WO2018142272A9 - A method of controlling personal information and allowing interaction with authenticated users - Google Patents

A method of controlling personal information and allowing interaction with authenticated users Download PDF

Info

Publication number
WO2018142272A9
WO2018142272A9 PCT/IB2018/050546 IB2018050546W WO2018142272A9 WO 2018142272 A9 WO2018142272 A9 WO 2018142272A9 IB 2018050546 W IB2018050546 W IB 2018050546W WO 2018142272 A9 WO2018142272 A9 WO 2018142272A9
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
anyone
alternatively
profile
Prior art date
Application number
PCT/IB2018/050546
Other languages
French (fr)
Other versions
WO2018142272A1 (en
Inventor
Mark Smith
Original Assignee
Cognitions Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cognitions Holdings Ltd filed Critical Cognitions Holdings Ltd
Priority to EP18748544.6A priority Critical patent/EP3577592A4/en
Publication of WO2018142272A1 publication Critical patent/WO2018142272A1/en
Publication of WO2018142272A9 publication Critical patent/WO2018142272A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to a method of controlling personal information and allowing interaction with authenticated users.
  • Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
  • the challenge of data privacy is to utilize data while simultaneously protecting individual's privacy preferences and their personally identifiable information.
  • Company balance sheets currently reflect intangible assets such as personal data, as a growing trend in contrast to tangible assets which depreciate over a defined period of time.
  • Personal data unlike tangible assets such as plant and machinery, increases in value over time particularly if the data is connected and analytics are applied to the data to provide empirical outputs.
  • the objects and advantages of the invention is to provide a method for the control of persona! information and the interaction of an authenticated user.
  • the invention provides for a method of the control of personal information and the interaction thereof with an authenticated user, which method includes the steps of: allowing a user to create a user profile:
  • the user may create an active user profile, alternatively may create an interactive user profile.
  • the information controlled and updated by the user within the user's profile may relate to a user's demographic, psychographic and ethnographic information.
  • the invention may yet further include the step of allowing a user to aggregate information and communicate the aggregated information in real time to the authenticated end-user.
  • the invention further includes the step of communicating the aggregated information in real time to the authenticated end-user by means of any suitable communication means, which communication means may be a short service message (SMS), email, facsimile, online shared folder applications, such as Dropbox or any combination of the aforementioned, it will be appreciated by those skilled in the art that any suitable communication means may be utilized to facilitate communication between the user and the authenticated end-user and the current invention should accordingly not be interpreted to be limited in any such means.
  • SMS short service message
  • email facsimile
  • online shared folder applications such as Dropbox or any combination of the aforementioned
  • any suitable communication means may be utilized to facilitate communication between the user and the authenticated end-user and the current invention should accordingly not be interpreted to be limited in any such means.
  • the information controlied and updated by the user on the user profiie may include personal Information such as, addresses, banking details, education, assets, employment history or any combination of the aforementioned.
  • the invention further provides for the user to control and update the user profile by uploading documents to the user profile, which documents may be aggregated and communicated, alternatively shared with the authenticated end-user.
  • the said documents may include qualification documents such as university degrees, diplomas, metrics certificates, tertiary education certificates or any combination of the aforementioned.
  • the said documents may yet further include warranties, identification documents, proof of residence, drivers licenses, insurance policies, vehicle licenses, alternatively any other document which may be required on a regular basis.
  • the method includes the steps of allowing a user to control and share any document with the authenticated end user by selecting the particular document of relevance, and sharing the relevant document by selecting a suitable means of communication as hereinbefore described.
  • the information may yet further include any information of a medical nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned.
  • the method may yet further include the steps of allowing the user to create a password vault, securing personal Information such as passwords, password keys, encrypted or otherwise, within the vault, which information may be shared with the authenticated end user as hereinbefore described.
  • the method may yet further include the step of allowing a user to create an extended profile.
  • the extended profile creates a basis for an exchange of personal information, as hereinbefore categorized, between the user and the authenticated end-users.
  • the extended profile may include the following categories: aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fashion, fast food and restaurants, finance, fluid and drinks/eating/habits/nutrition, gaming, geographic, health and beauty, health (medical), hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and life values, media and advertising, methods of communication, mobile, personal habits, physical characteristics, political outlook, shopping behavior, sport and recreation, technology, transportation and travel, or any combination of the aforementioned.
  • the hereinbefore categories may comprise multi metadata profiles which are self-curated (completed by the user).
  • the method may yet further include a step in which the user may be able to select and authenticate a particular end user from a list of predetermined authenticated end-users.
  • participating end-users may include retailers, wholesalers, suppliers, financial institutions, banks, brokers, or alternatively any other business desirous of collecting and using personal information.
  • the method may yet further include the steps of allowing the user to select the specific terms upon which the information stored on the user profile may be shared and communicated with the selected end-user.
  • the said specific terms may include the period of sharing, the categories of personal information hereinbefore described, the method of communication and the value associated with the sharing, !n a preferred embodiment of the invention the period may include 3, 6, 9 alternatively 12 months. The value may be measured in any currency.
  • the method may yet further include the step of allowing a user to set a particular reminder, for example date and time, to perform a particular task in the future.
  • a reminder notification which reminder notification may include a sms, email or any combination of the aforementioned.
  • the reminder notification may be linked to any existing calendar applications such as Outlook.
  • the method may further include the step of creating a loyalty card category, and enabling a user to upload and store loyalty cards within the user profile, thereby enabling such user to dispense with the need for carrying plastic cards in their wallets.
  • the method may yet further include a step in which the user may be awarded loyalty rewards.
  • the loyalty reward may be associated with any partner (open loyalty partner), alternatively may be associated with a particular partner (closed loyalty partner).
  • Rewards deposited in an open loyalty partner wallet can be spent with any participating and authenticated partner.
  • Rewards deposited in a closed loyalty partner wallet can only be spent with that particular authenticated partner.
  • the method may further include the steps of allowing a user to effect payment to any loyalty partner, and to view a summary of all funds which have been aggregated into a user profile and may include cash, airtime and vouchers.
  • the method may further include the step of allowing a user to select, organise and participate in a particular interested community for the purpose of participating in surveys or panels. It will be appreciated by those skilled in the art that the user may subscribe, "opt in”, alternatively unsubscribe, “opt out", of these communities. Typical communities may include technology, automotive, sports fan, shopping, healthcare, financial, parental, entertainment, travel, youth and pets. A user may typically be rewarded for participating in such panel or survey. [0042] The method may further include the step of allowing a user to conduct a credit check via a recognised credit bureau in terms of applicable legislation, and communicate said credit check to a preselected end-user as hereinbefore described.
  • the method may yet further include the step of recording and storing an activity log, i.e. a Block-chain encryption methodology, which provides an irreversible and full forensic audit trial.
  • the block-chain is a private ledge system which record every transaction made by the user.
  • the method as hereinbefore described furthermore includes the step of allowing a user to perform all the hereinbefore described steps from the convenience of a hand-held mobile device, such as a PDA, web based application, alternatively a cellular telephone. Consequently the hereinbefore described method may be contained and operated as a mobile application.
  • a user may control the entire user profile and in particular may request a suitable authentication means, alternatively procedure, before the user profile may be accessed.
  • a suitable authentication means for example, it may be required that a personal identification number (PIN) must be supplied, alternatively a biometric scanning authentication, such as a fingerprint, QR code, or voice recognition must be supplied before the user profile may be accessed (unlocked).
  • PIN personal identification number
  • biometric scanning authentication such as a fingerprint, QR code, or voice recognition
  • the method may further provide for an application notification as a means of communication which may be communicated to the user by means of push strategy.
  • the application notification may be communicate on behalf of the authenticated end user and may include any suitable information such as rewards, discount voucher, time of notification, date etc.
  • the method may yet further create a clearinghouse for the exchange of personal data, alternatively personally identifiable information (PI I) between a buyer (business) and a seller (consumer) using a private ledger block chain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information (PI I).
