted into a token 220 that is communicated to thecentral computing authority 230. In some embodiments, the conversion occurs at the sensor device110. In other embodiments, the conversion happens when theattribute 210 image is communicated to thecentral authority 230. - The conversion into a token 220 may occur in a variety of ways. At a high level, the tokenization may occur in such a way to obscure the source of the message and the message such as through encryption but allow the message and source to be unencrypted but the trusted
central computing system 230. Further, the token 220 may be reviewed by security software orrisk analysis applications 240 to ensure that malicious content is not being delivered to thecentral computing system 230. -
Entities 100 may be any person, organization or thing that may haveinformation 260 that may be considered sensitive or personal. Logically, a person may be considered anentity 100. In addition, a corporation or any other legal organization may be considered anentity 100 assensitive information 260 about the organization may be available. Further, loosely organized groups may also be considered anentity 100. As an example, a group of friends may play poker every week and the group may be considered anentity 100. Logically, alarger entity 100 may be made up of a group ofentities 100. At an even smaller level, each computing device may contain information that may be considered sensitive and each computing device may be considered anentity 100. For example, a user may have a smart phone solely for work purposes and that phone may be afirst entity 100 and the user may have a second phone for personal uses which may have very differentsensitive data 260 and the second phone may be considered anseparate entity 100. - What is
sensitive data 260 worth protecting may depend on theentity 100.Certain data 260 may be needed to execute fraudulent transactions such as a name and an account number. At the same time, someentities 100 may consider even more information to be sensitive 260 and worthy of being protected. For example, an address or phone number may be considered to besensitive data 260 to a famous actor whileother entities 100 such as a vendor may actively encourage the dissemination of a phone number and an address. Thus, the famous actor may mark the address and phone number as being sensitive 260 and it may only be communicated under direction of the actor. On the opposite extreme, a vendor may share a phone number and an address with as many people as possible. A user interface may be used to enable anentity 100 to specify that certain data is sensitive 260 and should only be shared with permission while other data may be shared to virtually anyone. -
FIG. 5a may be an illustration of a display for enteringsensitive data 260.Entities 100 may have the option to enter as much or as little information as they desire. For example, a vendor may enter a want to enter lots of information that may be shared with prospective customers while a famous actor that desires privacy may enter the bare minimum necessary to work productively in modern life. - The
computer system 230 may be illustrated inFIG. 7 and may include a trusted computing system that is in communication with a variety ofsensors 110. The trustedcomputing system 230 may also provide an analysis of thetokens 220 to address any concern over fraud. The trustedcomputing system 230 may be considered the gatekeeper ofentity information 260 and unless theentity 100 has authorized the release ofinformation 260 to a sensor 110 (or sensor owner), thesensor 110 is only left with the information it may be able to gather on its own. Thecomputing system 230 may have a single location or may be spread among a variety of locations. To thesystem 230 users, thesystem 230 may appear to be a single computer but thesystem 230 may be spread among a plurality ofcomputing systems 230 which may be spread across the world as a type of cloud computing design. -
FIG. 7 may be a high level illustration of some of the elements in asample computing system 230 that may be physically configured to execute the various embodiments of the method. Thecomputing system 230 may be adedicated computing device 141, a dedicatedportable computing device 101, an application on thecomputing device 141, an application on theportable computing device 101 or a combination of all of these.FIG. 8 may be a high level illustration of aportable computing device 101 communicating with aremote computing device 141 through asensor 110 but the application may be stored and accessed in a variety of ways. In addition, the application may be obtained in a variety of ways such as from an app store, from a web site, from a store WiFi system, etc. There may be various versions of the application to take advantage of the benefits of different computing devices, different computing languages and different API platforms. - In one embodiment, a
portable computing device 101 may be a device that operates using aportable power source 155 such as a battery (FIG. 8 ). Referring toFIG. 7 , theportable computing device 101 may also have adisplay 102 which may or may not be a touch sensitive display. More specifically, thedisplay 102 may have a capacitance sensor, for example, that may be used to provide input data to theportable computing device 101. In other embodiments, aninput pad 104 such as arrows, scroll wheels, keyboards, etc., may be used to provide inputs to theportable computing device 101. In addition, theportable computing device 101 may have amicrophone 106 which may accept and store verbal data, acamera 108 to accept images and aspeaker 110 to communicate sounds. - The
portable computing device 101 may be able to communicate with acomputing device 141 or a plurality ofcomputing devices 141 that make up a cloud of computing devices 111. Theportable computing device 101 may be able to communicate in a variety of ways. In some embodiments, the communication may be wired such as through an Ethernet cable, a USB cable or RJ6 cable. In other embodiments, the communication may be wireless such as through Wi-Fi (802.11 standard), Bluetooth, cellular communication or near field communication devices. The communication may be direct to thecomputing device 141 or may be through a communication device or network of devices such as cellular service, through the Internet, through a private network, through Bluetooth, through near field communications, etc.FIG. 8 may be a simplified illustration of the physical elements that make up aportable computing device 101 andFIG. 9 may be a simplified illustration of the physical elements that make up a servertype computing device 141. - Referring to
FIG. 8 , a sampleportable computing device 101 may be physically configured according to a method to be part of the system. Theportable computing device 101 may have aprocessor 150 that is physically configured according to computer executable instructions. It may have aportable power supply 155 such as a battery which may be rechargeable. It may also have a sound andvideo module 160 which assists in displaying video and sound and may turn off when not in use to conserve power and battery life. Theportable computing device 101 may also havevolatile memory 165 andnon-volatile memory 170. There also may be an input/output bus 175 that shuttles data to and from the various user input devices such as themicrophone 106, thecamera 108 andother inputs 102, etc. It also may control of communicating with the networks, either through wireless or wired devices. Of course, this is just one embodiment of theportable computing device 101 and the number and types ofportable computing devices 101 is limited only by the imagination. Theportable computing device 101 may act as thedisplay 102 or may be a part of thedisplay 102. - The physical elements that make up the
remote computing device 141 may be further illustrated inFIG. 9 . At a high level, thecomputing device 141 may include a digital storage such as a magnetic disk, an optical disk, flash storage, non-volatile storage, etc. Structured data may be stored in the digital storage such as in a database. Theserver 141 may have aprocessor 300 that is physically configured according to computer executable instructions. It may also have a sound andvideo module 305 which assists in displaying video and sound and may turn off when not in use to conserve power and battery life. Theserver 141 may also havevolatile memory 310 andnon-volatile memory 315. - The
database 325 may be stored in thememory database 325 may also be part of a cloud ofcomputing device 141 and may be stored in a distributed manner across a plurality ofcomputing devices 141. There also may be an input/output bus 320 that shuttles data to and from the various user input devices such as themicrophone 106, thecamera 108, theinputs 102, etc. The input/output bus 320 also may control of communicating with the networks, either through wireless or wired devices. In some embodiments, the application may be on thelocal computing device 101 and in other embodiments, the application may be remote 141. Of course, this is just one embodiment of theserver 141 and the number and types ofcomputing devices 141 is limited only by the imagination. - Referring again to
FIG. 3 , atblock 110, theattribute data 210 may be communicated through a computer network to a trustedcomputing system 230 to verify theattribute data 210 satisfies permission rules 250 created by the user to permitadditional data 260 to be communicated. As mentioned previously, theattribute data 210 may be converted into a token 220 that may be communicated through the network. The conversion may provide comfort toentities 100 that theirpersonal data 260 may not be communicated in a manner that is easily understood by nefarious entities that may attempt to hack into the computer network. The conversion may occur through an encryption type scheme or through another manner such that theadditional data 260 may be understood by the trustedcomputing system 230 but not by others that may have access to the computer network. - Further, as mentioned briefly, the
tokens 220 that are communicated through the computer network may be reviewed for security reasons. In this way, attempts to break into thesecure computing service 230 may be minimized. For example, theattribute data 210 may be analyzed for fraudulent characteristics. Further,entities 100 that use thesystem 230 may have more comfort in knowing that messages on the network are being reviewed for security. - The
fraud analysis 240 may view the transaction in terms of risk. Thetokens 220 and the data represented by the token 220 may be analyzed to determine if the data is more likely to be fraudulent. In addition, thefraud analysis 240 may use neural network or artificial intelligence to continually improve the analysis. For example, the analysis may determine over time that it is impossible for a single user to be in different places at the same time. Similarly, it would be highly likely that someone that is allergic to gluten would be buying products that contained gluten and the analysis may learn this over time. - A plurality of
attributes 210 may be examined to determine if a token 220 is fraudulent. For example, afirst sensor 110 may observe afirst attribute 210 of theentity 100 and asecond sensor 110 may observe asecond attribute 210 of theentity 100. Both of theattributes 210 observed of theentity 100 may be reviewed and cross-matched to ensure a proper and reliable identification of theentity 100. As an example and not limitation, if a first attribute 210 (facial features) is determined to belong to afirst entity 100 but a second attribute 210 (phone MAC address) is determined to belong to asecond entity 100, a determination may be made that fraud is likely occurring. Similarly, if a first attribute 210 (hair color) is determined to belong to afirst entity 100 and a second attribute 210 (ring RFID signature) is determined to belong to thefirst entity 100, a determination may be made that fraud is likely not occurring. Logically, the accumulation ofattribute data 210 for anentity 100 may occur over a period of time and theattributes 210 observed in close time proximity may be compared to ensure that thesame entity 100 is being observed. - The
risk service 240 may accumulate therelevant attribute 210 data observed and may perform one or more analysis algorithms to determine if fraud is likely. Therisk service 240 may be part of the central trustedcomputing device 230 but may also examine communications such astokens 220 that occur over the network. By reviewing communications before reaching the trusted network, nefarious communications may be determined and located even before reaching the trustedserver 230. - The
risk analysis service 240 may take on a variety of physical forms. In one embodiment, a computing system is physically configured to operate as therisk service 240. Computing chips may be physically configured and installed as part of therisk service 240. In yet another embodiment, the computing chips may be physically configured according to computer executable instructions and the instructions may change or be updated over time. As a result, the computing chips such as a processor or memory may change their physical structure as a result of the updated computer executable instructions. - In yet another embodiment, the
risk service 240 may be spread across the network. For example, if asensor 110 desired to communicateattribute 210 data to thecentral computing system 230, theattribute data 210 may first have to be analyzed by therisk service 240 which may reside on acomputing device 230 at or near thesensor 110 location. In this way, fraudulent or nefarious communications may be stopped before making much inroad into the network. - Referring again to
FIG. 3 , atblock 120 at thecentral computing device 230, theattributes 210 may be analyzed to determine if theentity 100 has preset permissions to allow additional data to be communicated about theentity 100. Theentity 100 may use an application with a user interface to determine how and when additional data regarding theentity 100 is communicated to other people that use the network. Thepermissions 250 may be specified in a variety of ways. In one example, thepermissions 250 may besensor 110 specific. As an example, if an entity consistently buys coffee at the Coffee House at the corner of Maple Avenue and River Road in a Anytown, US, theentity 100 may allow additional information such as payment information to be shared with the video camera (sensor) 110 and related computing equipment for operating the payment system at the Coffee House. - In yet another embodiment, the permission may be more broad and may be location specific. Referring again to the Coffee House example, all the
sensors 110 at the Coffee House at Maple & River such as the WiFi system, the video cameras, the still cameras, the scent sensors, etc. may be granted permission to obtainadditional information 260 about theentity 100 such as payment information. - In another embodiment, the
permission 250 may besensor 110 owner specific. Theentity 100 may trust all the Coffee Houses in the United States and may wish to share additional information with all the Coffee Houses in the United States. In this way, theentity 100 may be able to walk into any Coffee House across the United States and the Coffee House may be able to obtain additional information about theentity 100, including payment information. - As yet a further embodiment, the
entity 100 may allow ALL users of the network that serve coffee to have permission to obtain additional information about theentity 100. In this arrangement, theentity 100 may then allow data to be communicated to any coffee serving location and theentity 100 may obtain coffee at any of these locations. -
FIG. 5b may be an illustration of asample permission 250creation display 600. Thepermission display 600 may be created on any computing device that has network access and is capable of displaying and receiving input information including portable computing devices. There may be a plurality of input fields such as asensor owner name 610, a fee required to obtainadditional data 620, a location to be granteddata 630 and a level ofpermissions 640 which may start at a high level and may allow anentity 100 to make thepermissions 250 progressively more specific. Further,permissions 250 that have been created while at vendor/sensor 110 locations may also be listed and may be modified. - Similarly, the
entity 100 may set up thepermissions 250 while on the go. For example, if a user is at the airport, the user may set thepermissions 250 to communicate with limo drivers but not with taxi drivers. As another example, if the user desires Chinese food, the user may set up the permissions to communicate with restaurants that serve Chinese food but not restaurants that serve pizza. - In yet another embodiment, the
permission 250 rules may set a monetary value minimum and if thesensor 110 owner is willing to pay the monetary value minimum, a token 220 for theadditional data 260 may be provided. In this way, theentity 100 may be compensated for sharingadditional information 260. Logically, thepermission 250 rules may be created in many different ways with a variety of limitations. - As an example, an
entity 100 may select to receive offers for discounts from vendors in exchange for releasing somepersonal information 260. The percentage discount may also be set by theentity 100 andinformation 260 may only be shared with vendors willing to bid more than the discount percentage. As yet another example, anentity 100 may select to receive a benefit (discount, compensation, special offers) in exchange for only receiving advertisements (or setting up payment) at a single vendor or vendor line for a period of time. If the offer from the vendor does not meet a threshold, the offer may be rejected and thedata 260 on theentity 100 may continue to remain private. - Referring again to
FIG. 3 , atblock 130, if permission is granted,additional information 260 may be communicated. Theadditional data 260 may take on a variety of forms or levels and the form and level may be set by theentity 100. As mentioned previously, what oneentity 100 considers to be private orsensitive data 260 may vary depending on theentity 100 and these factors may be reflected in thepermissions 250 set and thedata 260 that is willing to be shared. Further, someentities 100 may have moreadditional data 260 to provide thanother entities 100. - As one example, the
additional data 260 may include data regarding the entity's 100 income level which the vendor may be able to use determine if theentity 100 is likely to be a customer. In another example, theadditional data 260 may include payment information data such as whether theentity 100 has a valid account or whether the account has room for additional purchases. Theentity 100 may set the level of additional data in advance. For example, theentity 100 may determine that a vendor willing to pay $5 may see a zip code related to anentity 100 and a vendor willing to pay $50 may view income level information about theentity 100. - In some embodiments, the level of
information 260 may be set by theentity 100 while at the vendor. As an example, anentity 100 may wander into a new store for which theentity 100 has not set up a permission level and theentity 100 may desire to make a purchase at the vendor. Theentity 100 may look into a security camera (sensor 110) where thesecurity camera 110 may communicate the image as authentication data at thecentral server 230. The authentication data, which may include the image and WiFi obtained data, may be validated as being non-fraudulent. Theentity 100, through one of thesensors 110, may indicate to thecentral authority 230 theentity 100 grantspermission 250 to purchase data to be communicated to the vendor. - The
entity 100 may make the indication in a variety of ways which may be preset by theentity 100. For example, theentity 100 may preset that a deliberate thumbs up gesture may mean that permission is granted forpayment data 260 to be communicated to this vendor. As another example, the user may speak a preset phrase into thecamera 110 which may also have sound capabilities, the sound and image may be verified asattributes 210 and thepayment data 260 may then be communicated to the vendor. As yet another example, theentity 100 may use a portable computing device such as a smart phone to communicate to thecentral authority 230 that payment data may be communicated to a specific vendor. - As previously mentioned. the communication may be to a trusted domain. The communication may be in the form of
tokens 220. In some embodiments, thetokens 220 are passed from theentity 100 to thesensor 110 where thetokens 220 are then communicated to the trustedauthority 230. - In yet another embodiment, the token 220 is communicated in a form of entity name.domain where domain may be the name of the trusted network provider. In yet another embodiment, the token 220 may be communicated in a form of token.domain where the domain may be the name of the trusted network provider. In some versions of the Internet Protocol, the token 220 itself may be part of the address and the token 220 may be dynamic.
- If the token 220 is accepted and permission is granted for additional communication, then future communications may proceed in an encrypted manner or in another secure and efficient format. The communication from the
central computing system 230 to thesensor 110 with the results of the determination if permission is granted may be in the form of a token 220. The token 220 may indicate the level of data theentity 100 has permitted the vendor orsensor 110 owner to view. The token 220 may also contain some preliminary information about theentity 100 if permission was granted and the vendor/sensor owner 110 may then decide whetheradditional data 260 would be useful. Related, in the situations where bidding or a payment is required to obtainadditional information 260, the relevant cost for theinformation 260 or the current bid status may be communicated as part of the token 220. - In some embodiments, all of the communication takes
place using tokens 220. To reduce fraud, thevarious tokens 220 may be dynamic. For example, theentity 100 may communicate afirst token 220 to afirst sensor 110 and may communicate adifferent token 220 to adifferent sensor 110. In this way, a vendor cannot use aprevious token 220 to attempt to communicate with anentity 100. As long as the token 220 may be understood by the trustedcomputing system 230, the token 220 may change or be dynamic. For example, the token 220 may change according to a clock which synchronizes thecentral computer 230 and thesensors 110. In addition, as mentioned previously, all the communication to the trustedcomputing system 230 may be reviewed for fraud or anomalies by therisk analysis system 240. - In yet another embodiment as illustrated in
FIG. 6 , thetokens 220 may enable a transaction over a traditional payment network. Anentity 100 may establish trust with asensor 110 or vendor. Assuming theentity 100 has granted access topayment information 260, thepayment information 260 stored in the trustedcomputing store 230 may be communicated through the traditional payment network such as through theacquirer 700 to theissuer processor 710 and then to theissuer 720. In yet another embodiment, the payment information may remain in the trustedcomputing store 230 and a token 220 that represents payment information may be passed through the traditional payment system 700-720 where it may be recognized and used to access therelevant payment information 260. In this embodiment, thepayment information 260 may be kept within the secure system, thereby reducing risk. - The
tokens 220 may be exchanged for a variety of purposes. In one example, a token 220 may permit a transaction to occur. In another example, the token 220 may allow additional information to be delivered. In yet another embodiment, the token 220 may denyadditional information 260. Further, the token 220 may indicate that fraud may be occurring and that the present inquiry is likely fraudulent. - In yet another aspect, a first vendor/
sensor owner 110 may be responsible for drawingentities 100 to a particular geographic location. As an example, an ice cream store may be responsible for drawing large crowds during warm days. The crowds may also shop atadditional vendors 110 after buying ice cream. A percentage of sales by theadditional vendors 110 may be shared to thefirst vendor 110. The transfer of funds may also use the trustedcomputing network 230 as vendors/sensor owners 110 may also be members of the trustedcomputing system 230. In some embodiments, the shared percentage may be negotiated among the parties. In another embodiment, the increase in sales by the additional vendors may be determined and may be automatically be apportioned. - In another embodiment, a
sensor 110 owner may be aprimary sensor 110 owner and theprimary sensor 110 owner may receive compensation fromsecondary sensor 110 owners in a logical proximity to theprimary sensor 110 owner if a transaction occurs. Thesensors 110 of thevarious vendors 110 may track the movements of customers and if the customers were drawn to a first vendor/sensor owner and then makes purchases at additional stores, the additional stores may share a portion of the revenue with the primary vendor. - The system may also provide additional abilities for
entities 100 to challenge fraudulent charges. As theentity 100 likely encounterednumerous sensors 110 before enacting a transaction, there may be numerous inquiries at the central computing location whether anentity 100 has agreed to provide additional information. If a purchase is made and the additional inquiries were not made, the probability that fraud occurred is higher. Similarly, if fraud did occur, it is likely the person that committed the fraud was sensed bynumerous sensors 110 on the network. The sensed attributes 210 of the fraud perpetrator may be used to chase down the fraud. Further, the sensed data may be used to illustrate theentity 110 may have been at a different location when the purchase was made. As thepersonal cloud 120 will have many unique attributes, it will be especially difficult to replicate. Similarly, if a fraudster tries to duplicate theattributes 210 of apersonal network 120, some of theattributes 210 of the fraudster may be obtained and may be used to trace the fraudster. - Communication Through Trusted Network (email)
- Another aspect is that the
entity 100 may use the network to do more than make purchases. Anentity 100 may setpermissions 250 such that theentity 100 may be recognized and can access additional functionality of the network. As an example, anentity 100 may give permission for certain vendors to have access topersonal data 260. Once theentity 100 is verified, theentity 100 may use thesensor 110 as a sort of input device to thesecure computing network 230 to perform tasks like any computing system. Theentity 100 may look into asecurity camera 110 and request that an email be sent to her assistant that her train is late. Similarly, theentity 100 may use the camera orother sensor 110 like an input into a computing device and virtually all the options available using a computer may be available. - In yet another aspect, the
entity 100 may use asensor 110 such as a camera in aportable computing device 101 to create a task and the task may be executed at a time in the future when adequate computer network access is available. For example, theentity 100 may be on public transportation and may wish to create a new level of permissions for a store. The user may create and store a message using theimage sensor 108 on theportable computing device 101 and once the user is off public transportation and near satisfactory computing network access, the message may be sent. - As yet an another example, a vendor may set up a communication spot similar to a phone booth. In the communication spot, an
entity 100 like a customer may have privacy and may access private information all after being recognized by the system. For example, anentity 100 may be recognized byappropriate attributes 210 and may access its email in the communication spot. Similarly, anentity 100 may request a map to an additional store and the map may be displayed in the communication spot. Further, the map (or other computer based object) may be downloaded to another computing device associated with theentity 100 such as aportable computing device 101. As another example, an entity may look at a camera and request a change in access for a specific vendor in question such as allowing the vendor to have access to payment data. - The trusted network may be a public network such as the Internet with sufficient safeguards or it may be a private network or a combination of public and private networks with appropriate security applied. If the network is a private network such as a payment processing network, entities may have more faith that their personal and sensitive information is being stored and maintained in a secure fashion and thus the entities may be more likely to take advantage of more aspects of the system.
- The described network, process and system may allow
entities 100 to better control access tosensitive data 260 about theentity 100. Instead of multipleparties collecting data 260 and using it as the parties see fit, theentity 100 will have control of such data. Theentity 100 may then use thedata 260 as theentity 100 sees fit, from authorizing payments, to accepting bids for additional information to denying access tosuch information 260. - In accordance with the provisions of the patent statutes and jurisprudence, exemplary configurations described above are considered to represent a preferred embodiment of the invention. However, it should be noted that the invention can be practiced otherwise than as specifically illustrated and described without departing from its spirit or scope.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/606,516 US20170264603A1 (en) | 2014-05-30 | 2017-05-26 | Personal area network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462005504P | 2014-05-30 | 2014-05-30 | |
PCT/US2015/033214 WO2015184278A1 (en) | 2014-05-30 | 2015-05-29 | Personal area network |
US14/737,267 US9699162B2 (en) | 2014-05-30 | 2015-06-11 | Personal area network |
US15/606,516 US20170264603A1 (en) | 2014-05-30 | 2017-05-26 | Personal area network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/737,267 Continuation US9699162B2 (en) | 2014-05-30 | 2015-06-11 | Personal area network |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170264603A1 true US20170264603A1 (en) | 2017-09-14 |
Family
ID=54699870
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/737,267 Active US9699162B2 (en) | 2014-05-30 | 2015-06-11 | Personal area network |
US15/606,516 Abandoned US20170264603A1 (en) | 2014-05-30 | 2017-05-26 | Personal area network |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/737,267 Active US9699162B2 (en) | 2014-05-30 | 2015-06-11 | Personal area network |
Country Status (11)
Country | Link |
---|---|
US (2) | US9699162B2 (en) |
EP (1) | EP3149626B1 (en) |
JP (1) | JP2017520039A (en) |
KR (1) | KR102444901B1 (en) |
CN (1) | CN106687948B (en) |
AU (1) | AU2015266786A1 (en) |
BR (1) | BR112016024386A2 (en) |
CA (1) | CA2946243A1 (en) |
ES (1) | ES2737273T3 (en) |
RU (1) | RU2691601C2 (en) |
WO (1) | WO2015184278A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10708054B2 (en) | 2017-10-12 | 2020-07-07 | Visa International Service Association | Secure microform |
BE1026938B1 (en) * | 2018-12-31 | 2020-07-28 | Bart Lieben Bvba | ADVANCED CONDITIONAL ACCESS SYSTEM FOR DATA AND DATA PROCESSING |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10380486B2 (en) * | 2015-01-20 | 2019-08-13 | International Business Machines Corporation | Classifying entities by behavior |
CN110581771B (en) * | 2018-06-07 | 2022-02-25 | 连株式会社 | Method for processing cost split by using network message service, computer device readable storage medium and computer device |
CN111385279A (en) * | 2018-12-28 | 2020-07-07 | 深圳市优必选科技有限公司 | Service access authority system and method |
JP2020190797A (en) * | 2019-05-20 | 2020-11-26 | ソニー株式会社 | Data processing device, data processing method, data processing program, control program, and terminal device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130268766A1 (en) * | 2012-04-09 | 2013-10-10 | Mcafee, Inc. | Wireless token device |
US20140143145A1 (en) * | 2012-11-20 | 2014-05-22 | Braintree Payment Solutions, Llc | Environment and methods for enabling electronic transactions |
US9064394B1 (en) * | 2011-06-22 | 2015-06-23 | Alarm.Com Incorporated | Virtual sensors |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2002249900A1 (en) * | 2002-01-03 | 2003-07-30 | Technoskin, Llc | An signal-emitting fabric strain gauge device |
US7249182B1 (en) * | 2002-02-27 | 2007-07-24 | Nokia Corporation | Personal profile sharing and management for short-range wireless terminals |
EP1535217A4 (en) * | 2002-06-11 | 2006-06-21 | First Data Corp | Value processing network and methods |
JP2004259117A (en) * | 2003-02-27 | 2004-09-16 | Nippon Telegr & Teleph Corp <Ntt> | Environment providing method |
US7478090B2 (en) * | 2005-01-14 | 2009-01-13 | Saffron Technology, Inc. | Methods, systems and computer program products for analogy detection among entities using reciprocal similarity measures |
US8639629B1 (en) * | 2005-02-02 | 2014-01-28 | Nexus Payments, LLC | System and method for accessing an online user account registry via a thin-client unique user code |
US7739099B2 (en) * | 2005-12-22 | 2010-06-15 | International Business Machines Corporation | Method and system for on-line performance modeling using inference for real production IT systems |
US7925023B2 (en) * | 2006-03-03 | 2011-04-12 | Oracle International Corporation | Method and apparatus for managing cryptographic keys |
US9318108B2 (en) * | 2010-01-18 | 2016-04-19 | Apple Inc. | Intelligent automated assistant |
US20080183714A1 (en) * | 2007-01-30 | 2008-07-31 | Motorola, Inc. | Location-based brokerage service for heterogeneous access roaming |
CN104200145B (en) * | 2007-09-24 | 2020-10-27 | 苹果公司 | Embedded verification system in electronic device |
US20090164275A1 (en) * | 2007-12-21 | 2009-06-25 | Yiling Chen | Revenue-sharing to incentivize users to reveal online purchasing interests |
US8990911B2 (en) * | 2008-03-30 | 2015-03-24 | Emc Corporation | System and method for single sign-on to resources across a network |
US20100010317A1 (en) * | 2008-07-09 | 2010-01-14 | De Lemos Jakob | Self-contained data collection system for emotional response testing |
US20100185871A1 (en) * | 2009-01-15 | 2010-07-22 | Authentiverse, Inc. | System and method to provide secure access to personal information |
WO2012048347A1 (en) * | 2010-10-08 | 2012-04-12 | Brian Lee Moffat | Private data sharing system |
JP6162681B2 (en) * | 2011-03-31 | 2017-07-12 | エーティーエス オートメーション ツーリング システムズ インコーポレイテッドAts Automation Tooling Systems Inc. | Three-dimensional light detection through optical media |
EP2575084A1 (en) * | 2011-09-30 | 2013-04-03 | Nxp B.V. | Security token and authentication system |
US9060273B2 (en) * | 2012-03-22 | 2015-06-16 | Blackberry Limited | Authentication server and methods for granting tokens comprising location data |
EP2842295A1 (en) * | 2012-04-24 | 2015-03-04 | Qualcomm Incorporated | System for delivering relevant user information based on proximity and privacy controls |
US20130282438A1 (en) * | 2012-04-24 | 2013-10-24 | Qualcomm Incorporated | System for delivering relevant user information based on proximity and privacy controls |
CN103778532A (en) * | 2014-02-21 | 2014-05-07 | 北京购阿购技术服务有限公司 | All-dimensional safety positioning trade information integration system |
-
2015
- 2015-05-29 CA CA2946243A patent/CA2946243A1/en not_active Abandoned
- 2015-05-29 CN CN201580028431.1A patent/CN106687948B/en active Active
- 2015-05-29 WO PCT/US2015/033214 patent/WO2015184278A1/en active Application Filing
- 2015-05-29 JP JP2016563065A patent/JP2017520039A/en active Pending
- 2015-05-29 AU AU2015266786A patent/AU2015266786A1/en not_active Abandoned
- 2015-05-29 ES ES15799795T patent/ES2737273T3/en active Active
- 2015-05-29 EP EP15799795.8A patent/EP3149626B1/en active Active
- 2015-05-29 KR KR1020167029180A patent/KR102444901B1/en active IP Right Grant
- 2015-05-29 RU RU2016140875A patent/RU2691601C2/en active
- 2015-05-29 BR BR112016024386A patent/BR112016024386A2/en not_active Application Discontinuation
- 2015-06-11 US US14/737,267 patent/US9699162B2/en active Active
-
2017
- 2017-05-26 US US15/606,516 patent/US20170264603A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9064394B1 (en) * | 2011-06-22 | 2015-06-23 | Alarm.Com Incorporated | Virtual sensors |
US20130268766A1 (en) * | 2012-04-09 | 2013-10-10 | Mcafee, Inc. | Wireless token device |
US20140143145A1 (en) * | 2012-11-20 | 2014-05-22 | Braintree Payment Solutions, Llc | Environment and methods for enabling electronic transactions |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10708054B2 (en) | 2017-10-12 | 2020-07-07 | Visa International Service Association | Secure microform |
BE1026938B1 (en) * | 2018-12-31 | 2020-07-28 | Bart Lieben Bvba | ADVANCED CONDITIONAL ACCESS SYSTEM FOR DATA AND DATA PROCESSING |
Also Published As
Publication number | Publication date |
---|---|
EP3149626A4 (en) | 2018-01-10 |
CN106687948A (en) | 2017-05-17 |
ES2737273T3 (en) | 2020-01-10 |
WO2015184278A1 (en) | 2015-12-03 |
US20150350180A1 (en) | 2015-12-03 |
BR112016024386A2 (en) | 2017-08-15 |
US9699162B2 (en) | 2017-07-04 |
CA2946243A1 (en) | 2015-12-03 |
RU2016140875A3 (en) | 2018-10-04 |
KR20170013209A (en) | 2017-02-06 |
CN106687948B (en) | 2021-06-25 |
RU2691601C2 (en) | 2019-06-14 |
JP2017520039A (en) | 2017-07-20 |
EP3149626B1 (en) | 2019-07-03 |
KR102444901B1 (en) | 2022-09-16 |
EP3149626A1 (en) | 2017-04-05 |
RU2016140875A (en) | 2018-04-18 |
AU2015266786A1 (en) | 2016-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3093054C (en) | Blockchain-based commercial inventory systems and methods | |
US11689539B2 (en) | Blockchain-based commercial inventory systems and methods | |
US20170264603A1 (en) | Personal area network | |
US9723131B1 (en) | Mobile device security | |
Kugler | From identification to identity theft: Public perceptions of biometric privacy harms | |
CN105229596A (en) | High level of authentication technology and application | |
US20120060214A1 (en) | Behavioral Stochastic Authentication (BSA) | |
JP2014170579A (en) | User profile and geolocation for efficient transaction | |
US11449948B2 (en) | Method for subscribing insurance policies from geolocated mobile devices with contracting on a distributed database | |
US20160232533A1 (en) | Automation of Personal Finance, Credit Offerings and Credit Risk Data Reporting | |
TW202207061A (en) | Terminal device, information processing system, and program | |
Frieden | An introduction to data property ownership rights and data protection responsibilities | |
Chua et al. | State of the Art in Data Tracking Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VISA INTERNATIONAL SERVICE ASSOCIATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAITH, PATRICK;HARRIS, THEODORE;SIGNING DATES FROM 20140619 TO 20140623;REEL/FRAME:042546/0286 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |