WO2019094993A1 - A system for identifying persons of interest - Google Patents

A system for identifying persons of interest Download PDF

Info

Publication number
WO2019094993A1
WO2019094993A1 PCT/ZA2018/050059 ZA2018050059W WO2019094993A1 WO 2019094993 A1 WO2019094993 A1 WO 2019094993A1 ZA 2018050059 W ZA2018050059 W ZA 2018050059W WO 2019094993 A1 WO2019094993 A1 WO 2019094993A1
Authority
WO
WIPO (PCT)
Prior art keywords
interest
personal information
identifying persons
requester
computing device
Prior art date
Application number
PCT/ZA2018/050059
Other languages
French (fr)
Inventor
Randell James FORD
Original Assignee
Ford Randell James
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ford Randell James filed Critical Ford Randell James
Publication of WO2019094993A1 publication Critical patent/WO2019094993A1/en
Priority to ZA2020/05630A priority Critical patent/ZA202005630B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • This invention relates to a system for identifying persons of interest.
  • this invention relates to a system for biometrically identifying persons of interest in order to access official information for those persons.
  • the invention further relates to a method for identifying persons of interest in order to access official information for those persons.
  • a system for identifying persons of interest which system includes: - a mobile computing device, which is configured to obtain biometric data and/or receive input of identification information of a person by a requester; a requester software application which is installable on the mobile computing device, which application configures the mobile computing device to upload the biometric data and/or identification information of the person to a personal information database for verification of thereof; and the requester software application further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person from the personal information database so as to display it on the mobile computing device.
  • the mobile computing device may be arranged in communication with the personal information database for allowing uploading of the biometric data and/or identification information.
  • the mobile computing device may include at least one feature for allowing scanning and/or capturing of the anatomy of the person so as to obtain the biometric data.
  • the feature may be in the form of a camera, a scanner, a touch screen, a microphone and the like.
  • the obtained biometric data may relate to the person's iris, face, fingerprint, palm, voice and/or any other defining anatomy or parts thereof.
  • the mobile computing device may include at least one input feature for allowing input of identification information for the person.
  • the input feature may be in the form of a keypad, a voice-activated prompt and the like.
  • the identification information may relate to an identity number, passport number, a tax number, a physical address, a postal address, a contact number and the like.
  • the mobile computing device may include a locating feature such as global positioning service (GPS) capabilities for locating a position thereof.
  • GPS global positioning service
  • the mobile computing device may be any one or more of the group selected from but not limited to, a smart phone, a tablet device, a note pad device, a palm scanning/reading device, a laptop computer, a network equipment and a wearable electronic device such as a smart watch or smart glasses.
  • the personal information database may be held, obtained and/or collated by a governing authority.
  • the governing authority may be at least one government department and/or office.
  • the personal information database may include personal information for the person which may be in the form of the governing authority's official records for the person. Different government departments and/or offices or the same government department and/or office located in different jurisdictions may each hold, obtain and/or collate a personal information database relating to its particular mandate.
  • the personal information may include biometric data, identification information as well as any other personal information relating to the person.
  • the personal information may include any one or more selected from the group including but not limited to biometric data which may relate to the person's iris; face; fingerprint; palm; voice and/or any other defining anatomy or parts thereof, an identity number, passport number, tax details, a physical address, a postal address, a contact number, birth details, death details, voting details, heritage details, , car license registration details, employment details, health details, criminal offences, traffic violations, judicial details, property ownership details, marital status, financial details, banking details, legal capacity, educational information, demographic classification, census information and the like.
  • biometric data may relate to the person's iris; face; fingerprint; palm; voice and/or any other defining anatomy or parts thereof, an identity number, passport number, tax details, a physical address, a postal address, a contact number, birth details, death details, voting details, heritage details, , car license registration details, employment details, health details, criminal offences, traffic violations, judicial details, property ownership details, marital status, financial details, banking details, legal capacity, educational
  • the requester software application may include an access verification means for verifying authorised access thereto by a requester.
  • the verification means may be in the form of a firewall and/or what is conventionally known as an authentication service.
  • the verification means may further verify a type of authorised access by the requester, wherein the type of authorised access may limit and/or dictate which personal information the requester may retrieve from the personal information database.
  • the requester software application may be configured to allow the type or level of access. It is to be appreciated that limiting access to personal information of the person will protect against inappropriate use thereof.
  • the requester may be a governing authority official, representative and/or officer.
  • the requester software application may be configured to allow the requester to access the features and/or input features of the mobile computing device in order to obtain the biometric data and/or identification information for uploading to the personal information database for verification thereof.
  • the requester software application may be further configured to access the locating feature of the mobile computing device so as to determine an appropriate communication path for uploading to the personal information database.
  • the requester software application may access the locating feature to determine the appropriate personal information database to be accessed, based on jurisdiction.
  • the requester software application may include an encryption programme which may be encoded/programmed therein for encrypting data uploaded from and/or decrypting data downloaded to the mobile computing device.
  • the personal information database may be stored on a memory resource which may form part of a computer.
  • the computer may be in the form of a server.
  • the server may be arranged in communication with the mobile computing device and therefore the requester software application to receive the obtained biometric data and/or identification information for verification thereof as well the request for personal information selected by the requester.
  • each memory resource may store a different personal information database.
  • the memory resources may be part of a computing system, wherein each memory resource may form part of each computer which comprises the computing system.
  • Each of the computers in the system may be in the form of a server.
  • the computers of the computing system may be arranged in communication with each other and/or with the mobile computing device to allow identity verification against and/or retrieval of personal information from one or more databases.
  • the memory resource may be in the form of a volatile and/or a non-volatile memory.
  • the volatile memory may be in the form of random-access memory (RAM).
  • the non-volatile memory may be in the form of read-only memory (ROM).
  • the memory resource may be selected from any one or more of the group consisting of a hard-drive, a solid state drive, a magnetic tape and an optical disc.
  • a service software application may be provided which is installable on the computer.
  • the service software application may be complementary to the requester software application for allowing downloading of data uploaded from the mobile computing device.
  • the service software application may include an encryption programme which may be encoded/programmed therein for decrypting downloaded data and/or encrypting uploaded data.
  • the service software application may include a sequence of code which may include computer-executable instructions to enable the computer to verify the obtained biometric data/identification information by comparison thereof against the personal information database.
  • the instructions may further enable the computer to search the database so as to retrieve the requested personal information selected by the requester.
  • the result of the verification and/or the retrieved personal information may be uploaded for retrieval and/or downloading thereof by the mobile computing device.
  • an operator of the service software application may communicate the result of the verification and/or the retrieved personal information to the requester.
  • the operator may be in the form of a person such as an agent in a call centre and/or a governing authority official, representative and/or officer which has authorised access to the service software application.
  • Communication may be in the form of a call or text message to the requester.
  • the service software application may include an access verification means which verifies authorised access by an operator.
  • the verification means may be in the form of firewall and/or what is conventionally known as an authentication service.
  • the verification means may further verify a type of authorised access by the operator, wherein the type of authorised access may limit and/or dictate which personal information the operator may access from the personal information database.
  • the service software application may be configured to allow the type or level of access. It is to be appreciated that limiting access to personal information of the person will protect against inappropriate use thereof.
  • the service software application may include a graphical interface which allows operation thereof by the operator.
  • the graphical interface may be configured to graphically represent the result of the verification and/or the retrieved personal information to the operator.
  • a controlling computing device for controlling communication between the mobile computing device and the computer and/or the computing system.
  • the controlling computing device may be in the form of a server or what is conventional known as a back-end server.
  • the controlling computing device and/or the computing system may form what is conventionally known as a cloud-computing.
  • the service software application may be installable on the controlling computing device alone or both the controlling computing device and the computing system.
  • the service application software may configure the controlling computing device to receive and/or download the obtained biometric data and/or identification information as well as the request for personal information selected by the requester from the mobile computing device.
  • the service software application may further configure the controlling computing device to determine and access one or more personal information databases based on the positioning of the mobile computing device and/or the personal information requested.
  • the service software application may include computer-executable instructions to enable the controlling computing device to verify the obtained biometric data/identification information by comparison thereof against the personal information database and to retrieve the requested personal information selected by the requester. The result of the verification and/or the retrieved of personal information may be uploaded for retrieval and/or downloading thereof by the mobile computing device.
  • communication in the system may be via any suitable transmitting means or network.
  • the transmitting means or network may be selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.
  • a method for identifying persons of interest including: - obtaining biometric data and/or identification information of a person using a mobile computing device; sending or uploading of the biometric data and/or identification information, by way of a requester software application which is installable on the mobile computing device, to a personal information database for verification of the biometric data and/or identification information; retrieving or downloading the verified biometric and/or identification information as well as any other personal information for the person from the personal information database by means of the requester software application; and displaying it on the mobile computing device.
  • Authorised accessing of the requester software application by a requester may be carried out using an access verification means.
  • the verification means may be part of the requester software application which may be in the form of a firewall and/or what is conventionally known as an authentication service.
  • Recognising a type or level of authorised access by the requester may be carried out by the access verification means, wherein the type or level of authorised access may limit and/or dictate which personal information may be retrieved by the requester.
  • recognising of the type or level of authorised access may be carried out by the requester software application. It is to be appreciated that limiting and/or dictating access to personal information of the person will protect against inappropriate use thereof.
  • Scanning and/or capturing the anatomy of the person or parts thereof may be performed by using the features of the mobile computing device in order to obtain the biometric data.
  • the obtained biometric data may relate to the person's iris, face, fingerprint, palm, voice and/or any other defining anatomy or parts thereof.
  • Accessing and/or operating input features of the mobile computing device may be permitted by the requester software application.
  • the input features may be in the form of a keypad, a voice-activated prompt and the like.
  • Inputting of the identification information may be performed by using the input features of the mobile computing device.
  • the identification information may relate to an identity number, passport number, a tax number, a physical address, a postal address, a contact number and the like.
  • Encrypting of the obtained biometric data/identification information may be carried out by an encryption programme which may be encoded/programmed into the requester software application.
  • the method may include the step of recording and logging the details of all verification and access to personal information and records transactions.
  • the details are to include date and time, identity of the requestor, location of the requestor and information and records accessed by the requestor.
  • Sending and/or uploading of the obtained biometric data/identification information may be via any suitable network and or transmitting means.
  • Receiving and/or downloading of the obtained biometric data/identification information may be by carried out by a computer which may have the personal information database stored therein.
  • Decrypting of the received and/or downloaded data may be carried out by an encryption programme which may be encoded/programmed into a service software application which may be installed on the computer.
  • Retrieval based on a result of the verification of the person's identity, of the personal information which is of interest to the requester may be carried out by the computer or more particularly, a processor of the computer, which may search the personal information database in order to retrieve the personal information of interest to the requester.
  • Encrypting of the verified identity for the person as well as the retrieved personal information may be carried out by the encryption programme.
  • Sending and/or uploading of the encrypted data to the mobile computing device may be via any suitable network and/or transmitting means.
  • Retrieval and/or downloading of the encrypted data may be followed by decrypting thereof by the encryption programme.
  • the transmitting means or network may be selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.
  • FIG. 1 is a schematic illustration of the flow of data in a first embodiment of a system for identifying person of interest in accordance with the present invention.
  • Figure 2 is a schematic illustration of the flow of data in a second embodiment of a system for identifying person of interest in accordance with the present invention.
  • the system 10 includes a mobile computing device 12, which is configured to obtain biometric data of a person 14 by a requester 16, a requester software application 18 which is installable on the mobile computing device 12, which application 18 configures the mobile computing device 12 to upload the biometric data and/or identification information of the person 14 to a personal information database 20 for verification of thereof, and the requester software application 18 further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person 14 from the personal information database 20 so as to display it on the mobile computing device 12.
  • the mobile computing device 12 may be arranged in communication with the personal information database 20 for allowing uploading of the biometric data.
  • the mobile computing device 12 can include a built-in palm vein reader 22 to obtain biometric data related to the person's palm vein configuration.
  • the palm vein reader 22 is arranged in communication with the mobile computing device 12. Whilst there are many palm vein readers available on the market, the inventor envisions to use any one of the Fujitsu palm vein readers.
  • the mobile computing device 12 includes a locating feature typically in the form of global positioning service (GPS) capabilities for locating a position thereof.
  • GPS global positioning service
  • the mobile computing device 12 is typically in the form of a smart phone.
  • the personal information database 20 relates to personal information for the person 14.
  • the personal information are the official records for a governing authority.
  • the governing authority can be any organisation that has official records for the person 14, in this embodiment, the governing authority is the government of a country which comprises governmental departments 24 and offices. Each type of governmental department 24 and office can be responsible for obtaining and collating personal information for the person 14 according to its mandate. Therefore, each governmental department 24 and office can have different personal information databases 20 which include different personal information for the person 14. Each governmental department 24 and office can however have several branches in different jurisdictional regions. In this instance, the branches can also have a responsibility to obtain and collate personal information for the personal information database 20, however, it may be for different persons 14 based on jurisdiction, therefore different personal information databases 20 can be held by different branches.
  • the personal information included therein can relate to biometric data which may relate to the person's iris; face; fingerprint; palm; voice and/or any other defining anatomy or parts thereof, an identity number, passport number, tax details, a physical address, a postal address, a contact number, birth details, death details, voting details, heritage details, , car license registration details, employment details, health details, criminal offences, traffic violations, judicial details, property ownership details, marital status, financial details, banking details, legal capacity, educational information, demographic classification, census information and the like.
  • the person 14 can be a citizen, a resident or refugee of a country.
  • the requester software application 18 includes an access verification means 26 for verifying authorised access thereto by a requester 16.
  • the verification means 26 is in the form of what is conventionally known as an authentication service.
  • the access verification means 26 further verifies a level of authorised access by the requester 16, wherein the level of authorised access limits which personal information the requester 16 retrieves from the personal information database 20. For example, if the requester 16 is a traffic officer, he or she may have a level of authorised access which allows accessing of biometric data from personal database 20.1 for verification of the obtained biometric data there against, criminal records from database 20.2 as well as outstanding traffic fines from database 20.3.
  • the requester software application 18 is configured to allow the requester 16 to access the palm vein reader 22 of the mobile computing device 12 in order to obtain the biometric data for uploading to the personal information database 20 for verification thereof.
  • the requester software application 18 is further configured to access the locating feature of the mobile computing device 12 so as to determine an appropriate communication path for uploading to the personal information database 20.
  • the requester software application 18 accesses the locating feature to determine the appropriate personal information database 20 to be accessed, based on jurisdiction.
  • Computer 30.1 also provides computer 30.3 with the key in order to receive the outstanding traffic fines for the person 14 from database 20.3. Once computer 30.1 has all the requested personal information, it is uploaded to the mobile computing device 12. It is to be appreciated whilst the present network architecture has been described, various network architecture can be implemented.
  • the memory resource 28 is in the form of a volatile and a non-volatile memory.
  • the memory resource 28 is selected from any one or more of the group consisting of a hard-drive, a solid state drive, a magnetic tape and an optical disc.
  • the service software application 134 is installable on each of the back-end servers 136.
  • the service application software 134 configures the back-end servers 136 to download the obtained biometric data as well as the request for personal information selected by the requester 116 from the mobile computing device 1 12.
  • the service software application 134 configures the back-end servers 136 to determine and access one or more personal information databases 120 based on the positioning of the mobile computing device 1 12 and the personal information requested.
  • the service software application 134 Upon access to the database/s, the service software application 134 includes computer-executable instructions to enable the back-end server 136 to verify the obtained biometric data by comparison thereof against the personal information database 120 and to retrieve the requested personal information selected by the requester 1 16.
  • the transmitting means or network is selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A system (110) for identifying persons of interest which includes a mobile computing device (112), which is configured to obtain biometric data and/or receive input of identification information of a person (114) by a requester (116), a requester software application (118) which is installable on the mobile computing device (112), which application (118) configures the mobile computing device (112) to upload the biometric data and/or identification information of the person (114) to a personal information database (120.1, 120.2, 120.3) for verification thereof and the requester software application (118) further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person (14) from the personal information database (120.1, 120.2, 120.3) so as to display it on the mobile computing device (112).

Description

A SYSTEM FOR IDENTIFYING PERSONS OF INTEREST
TECHNICAL FIELD
This invention relates to a system for identifying persons of interest. In particular, this invention relates to a system for biometrically identifying persons of interest in order to access official information for those persons. The invention further relates to a method for identifying persons of interest in order to access official information for those persons.
SUMMARY OF THE INVENTION
According to a first aspect of the invention, there is provided a system for identifying persons of interest, which system includes: - a mobile computing device, which is configured to obtain biometric data and/or receive input of identification information of a person by a requester; a requester software application which is installable on the mobile computing device, which application configures the mobile computing device to upload the biometric data and/or identification information of the person to a personal information database for verification of thereof; and the requester software application further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person from the personal information database so as to display it on the mobile computing device.
The mobile computing device may be arranged in communication with the personal information database for allowing uploading of the biometric data and/or identification information. The mobile computing device may include at least one feature for allowing scanning and/or capturing of the anatomy of the person so as to obtain the biometric data. The feature may be in the form of a camera, a scanner, a touch screen, a microphone and the like. The obtained biometric data may relate to the person's iris, face, fingerprint, palm, voice and/or any other defining anatomy or parts thereof. The mobile computing device may include at least one input feature for allowing input of identification information for the person. The input feature may be in the form of a keypad, a voice-activated prompt and the like. The identification information may relate to an identity number, passport number, a tax number, a physical address, a postal address, a contact number and the like. The mobile computing device may include a locating feature such as global positioning service (GPS) capabilities for locating a position thereof. The mobile computing device may be any one or more of the group selected from but not limited to, a smart phone, a tablet device, a note pad device, a palm scanning/reading device, a laptop computer, a network equipment and a wearable electronic device such as a smart watch or smart glasses.
It is to be understood that the personal information database may be held, obtained and/or collated by a governing authority. The governing authority may be at least one government department and/or office. The personal information database may include personal information for the person which may be in the form of the governing authority's official records for the person. Different government departments and/or offices or the same government department and/or office located in different jurisdictions may each hold, obtain and/or collate a personal information database relating to its particular mandate. The personal information may include biometric data, identification information as well as any other personal information relating to the person. The personal information may include any one or more selected from the group including but not limited to biometric data which may relate to the person's iris; face; fingerprint; palm; voice and/or any other defining anatomy or parts thereof, an identity number, passport number, tax details, a physical address, a postal address, a contact number, birth details, death details, voting details, heritage details, , car license registration details, employment details, health details, criminal offences, traffic violations, judicial details, property ownership details, marital status, financial details, banking details, legal capacity, educational information, demographic classification, census information and the like.
It is to be further understood that the person may be a citizen and/or resident and/or refugee of the governing authority. The requester software application may include an access verification means for verifying authorised access thereto by a requester. The verification means may be in the form of a firewall and/or what is conventionally known as an authentication service. The verification means may further verify a type of authorised access by the requester, wherein the type of authorised access may limit and/or dictate which personal information the requester may retrieve from the personal information database. Alternatively, the requester software application may be configured to allow the type or level of access. It is to be appreciated that limiting access to personal information of the person will protect against inappropriate use thereof.
It is to be understood that the requester may be a governing authority official, representative and/or officer.
The requester software application may be configured to allow the requester to access the features and/or input features of the mobile computing device in order to obtain the biometric data and/or identification information for uploading to the personal information database for verification thereof. The requester software application may be further configured to access the locating feature of the mobile computing device so as to determine an appropriate communication path for uploading to the personal information database. When there is more than one personal information database which is accessible by the requester, the requester software application may access the locating feature to determine the appropriate personal information database to be accessed, based on jurisdiction.
The system may be configured to record and log the details of all verification and access to personal information and records transactions. Typically, the details are to include date and time, identity of the requestor, location of the requestor and information and records accessed by the requestor. It is to be appreciated that such an audit trail will further prevent unauthorised use of personal information and records. The requester application software may include a graphical interface for allowing operation thereof by the requester. The graphical interface may include a selection of personal information from which the requester may select and request specific personal information for retrieval from one or more personal information databases. For example, the requester may select and request to retrieve outstanding traffic violations for the person once the person's identity has been verified.
The requester software application may include an encryption programme which may be encoded/programmed therein for encrypting data uploaded from and/or decrypting data downloaded to the mobile computing device.
In a first embodiment of the invention the personal information database may be stored on a memory resource which may form part of a computer. The computer may be in the form of a server. The server may be arranged in communication with the mobile computing device and therefore the requester software application to receive the obtained biometric data and/or identification information for verification thereof as well the request for personal information selected by the requester.
Preferably, a plurality of memory resources may be provided, wherein each memory resource may store a different personal information database. The memory resources may be part of a computing system, wherein each memory resource may form part of each computer which comprises the computing system. Each of the computers in the system may be in the form of a server. The computers of the computing system may be arranged in communication with each other and/or with the mobile computing device to allow identity verification against and/or retrieval of personal information from one or more databases.
The memory resource may be in the form of a volatile and/or a non-volatile memory. The volatile memory may be in the form of random-access memory (RAM).
The non-volatile memory may be in the form of read-only memory (ROM).
The memory resource may be selected from any one or more of the group consisting of a hard-drive, a solid state drive, a magnetic tape and an optical disc.
A service software application may be provided which is installable on the computer. The service software application may be complementary to the requester software application for allowing downloading of data uploaded from the mobile computing device.
The service software application may include an encryption programme which may be encoded/programmed therein for decrypting downloaded data and/or encrypting uploaded data.
The service software application may include a sequence of code which may include computer-executable instructions to enable the computer to verify the obtained biometric data/identification information by comparison thereof against the personal information database. The instructions may further enable the computer to search the database so as to retrieve the requested personal information selected by the requester. The result of the verification and/or the retrieved personal information may be uploaded for retrieval and/or downloading thereof by the mobile computing device.
Alternatively, an operator of the service software application may communicate the result of the verification and/or the retrieved personal information to the requester. The operator may be in the form of a person such as an agent in a call centre and/or a governing authority official, representative and/or officer which has authorised access to the service software application. Communication may be in the form of a call or text message to the requester.
The service software application may include an access verification means which verifies authorised access by an operator. The verification means may be in the form of firewall and/or what is conventionally known as an authentication service. The verification means may further verify a type of authorised access by the operator, wherein the type of authorised access may limit and/or dictate which personal information the operator may access from the personal information database. Alternatively, the service software application may be configured to allow the type or level of access. It is to be appreciated that limiting access to personal information of the person will protect against inappropriate use thereof.
The service software application may include a graphical interface which allows operation thereof by the operator. The graphical interface may be configured to graphically represent the result of the verification and/or the retrieved personal information to the operator.
In a second embodiment of the invention, there may be provided a controlling computing device for controlling communication between the mobile computing device and the computer and/or the computing system. The controlling computing device may be in the form of a server or what is conventional known as a back-end server. There may be a plurality of controlling computing devices provided which may be arranged in communication with each other. The controlling computing device and/or the computing system may form what is conventionally known as a cloud-computing.
In this embodiment, the service software application may be installable on the controlling computing device alone or both the controlling computing device and the computing system. The service application software may configure the controlling computing device to receive and/or download the obtained biometric data and/or identification information as well as the request for personal information selected by the requester from the mobile computing device. The service software application may further configure the controlling computing device to determine and access one or more personal information databases based on the positioning of the mobile computing device and/or the personal information requested. Upon access to the database/s, the service software application may include computer-executable instructions to enable the controlling computing device to verify the obtained biometric data/identification information by comparison thereof against the personal information database and to retrieve the requested personal information selected by the requester. The result of the verification and/or the retrieved of personal information may be uploaded for retrieval and/or downloading thereof by the mobile computing device.
It is to be understood that communication in the system may be via any suitable transmitting means or network.
The transmitting means or network may be selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.
According to a second aspect of the invention, there is provided a method for identifying persons of interest, the method including: - obtaining biometric data and/or identification information of a person using a mobile computing device; sending or uploading of the biometric data and/or identification information, by way of a requester software application which is installable on the mobile computing device, to a personal information database for verification of the biometric data and/or identification information; retrieving or downloading the verified biometric and/or identification information as well as any other personal information for the person from the personal information database by means of the requester software application; and displaying it on the mobile computing device.
Authorised accessing of the requester software application by a requester may be carried out using an access verification means. The verification means may be part of the requester software application which may be in the form of a firewall and/or what is conventionally known as an authentication service.
Recognising a type or level of authorised access by the requester may be carried out by the access verification means, wherein the type or level of authorised access may limit and/or dictate which personal information may be retrieved by the requester. Alternatively, recognising of the type or level of authorised access may be carried out by the requester software application. It is to be appreciated that limiting and/or dictating access to personal information of the person will protect against inappropriate use thereof.
Accessing and/or operating features of the mobile computing device may be permitted by the requester software application. The features may be in the form of a camera, a scanner, a touch screen, a microphone and the like.
Scanning and/or capturing the anatomy of the person or parts thereof may be performed by using the features of the mobile computing device in order to obtain the biometric data. The obtained biometric data may relate to the person's iris, face, fingerprint, palm, voice and/or any other defining anatomy or parts thereof.
Accessing and/or operating input features of the mobile computing device may be permitted by the requester software application. The input features may be in the form of a keypad, a voice-activated prompt and the like. Inputting of the identification information may be performed by using the input features of the mobile computing device. The identification information may relate to an identity number, passport number, a tax number, a physical address, a postal address, a contact number and the like.
Encrypting of the obtained biometric data/identification information may be carried out by an encryption programme which may be encoded/programmed into the requester software application.
The method may include the step of recording and logging the details of all verification and access to personal information and records transactions. Typically, the details are to include date and time, identity of the requestor, location of the requestor and information and records accessed by the requestor.
Sending and/or uploading of the obtained biometric data/identification information may be via any suitable network and or transmitting means.
Receiving and/or downloading of the obtained biometric data/identification information may be by carried out by a computer which may have the personal information database stored therein.
Decrypting of the received and/or downloaded data may be carried out by an encryption programme which may be encoded/programmed into a service software application which may be installed on the computer.
Comparing of the obtained biometric data/identification information to details of the person stored in the personal information database in order to verify an identify of the person. The comparison may be carried out by the computer or more particularly, a processor of the computer, which may be instructed to carry out the comparison by computer-executable instructions encoded in the service software application.
Retrieval, based on a result of the verification of the person's identity, of the personal information which is of interest to the requester may be carried out by the computer or more particularly, a processor of the computer, which may search the personal information database in order to retrieve the personal information of interest to the requester.
Encrypting of the verified identity for the person as well as the retrieved personal information may be carried out by the encryption programme.
Sending and/or uploading of the encrypted data to the mobile computing device may be via any suitable network and/or transmitting means.
Retrieval and/or downloading of the encrypted data may be followed by decrypting thereof by the encryption programme.
The transmitting means or network may be selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.
BRIEF DESCRIPTION OF THE DRAWINGS
A system for identifying persons of interest in accordance with the invention will now be described by way of the following, non-limiting examples with reference to the accompanying figure.
In the figure: - Figure 1 is a schematic illustration of the flow of data in a first embodiment of a system for identifying person of interest in accordance with the present invention.
Figure 2 is a schematic illustration of the flow of data in a second embodiment of a system for identifying person of interest in accordance with the present invention.
DETAILED DESCRIPTION OF THE INVENTION
An embodiment of a system for identifying persons of interest 10, in accordance with the invention will now be described by way of a non-limiting example, with reference to the accompanying flowcharts as illustrated in figure 1 and 2. The system 10 includes a mobile computing device 12, which is configured to obtain biometric data of a person 14 by a requester 16, a requester software application 18 which is installable on the mobile computing device 12, which application 18 configures the mobile computing device 12 to upload the biometric data and/or identification information of the person 14 to a personal information database 20 for verification of thereof, and the requester software application 18 further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person 14 from the personal information database 20 so as to display it on the mobile computing device 12.
The mobile computing device 12 may be arranged in communication with the personal information database 20 for allowing uploading of the biometric data. The mobile computing device 12 can include a built-in palm vein reader 22 to obtain biometric data related to the person's palm vein configuration. Preferably, the palm vein reader 22 is arranged in communication with the mobile computing device 12. Whilst there are many palm vein readers available on the market, the inventor envisions to use any one of the Fujitsu palm vein readers. The mobile computing device 12 includes a locating feature typically in the form of global positioning service (GPS) capabilities for locating a position thereof. The mobile computing device 12 is typically in the form of a smart phone. It is to be understood that the personal information database 20 relates to personal information for the person 14. The personal information are the official records for a governing authority. Whilst the governing authority can be any organisation that has official records for the person 14, in this embodiment, the governing authority is the government of a country which comprises governmental departments 24 and offices. Each type of governmental department 24 and office can be responsible for obtaining and collating personal information for the person 14 according to its mandate. Therefore, each governmental department 24 and office can have different personal information databases 20 which include different personal information for the person 14. Each governmental department 24 and office can however have several branches in different jurisdictional regions. In this instance, the branches can also have a responsibility to obtain and collate personal information for the personal information database 20, however, it may be for different persons 14 based on jurisdiction, therefore different personal information databases 20 can be held by different branches. Across the government authority personal information databases, the personal information included therein can relate to biometric data which may relate to the person's iris; face; fingerprint; palm; voice and/or any other defining anatomy or parts thereof, an identity number, passport number, tax details, a physical address, a postal address, a contact number, birth details, death details, voting details, heritage details, , car license registration details, employment details, health details, criminal offences, traffic violations, judicial details, property ownership details, marital status, financial details, banking details, legal capacity, educational information, demographic classification, census information and the like.
It is to be understood that the person 14 can be a citizen, a resident or refugee of a country.
The requester software application 18 includes an access verification means 26 for verifying authorised access thereto by a requester 16. The verification means 26 is in the form of what is conventionally known as an authentication service. The access verification means 26 further verifies a level of authorised access by the requester 16, wherein the level of authorised access limits which personal information the requester 16 retrieves from the personal information database 20. For example, if the requester 16 is a traffic officer, he or she may have a level of authorised access which allows accessing of biometric data from personal database 20.1 for verification of the obtained biometric data there against, criminal records from database 20.2 as well as outstanding traffic fines from database 20.3.
It is to be understood that the requester 16 can be any governing authority official, representative or officer which has authorised access.
The requester software application 18 is configured to allow the requester 16 to access the palm vein reader 22 of the mobile computing device 12 in order to obtain the biometric data for uploading to the personal information database 20 for verification thereof. The requester software application 18 is further configured to access the locating feature of the mobile computing device 12 so as to determine an appropriate communication path for uploading to the personal information database 20. When there is more than one personal information database 20 which is accessible by the requester 16, the requester software application 18 accesses the locating feature to determine the appropriate personal information database 20 to be accessed, based on jurisdiction.
The system 10 is configured to record and log the details of all verification and access to personal information and records transactions. Typically, the details are to include date and time, identity of the requestor, location of the requestor and information and records accessed by the requestor 16. It is to be appreciated that such an audit trail will further prevent unauthorised use of personal information and records.
The requester application software 18 includes a graphical interface (not shown) for allowing operation thereof by the requester 16. The graphical interface includes a selection of personal information from which the requester 16 can select and request specific personal information for retrieval from one or more personal information databases 20. For example, the traffic officer can select and request to retrieve the criminal records from database 20.2 as well as outstanding traffic violations from database 20.3 for the person 14 once the person's identity has been verified against database 20.1.
The requester software application 18 includes an encryption programme which is encoded/programmed therein for encrypting data uploaded from and/or decrypting data downloaded to the mobile computing device 12.
In a first embodiment of the invention as shown in figure 1 , each personal information database 20 is stored on a memory resource 28 wherein each memory resource 28 forms part of a computer 30 which comprises a computing system 32. Each of the computers 30 in the computing system 32 is in the form of a server. The computers 30 of the computing system 32 is arranged in communication with each other to allow for identity verification against and retrieval of personal information from more than one database 20. For example, computer 30.1 may receive the obtained biometric data of the person 14 from the mobile computing device 12 for verification against database 20.1 as well as the request for the person's criminal records and outstanding traffic fines. Once the obtained biometric data for the person 14 has been verified, computer 30.1 provides computer 30.2 with a key specific to the person 14 in order to receive the criminal records from database 20.2. Computer 30.1 also provides computer 30.3 with the key in order to receive the outstanding traffic fines for the person 14 from database 20.3. Once computer 30.1 has all the requested personal information, it is uploaded to the mobile computing device 12. It is to be appreciated whilst the present network architecture has been described, various network architecture can be implemented.
The memory resource 28 is in the form of a volatile and a non-volatile memory.
The volatile memory may be in the form of random-access memory (RAM). The non-volatile memory may be in the form of read-only memory (ROM).
The memory resource 28 is selected from any one or more of the group consisting of a hard-drive, a solid state drive, a magnetic tape and an optical disc.
A service software application 34 is provided which is installable on the computer 30. The service software application 34 is complementary to the requester software application 18 for allowing downloading of data uploaded from the mobile computing device 12.
The service software application 34 includes an encryption programme which may be encoded/programmed therein for decrypting downloaded data and/or encrypting uploaded data.
The service software application 34 includes a sequence of code which may include computer-executable instructions to enable the computer 30 to verify the obtained biometric data/identification information by comparison thereof against the personal information database 20. The instructions may further enable the computer 30 to search the database 20 so as to retrieve the requested personal information selected by the requester 16. A result of the verification as well as the retrieved personal information is uploaded for downloading thereof by the mobile computing device 12. The result of the verification of identification can include a profile for the person 14. The profile can include a picture, identification number, residential address, postal address and contact details.
In a second embodiment of the invention 1 10 as shown in figure 2, there is provided a controlling computing device in the form of a back-end server 136 for controlling communication between the mobile computing device 112 and the computing system 132. Typically, there are a plurality of back-end servers 136 provided which are arranged in communication with each other. The back-end servers 136 and the computing system 32 form what is conventionally known as a cloud- computing 138.
In this embodiment, the service software application 134 is installable on each of the back-end servers 136. The service application software 134 configures the back-end servers 136 to download the obtained biometric data as well as the request for personal information selected by the requester 116 from the mobile computing device 1 12. The service software application 134 configures the back-end servers 136 to determine and access one or more personal information databases 120 based on the positioning of the mobile computing device 1 12 and the personal information requested. Upon access to the database/s, the service software application 134 includes computer-executable instructions to enable the back-end server 136 to verify the obtained biometric data by comparison thereof against the personal information database 120 and to retrieve the requested personal information selected by the requester 1 16. The result of the verification and the retrieved of personal information is uploaded for downloading thereof by the mobile computing device 1 12. For example, the back-end server 136 geographically closest to the mobile computing device 1 12 of the traffic officer 1 16, determined using the locating feature of the device 1 12, receives the obtained biometric data and the request for criminal records and outstanding traffic fines select by the traffic officer 1 16. The back-end server 136 accesses database 120.1 in computer 130.1 in order to verify the identity of the person 114. Once the person's 114 identity is verified, the back-end server 136 accesses database 120.2 on computer 130.2. Using a key specific to the person 1 14, the back- end server retrieves the criminal records for person 1 14 therefrom. The same is performed for the traffic fines using database 120.3 on computer 130.3. The back-end server 136 then uploads all the data to be downloaded by the mobile computing device 1 12.
It is to be understood that communication in the system 10 is via any suitable transmitting means or network. The transmitting means or network is selected from any one or more of the group consisting of, the internet, Bluetooth, Wi-Fi, cellular network, electrical connection and radio waves.
Although only certain embodiments of the invention have been described herein, it will be understood by any person skilled in the art that other modifications, variations, and possibilities of the invention are possible. Such modifications, variations and possibilities are therefore to be considered as falling within the spirit and scope of the invention and hence form part of the invention as herein described and/or exemplified. It is further to be understood that the examples are provided for illustrating the invention further and to assist a person skilled in the art with understanding the invention and is not meant to be construed as unduly limiting the reasonable scope of the invention.

Claims

1. A system for identifying persons of interest which includes: - a mobile computing device, which is configured to obtain biometric data and/or receive input of identification information of a person by a requester; a requester software application which is installable on the mobile computing device, which application configures the mobile computing device to upload the biometric data and/or identification information of the person to a personal information database for verification of thereof; and the requester software application further being configured to retrieve or download the verified biometric and/or identification information as well as any other personal information for the person from the personal information database so as to display it on the mobile computing device.
2. A system for identifying persons of interest as claimed in claim 1 , wherein the mobile computing device is arranged in communication with the personal information database for allowing uploading of the biometric data and/or identification information.
3. A system for identifying persons of interest as claimed in claim 1 or claim 2, wherein the mobile computing device includes at least one feature for allowing scanning and/or capturing of the anatomy of the person so as to obtain the biometric data.
4. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein the mobile computing device may include at least one input feature for allowing input of identification information for the person.
5. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein the mobile computing device may include a locating feature for locating a position thereof.
6. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein the mobile computing device is any one or more of the group selected from but not limited to, a smart phone, a tablet device, a note pad device, a palm scanning/reading device, a laptop computer, a network equipment and a wearable electronic device such as a smart watch or smart glasses.
7. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein the requester software application includes an access verification means for verifying authorised access thereto by a requester.
8. A system for identifying persons of interest as claimed in claim 7 wherein the verification means further verifies a type or level of authorised access by the requester, wherein the type or level of authorised access limits which personal information the requester is able to retrieve from the personal information database.
9. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein the requester software application is configured to allow the type or level of authorised access by the requester, wherein the type of authorised access limits which personal information the requester is able to retrieve from the personal information database.
10. A system for identifying persons of interest as claimed in any one or more of claims 3 to 9 wherein the requester software application is configured to allow the requester to access the features and the input features of the mobile computing device in order to obtain the biometric data and/or identification information for uploading to the personal information database for verification thereof.
1 1. A system for identifying persons of interest as claimed in any one or more of claims 5 to 9 wherein the requester software application is configured to access the locating feature of the mobile computing device so as to determine an appropriate personal information database to be accessed, based on jurisdiction, when there is a plurality of personal information databases provided.
12. A system for identifying persons of interest as claimed in any one or more or the preceding claims the system is configured to record and log the details of all verification and access to personal information and records transactions.
13. A system for identifying persons of interest as claimed in claim 12 wherein the details recorded and logged is any one or more selected from the group including but not limited to, a date, a time, an identity of the requestor, a location of the requestor and information and records accessed by the requestor.
14. A system for identifying persons of interest as claimed in any one or more or the preceding claims wherein the requester application software includes a graphical interface for allowing operation thereof by the requester.
15. A system for identifying persons of interest as claimed in claim 14 wherein the graphical interface includes a selection of personal information from which the requester selects and requests specific personal information for retrieval from one or more personal information databases.
16. A system for identifying persons of interest as claimed in any one or more or the preceding claims wherein the requester software application includes an encryption programme which is programmed therein for encrypting data uploaded from and decrypting data downloaded to the mobile computing device.
17. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein one or more personal information databases is stored on one or more memory resources.
18. A system for identifying persons of interest as claimed in claim 17 wherein one or more memory resources form part of a computer.
19. A system for identifying persons of interest as claimed in claim 18 wherein the computer is in the form of a server.
20. A system for identifying persons of interest as claimed in claim 18 or claim 19 wherein the computer is arranged in communication with the mobile computing device and therefore the requester software application to receive the obtained biometric data and/or identification information for verification thereof as well the request for personal information selected by the requester.
21. A system for identifying persons of interest as claimed in any one or more of claims 18 to 20 wherein two or more computers form part of a computing system.
22. A system for identifying persons of interest as claimed in claim 21 wherein the computers of the computing system are arranged in communication with each other and/or with the mobile computing device to allow identity verification against and retrieval of personal information from one or more databases.
23. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein a service software application is provided which is installable on the computer.
24. A system for identifying persons of interest as claimed in claim 23 wherein the service software application is configured to be complementary to the requester software application for allowing downloading of data uploaded from the mobile computing device.
25. A system for identifying persons of interest as claimed in claim 23 or claim 24 wherein the service software application includes an encryption programme which is programmed therein for decrypting downloaded data and encrypting uploaded data.
26. A system for identifying persons of interest as claimed in any one or more of claims 23 to 25 wherein the service software application includes a sequence of code which includes computer-executable instructions to enable the computer to verify the obtained biometric data and/or identification information by comparison thereof against the personal information database.
27. A system for identifying persons of interest as claimed in claim 26 wherein the instructions enable the computer to search the database so as to retrieve the requested personal information selected by the requester.
28. A system for identifying persons of interest as claimed in any one or more of claims 23 to 27 wherein the service software application uploads a result of the verification of identify as well as the retrieved requested personal information for the person selected by the requester, to the mobile computing device.
29. A system for identifying persons of interest as claimed in any one or more of claims 23 to 27 wherein an operator of the service software application communicates the result of the verification of identify as well as the retrieved requested personal information for the person selected by the requester, wherein the operator is in the form of a person such as an agent in a call centre or a governing authority representative.
30. A system for identifying persons of interest as claimed in claim 29 wherein the service software application includes an access verification means which verifies authorised access by an operator.
31. A system for identifying persons of interest as claimed in claim 29 or claim 30 wherein the verification means verifies a type or level of authorised access by the operator, wherein the type or level of authorised access limits which personal information the operator accesses from the personal information database.
32. A system for identifying persons of interest as claimed in any one or more of claims 29 to 31 wherein the service software application is configured to allow the type or level of access by the operator.
33. A system for identifying persons of interest as claimed in any one or more of claims 29 to 32 wherein the service software application includes a graphical interface which allows operation thereof by the operator.
34. A system for identifying persons of interest as claimed in claim 33 wherein the graphical interface is configured to graphically represent the result of the verification and the retrieved personal information to the operator.
35. A system for identifying persons of interest as claimed in any one or more of the preceding claims wherein a controlling computing device is provided for controlling communication between the mobile computing device and personal information database.
38. A system for identifying persons of interest as claimed in any one or more of claims 18 to 35 wherein the controlling computing device controls communication between the mobile computing device and the computer.
37. A system for identifying persons of interest as claimed in claim 35 or claim 36 wherein the controlling computing device is in the form of a server.
38. A system for identifying persons of interest as claimed in any one or more of claims 35 to 37 wherein there are provided a plurality of controlling computing devices arranged in communication with each other.
39. A system for identifying persons of interest as claimed in any one or more of claims 35 to 38 wherein the service software application is installable on the controlling computing device.
40. A system for identifying persons of interest as claimed in any one or more of claims 35 to 39 wherein the service application software configures the controlling computing device to download the obtained biometric data and/or identification information as well as the request for personal information selected by the requester from the mobile computing device.
41. A system for identifying persons of interest as claimed in any one or more of claims 35 to 40 wherein the service software application configures the controlling computing device to determine and access one or more personal information databases based on the positioning of the mobile computing device and/or the personal information requested.
42. A system for identifying persons of interest as claimed in any one or more of claims 35 to 41 wherein the service software application includes computer-executable instructions to enable the controlling computing device to verify the obtained biometric data/identification information by comparison thereof against the personal information database and to retrieve the requested personal information selected by the requester from one or more personal information databases.
43. A system for identifying persons of interest as claimed in any one or more of claims 35 to 42 wherein a result of the verification and the retrieved personal information is uploaded for downloading thereof by the mobile computing device.
44. A method for identifying persons of interest, the method including: - obtaining biometric data and/or identification information of a person using a mobile computing device;
sending or uploading of the biometric data and/or identification information, by way of a requester software application which is installable on the mobile computing device, to a personal information database for verification of the biometric data and/or identification information; retrieving or downloading the verified biometric and/or identification information as well as any other personal information for the person from the personal information database by means of the requester software application; and displaying it on the mobile computing device.
45. A method for identifying persons of interest as claimed in claim 44 wherein authorised accessing of the requester software application by a requester is carried out using an access verification means.
46. A method for identifying persons of interest as claimed in claim 45 wherein the verification means is in the form of what is conventionally known as an authentication service.
47. A method for identifying persons of interest as claimed in claim 45 or claim 46 wherein recognising of a type of authorised access by the requester which is carried out by the access verification means, wherein the type of authorised access limits which personal information is retrieved by the requester.
48. A method for identifying persons of interest as claimed in any one or more of claims 44 to 47 wherein recognising of a type of authorised access is carried out by the requester software application wherein the type of authorised access limits which personal information is retrieved by the requester
49. A method for identifying persons of interest as claimed in any one or more of claims 44 to 48 wherein accessing and operating a feature of the mobile computing device is permitted by the requester software application.
50. A method for identifying persons of interest as claimed in claim 49 wherein the feature is in the form of any one or more selected from the group including but not limited to a camera, a scanner, a touch screen, a microphone and the like.
51. A method for identifying persons of interest as claimed in claim 49 or claim 50 wherein scanning or capturing the anatomy or parts thereof of the person is performed by using one or more features of the mobile computing device in order to obtain the biometric data.
52. A method for identifying persons of interest as claimed in any one or more of claims 44 to 51 wherein accessing and operating an input feature of the mobile computing device is permitted by the requester software application.
53. A method for identifying persons of interest as claimed in claim 52 wherein the input feature is any one or more selected from the group including but not limited to, a keypad, a voice-activated prompt and the tike.
54. A method for identifying persons of interest as claimed in claim 52 or claim 53 wherein inputting of the identification information is performed by using the input features of the mobile computing device.
55. A method for identifying persons of interest as claimed in any one or more of claims 44 to 54 wherein encrypting of the obtained biometric data and/or identification information is carried out by an encryption programme which is programmed into the requester software application.
56. A method for identifying persons of interest as claimed in any one or more of claims 44 to 55 wherein step of recording and logging the details of all verification and access to personal information and records transactions are carried out
57. A method for identifying persons of interest as claimed in claim 56 wherein the details recorded and logged is one or more selected from the group including but not limited to, a date, a time, and identity of the requestor, a location of the requestor and information and records accessed by the requestor.
58. A method for identifying persons of interest as claimed in any one or more of claims 44 to 57 wherein downloading of the obtained biometric data and/or identification information is carried out by a computer which has the personal information database stored therein.
59. A method for identifying persons of interest as claimed in claim 58 wherein decrypting of the downloaded data is carried out by an encryption programme programmed into a service software application installed on the computer.
60. A method for identifying persons of interest as claimed in claim 58 or claim 59 wherein comparing of the obtained biometric data and/or identification information to details of the person stored in the personal information database in order to verify an identify of the person, the comparison being carried out by a processor of the computer which is instructed to carry out the comparison by computer-executable instructions encoded in the service software application.
61. A method for identifying persons of interest as claimed in claim 60 wherein retrieval, based on a result of the verification of the person's identity, of the personal information which is of interest to the requester is carried out by the processor which searches the personal information database in order to retrieve the relevant personal information.
62. A method for identifying persons of interest as claimed in claim 61 wherein encrypting of the verified identity for the person as well as the retrieved personal information is carried out by the encryption programme.
63. A method for identifying persons of interest as claimed in claim 62 wherein uploading of the encrypted data to the mobile computing device is via any suitable network and/or transmitting means.
64. A method for identifying persons of interest as claimed in claim 63 wherein downloading of the encrypted data by the mobile computing device followed by decrypting thereof by the encryption programme in the requester software application.
65. A system for identifying persons of interest, according to the invention, substantially as hereinbefore described or exemplified.
66. A system for identifying persons of interest, as specifically described with reference to or as illustrated in any one of the accompanying drawings.
67. A system for identifying persons of interest, including any new or inventive integer or combination of integers, substantially as herein described.
PCT/ZA2018/050059 2017-11-13 2018-11-13 A system for identifying persons of interest WO2019094993A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
ZA2020/05630A ZA202005630B (en) 2017-11-13 2020-09-10 A system for identifying persons of interest

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2017/07688 2017-11-13
ZA201707688 2017-11-13

Publications (1)

Publication Number Publication Date
WO2019094993A1 true WO2019094993A1 (en) 2019-05-16

Family

ID=66438681

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2018/050059 WO2019094993A1 (en) 2017-11-13 2018-11-13 A system for identifying persons of interest

Country Status (2)

Country Link
WO (1) WO2019094993A1 (en)
ZA (1) ZA202005630B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022082268A1 (en) * 2020-10-22 2022-04-28 Verifai Pty Ltd A locking system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999016025A1 (en) * 1997-09-25 1999-04-01 Raytheon Company Stand-alone biometric identification system
US20030065626A1 (en) * 2001-09-28 2003-04-03 Allen Karl H. User verification for conducting health-related transactions
US20070288998A1 (en) * 2006-05-23 2007-12-13 Ganesh Gudigara System and method for biometric authentication
US20130081119A1 (en) * 2011-09-27 2013-03-28 George P. Sampas Mobile device-based authentication
US20170041324A1 (en) * 2015-08-04 2017-02-09 Pawn Detail, LLC Systems and methods for personal property information management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999016025A1 (en) * 1997-09-25 1999-04-01 Raytheon Company Stand-alone biometric identification system
US20030065626A1 (en) * 2001-09-28 2003-04-03 Allen Karl H. User verification for conducting health-related transactions
US20070288998A1 (en) * 2006-05-23 2007-12-13 Ganesh Gudigara System and method for biometric authentication
US20130081119A1 (en) * 2011-09-27 2013-03-28 George P. Sampas Mobile device-based authentication
US20170041324A1 (en) * 2015-08-04 2017-02-09 Pawn Detail, LLC Systems and methods for personal property information management

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022082268A1 (en) * 2020-10-22 2022-04-28 Verifai Pty Ltd A locking system

Also Published As

Publication number Publication date
ZA202005630B (en) 2022-03-30

Similar Documents

Publication Publication Date Title
US11423131B2 (en) Systems and methods for improving KBA identity authentication questions
US20180253539A1 (en) Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates.
EP1669836A1 (en) User authentication by combining speaker verification and reverse turing test
US10027648B2 (en) Geolocation dependent variable authentication
WO2018102553A1 (en) System and method for unified inmate information and provisioning
US11550957B2 (en) Securing user-entered text in-transit
US20110087602A1 (en) Electronic display device content caching and transactions
US9838468B2 (en) System and method for directing entrants at a checkpoint using a mobile device
US20160196509A1 (en) Ticket authorisation
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
US11777929B2 (en) Field forensic method to acquire adaptable format biometric evidentiary proof of having complied with the special consent provisions of countries' data protection regulations
WO2019094993A1 (en) A system for identifying persons of interest
US20220335154A1 (en) Predictive response-generation systems to facilitate timely compliance with information-disclosure laws
US11418502B2 (en) Input entry based on user identity validation
EP1602999B1 (en) Data reproduction method
GB2597112A (en) Computer platform and method for securely exchanging confidential data and generating legal documents
US9842441B1 (en) System and method for determining entry into a secured facility at a checkpoint
US20230036423A1 (en) Method and Apparatus for Obtaining Identifying Information from Biometric Data
US9984517B2 (en) System and method for determining entry to a secured area at a checkpoint
US11694508B2 (en) Player identification and tracking systems and methods
US11803899B2 (en) Using proof of purchase for multifactor authentication
O’Regan Public Law, the Digital World and Human Rights: Challenges Ahead
WO2006138748A2 (en) Wills and testaments
Stojičić et al. Towards the development of readiness for the application of the principles of electronic business for the exchange of biometric data kept in automated systems as a basis for establishing the identity of persons
Stojicic et al. U susret razvoju spremnosti za primenu principa elektronskog poslovanja za razmenu biometrijskih podataka koji se vode u automatizovanim sistemima kao osnova za utvrđivanje identiteta lica

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18876851

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18876851

Country of ref document: EP

Kind code of ref document: A1