  • PI I alternatively personally identifiable information
  • Fig 8 illustrates a flow diagram of the user's access and identification between an encrypted database and a pseudonymous / de-identified database according to the invention.
  • the hereinbefore described patent particularly relates to the generating of a user profile by collecting data.
  • the current invention allows a user to self curate and aggregate his profile and fully control the sharing of the relevant information with a particular end user.
  • Consumers are pushing back against the concept that personal information has been classified as a tradable asset and in particular is greatly concerned with their privacy. Consumers want to be in control and are looking for mechanisms or platforms to enable them to manage and share the data on terms and conditions acceptable to them.
  • the current invention provides for a system to create a "clearinghouse” for personal data, which system is supported by a trust framework as more clearly illustrated in Figure 1.
  • Figure 1 illustrates an exchange 10 created between a buyer 12 and seller 14, which exchange 10 is supported by the principles referred to as transparency 16, trust 18, control 20 and value 22.
  • the invention provides for a method of the control of personal information and the interaction thereof with an authenticated user, which method includes the steps of: allowing a user 30 to create a user profile; the user 30 updating the user profile with information: and the user 30 granting access to the information to an authenticated end-user.
  • the user 30 typically creates an active user profile, alternatively may create an interactive user profile by self- curating and aggregating his or her profile information by completing various categories 32.
  • the information controlled and updated by the user 30 within the user's profile relate to a user's demographic, psychographic and ethnographic information.
  • the invention therefore effectively allows a user 30 to self-curate and aggregate information and communicate the aggregated information in real time to the authenticated end-user, as more fully described hereinafter.
  • the user may be prompted to complete a user profile containing 32 categories of demographic, psychographic and personal information, also referred to as an extended profile.
  • the user 30 will complete the requisite information by means of an application provided and operated on a cellular telephone 34 and/or a mirrored website.
  • the user may elect to share the aggregated information in real time with the authenticated end-user by means of any suitable communication means, which communication means may be a short service message (SMS), email, facsimile, online shared folder applications, such as Dropbox or any combination of the aforementioned.
  • SMS short service message
  • email email
  • facsimile online shared folder applications
  • Dropbox any combination of the aforementioned.
  • the authenticated end user may request a means of communication which the user may then agree to or not.
  • a user may utilize his cellular telephone 34 mirrored website and select a particular category of information, alternatively specific information within a category, to be shared with a particular end user.
  • FIG. 4 more clearly illustrates a typical example of the various categories with which a user 30 may interact.
  • a user 30 may interact with anyone of the following categories and/or modules: mirewards 36, documents 38, medical 40, extended profiles 42, credit report 44, payment gateways 46, loyalty cards 48, surveys 50, shopping basket 52, intent casting 54, commodities and currencies 58, profiled to share 58, reminders 60, and passwords 62.
  • the information controlled and updated by the user on the user profile includes personal information such as, addresses, banking details, education, assets, employment history or any combination of the aforementioned.
  • the invention further provides for the user 30 to control and update the user profile by uploading documents to the user profile and more particularly into the documents category 38.
  • the documents may be aggregated and communicated, alternatively shared with the authenticated end-users by any suitable means.
  • the documents may include qualification documents such as university degrees, diplomas, matric certificates, college education certificates or any combination of the aforementioned.
  • the said documents may yet further include warranties, identification documents, proof of residence, driver's licenses, insurance policies, vehicle licenses, alternatively any other document which may be required on a regular basis.
  • the user 30 can control and share any document with the authenticated end user by selecting the particular document of relevance, and sharing the relevant document by selecting a suitable means of communication such as email alternatively sms.
  • the user 30 may even select the format in which the particular document of relevance may be communicated to the end user and may protect same by means of a password which may be communicated to the end user by any suitable means.
  • a financial institution may that a user to provide it with relevant proof of address and identification document.
  • the user 30 can now conveniently share and communicate the relevant documents to the financial institution, once it has been uploaded and stored under the documents module in the user's 30 profile. [0081] !t will be appreciated by those skilled in the art that depending on the particular category of information, the user 30 may, in a similar manner, share, for example, medical information etc. with a particular end user.
  • Typical information controlled by the user 30 can include information of a medical nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned. This type of information may conveniently be communicated to for example a doctor, alternatively medical team of concern.
  • a user may similarly participate in surveys, make payments and shop online.
  • Typical information controlled by the user can include information of a medicai nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned. This type of information may conveniently be communicated to for example a doctor, alternatively medical team of concern.
  • the user is furthermore allowed to create a password vault, securing personal information such as passwords, password keys, encrypted or otherwise, within the vault, which information may be shared with the authenticated end user as hereinbefore described.
  • the user may create an extended profile, in a preferred embodiment of the invention the extended profile creates a basis for an exchange of personal information, as hereinbefore categorized, between the user 30 and the authenticated end-users.
  • the extended profile typically include the following categories: aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fashion, fast food and restaurants, finance, fluid and drinks/eating/habits/nutrition, gaming, geographic, health and beauty, health (medical), hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and life values, media and advertising, methods of communication, mobile, personal habits, physical characteristics, political outlook, shopping behavior, sport and recreation, technology, transportation and travel, or any combination of the aforementioned.
  • the hereinbefore categories comprise multi metadata profiles which are se!f-curated (completed by the user), it will be appreciated by those skilled in art that this is an extremely important aspect of the current invention.
  • the user may be able to select and authenticate a particular authenticated end user from a predetermined end-user list.
  • participating end-users may include retailers, wholesalers, suppliers, financial institutions, banks, brokers, or alternatively any other business desirous of collecting and using personal information.
  • the user 30 is allowed to select the specific terms upon which the information stored on the user profile are shared and communicated with the selected end-user. It will be appreciated by those skilled in the art that this allows a user 30 to have full control over the personal information to be shared.
  • the specific terms may vary and may include the period of sharing, the categories, the method of communication and the value associated with the sharing, in a preferred embodiment of the invention the period may include 3, 6, alternatively 12 months. The value may be measured in any currency.
  • the user 30 may yet further be allowed to set a particular reminder, for example date and time, to perform a particular task in the future. In a preferred embodiment of the invention the user may select a reminder notification, which reminder notification may include a sms, email or any combination of the aforementioned.
  • the reminder notification can be linked to any existing calendar applications such as Outlook.
  • a mi-reward category may also be provided for interaction between the user 30 and the authenticated end user.
  • Figure 5 more clearly illustrates a typical example in which a user is allowed to interact with a predetermined end-user, alternatively and authenticated end-user with regards to the various sharing modules of the invention and receive an exchange of value on the form of currency, airtime, vouchers or similar value.
  • a user 30 may interact with communities 64, suppliers 66, loyalty partners 68 and vendors 70.
  • an e-Wallet 72 may be utilised. It will be appreciated by those skilled in the art that the e-wallet 72 principle is well known in the art and will operate in a similar manner.
  • the user 30 may be awarded loyalty rewards.
  • the loyalty rewards are associated with any partner, also referred to as an open loyalty partner, alternatively are associated with a particular partner, also referred to as a closed loyalty partner.
  • Rewards deposited in an open loyalty partner wallet can be spent with any participating and authenticated partner, whilst rewards deposited in a closed loyalty partner wallet, can only be spent with that particular authenticated partner.
  • the method may further include the steps of allowing a user to effect payment to any loyalty partner, and to view a summary of all funds which have been aggregated into a user profile and may include cash, airtime and vouchers or similar. It is of vital importance to understand that during any interaction between a user and an authenticated end-user, the block chain encryption provides for a reputable audit trial.
  • the user 30 may furthermore select, organise and participate in a particular interested community for the purpose of participating in surveys or panels. It will be appreciated by those skilled in the art that the user may subscribe, "opt in”, alternatively unsubscribe, “opt out”, of these communities. Typical communities may include technology, automotive, sports fan, shopping, healthcare, financial, parental, entertainment, travel, youth and pets. A user may typically be rewarded for participating in such panel or survey.
  • FIG. 6 typically illustrates a sample screen layout on a cellular telephone which allows a user 30 to navigate between various categories such as the user's profile 80, documents 82, medical records 84, password vault 86, extended profile 88 and reminder us 90. It will be appreciated by those skilled in the art that the particular layout and the categories displayed to the user 30 may vary and may even include subcategories which may be displayed on alternative pages, or alternative screen layouts.
  • the current invention aims to rectify the common problems in which data is not accurate and to address the concerns of a user 30 with regards to the privacy of his information.
  • the invention typically consists of a variety of modules which may include profiles, documents, medical, passwords, and extended profile, shared profile, reminders, loyalty cards, miPay, MiWallet, MiCommunities, suppliers, credit records, identity theft insurance, financial indicators, activities, notifications or any combination of the aforementioned.
  • the profile module enables a subscriber/user 30 to complete and store personal data. What is of vital importance is that this particular module is completed by the user personally and is therefore self-curated. The user can therefore coherently aggregate the relevant data, not only for themselves but to enable them to share the data through the invention with authenticated end- users of choice.
  • a typical example would be where the user may be requested to provide educational and/or banking information. The user can easily and conveniently log into the mobile application, aggregate the relevant information and simply communicate same to the end user by means of an email.
  • the user can upload and store a variety of documents and medical history within the module. Once again the user may communicate and share the relevant information with any authenticated end-user.
  • the password module in turn allows a user to store and encrypt various passwords such as login details for financial institutions.
  • various passwords such as login details for financial institutions.
  • the particular password vault may be protected by means of suitable identification such as fingerprint scanning, alternatively any other suitable biometric scanning authentication system which is currently available on cellular telephones, alternatively computers.
  • the extended profile is of critical importance. This self-curated profile allows a user to upload a variety of information, which information may be exchanged within the current invention for rewards.
  • the extended profile comprise approximately 300 metadata files which are self-curated (completed by the subscriber) resulting in a high degree of accuracy.
  • the extended profile typically contains categories such as aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fast food and restaurants, finance, food and drink/eating habits/nutrition, gaming, due graphics, health and beauty, medical, hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and lay values, media and advertising, methods of communication, mobile, personal habits, bets, physical characteristics, political outlook, shopping behaviour, sports and recreation, technology, transport and travel.
  • the user 30 is allowed to dictate and control the mannered and the period for which particular information of relevance may be shared, alternatively communicated to a particular end-user.
  • the user may select an authenticated end user from a predetermined list, alternatively may request that a user be authenticated and loaded/subscribed to the subscriber end-user list.
  • the period of sharing may vary depending on the particular need and in general may be shared for 3, 6, 9 or 12 months. Similarly the category of sharing may also differ and may the user dictate the period for which such category may be shared.
  • the communication channel is critical as it is required to comply with various data privacy regulations and legislation globally.
  • the loyalty card module enables a user to digitally store loyalty cards.
  • the user can digitally store cards, including the bar code, front and back image of the loyalty card effectively dispensing with the need to carry any plastic cards around.
  • the MiRewards module is a rewards program which is capable of being deployed at any retail or wholesale business.
  • the rewards program has a backend engine where a loyalty partner is signed up, adding defined rate of exchange. For example the loyalty partner would agree to provide a "cashback" based on purchases. The loyalty partner may agree to pay 2% in "cashback" on purchases made by the user.
  • This particular module operates using a QR code and geo-location tagging which enables the user to either select the participating partner by brand, alternatively to scan the QR code at a point of sales.
  • the user typically utilises the camera feature on an existing mobile device to scan the QR code as well as the till slip.
  • the captured image proceeds through a moderation portal where after values are linked to an agreed “cashback" reward from the particular loyalty partner after which the funds are allocated into the user's e-wallet.
  • the MiPay module enables the user to make payment to either an open, alternatively close loyalty partner, by once again either selecting the geo-tag of the brand in question, alternatively scanning a QR code, generating the amount they wish to pay and submitting same for processing.
  • the MiWallet module contains a summary of all funds which have been aggregated into a subscriber/user's e-wallet and includes: cash, airtime and vouchers. A full ledger is displayed allowing a user to perform an audit trial of the transactions.
  • the identity theft insurance module enables the user to subscribe for insurance and protection against identity theft.
  • the financial indicators module allows a user to conveniently obtain relevant information such as exchange rates, forex and commodities.
  • the activity module deploys a block chain encryption methodology. In this module a private ledger block chain is created which effectively means that every aspect or transaction between a user and an end user alternatively and authenticated end-user is logged in the block chain ensuring that information is transferred correctly between the relevant parties, effectively creating an irreversible and full forensic auditable trail.
  • the master database incorporates information relating to demographic such as identity numbers, social security numbers, telephone numbers, mobile numbers and email addresses. Furthermore, all the extended profile data is maintained and stored in the master database. However it is important to note that this information is separated and encrypted from identifiers.
  • the vendor receives a link to the vendor database. Once the user shares his data, based on the standard profile and sharing module, the information, excluding the identifiers, is transferred from the master database to the vendor database. The vendor/end-user may now conveniently view all the data, without identifying the particular user.
  • the interaction between the user, the end-user, the master database and the vendor database is controlled via the Knowledge dashboard built with MicroStrategy.
  • a vendor in question for example a retailer, wish to further interrogate the vendor database, they could look for a particular subscriber who participates in a particular type of sport (e.g running).
  • the Knowledge dashboard would select all the road runners based on the extended profile completed and communicate same to the end-user.
  • the vendor/end user may then select the channel for which the user has elected to be communicated with, such as email, sms, call centre alternatively app push, thereby ensuring that any communication complies with any privacy regulations and is in the full control of the user.
  • the processed information will be communicated to the master database to be presented to a marketing dashboard.
  • the marketing dashboard associates the brand of vendor in question and populate the necessary channel of communication.
  • Information may now be sent to the user/subscriber on a personalised basis.
  • FIG. 7 and 8 more clearly illustrate the interaction between the master database 100 and vendor database 102.
  • the master database 100 is furthermore in communication with an encrypted identifying information database 104.
  • the encrypted identifying information database 104 includes a variety of identity keys.
  • the vendor database communicates 102 with the master database 100.
  • the information returned are psychographic, demographic, and ethnographic of nature.
  • the encrypted identifying information database 104 would typically include an identity key and the master database 100 an obfuscated identity key.
  • the invention creates a clearinghouse for the exchange of personal data, alternatively personally identifiable information (PI I) between a buyer (business) and a seller (consumer) using a private ledger block chain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information (PI I).
  • PI I alternatively personally identifiable information
  • the user is able to perform all the hereinbefore described steps from the convenience of a hand-held mobile device, such as a PDA, web based application, alternatively a cellular telephone. Consequently the hereinbefore described method may be contained and operated as a mobile application.
  • a hand-held mobile device such as a PDA, web based application, alternatively a cellular telephone. Consequently the hereinbefore described method may be contained and operated as a mobile application.
  • a user may control the entire user profile and in particular may request a suitable authentication means, alternatively procedure, before the user profile may be accessed.
  • a suitable authentication means for example, it may be required that a personal identification number (PIN) must be supplied, alternatively a biometric scanning authentication, such as a fingerprint, QR code, or voice recognition must be supplied before the user profile may be accessed (unlocked).
  • PIN personal identification number
  • biometric scanning authentication such as a fingerprint, QR code, or voice recognition
  • An application notification as a means of communication which communicated to the user by means of push strategy is also provided.
  • the application notification may be communicate on behalf of the authenticated end user and may include any suitable information such as rewards, discount voucher, time of notification, date etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Medical Informatics (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Method of controlling personal information and allowing interaction with authenticated users wherein a clearinghouse (10) is created for the exchange of personal data, alternatively personally identifiable information between a buyer / business (12) and a seller / consumer (14) using a private ledger blockchain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information.

