WO2019009762A1 - Способ передачи персональной информации - Google Patents
Способ передачи персональной информации Download PDFInfo
- Publication number
- WO2019009762A1 WO2019009762A1 PCT/RU2018/000364 RU2018000364W WO2019009762A1 WO 2019009762 A1 WO2019009762 A1 WO 2019009762A1 RU 2018000364 W RU2018000364 W RU 2018000364W WO 2019009762 A1 WO2019009762 A1 WO 2019009762A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- personal information
- contact
- mobile device
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/21—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- the invention relates to the field of computer networks, in particular to mobile technologies. More specifically, the invention relates to methods of transmitting contact and other personal information.
- the dialing field is used as the input field of certain commands, the characters entered in the dialing field, the combination of characters entered, confirmed, then using the command checking system, automatically check for the presence of a specific command in the database and in case of I command: automatically display the relevant information from the Internet address of the Internet site tied to the team, or automatically carry out through the Internet connection with a specific subscriber to the appropriate team,
- commands are entered into the database in advance by linking a symbol or a certain combination of characters to a specific address of the Internet page or messenger function for further verification of the entered characters and all commands are stored in this database, which, using the command verification system, checks the specified characters , and the command database is located completely on the server or on a specific device, or partially on the server, and partly on a specific device, while providing each individual device access to all parts of the database.
- the task that the developer has set for himself in the way of transferring personal information is to develop a method that, in comparison with peers, would reduce the time spent on the transfer of contact information and other personal information.
- the technical result of the proposed method of transmitting personal information is to increase the speed of transmission of contact and other personal information, automatically supplementing existing personal information on mobile devices, informing users about the activities of other users whose contacts are stored on the device, controlling the transmission of contact and other personal information, and its volume, saving time at removal from the Internet sites of ads, after losing their relevance, the possibility Locked access to their contacts and other personal data stored on the server.
- the essence of the method of transmitting personal information is that, based on the contact information provided by the user and the biometric data belonging to him, they are registered in the user’s database, linking his contact information to the biometric data belonging to the aforementioned user, then initiated by the registered user from a mobile device, automatically provide contact information for this mobile device
- the user who owns the biometric data To biometric data in addition to contact information, they also bind other personal information provided by the user and provide it upon request from a mobile device containing the biometric data of a registered user. Other users can add personal information about each individual registered user.
- the provided contact and other personal information is automatically stored in the memory of a mobile device, or a social network, or the contact database of the messenger.
- contact and other personal information and biometric data are obtained using personal mobile devices of users equipped with sensors for reading biometric data. If the personal information is supplemented by a registered user about himself or by other users, additional personal information is automatically transmitted to all mobile devices that have the contact information of the registered user. And a mobile device having a sensor for reading biometric data and initiating a request containing biometric data of a registered user provides the opportunity to receive biometric data. data by reading biometric data from the registered user to whom they belong. Also, mobile devices of users provide the ability to transfer and receive biometric data of registered users among themselves.
- biometric data 105 to a mobile device that transmits biometric data, read the biometric data of the owner of the mobile device to which the biometric data is transmitted.
- biometric data When transmitting personal information using ads or advertisements, personal information about a registered user is transmitted in the form of but temporary identifiers with a certain expiration date, and permanent identifiers are transmitted only after the user's permission to which permanent identifiers belong.
- user data provide the ability to automatically receive personal information after the request contains a registered user biometric data.
- the inventive method of transmitting personal information is 120 as follows.
- the user is requested to contact and other personal information and biometric data for registration.
- register the user in the database associating his contact information, such as phone number, address, IDs of instant messengers, social networks, etc., and 125 as other personal information, such as last name, first name, patronymic, place of work, hobbies, and t d., to biometric data, such as fingerprints, voice timbre, retina, etc., belonging to the above-mentioned user.
- biometric data such as fingerprints, voice timbre, retina, etc., belonging to the above-mentioned user.
- the database is located on the server.
- User registration can be carried out at 130 specialized registration points, and can be automatically carried out using the user's mobile device requesting the necessary information.
- the mobile device To register using the user's mobile device, the mobile device must have the appropriate software
- a registered user After registering a user to transfer contact and other personal information, a registered user provides
- Mobile reader 145 biometric data must have appropriate software to communicate with the server. After receiving the biometric data, the mobile device sends a request to the server containing the database of registered users. Next, the mobile device that sent the request to the server containing biometric data
- the contact and other personal information of the above-mentioned registered user is received. If the user who received the contact and other personal information of the registered user on his mobile device is also registered, then to him on the mobile
- the device may receive an automatic request from the server to allow the transfer of its personal information to the mobile device of the user who submitted their biometric data.
- the contacts and personal information will be exchanged, and in case of refusal only one
- the user will receive contact and other personal information of the user who provided their biometric data.
- Contact and other personal information obtained from the database can be automatically saved in the contact book of the mobile device, in social networks, in the contacts of the messenger. Before saving, 165 confirmation may be required, giving the opportunity to edit the received information.
- This method provides the ability to hide phone numbers and other identifiers in various networks and instant messengers from users, including from the users to whom these identifiers belong. 170 Identifiers are there, but this information is inside the device and is hidden. Thus, the uncontrolled transfer of someone else's contacts is impossible, for example, nobody can transfer numbers without control phones as nobody knows them. The full name and other information about the user that is not a contact will not be hidden.
- user B performs the following actions:
- user A indicates the recipient of contact and other personal information of user C, or if user C is not in the contact book of the mobile device of user A
- the mobile device suggests reading the biometric data of the user to whom the contact and other personal information of user B should be transmitted. If biometric data is to be read, such as fingerprints, user C
- user C from the contact book of the mobile device, sends a request to the server which contains identification or biometric data of user C and identification information about user B, whose contact and other personal information they want to transmit.
- the server receives the request, and also recognizes the mobile
- the server creates a request addressed to the mobile device of user B, whose contact and other personal information the user A wants to send.
- the server request addressed to user B contains information that user A wishes to transfer the contact and
- user B agrees to the transfer of contact and other personal information to user B, he confirms the transfer and user B receives contact and other personal information of user B. If contact and other personal information is exchanged, then after the transfer of contact and other personal information of user B
- the server sends a request to user B containing a confirmation or refusal to transfer contact and other personal information to user B. If user C does not agree to transfer his contact and other personal information to user B, he refuses the request. If user B is ready to transfer his contact
- a request to confirm or reject the transfer of contact and other personal information can be created not only by the server, this function can be performed, for example, by a device that contains contact and other personal information that needs to be transferred.
- the request that created the server for user B with the ability to confirm or reject the transfer of contact and other personal information to user C, could create a mobile device of user A. And after confirming the transfer by user B, without server participation, directly send contact and other
- the above data also carries out a request to the server on which the contact and other personal information of registered users is stored to obtain the contact and other personal information of the user who owns the biometric data.
- the exchange of contact and other personal information 260 means that participants will receive contact and other personal information. information about each other. Transmission of contact and other personal information means that only one user will receive the above information.
- Internet sites and advertising create temporary identifiers that have a specific shelf life of 285, which also provides control over the transfer of contacts and expands the functionality of the invention.
- a registered user wants to place an ad on the Internet, then on his mobile device he activates a temporary identifier that is issued by a server that stores personal information 290 registered user.
- This temporary identifier is issued for a short period, for example, for a month or several months, and at a specific user request, for any necessary period, for example, for an hour or a day.
- the user in the ad indicates the above temporary
- 305 can also send a request for the transfer or exchange of permanent identifiers and upon confirmation of the user who created the advertisement, the transfer or exchange of contact and other personal information will occur.
- users can, if necessary, organize communication with each other, for example, telephone
- initiating the exchange of permanent identifiers can be either by the user who created the ad or by another user who communicated the ad using temporary identifiers with the user.
- the website that hosts the ad can also automatically retrieve information from the server that stores contact information and other personal data of registered users that the temporary identifier
- 325 is no longer valid and self-delete ad.
- the user will not have to take unnecessary calls and search for all sites of the ads on which he placed, and all these sites will remove irrelevant information automatically after receiving information about the irrelevance of the temporary identifier.
- Sites of ads can also for these purposes with a certain frequency, for example once per hour, send requests to the server that stores contact and other personal data of registered users to clarify the relevance of temporary identifiers.
- the irrelevance of temporary identifiers may
- a data group is a user-selected information about himself that he can
- data group 1 will contain your full name (last name, first name, middle name) and mobile phone number
- data group 2 will contain your full name, telephone number and identifiers of social networks
- data group 3 will contain your full name, mobile phone number, user position
- different data groups can be tied to different fingerprints owned by the user.
- the user can decide which group of data another user will receive, 350 by attaching the appropriate fingerprint.
- the user has the opportunity to choose which data group to transfer from the list that appears on the screen of his mobile device.
- the database may be located, for example, on each individual mobile device.
- Permanent identifiers belonging to organizations may not be hidden, or temporary identifiers may be issued for a very long time, for example, 10 or more years. In other words for advertising
- 360 organizations can use permanent or temporary identifiers that are entered as a phone number in the corresponding dialing field of a mobile device and can be stored in the contact book of mobile devices, while the server can also provide company information to mobile devices
- QR codes for the transfer of contact and other personal information of the organization can be used various codes and images that can be identified from the camera of the mobile device. For example QR codes.
- 370 organizations can also be used, for example, fingerprints of its employees.
- the user may have at the same time attached contact and other personal information relating to the user, for example, to the thumbprints of his right hand and contact and other personal information relating to the organization in 375 which the user works, for example, to the thumbprint of the left hand.
- users save only one identifier of each individual user or organization, which in turn can be
- user A will only have one user ID B on his mobile device and personal information that does not include other user B identifiers, such as information such as his full name, activity, hobbies, etc. Only
- 385 identifier which will be stored on the mobile device will allocate user B among other users registered on the server. And all user B identifiers such as mobile phone number, social network identifiers, instant messengers, etc. will be stored only on the server which will be implemented every time
- 390 connect different users to each other using their ids in different services. For example, if user A wants to call user B, he selects the function of call to user B on the mobile device in the contact book. The mobile device of user A sends a request containing the user ID
- the server identifies the user A who sent the request from the mobile device and using the identifiers of the mobile network of users A and B organizes the connection of the above-mentioned users.
- 400 identifiers transfer only identifiers of registered users, by which users are distinguished on the server, it is possible to block access of individual users to the opportunity to contact the user who performs lock For example, if User A no longer wants user B to 405 who previously received contact and other personal information, he blocks User B’s access to his data on the server, and User B will not be able to contact User A. Since the identifier by which User B has contacted User A hidden, User B will not be able to use other 410 mobile devices or numbers to communicate with User A. Thus, there is no need to change mobile phone numbers gender zovatelyam, which detractors call and use different phone numbers.
- instant messengers and 415 mobile networks of users are stored on mobile devices, it is possible for users to delete their contact and other personal information from the contact book of mobile devices of users to whom they previously provided their contact and other personal information .
- 425 server that stores contact and other personal information of registered users.
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18828585.2A EP3651487A4 (en) | 2017-07-07 | 2018-06-05 | PROCESS FOR ISSUING PERSONAL INFORMATION |
JP2019571406A JP2020526953A (ja) | 2017-07-07 | 2018-06-05 | 個人情報の転送方法 |
BR112020000192-9A BR112020000192A2 (pt) | 2017-07-07 | 2018-06-05 | método de transmissão de informações pessoais |
CN201880056132.2A CN111034237A (zh) | 2017-07-07 | 2018-06-05 | 个人信息传输的方法 |
US16/629,030 US11165584B2 (en) | 2017-07-07 | 2018-06-05 | Method for transmitting personal information |
KR1020207003462A KR20200024303A (ko) | 2017-07-07 | 2018-06-05 | 개인 정보를 전송하는 방법 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2017123996 | 2017-07-07 | ||
RU2017123996A RU2659675C1 (ru) | 2017-07-07 | 2017-07-07 | Способ передачи персональной информации |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019009762A1 true WO2019009762A1 (ru) | 2019-01-10 |
Family
ID=62815820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2018/000364 WO2019009762A1 (ru) | 2017-07-07 | 2018-06-05 | Способ передачи персональной информации |
Country Status (8)
Country | Link |
---|---|
US (1) | US11165584B2 (ru) |
EP (1) | EP3651487A4 (ru) |
JP (1) | JP2020526953A (ru) |
KR (1) | KR20200024303A (ru) |
CN (1) | CN111034237A (ru) |
BR (1) | BR112020000192A2 (ru) |
RU (1) | RU2659675C1 (ru) |
WO (1) | WO2019009762A1 (ru) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2701041C1 (ru) * | 2018-11-15 | 2019-09-24 | Илья Владимирович Редкокашин | Способ автоматизированной регистрации |
US11036838B2 (en) | 2018-12-05 | 2021-06-15 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11113370B2 (en) | 2018-12-05 | 2021-09-07 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11048793B2 (en) | 2018-12-05 | 2021-06-29 | Bank Of America Corporation | Dynamically generating activity prompts to build and refine machine learning authentication models |
US11120109B2 (en) | 2018-12-05 | 2021-09-14 | Bank Of America Corporation | Processing authentication requests to secured information systems based on machine-learned event profiles |
US11159510B2 (en) * | 2018-12-05 | 2021-10-26 | Bank Of America Corporation | Utilizing federated user identifiers to enable secure information sharing |
US11176230B2 (en) | 2018-12-05 | 2021-11-16 | Bank Of America Corporation | Processing authentication requests to secured information systems based on user behavior profiles |
RU2723667C1 (ru) * | 2020-01-11 | 2020-06-17 | Илья Владимирович Редкокашин | Способ передачи персональной информации |
CN113537530B (zh) * | 2021-09-17 | 2021-12-31 | 中建电子信息技术有限公司 | 基于智慧社区物联网大数据的智能分析及应用方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205478B1 (en) * | 1998-07-08 | 2001-03-20 | Fujitsu Limited | System for exchanging user information among users |
RU2257613C2 (ru) * | 2000-03-22 | 2005-07-27 | Италдата Индженьериа Делл`Идея С.П.А. | Портативное устройство для научной идентификации личности |
US20060099931A1 (en) | 2004-11-09 | 2006-05-11 | Tony Trujillo | Automatic phone number to website linking system and method |
US20120297190A1 (en) * | 2011-05-19 | 2012-11-22 | Microsoft Corporation | Usable security of online password management with sensor-based authentication |
US20160078204A1 (en) * | 2014-09-15 | 2016-03-17 | Chiun Mai Communication Systems, Inc. | Electronic device and protection method |
RU2015103099A (ru) | 2015-01-30 | 2016-08-20 | Петр Алексеевич Игнатюк | Способ перехода на интернет-страницу и запуска программы мессенджера(варианты) |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2950307B2 (ja) * | 1997-11-28 | 1999-09-20 | 日本電気株式会社 | 個人認証装置と個人認証方法 |
US6845448B1 (en) * | 2000-01-07 | 2005-01-18 | Pennar Software Corporation | Online repository for personal information |
JP2001339537A (ja) * | 2000-05-29 | 2001-12-07 | Web Logic:Kk | 個人情報リスト作成システム及び個人情報リスト作成方法 |
US7836147B2 (en) * | 2001-02-27 | 2010-11-16 | Verizon Data Services Llc | Method and apparatus for address book contact sharing |
US7640006B2 (en) * | 2001-10-03 | 2009-12-29 | Accenture Global Services Gmbh | Directory assistance with multi-modal messaging |
US7929951B2 (en) * | 2001-12-20 | 2011-04-19 | Stevens Lawrence A | Systems and methods for storage of user information and for verifying user identity |
JP2006079293A (ja) * | 2004-09-08 | 2006-03-23 | Xing Inc | 電子名刺の証明方法及びそのシステム並びに電子名刺の証明装置及び端末装置 |
US20060229063A1 (en) * | 2005-04-12 | 2006-10-12 | Microsoft Corporation | Systems and methods automatically updating contact information |
US8015118B1 (en) * | 2005-05-06 | 2011-09-06 | Open Invention Network, Llc | System and method for biometric signature authorization |
US8150371B2 (en) | 2007-05-03 | 2012-04-03 | Qualcomm Incorporated | Interactive control of access to services and capabilities of a mobile device |
US9398022B2 (en) * | 2007-06-01 | 2016-07-19 | Teresa C. Piliouras | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation |
US8027518B2 (en) * | 2007-06-25 | 2011-09-27 | Microsoft Corporation | Automatic configuration of devices based on biometric data |
US20090288012A1 (en) * | 2008-05-18 | 2009-11-19 | Zetawire Inc. | Secured Electronic Transaction System |
CN101754182A (zh) * | 2008-12-19 | 2010-06-23 | 北京网秦天下科技有限公司 | 基于分组的网络通讯录的实现方法及系统 |
US8364131B2 (en) * | 2009-05-17 | 2013-01-29 | Qualcomm Incorporated | Method and apparatus for providing caller recognition based on biometric data and biometric mobile device address book |
US9984157B2 (en) * | 2010-12-01 | 2018-05-29 | Aware Inc. | Relationship detection within biometric match results candidates |
CN102547615A (zh) * | 2012-02-17 | 2012-07-04 | 廖大鸿 | 实现基于短信和彩信业务的社交信息业务的方法 |
CN103379458B (zh) * | 2012-04-28 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | 一种号码共享及屏蔽的方法、系统及移动终端和服务器 |
US8990300B2 (en) * | 2012-08-21 | 2015-03-24 | Mitel Networks Corporation | Constructing a contact sharing history |
US20140354405A1 (en) * | 2013-05-31 | 2014-12-04 | Secure Planet, Inc. | Federated Biometric Identity Verifier |
US9166796B2 (en) | 2013-06-24 | 2015-10-20 | Prince Sattam Bin Abdulaziz University | Secure biometric cloud storage system |
US20150074206A1 (en) * | 2013-09-12 | 2015-03-12 | At&T Intellectual Property I, L.P. | Method and apparatus for providing participant based image and video sharing |
US9294525B2 (en) * | 2014-04-24 | 2016-03-22 | International Business Machines Corporation | Social sharing of contacts information |
US9391988B2 (en) * | 2014-06-04 | 2016-07-12 | Grandios Technologies, Llc | Community biometric authentication on a smartphone |
EP3091492A1 (en) * | 2015-05-05 | 2016-11-09 | Mastercard International Incorporated | Systems, methods, devices, and computer readable media for enabling electronic payment transfers |
CN105550205A (zh) * | 2015-11-30 | 2016-05-04 | 东莞酷派软件技术有限公司 | 一种联系信息处理方法及其设备 |
GB201603807D0 (en) * | 2016-03-04 | 2016-04-20 | Microsoft Technology Licensing Llc | Communication between applications |
US20170300678A1 (en) * | 2016-04-13 | 2017-10-19 | Motorola Solutions, Inc | Method and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device |
-
2017
- 2017-07-07 RU RU2017123996A patent/RU2659675C1/ru active
-
2018
- 2018-06-05 BR BR112020000192-9A patent/BR112020000192A2/pt unknown
- 2018-06-05 CN CN201880056132.2A patent/CN111034237A/zh active Pending
- 2018-06-05 WO PCT/RU2018/000364 patent/WO2019009762A1/ru unknown
- 2018-06-05 KR KR1020207003462A patent/KR20200024303A/ko active IP Right Grant
- 2018-06-05 JP JP2019571406A patent/JP2020526953A/ja active Pending
- 2018-06-05 US US16/629,030 patent/US11165584B2/en active Active
- 2018-06-05 EP EP18828585.2A patent/EP3651487A4/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6205478B1 (en) * | 1998-07-08 | 2001-03-20 | Fujitsu Limited | System for exchanging user information among users |
RU2257613C2 (ru) * | 2000-03-22 | 2005-07-27 | Италдата Индженьериа Делл`Идея С.П.А. | Портативное устройство для научной идентификации личности |
US20060099931A1 (en) | 2004-11-09 | 2006-05-11 | Tony Trujillo | Automatic phone number to website linking system and method |
US20120297190A1 (en) * | 2011-05-19 | 2012-11-22 | Microsoft Corporation | Usable security of online password management with sensor-based authentication |
US20160078204A1 (en) * | 2014-09-15 | 2016-03-17 | Chiun Mai Communication Systems, Inc. | Electronic device and protection method |
RU2015103099A (ru) | 2015-01-30 | 2016-08-20 | Петр Алексеевич Игнатюк | Способ перехода на интернет-страницу и запуска программы мессенджера(варианты) |
Non-Patent Citations (1)
Title |
---|
See also references of EP3651487A4 |
Also Published As
Publication number | Publication date |
---|---|
JP2020526953A (ja) | 2020-08-31 |
CN111034237A (zh) | 2020-04-17 |
RU2659675C1 (ru) | 2018-07-03 |
US11165584B2 (en) | 2021-11-02 |
EP3651487A4 (en) | 2021-04-07 |
US20200235933A1 (en) | 2020-07-23 |
KR20200024303A (ko) | 2020-03-06 |
BR112020000192A2 (pt) | 2020-07-07 |
EP3651487A1 (en) | 2020-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2659675C1 (ru) | Способ передачи персональной информации | |
US8078677B2 (en) | Method for making recommendations in a social networking system based on personal communication information and a social networking system incorporating same | |
US8554186B2 (en) | Mobile terminal device, computer executable program for exchanging personal information, and method and system for exchanging personal information | |
JP5138970B2 (ja) | システム、サーバ、情報端末、オペレーティングシステム、ミドルウェア、情報通信機器、認証方法、システム及びアプリケーションソフトウェア | |
JP5847579B2 (ja) | ユーザが、少なくとも1人の他のユーザによって提供される少なくとも1つのサービスにアクセスするための方法およびシステム | |
US9794200B2 (en) | Server device, method, and system | |
CN102082881A (zh) | 用于实时显示呼叫者位置、简介和信任关系的方法与系统 | |
CN101631311A (zh) | 用于共享权限启用的移动简档的简档服务 | |
AU2010337430B2 (en) | System and method for a global directory service | |
JP2016516314A (ja) | 電話番号連動基盤の電子名刺伝送管理システム及びその方法 | |
EP2041942B1 (fr) | Partage contrôlé de données personnelles | |
JP2008259153A (ja) | 通信端末、通信方法選択方法、通信方法及びこれらを実現するサーバ | |
CN102158817A (zh) | 通过网络获取他人联系信息的方法及系统 | |
KR102352879B1 (ko) | 명함을 이용한 소셜네트워크 플랫폼 | |
CN112241544B (zh) | 业务系统、访问方法、装置、计算机设备和存储介质 | |
CN101510895A (zh) | 基于互联网的移动通讯录管理系统及方法 | |
US20050259666A1 (en) | Method for distributing and collecting address information | |
US20140148130A1 (en) | Remote subscriber identification (rsid) system and method | |
US20140372375A1 (en) | Contact data sharing | |
JP4676274B2 (ja) | 携帯端末の個人情報の管理方式 | |
CN112470146A (zh) | 信息传输方法 | |
KR20040071105A (ko) | 다량 문자메시지 중계전송서비스 제공 방법 | |
US20150017959A1 (en) | Method for managing the establishment of a digital connection | |
KR101581807B1 (ko) | 명함정보의 등록 및 조회서비스 제공시스템 및 방법 | |
KR20020019316A (ko) | 인간관계 관리를 위한 토탈 서비스 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18828585 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019571406 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112020000192 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20207003462 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2018828585 Country of ref document: EP Effective date: 20200207 |
|
ENP | Entry into the national phase |
Ref document number: 112020000192 Country of ref document: BR Kind code of ref document: A2 Effective date: 20200106 |