WO2001023978A2 - Remotely accessible global personal information database - Google Patents

Remotely accessible global personal information database Download PDF

Info

Publication number
WO2001023978A2
WO2001023978A2 PCT/US2000/026809 US0026809W WO0123978A2 WO 2001023978 A2 WO2001023978 A2 WO 2001023978A2 US 0026809 W US0026809 W US 0026809W WO 0123978 A2 WO0123978 A2 WO 0123978A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
personal information
encryption
code
Prior art date
Application number
PCT/US2000/026809
Other languages
French (fr)
Other versions
WO2001023978A3 (en
Inventor
Bruce Denson
Original Assignee
Senetas Corp. Ltd. (Usa)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Senetas Corp. Ltd. (Usa) filed Critical Senetas Corp. Ltd. (Usa)
Priority to AU14308/01A priority Critical patent/AU1430801A/en
Publication of WO2001023978A2 publication Critical patent/WO2001023978A2/en
Publication of WO2001023978A3 publication Critical patent/WO2001023978A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Definitions

  • Certain internet resources e.g.,
  • the present application teaches a system of
  • This repository of information include information of
  • a special code is allowed to allow a user to
  • the present application teaches a system which
  • the present application refers to a product
  • EPIL is accessed through
  • FIG. 1 A server
  • computer 100 at a central location, stores a
  • interfacing program such as a web browser.
  • server computer 100 is connected to a network 110,
  • the network can be the Internet,
  • the ⁇ of information.
  • the ⁇ of information.
  • the ⁇ of information.
  • the ⁇ of information.
  • the ⁇ of information.
  • network 110 may be a dedicated dial-up or LAN
  • the network comprises at least an
  • the information line and a router 130.
  • line 110 can be a telephone line and the router 130
  • the server computer 100 runs a routine that is described
  • Client 120 is shown at a remote
  • the client computer 120 can be any computer
  • client computer can have various peripherals attached
  • peripherals can include, for example,
  • a camera 135, a biometric reader 136, and the like are examples of the like.
  • each of the client computers is configured to operate.
  • the profile may be
  • multitasking system can be used to handle these tasks
  • FIG. 2 shows the operation.
  • the first step 200 the first step
  • client computer 120 transmits a log on request to the
  • server computer This can be done by entering a user
  • the server computer recognizes an
  • the server obtains the
  • profile includes information that was entered to
  • the client sends an
  • the client to request information to be used to
  • Figure 3 has fields for the basic personal
  • This information is
  • the user fills out the information screen of
  • the database then generates a response
  • the public key is a code number that is formed from
  • the ePIL server also generates an
  • the private key is only known to the ePIL
  • public key is based on personal information of the
  • the ePIL database/server can recognize a user's
  • the code numbers may be
  • the ePIL code number can be
  • IP address of the user e.g., the IP address of the user.
  • the response must be received within a certain
  • IP address being obtained twice. If the user does
  • the public key can depend on any or all of the
  • ePIL version 1 is a basic module with
  • ePIL version 2 is a more detailed module with
  • ePIL version 3 is similar to version 2 without
  • ePIL version 4 allows a level 2 open attachment
  • Version 5 includes the version 2 module with a
  • An anniversary billing system may be used to notify the user of an anniversary billing system.
  • the system may
  • associations can use the ePIL as a
  • the chart shows an individual inviting friends
  • an employer can receive a resume via
  • the user information is also shown in Figure 6.
  • the system shows using an ePIL code number as the

Abstract

A remotely accessible personal information database (105). The information in the database is stored in encrypted form which requires keys for encryption and/or deep reduction. A private key is known only to the user (102), and the database itself is crypto logically unable to access the information in the database without the private key. The public key may be formed from the users personal information.

Description

REMOTELY ACCESSIBLE GLOBAL PERSONAL INFORMATION
DATABASE
This application claims the benefit of US Provisional
application no 60/156,775, filed September 29, 1999.
BACKGROUND
The internet is a powerful source of
information. However, one problem over the internet
is always security. Since the internet is publicly
accessible, is may be possible for someone to
intercept information that passes over the internet.
This may become even more problematic when the
information being reviewed includes private
information of some type; e.g., personal or sensitive
information.
Mistrust of internet resources is common among
internet users. Certain internet resources, e.g.,
websites, have admitted to surreptitious monitoring
of user activity. SUMMARY
The present application teaches a system of
providing a repository to a common database of
information where personal information can be stored.
This repository of information include information of
personal databases, formation of emails, and the
like. A special code is allowed to allow a user to
access the information from any desired location.
DETAILED DESCRIPTION
The present application teaches a system which
forms a permanent electronic but secure link to the
internet. A number of aspects are described,
including the way in which edits, uploads and
security are ensured.
According to an aspect, a single version is
distributed free to everyone. This version provides
the user with a basic electronic address, and
lifetime electronic link. A code number which is
assigned to the person provides a link to the
electronic information from any desired location. The present application refers to a product,
called ePIL. The product has special features which
allow information security. EPIL is accessed through
an internet website, or through a private network.
The basic hardware forming the basic setup of
the present invention is shown in Figure 1. A server
computer 100, at a central location, stores a
database of information, as well as a user interface
program, and a main program which can run a network
interfacing program, such as a web browser. The
server computer 100 is connected to a network 110,
which connects the server 100 to a plurality of
client computers. The network can be the Internet,
or can be any other network that allows an exchange
of information. For example, in one embodiment, the
network 110 may be a dedicated dial-up or LAN
network. The network comprises at least an
information line, and a router 130. The information
line 110 can be a telephone line and the router 130
can be the internet backbone, for example. The server computer 100 runs a routine that is described
with reference to the flowchart of figure 2.
Many client computers can be connected to the
server 100. Client 120 is shown at a remote
location.
The client computer 120 can be any computer
which is capable of running a network interfacing
program such as a web browser. In addition, the
client computer can have various peripherals attached
thereto. These peripherals can include, for example,
a camera 135, a biometric reader 136, and the like.
In operation, each of the client computers is
driven to run the specified routine under control of
the server 100.
According to the present application, the user
enters an initial profile, either over the network,
e.g., the Internet, or in person. The profile may be
supplemented over time.
The specified routines run by both the client
and server computers are shown in Figure 2. It
should be understood, however, that multiple client computers could simultaneously operate. When this
happens, this client part of the routine, shown on
the left in Figure 2, may have multiple clients
requesting information from the same server. Any
multitasking system can be used to handle these
requests .
Figure 2 shows the operation. At step 200, the
client computer 120 transmits a log on request to the
server computer. This can be done by entering a user
name and password. Alternatively, biometric
information can be obtained from the part 136 and
sent to the server computer 100. The biometric
information part uniquely identifies the user, and
hence serves as at least part of the log-in.
At step 210, the server computer recognizes an
accepted login corresponding to an authorized user.
In response to this detection, the server obtains the
pre-stored profile of the user 215. The pre-stored
profile includes information that was entered to
enroll the person into the system and also
information from previous system accesses. Each time the user accesses the system, additional information
can be added to the pre-stored profile and stored in
the main database 105 in server 100.
If the user is not recognized at 210, then a new
login is recognized at 225. The client sends an
information screen of the type shown in Figure 3 to
the client, to request information to be used to
begin the process of forming a new ePIL user.
The basic ePIL information screen shown in
Figure 3 , has fields for the basic personal
information, e.g, the person's name, address, etc. as
well as information allowing determining certain
information about the person. This information is
used to apply for a password, as shown in Figure 4.
The user fills out the information screen of
Figure 3 and submits it to the database/server at