Description

A METHOD OF CONTROLLING PERSONAL INFORMATION AND
ALLOWING INTERACTION WITH AUTHENTICATED USERS
BACKGROUND TO THE INVENTION
[001] The present invention relates to a method of controlling personal information and allowing interaction with authenticated users.
[002] Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
[003] Privacy concerns exist whenever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted - in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for issues relating to the breach of privacy. Data privacy issues can arise in response to information from a wide range of sources, such as:
• Healthcare records
• Criminal justice investigations and proceedings
· Financial institutions and transactions
• Biological traits, such as genetic material • Residence and geographic records
• Privacy breach
Location-based service and geolocation
• Web surfing behavior or user preferences using persistent cookies
[004] The challenge of data privacy is to utilize data while simultaneously protecting individual's privacy preferences and their personally identifiable information.
[005] The fields of computer security, data security and information security design, utilize software, hardware and human resources to address this issue.
[006] As the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and continually reassess compliance with data privacy and security regulations.
[007] In general the industry has a seller of and a buyer of personal information. On the one hand, one has a seller who generally wishes only certain information to be made available (almost always at a premium), and on the other hand a buyer who wishes to obtain the information and use same for either its own benefit, or that of a third party.
[008] A major problem with allowing, alternatively making, personal information available, pivots around four important elements, namely Transparency, Trust, Control and Value. [009] It is common cause that many social media sites, such as Facebook, Google and Instagram together with various tracking devices or cookies on websites, collect personal data from consumers without their knowledge or consent and sell this data to the business sector for large profits. This is done without the knowledge or express consent of the person whose data is sold.
[0010] A number of studies have been conducted around the world which suggest that consumers are willing to share data, such as personal information, provided they do so on terms and conditions more favourable to themselves. To achieve this a proper platform to manage this process is of vital importance.
[0011] Recently the World Economic Forum has indicated that personal data must be considered as a new asset class and as such will become more valuable in future.
[0012] Company balance sheets currently reflect intangible assets such as personal data, as a growing trend in contrast to tangible assets which depreciate over a defined period of time. [0013] Personal data, unlike tangible assets such as plant and machinery, increases in value over time particularly if the data is connected and analytics are applied to the data to provide empirical outputs.
[0014] It is common cause that many buyers of data (businesses) use a variety of methods such as loyalty programs, surveys, panels, competitions, promotions, engagements and interactions to try and collect data. The majority of the use methodologies are referred to as "pull" processes/strategies whereby piecemeal data is collected over an extended period of time with the risk that the data is never aggregated or substantive and that the data can age very quickly, i.e. is not accurate. This is an inherited problem in the historical manner of collecting data. [0015] It is an object of the current invention to at least alleviate some of the aforementioned problems by enabling a subscriber to self-curate all their demographic, psychographic and ethnographic profiles and to share this with potential authenticated users. [0016] It will be appreciated that this will enable buyers (businesses) to obtain heritage, clean, accurate and broad data on a rapid basis on the principle that it is updated constantly giving the buyer value for money and a granular view of the seller ( customer), with the express consent of the seller (customer). [0017] It is common cause that the customers require more control over their personal information and require more relevant, meaningful and anticipated communication in a manner that respect the customer privacy.
SUMMARY OF THE INVENTION
[0018] The objects and advantages of the invention is to provide a method for the control of persona! information and the interaction of an authenticated user. [0019] The invention provides for a method of the control of personal information and the interaction thereof with an authenticated user, which method includes the steps of: allowing a user to create a user profile:
the user updating the user profile with information; and
the user granting access to the information to an authenticated end-user. [0020] in a preferred embodiment of the invention the user may create an active user profile, alternatively may create an interactive user profile.
[0021] The information controlled and updated by the user within the user's profile may relate to a user's demographic, psychographic and ethnographic information.
[0022] The invention may yet further include the step of allowing a user to aggregate information and communicate the aggregated information in real time to the authenticated end-user.
[0023] The invention further includes the step of communicating the aggregated information in real time to the authenticated end-user by means of any suitable communication means, which communication means may be a short service message (SMS), email, facsimile, online shared folder applications, such as Dropbox or any combination of the aforementioned, it will be appreciated by those skilled in the art that any suitable communication means may be utilized to facilitate communication between the user and the authenticated end-user and the current invention should accordingly not be interpreted to be limited in any such means. [0024] in general the information controlied and updated by the user on the user profiie may include personal Information such as, addresses, banking details, education, assets, employment history or any combination of the aforementioned.
[0025] The invention further provides for the user to control and update the user profile by uploading documents to the user profile, which documents may be aggregated and communicated, alternatively shared with the authenticated end-user.
[0028] The said documents may include qualification documents such as university degrees, diplomas, metrics certificates, tertiary education certificates or any combination of the aforementioned. [0027] The said documents may yet further include warranties, identification documents, proof of residence, drivers licenses, insurance policies, vehicle licenses, alternatively any other document which may be required on a regular basis. [0028] The method includes the steps of allowing a user to control and share any document with the authenticated end user by selecting the particular document of relevance, and sharing the relevant document by selecting a suitable means of communication as hereinbefore described. [0029] The information may yet further include any information of a medical nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned. [0030] The method may yet further include the steps of allowing the user to create a password vault, securing personal Information such as passwords, password keys, encrypted or otherwise, within the vault, which information may be shared with the authenticated end user as hereinbefore described.
[0031] The method may yet further include the step of allowing a user to create an extended profile. In a preferred embodiment of the invention the extended profile creates a basis for an exchange of personal information, as hereinbefore categorized, between the user and the authenticated end-users. The extended profile may include the following categories: aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fashion, fast food and restaurants, finance, fluid and drinks/eating/habits/nutrition, gaming, geographic, health and beauty, health (medical), hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and life values, media and advertising, methods of communication, mobile, personal habits, physical characteristics, political outlook, shopping behavior, sport and recreation, technology, transportation and travel, or any combination of the aforementioned.
[0032] The hereinbefore categories may comprise multi metadata profiles which are self-curated (completed by the user).
[0Q33] The method may yet further include a step in which the user may be able to select and authenticate a particular end user from a list of predetermined authenticated end-users. In a preferred embodiment of the invention, participating end-users may include retailers, wholesalers, suppliers, financial institutions, banks, brokers, or alternatively any other business desirous of collecting and using personal information.
[0034] The method may yet further include the steps of allowing the user to select the specific terms upon which the information stored on the user profile may be shared and communicated with the selected end-user. [0035] The said specific terms may include the period of sharing, the categories of personal information hereinbefore described, the method of communication and the value associated with the sharing, !n a preferred embodiment of the invention the period may include 3, 6, 9 alternatively 12 months. The value may be measured in any currency.
[0036] The method may yet further include the step of allowing a user to set a particular reminder, for example date and time, to perform a particular task in the future. In a preferred embodiment of the invention the user may select a reminder notification, which reminder notification may include a sms, email or any combination of the aforementioned.
[0037] The reminder notification may be linked to any existing calendar applications such as Outlook.
[0038] The method may further include the step of creating a loyalty card category, and enabling a user to upload and store loyalty cards within the user profile, thereby enabling such user to dispense with the need for carrying plastic cards in their wallets.
[0039] The method may yet further include a step in which the user may be awarded loyalty rewards. It will be appreciated by those skilled in the art that the loyalty reward may be associated with any partner (open loyalty partner), alternatively may be associated with a particular partner (closed loyalty partner). Rewards deposited in an open loyalty partner wallet can be spent with any participating and authenticated partner. Rewards deposited in a closed loyalty partner wallet, can only be spent with that particular authenticated partner.
[0040] The method may further include the steps of allowing a user to effect payment to any loyalty partner, and to view a summary of all funds which have been aggregated into a user profile and may include cash, airtime and vouchers.
[0041] The method may further include the step of allowing a user to select, organise and participate in a particular interested community for the purpose of participating in surveys or panels. It will be appreciated by those skilled in the art that the user may subscribe, "opt in", alternatively unsubscribe, "opt out", of these communities. Typical communities may include technology, automotive, sports fan, shopping, healthcare, financial, parental, entertainment, travel, youth and pets. A user may typically be rewarded for participating in such panel or survey. [0042] The method may further include the step of allowing a user to conduct a credit check via a recognised credit bureau in terms of applicable legislation, and communicate said credit check to a preselected end-user as hereinbefore described. [0043] The method may yet further include the step of recording and storing an activity log, i.e. a Block-chain encryption methodology, which provides an irreversible and full forensic audit trial. The block-chain is a private ledge system which record every transaction made by the user. [0044] The method as hereinbefore described furthermore includes the step of allowing a user to perform all the hereinbefore described steps from the convenience of a hand-held mobile device, such as a PDA, web based application, alternatively a cellular telephone. Consequently the hereinbefore described method may be contained and operated as a mobile application.
[0045] A user may control the entire user profile and in particular may request a suitable authentication means, alternatively procedure, before the user profile may be accessed. For example, it may be required that a personal identification number (PIN) must be supplied, alternatively a biometric scanning authentication, such as a fingerprint, QR code, or voice recognition must be supplied before the user profile may be accessed (unlocked). It will be appreciated by those skilled in the art that it is of vital importance that the user profile is suitably protected as a variety of personal information may be stored within the user profile.
[0046] The method may further provide for an application notification as a means of communication which may be communicated to the user by means of push strategy. The application notification may be communicate on behalf of the authenticated end user and may include any suitable information such as rewards, discount voucher, time of notification, date etc. [0047] The method may yet further create a clearinghouse for the exchange of personal data, alternatively personally identifiable information (PI I) between a buyer (business) and a seller (consumer) using a private ledger block chain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information (PI I).
[0048] It will be appreciated by those skilled in the art that the method as hereinbefore described may be computer aided. [0049] It will yet further be appreciated by those skilled in the art that the hereinbefore described method effectively provides an exchange for personal data via a settlement or clearing bureau.
BRIEF DESCRIPTION OF THE DRAWINGS The invention is now further described by way of example with reference ccompanying drawings wherein: is a general overview of the method creating an exchange of personal information between a user (seller) and an authenticated end user (buyer); illustrates an alternative diagram more clearly reflecting the structural nature of the classification of personal data (PI I) as an asset; illustrates a flow diagram according to the method described in this invention; illustrates the home page of the mobile app showing various profiles updated and self-curated by the user according to the invention;
illustrate a flow diagram of the interaction between the user and the end- user with regards to the reward system according to the invention; illustrates a typical screen layout of the user profile according to the invention; illustrates a flow diagram of the personal data exchange according to the invention; and Fig 8 illustrates a flow diagram of the user's access and identification between an encrypted database and a pseudonymous / de-identified database according to the invention.
DESCRIPTION OF PREFERRED EMBODIMENTS
[0051] In the following embodiments individual characteristics, given in connection with specific embodiments, may actually be interchanged with other different characteristics that exist in other embodiments. [0052] It must further be noted that in terms of the description to follow, the use of the word "mibubble" is a particular reference to a trademark better describing the manner in which the process and method will be implemented.
[0053] Furthermore, the use of the words "buyer" / "seller" / "subscriber" / "consumer" may be used interchangeably and similarly the words "end user" / "buyer" / "partner" may also be used interchangeably in the description to follow.
[0054] The invention hereinafter describe specifically relates to a method to manage and control personal information which allows consumers/users to store and manage their personal data so as to enable them to have effective insight into said information and to exchange the information for awards.
[0055] !t is of vita! importance to note that the any exchange of data as hereinafter described, occurs with the consent of the user/subscriber.
[0056] It is common cause that many social media sites, such as Facebook, Google, Instagram etc, together with the various tracking devices or cookies on websites, collect personal data from a consumer without their knowledge or consent, which data is sold to businesses for a profit. In some instances the collection of the personal data may very well have occurred with the consent of the consumer/user. A typical embodiment of this type of invention is fully described in a recently filed patent under patent number PCT/US2013/052159. [0057] This particular patent relates to a computing system which manages and protects consumer data and increases the accuracy of consumer purchasing alternatives. This is achieved by collecting a plurality of data relating to a user from a plurality of unaffiliated data sources, wherein the data comprises disparate data of varying formats, wherein the said collecting is performed in part under authorization by the user, and wherein at least one data source is unaffiliated with another unaffiliated data source such that data is not otherwise shared between unaffiliated data sources; aggregating the said data collected and normalizing the data in a standardized format and finally generating an aggregated data profile associated with a particular user.
[0058] It will be appreciated by those skilled in the art that the hereinbefore described patent particularly relates to the generating of a user profile by collecting data. In contrast, the current invention allows a user to self curate and aggregate his profile and fully control the sharing of the relevant information with a particular end user. [0059] Consumers are pushing back against the concept that personal information has been classified as a tradable asset and in particular is greatly concerned with their privacy. Consumers want to be in control and are looking for mechanisms or platforms to enable them to manage and share the data on terms and conditions acceptable to them.
[0080] A number of studies conducted worldwide have indicated that consumers are willing to share personal information, however such sharing should occur on the consumer's terms. [0081] It is common cause that personal data, unlike tangible assets, increase in value over time particularly if the data concerned is accurate and analytics are applied to provide empirical outputs.
[0062] The current invention provides for a system to create a "clearinghouse" for personal data, which system is supported by a trust framework as more clearly illustrated in Figure 1.
[0063] Figure 1 illustrates an exchange 10 created between a buyer 12 and seller 14, which exchange 10 is supported by the principles referred to as transparency 16, trust 18, control 20 and value 22.
[0064] Since the world economic forum has classified personal data as a new asset, it has become of vital importance to create an exchange 10 which now allows for the codification of rules, norms, structures and settlement as more clearly illustrated in Figure 2.
[0065] The invention provides for a method of the control of personal information and the interaction thereof with an authenticated user, which method includes the steps of: allowing a user 30 to create a user profile; the user 30 updating the user profile with information: and the user 30 granting access to the information to an authenticated end-user. [0066] In a preferred embodiment of the invention the user 30 typically creates an active user profile, alternatively may create an interactive user profile by self- curating and aggregating his or her profile information by completing various categories 32. [0067] The information controlled and updated by the user 30 within the user's profile relate to a user's demographic, psychographic and ethnographic information.
[0088] The invention therefore effectively allows a user 30 to self-curate and aggregate information and communicate the aggregated information in real time to the authenticated end-user, as more fully described hereinafter.
[0069] in a typical example of the current invention the user may be prompted to complete a user profile containing 32 categories of demographic, psychographic and personal information, also referred to as an extended profile. In general, the user 30 will complete the requisite information by means of an application provided and operated on a cellular telephone 34 and/or a mirrored website.
[Θ07Θ] After completion of the relevant categories the user may elect to share the aggregated information in real time with the authenticated end-user by means of any suitable communication means, which communication means may be a short service message (SMS), email, facsimile, online shared folder applications, such as Dropbox or any combination of the aforementioned. In general the user will control and choose the relevant means of communication. However, it may be that the authenticated end user may request a means of communication which the user may then agree to or not.
[0071] It will be appreciated by those skilled in the art that any suitable communication means may be utilized to facilitate communication between the user and the end-user and should the current invention should accordingly not be interpreted to be limited in any such means.
[0072] In a typical example a user may utilize his cellular telephone 34 mirrored website and select a particular category of information, alternatively specific information within a category, to be shared with a particular end user.
[0073] Normally a predefined list of authenticated end-users will be displayed to the user via the application, allowing the user to merely choose an end user. After selecting the particular end user which the user 30 wish to communicate the selected information with, the user 30 may select the relevant means of communication. [0074] Figure 4 more clearly illustrates a typical example of the various categories with which a user 30 may interact. Typically a user 30 may interact with anyone of the following categories and/or modules: mirewards 36, documents 38, medical 40, extended profiles 42, credit report 44, payment gateways 46, loyalty cards 48, surveys 50, shopping basket 52, intent casting 54, commodities and currencies 58, profiled to share 58, reminders 60, and passwords 62.
[0075] The information controlled and updated by the user on the user profile includes personal information such as, addresses, banking details, education, assets, employment history or any combination of the aforementioned.
[0076] The invention further provides for the user 30 to control and update the user profile by uploading documents to the user profile and more particularly into the documents category 38. The documents may be aggregated and communicated, alternatively shared with the authenticated end-users by any suitable means.
[0077] The documents may include qualification documents such as university degrees, diplomas, matric certificates, college education certificates or any combination of the aforementioned.
[0078] The said documents may yet further include warranties, identification documents, proof of residence, driver's licenses, insurance policies, vehicle licenses, alternatively any other document which may be required on a regular basis. [0079] in a typical example the user 30 can control and share any document with the authenticated end user by selecting the particular document of relevance, and sharing the relevant document by selecting a suitable means of communication such as email alternatively sms. The user 30 may even select the format in which the particular document of relevance may be communicated to the end user and may protect same by means of a password which may be communicated to the end user by any suitable means.
[Θ08Θ] Especially in South Africa where PICA requirements are the norm of the day, a financial institution may that a user to provide it with relevant proof of address and identification document. The user 30 can now conveniently share and communicate the relevant documents to the financial institution, once it has been uploaded and stored under the documents module in the user's 30 profile. [0081] !t will be appreciated by those skilled in the art that depending on the particular category of information, the user 30 may, in a similar manner, share, for example, medical information etc. with a particular end user.
[0082] Typical information controlled by the user 30 can include information of a medical nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned. This type of information may conveniently be communicated to for example a doctor, alternatively medical team of concern. [0083] A user may similarly participate in surveys, make payments and shop online. [0084] Typical information controlled by the user can include information of a medicai nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned. This type of information may conveniently be communicated to for example a doctor, alternatively medical team of concern.
[0085] The user is furthermore allowed to create a password vault, securing personal information such as passwords, password keys, encrypted or otherwise, within the vault, which information may be shared with the authenticated end user as hereinbefore described.
[0086] As mentioned hereinbefore, the user may create an extended profile, in a preferred embodiment of the invention the extended profile creates a basis for an exchange of personal information, as hereinbefore categorized, between the user 30 and the authenticated end-users. The extended profile typically include the following categories: aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fashion, fast food and restaurants, finance, fluid and drinks/eating/habits/nutrition, gaming, geographic, health and beauty, health (medical), hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and life values, media and advertising, methods of communication, mobile, personal habits, physical characteristics, political outlook, shopping behavior, sport and recreation, technology, transportation and travel, or any combination of the aforementioned. [0087] The hereinbefore categories comprise multi metadata profiles which are se!f-curated (completed by the user), it will be appreciated by those skilled in art that this is an extremely important aspect of the current invention. [0088] As already hereinbefore mentioned the user may be able to select and authenticate a particular authenticated end user from a predetermined end-user list. In a preferred embodiment of the invention, participating end-users may include retailers, wholesalers, suppliers, financial institutions, banks, brokers, or alternatively any other business desirous of collecting and using personal information.
[0Q89] !n a typical embodiment of the invention the user 30 is allowed to select the specific terms upon which the information stored on the user profile are shared and communicated with the selected end-user. It will be appreciated by those skilled in the art that this allows a user 30 to have full control over the personal information to be shared.
[0090] The specific terms may vary and may include the period of sharing, the categories, the method of communication and the value associated with the sharing, in a preferred embodiment of the invention the period may include 3, 6, alternatively 12 months. The value may be measured in any currency. [0091] The user 30 may yet further be allowed to set a particular reminder, for example date and time, to perform a particular task in the future. In a preferred embodiment of the invention the user may select a reminder notification, which reminder notification may include a sms, email or any combination of the aforementioned.
[0092] The reminder notification can be linked to any existing calendar applications such as Outlook.
[0093] A mi-reward category may also be provided for interaction between the user 30 and the authenticated end user. [0094] Figure 5 more clearly illustrates a typical example in which a user is allowed to interact with a predetermined end-user, alternatively and authenticated end-user with regards to the various sharing modules of the invention and receive an exchange of value on the form of currency, airtime, vouchers or similar value. Generally a user 30 may interact with communities 64, suppliers 66, loyalty partners 68 and vendors 70.
[0095] During this interaction an e-Wallet 72 may be utilised. It will be appreciated by those skilled in the art that the e-wallet 72 principle is well known in the art and will operate in a similar manner.
[0096] Another important aspect of the current invention is that the user 30 may be awarded loyalty rewards. The loyalty rewards are associated with any partner, also referred to as an open loyalty partner, alternatively are associated with a particular partner, also referred to as a closed loyalty partner. Rewards deposited in an open loyalty partner wallet can be spent with any participating and authenticated partner, whilst rewards deposited in a closed loyalty partner wallet, can only be spent with that particular authenticated partner. [0097] The method may further include the steps of allowing a user to effect payment to any loyalty partner, and to view a summary of all funds which have been aggregated into a user profile and may include cash, airtime and vouchers or similar. It is of vital importance to understand that during any interaction between a user and an authenticated end-user, the block chain encryption provides for a reputable audit trial.
[0098] The manner of interaction between the user 30 and the authenticated end user is more fully described with reference to figure 7 and 8.
[0099] The user 30 may furthermore select, organise and participate in a particular interested community for the purpose of participating in surveys or panels. It will be appreciated by those skilled in the art that the user may subscribe, "opt in", alternatively unsubscribe, "opt out", of these communities. Typical communities may include technology, automotive, sports fan, shopping, healthcare, financial, parental, entertainment, travel, youth and pets. A user may typically be rewarded for participating in such panel or survey.
[00100] Another important feature of the invention allows a user to perform a self-credit check via a recognised credit bureau in terms of applicable legislation, and communicate said credit check to a preselected end-user as hereinbefore described. This provides the user 30 with an extremely important and relevant piece of information, allowing the user 30 to ensure good standing of his credit record. [00101] Figure 6 typically illustrates a sample screen layout on a cellular telephone which allows a user 30 to navigate between various categories such as the user's profile 80, documents 82, medical records 84, password vault 86, extended profile 88 and reminder us 90. It will be appreciated by those skilled in the art that the particular layout and the categories displayed to the user 30 may vary and may even include subcategories which may be displayed on alternative pages, or alternative screen layouts.
[00102] The current invention aims to rectify the common problems in which data is not accurate and to address the concerns of a user 30 with regards to the privacy of his information.
[00103] The invention typically consists of a variety of modules which may include profiles, documents, medical, passwords, and extended profile, shared profile, reminders, loyalty cards, miPay, MiWallet, MiCommunities, suppliers, credit records, identity theft insurance, financial indicators, activities, notifications or any combination of the aforementioned.
[00104] What will follow now is a general description of most modules of importance.
[00105] The profile module enables a subscriber/user 30 to complete and store personal data. What is of vital importance is that this particular module is completed by the user personally and is therefore self-curated. The user can therefore coherently aggregate the relevant data, not only for themselves but to enable them to share the data through the invention with authenticated end- users of choice. [00106] A typical example would be where the user may be requested to provide educational and/or banking information. The user can easily and conveniently log into the mobile application, aggregate the relevant information and simply communicate same to the end user by means of an email.
[00107] Similarly with the documents and medical module the user can upload and store a variety of documents and medical history within the module. Once again the user may communicate and share the relevant information with any authenticated end-user.
[00108] The password module in turn allows a user to store and encrypt various passwords such as login details for financial institutions. It will be appreciated by those skilled in the art that the particular password vault may be protected by means of suitable identification such as fingerprint scanning, alternatively any other suitable biometric scanning authentication system which is currently available on cellular telephones, alternatively computers.
[00109] The extended profile is of critical importance. This self-curated profile allows a user to upload a variety of information, which information may be exchanged within the current invention for rewards. In a preferred embodiment of the invention the extended profile comprise approximately 300 metadata files which are self-curated (completed by the subscriber) resulting in a high degree of accuracy.
[00110] The extended profile typically contains categories such as aspirations and goals, automotive, children, communication skills, cultures, demographics, employment, environmental views, family status, fast food and restaurants, finance, food and drink/eating habits/nutrition, gaming, due graphics, health and beauty, medical, hobbies/leisure/entertainment and interests, home status, income, internet/online/social media, lifestyle and lay values, media and advertising, methods of communication, mobile, personal habits, bets, physical characteristics, political outlook, shopping behaviour, sports and recreation, technology, transport and travel.
[00111] Within the shared profile, the user 30 is allowed to dictate and control the mannered and the period for which particular information of relevance may be shared, alternatively communicated to a particular end-user. In a typical example the user may select an authenticated end user from a predetermined list, alternatively may request that a user be authenticated and loaded/subscribed to the subscriber end-user list. [00112] The period of sharing may vary depending on the particular need and in general may be shared for 3, 6, 9 or 12 months. Similarly the category of sharing may also differ and may the user dictate the period for which such category may be shared. [00113] The communication channel is critical as it is required to comply with various data privacy regulations and legislation globally. The manner of sharing effectively creates a "clearinghouse" for the exchange of data within the ambit of the relevant legislation. [00114] The loyalty card module enables a user to digitally store loyalty cards. In essence, the user can digitally store cards, including the bar code, front and back image of the loyalty card effectively dispensing with the need to carry any plastic cards around.
[00115] The MiRewards module is a rewards program which is capable of being deployed at any retail or wholesale business. The rewards program has a backend engine where a loyalty partner is signed up, adding defined rate of exchange. For example the loyalty partner would agree to provide a "cashback" based on purchases. The loyalty partner may agree to pay 2% in "cashback" on purchases made by the user. This particular module operates using a QR code and geo-location tagging which enables the user to either select the participating partner by brand, alternatively to scan the QR code at a point of sales.
[00116] The user typically utilises the camera feature on an existing mobile device to scan the QR code as well as the till slip. The captured image proceeds through a moderation portal where after values are linked to an agreed "cashback" reward from the particular loyalty partner after which the funds are allocated into the user's e-wallet. [00117] The MiPay module enables the user to make payment to either an open, alternatively close loyalty partner, by once again either selecting the geo-tag of the brand in question, alternatively scanning a QR code, generating the amount they wish to pay and submitting same for processing. [00118] The MiWallet module contains a summary of all funds which have been aggregated into a subscriber/user's e-wallet and includes: cash, airtime and vouchers. A full ledger is displayed allowing a user to perform an audit trial of the transactions.
[00119] The identity theft insurance module enables the user to subscribe for insurance and protection against identity theft.
[00120] The financial indicators module allows a user to conveniently obtain relevant information such as exchange rates, forex and commodities. [00121] The activity module deploys a block chain encryption methodology. In this module a private ledger block chain is created which effectively means that every aspect or transaction between a user and an end user alternatively and authenticated end-user is logged in the block chain ensuring that information is transferred correctly between the relevant parties, effectively creating an irreversible and full forensic auditable trail.
[00122] It will be appreciated by those skilled in the art that the particular invention herein described serves and provides an infomediary or clearinghouse for personal information which complies with strict ethical frameworks and legislation.
[00123] In general at least two databases are created, a master database and vendor data base. [00124] The master database incorporates information relating to demographic such as identity numbers, social security numbers, telephone numbers, mobile numbers and email addresses. Furthermore, all the extended profile data is maintained and stored in the master database. However it is important to note that this information is separated and encrypted from identifiers.
[00125] Once a particular end user, such as a vendor, subscribes, the vendor receives a link to the vendor database. Once the user shares his data, based on the standard profile and sharing module, the information, excluding the identifiers, is transferred from the master database to the vendor database. The vendor/end-user may now conveniently view all the data, without identifying the particular user.
[00126] The interaction between the user, the end-user, the master database and the vendor database is controlled via the Knowledge dashboard built with MicroStrategy. [00127] Should a vendor in question, for example a retailer, wish to further interrogate the vendor database, they could look for a particular subscriber who participates in a particular type of sport (e.g running). The Knowledge dashboard would select all the road runners based on the extended profile completed and communicate same to the end-user. The vendor/end user may then select the channel for which the user has elected to be communicated with, such as email, sms, call centre alternatively app push, thereby ensuring that any communication complies with any privacy regulations and is in the full control of the user. The processed information will be communicated to the master database to be presented to a marketing dashboard. The marketing dashboard associates the brand of vendor in question and populate the necessary channel of communication. [00128] Information may now be sent to the user/subscriber on a personalised basis.
[00129] Figures 7 and 8 more clearly illustrate the interaction between the master database 100 and vendor database 102.
[00130] The master database 100 is furthermore in communication with an encrypted identifying information database 104. The encrypted identifying information database 104 includes a variety of identity keys.
[00131] In use, the vendor database communicates 102 with the master database 100. The information returned are psychographic, demographic, and ethnographic of nature. [00132] The encrypted identifying information database 104 would typically include an identity key and the master database 100 an obfuscated identity key.
[00133] Therefore the invention creates a clearinghouse for the exchange of personal data, alternatively personally identifiable information (PI I) between a buyer (business) and a seller (consumer) using a private ledger block chain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information (PI I).
[00134] The user is able to perform all the hereinbefore described steps from the convenience of a hand-held mobile device, such as a PDA, web based application, alternatively a cellular telephone. Consequently the hereinbefore described method may be contained and operated as a mobile application.
[00135] A user may control the entire user profile and in particular may request a suitable authentication means, alternatively procedure, before the user profile may be accessed. For example, it may be required that a personal identification number (PIN) must be supplied, alternatively a biometric scanning authentication, such as a fingerprint, QR code, or voice recognition must be supplied before the user profile may be accessed (unlocked). It will be appreciated by those skilled in the art that it is of vital importance that the user profile is suitably protected as a variety of personal information may be stored within the user profile.
[00136] An application notification as a means of communication which communicated to the user by means of push strategy is also provided. The application notification may be communicate on behalf of the authenticated end user and may include any suitable information such as rewards, discount voucher, time of notification, date etc.
[00137] It will be appreciated by those skilled in the art that the method as hereinbefore described may include a computer aided system.

Claims

A method of the control of the personal information and the interaction thereof with and authenticated user, which method includes the steps of: allowing a user to create a user profile;
the user updating the user profile with information; and
the user granting access to the information to an authenticated end-user.
A method as claimed in Claim 1 wherein the user create an active user profile, alternatively creates an interactive user profile further alternatively any combination of the before mentioned.
A method as claimed in anyone of claims 1 to 2 wherein the information controlled and updated by the user within the user's profile relates to a user's demographic, psychographic and ethnographic information.
A method as claimed in anyone of claims 1 to 3 which includes the step of allowing the user to aggregate information and communicate the aggregated information in real time to the authenticated end-user.
A method as claimed in claim 4 which include the step of communicating the aggregated information in real time to the authenticated end-user by means of any suitable communications means.
6. A method as claimed in claim 5 in which the communication means is a short service message (SMS), email, facsimile, online shared folder applications, such as Dropbox or any combination of the aforementioned.
7. A method as claimed in anyone claim 1 to 6 wherein the information controlled and updated by the user of the user profile includes personal information such as addresses, banking details, education, assets, employment history or any combination of the aforementioned.
8. A method as claimed in anyone of claims 1 to 7 wherein the user is able to control and update the user profile by uploading documents to the user profile, which documents are aggregated and communicated, alternatively shared with the authenticated end-user.
9. A method as claimed in anyone of the claims 1 to 8 wherein the documents include university degrees, diplomas, secondary certificates, tertiary education certificates or any combination of the aforementioned.
10. A method as claimed in claim 9 wherein the documents yet further include warranties, identification documents, proof of residence, driver's licenses, insurance policies, vehicle licenses, alternatively any other document which may be required on a regular basis.
11 . A method as anyone of claims 1 to 10 which includes the step of allowing a user to control and share any documents with the authenticated end user by selecting the particular document of relevance, and sharing the relevant document by selecting a suitable means of communication as hereinbefore described.
12. A method as claimed in anyone of claims 1 to 11 wherein the information further include information of a medical nature such as medical aid plans, blood type, allergies, next of kin, current medical history, passed historical medical records or any combination of the aforementioned.
13. A method as claimed in anyone of claims 1 to 12 which includes the step of allowing a user to create a password vault, securing personal information such as passwords, password keys, encrypted or otherwise, within the vault, which information may be shared with the authenticated end user.
14. A method as claimed to in anyone of claims 1 to 13 which include the step of allowing the user to create an extended profile.
15. A method as claimed in claim 14 in which the extended profile creates a basis for an exchange of personal information, between the user and the authenticated end-users.
16. A method as claimed in claims 14 to 15 in which the extended profile includes the following categories: aspirations and goals, automotive, children, communications skills, cultures, demographics, employment, environmental views, family status, fashion, fast-food and restaurants, finance, fluid and drinks/eating/habits/nutrition, gaming, geographic, health and beauty, health (medical), hobbies/leisure/entertainment and interest, home status, income, internet/online/social media, lifestyle and life values, media and advertising, methods of communication, mobile, personal habits, physical characteristics, political outlook, shopping behaviour, sport and recreation, technology, transportation and travel, or any combination of the aforementioned.
17. A method as claimed in claim 16 wherein the respective categories comprise multi metadata profiles which are self-curated (completed by the user).
18. A method as claimed in any claims 1 to 17 wherein the user is able to select and authenticate a particular end user from a list of predetermined authenticated end-users.
19. A method as claimed in claim 18 in which the participating end-user includes retailers, wholesalers, suppliers, financial institutions, banks, brokers, or alternatively any other business desirous of collecting and using personal information.
20. A method as claimed in anyone of claims 1 to 19 which includes the step of allowing the user to select specific terms upon which the information stored on the user profile may be shared and communicated with the selected end-user.
21 A method as claimed in claim 20 in which the specific terms include the period of sharing, the categories of personal information, the method of communication and the value associated with the sharing.
22. A method as claimed in anyone claims 1 to 21 which include the step of allowing the user to set a particular reminder (task orientated).
23. A method as claimed in claim 22 wherein the reminder notification includes a sms, e-mail or any combination of the aforementioned.
24. A method as claimed in claim 23 in which the notification is linked to an existing calendar application such as Outlook.
25. A method as claimed in anyone of claims 1 to 24 which method includes the step of creating a loyalty card category, enabling a user to upload and store loyalty cards within the user profile, thereby enabling such user to dispense the need for carrying plastic cards in their wallets.
26. A method as claimed in anyone of claims 1 to 25 which includes the step of awarding a user with a loyalty reward.
27. A method as claimed in claim 26 in which the loyalty reward is associated with any partner (open loyalty partner), alternatively is associated with a particular partner (closed partner).
28. A method as claimed in anyone claims 25 to 27 which includes the step off allowing a user to spend the loyalty rewards with an open alternatively closed partner further alternatively with any participating authenticated partner.
29. A method as claimed in anyone as claimed to in claims 1 to 28 which includes the step of allowing a user to select, organise and participate in a particular interested community for the purpose of participating in surveys or panels.
30. A method as claimed in claim 29 which includes the step of allowing the user to "opt in" alternative unsubscribe, "opt out".
31 . A method as claimed in anyone of claim 29 to 30 wherein the communities include technology, automotive, sports fan, shopping, healthcare, financial, parental, entertainment, travel, youth or any combination of the before mentioned.
32. A method as claimed in anyone of claims 1 to 31 which method includes the step of allowing a user to conduct a credit check via a recognised credit bureau in terms of applicable legislation, and communicated said credit record to a preselected end-user as hereinbefore described.
33. A method as claimed in anyone of claims 1 to 32 which includes the step of recording and storing an activity log, i.e. a Block-chain encryption, methodology, which provides an irreversible and full forensic audit trial.
34. A method as claimed in anyone of claims 1 to 33 which includes the step of allowing the user to perform all the hereinbefore described steps from the convenience of a hand-held mobile device, such as a PDA, web based application, alternatively a cellular telephone.
35. A method as claimed in anyone of claims 1 to 34 which includes the step of allowing a user to control the user profile and to select a suitable authentication means, alternatively procedure, before the user profile is accessible by an end-user. A method as claimed in claim 35 wherein the user is able to require that a personal identification number (PIN) must be supplied, alternatively a biometric scanning authentication, such as a fingerprint, QR code, or voice recognition must be supplied before the user profile may be accessed (unlocked).
A method as claimed in anyone of claims 1 to 36 which includes the step of providing for an application notification as a means of communication, communicating with the user by means of push strategy, the communication undertaken on behalf of the authenticated end-user, which communication include any suitable information such as rewards, discount voucher, time of notification, date, specials or any combination of the before mentioned.
A method as claimed in anyone claims of 1 to 37 wherein the method create a clearinghouse for the exchange of personal data, alternatively personally identifiable information (PI I) between a buyer (business) and a seller (consumer) using a private ledger block chain encryption, linked to an obfuscated user ID, to ensure an irrefutable audit trial for the transfer and the payment of the personal data, alternatively personally identifiable information (PI I).
PCT/IB2018/050546 2017-01-31 2018-01-30 A method of controlling personal information and allowing interaction with authenticated users WO2018142272A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP18748544.6A EP3577592A4 (en) 2017-01-31 2018-01-30 A method of controlling personal information and allowing interaction with authenticated users

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2017/00750 2017-01-31
ZA201700750 2017-01-31

Publications (2)

Publication Number Publication Date
WO2018142272A1 WO2018142272A1 (en) 2018-08-09
WO2018142272A9 true WO2018142272A9 (en) 2018-10-04

Family

ID=63039379

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2018/050546 WO2018142272A1 (en) 2017-01-31 2018-01-30 A method of controlling personal information and allowing interaction with authenticated users

Country Status (3)

Country Link
EP (1) EP3577592A4 (en)
WO (1) WO2018142272A1 (en)
ZA (1) ZA201800647B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493093A (en) * 2018-09-26 2019-03-19 百度在线网络技术(北京)有限公司 User behavior information processing method and device based on block chain
US11374922B2 (en) 2018-12-03 2022-06-28 At&T Intellectual Property I, L.P. Generation of a persona key
CN110599263B (en) * 2019-09-26 2021-06-01 腾讯科技(深圳)有限公司 User interaction data processing method and device, storage medium and computer equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140032259A1 (en) * 2012-07-26 2014-01-30 Malcolm Gary LaFever Systems and methods for private and secure collection and management of personal consumer data
CA3003084A1 (en) * 2014-10-23 2016-04-28 Dele Atanda Intelligent personal information management system
EP3292484B1 (en) * 2015-05-05 2021-07-07 Ping Identity Corporation Identity management service using a block chain

Also Published As

Publication number Publication date
WO2018142272A1 (en) 2018-08-09
EP3577592A4 (en) 2020-07-22
ZA201800647B (en) 2019-01-30
EP3577592A1 (en) 2019-12-11

Similar Documents

Publication Publication Date Title
JP7494210B2 (en) Payment Processing
Cohen Big data and service operations
Christl et al. Corporate surveillance in everyday life
Chin et al. An empirical investigation of intent to adopt mobile payment systems using a trust-based extended valence framework
Rejeb et al. Blockchain technology in tourism: applications and possibilities
Kassim et al. Perceived risk factors influence on intention to continue using Internet banking among Malaysians
RU2602394C2 (en) Payment privacy tokenisation apparatus, methods and systems
Holt et al. Exploring and estimating the revenues and profits of participants in stolen data markets
Garrouch Does the reputation of the provider matter? A model explaining the continuance intention of mobile wallet applications
Mansell et al. The International Encyclopedia of Digital Communication and Society, 3 Volume Set
BR112013021057A2 (en) universal electronic payment devices, methods and systems
Holt et al. A crime script analysis of counterfeit identity document procurement online
US20130211911A1 (en) Permissioned use predictive interactions
US20230116407A1 (en) Systems and Methods for Predicting Consumer Spending and for Recommending Financial Products
US20230418918A1 (en) User information gathering and distribution system
WO2018142272A9 (en) A method of controlling personal information and allowing interaction with authenticated users
Kee et al. The impact of using cashless payment during the covid-19 pandemic: A case study of Maybank
US20240152645A1 (en) System and method for registering claims of ownership rights
Basheer Cryptomarkets’ phenomenon: A conceptualization approach
Roosendaal et al. Personal data markets
US20220270001A1 (en) Value Systems
Tounekti et al. AN EVOLUTION ANALYSIS OF ELECTRONIC PAYMENT SYSTEMS AND MOBILE PAYMENT SYSTEMS CHARACTERISTICS.
Gbadebo The influences of e-satisfaction, e-trust and hedonic motivation on the relationship between e-banking adoption and its determinants in Nigeria
US20130218776A1 (en) Money allocation system
Baba-Yara et al. Are uncertain firms riskier

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18748544

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018748544

Country of ref document: EP

Effective date: 20190902