405. The database then generates a response,
including a public key, a private key/unique password
for self-editing, as well as a random data element.
The public key is a code number that is formed from
an encrypted version of certain items of the user's personal information. The code numbers that are
generated at 410 will be used to encrypt all the
information.
At this time, the ePIL server also generates an
information screen and/or email at 415. The
information screen/email indicates to the user how to
use the ePIL product.
The private key is only known to the ePIL
member. The public key is known to the public. In
order to edit or access ePIL information, both the
private key and the (public) code number must be
entered together. However, certain information can
be entered using only the public key. Since the
public key is based on personal information of the
user, it can be regenerated remotely.
This dual key is necessary for self editing.
The ePIL database/server can recognize a user's
password; but is not able to externally identify it.
Therefore, the ePIL system is not cryptologically
able to access the private ePIL modules. No external
authority can carry out encryption or decryption without the private code. The code numbers may be
generated from the data entered in the data screen of
Figure 3. For example, the ePIL code number can be
generated as follows.
Number sequence 1st 2nd 3rd 4 th 5C
AU 3 6 1 1 1 etc .
Country origin Work Area Interest Interest Interest Zip Code The code number is derived from this and
other information, e.g, the IP address of the user.
The user must then respond, which is shown at
420. The response must be received within a certain
time e.g., within seven days. If the response is not
received within seven days, all codes are washed out
of the system at 430. This is done to eliminate a
hacker or graffitist whose main function may be to
create congestion. Otherwise, however, if a response
is received within seven days, then the codes are set
at 450 and may be used later on for further
operations . Special encryption systems are used according to
the present system. At 435 an additional detection
is made shown as security pass. In order to active
the listing at 435, the user response at 420 must
come from the same IP address. Other such tests are
also possible, since some users may have dynamic IP
addresses, which would effectively prevent the same
IP address being obtained twice. If the user does
not pass the test, the response will not be accepted
at 435.
The public key can depend on any or all of the
following: The IP address;
A random data element as part of the private key
The combination of IP address and a data element
for the private key
The user and the server IP address together;
The asci equivalent of the user's name and adds
the asci equivalent of BRD's mascot's name.
The versions of ePIL vary according to different
aspects. ePIL version 1 is a basic module with
standard data. It allows name, address, postal email, telephone, business work and interests. This
version of the program is intended to be given free.
The other versions described herein are available
only for cost .
ePIL version 2 is a more detailed module with
more data entry and functions. It also includes
facts, email generating subportal, web address,
company name, position, messages, attachments and web
links .
ePIL version 3 is similar to version 2 without
personal or business web link.
ePIL version 4 allows a level 2 open attachment
that can be accessed through the public key PILN.
Version 5 includes the version 2 module with a
level 3 closed attachments that allow access through
the dual key system. Other versions are also
possible .
An anniversary billing system may be used to
access this system. For example, the system may
automatically bill certain aspects at certain times.
If billing is not automatically obtained, certain
10 functions are disabled, including reversion to a
lower version. If payment is not made, the system
will eventually revert to the lowest version, here
version 1. The data will not die, but rather less
activity will be allowed. One way in which this
system can be used is shown in Figure 5. Different
locations are shown throughout the world. People who
inquire without specific numbers are given only
public access details that are revealed by the
client. This is shown at 500. The users can select
the public access details they release. Other users,
for example, associations, can use the ePIL as a
membership database center at 505. Users can log in
and use the ePIL from anywhere in the United States,
thereby providing information about the service. At
510, the chart shows an individual inviting friends
on holiday and supplying details via an ePIL data
attachment. This can be used from anywhere in the
world and can provide information to anywhere in the
world. AT 515, an employer can receive a resume via
an open modular attachment and make it a job offer by
11 return. At 520, the system shows ePIL allowing
keeping track of suppliers.
The user information is also shown in Figure 6.
The system shows using an ePIL code number as the
initial log in screen. After receiving the ePIL code
number, the system produces outputs, otherwise it
does not .
Although only a few embodiments have been
disclosed in detail above, other modifications are
possible.

Claims

What is Claimed is :
1. A method, comprising:
storing on a server connected to a publicly
available database, personal information about a user
of the database,
said storing including storing encrypted
information in a way that requires first and second
encryption keys; and
allowing access to certain parts of said
information using only one of said encryption keys
and allowing access to other parts of the information
only when both of the encryption keys are available,
wherein one of the encryption keys is known the only
to said user to prevent said server from getting
access to said information.
2. A method as in claim 1, further comprising
entering user characteristics into said database,
wherein said first and second encryption keys include
a public encryption key and public encryption key, said public encryption key being based on an
encrypted version of user characteristics.
3. A method as in claim 2, wherein said
encrypted characteristics include country of origin
of said user.
4. A method as in claim 2, wherein said
characteristics include user-defined interests
entered during said entering.
5. A method as in claim 2, wherein said
information includes a mailing code.
6. In method as in claim to wherein said key
includes an IP address of a user.
7. A method of storing information, comprising:
requiring user to enter a user profile which
includes a user's personal information;
14 Using at least part of said personal information
to form of first encryption key;
forming a second encryption key which is known
only to the user; and
allowing said user to access all information
therein only when said user has access to both said
first and second encryption keys .
8. A method as in claim 7 further comprising
reconstituting said first encryption key by
reentering said personal information.
9. A method of storing users personal information,
comprising:
in a client computer, prompting a user to enter
their personal information;
using a first encryption key in the client
computer, along with a second encryption key in a
server computer, to encrypt the information;
storing encrypted information which has been
encrypted with both said first and second encryption
keys ; and
15 allowing a user to access said information only
if said user is in possession of said second
encryption key, wherein said information is stored in
a way that makes said information cryptologically
unable to be obtained without said second encryption
key.
10. A method as in claim 9 wherein at least one
of said encryption keys is obtained from a user's
personal information.
11. A method as in claim 10 wherein said
personal information is translated into numbers, and
said numbers are used to form said encryption key.
12. A method as in claim 10, wherein said first
and second encryption keys include a public code
number and a private code number.
13. A method as in claim 12 wherein said public
code number is based on personal information of the
user.
16
14. A method as in claim 13 wherein said public
code number can be regenerated remotely by reentering
the user's personal information.
15. A method, comprising:
obtaining information about a user;
generating encryption codes about the user
including at least a first public encryption code and
a second private encryption code known only to the
user;
sending information to a user's registered
address indicative of said encryption codes;
allowing said information to be responded to;
if said information is not responded to within a
certain time, eliminating said codes; and
otherwise, establishing said codes and allowing
said user to use said codes to enter personal
information into a database.
16. A method as in claim 15, further comprising
forming said public encryption code by translating a
users personal information into numbers and carrying
out a specified relationship on said numbers to form
said encryption code.
17. A method as in claim 16 further comprising
allowing the user to regenerate said personal
information code by reentering said personal
information.
18. A method as in claim 16 wherein said personal
information includes a users IP address.
19. A method as in claim 16 wherein said personal
information also includes a random data element.
20. A method as in claim 16 wherein said personal
information includes obtaining a user's name, forming
an ASCII equivalent of the user's name, and using the
ASCII equivalent as part of the public code.
18
21. A method as in claim 15 further comprising
allowing data to be entered only if both said public
code and said private code are available.
22. A method as in claim 21, further comprising
allowing a user first level functionality as a free
version, and a second increased level of
functionality as a pay version.
23. A method as in claim 22 further comprising
sending a bill at a specified time, and if said Bill
is not paid, allowing the information to stay in the
system but be accessed only by a lower-level version
of the information.
19
PCT/US2000/026809 1999-09-29 2000-09-29 Remotely accessible global personal information database WO2001023978A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU14308/01A AU1430801A (en) 1999-09-29 2000-09-29 Remotely accessible global personal information database

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15677599P 1999-09-29 1999-09-29
US60/156,775 1999-09-29

Publications (2)

Publication Number Publication Date
WO2001023978A2 true WO2001023978A2 (en) 2001-04-05
WO2001023978A3 WO2001023978A3 (en) 2001-10-11

Family

ID=22561039

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/026809 WO2001023978A2 (en) 1999-09-29 2000-09-29 Remotely accessible global personal information database

Country Status (2)

Country Link
AU (1) AU1430801A (en)
WO (1) WO2001023978A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5940507A (en) * 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
US6044155A (en) * 1997-06-30 2000-03-28 Microsoft Corporation Method and system for securely archiving core data secrets
US6105131A (en) * 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5940507A (en) * 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
US6105131A (en) * 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system
US6044155A (en) * 1997-06-30 2000-03-28 Microsoft Corporation Method and system for securely archiving core data secrets

Also Published As

Publication number Publication date
AU1430801A (en) 2001-04-30
WO2001023978A3 (en) 2001-10-11

Similar Documents

Publication Publication Date Title
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US8327421B2 (en) System and method for identity consolidation
US7519558B2 (en) Biometrically enabled private secure information repository
US8839394B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
KR101116806B1 (en) Method And System For The Authentication Of A User Of A Data Processing System
CN100536388C (en) Apparatus, system, and method for authorized remote access to a target system
US9801063B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US20120227094A1 (en) Systems and methods for single sign-in for multiple accounts
US9154952B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
EP1208522A1 (en) System, method and computer program product for allowing access to enterprise resources using biometric devices
CN101432767A (en) Method for a server-less office architecture
US20040181683A1 (en) Privacy protection system and method
US20030195858A1 (en) Distributed information storage, authentication and authorization system
CN101803272A (en) Authentication system and method
CN101405759A (en) Method and apparatus for user centric private data management
JP2003527672A (en) Method and apparatus for providing secure authentication of a portable device via an internet host server
US20200008058A1 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wirelsss device
US20060053480A1 (en) Authentication of handheld devices for access to applications
US7512967B2 (en) User authentication in a conversion system
JPH11184818A (en) Authentication system, its method and client machine for the certification system
CN100432979C (en) Method for unifying user's registration information trans network
WO2021260495A1 (en) Secure management of a robotic process automation environment
WO2001023978A2 (en) Remotely accessible global personal information database
US7093281B2 (en) Casual access application with context sensitive pin authentication
WO2003025718A2 (en) Private secure information repository with biometric authentication

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP