Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERSONALIZE GRAPHICAL ID BRANDING MANAGER AS THE SECRET CODE AND AUTHENTICATION TO SEND VITAL MESSAGES
Document Type and Number:
WIPO Patent Application WO/2010/039021
Kind Code:
A2
Inventors:
LAI POEY CHIN (MY)
Application Number:
PCT/MY2008/000110
Publication Date:
April 08, 2010
Filing Date:
September 30, 2008
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LAI POEY CHIN (MY)
International Classes:
H04L9/32
Download PDF:
Claims:
[ Documentation Name ] Claim

1. A method that generates the customizable personalizes graphical ID branding that store vital personal particulars for authentication during registration as shown in Fig 1.

2. According to claim 1, the invention is an algorithm/string or any other methods that generate personalize graphical ID branding from the registration system. Personalize Graphical ID branding can also be in the form of any other pictures, video, etc.

3. According to claim 1, after generating the Personalized Graphical ID branding as shown in Fig 2, an authentication of Type A shown in Fig 3 or Type B shown in Fig 4 or Type C shown in Fig 5 will be provided for selection.

4. According to claim 1, a method of setting the vital messages attached to the selected pictures provides link to the operators for Type D speed authentication shown in Fig 6 after the task in claim 3 is completed.

5. The method for authenticating a user as recited in claim 1 and 3 further comprises: denying access to the user as shown in Fig 8, Fig 9 and Fig 10 if the input is determined does not match the authentication preset for Type A or Type B or Type C.

6. The method of Personalized Graphical ID branding authenticating for Type A as shown in Fig 3 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the user log in and password as shown in Fig 3. The users will press the personalized ID (e.g Joan Lai graphical ID) first before typing in their usual user ID and authentication password so that the vital message set will be send together with the pictures authentication password.

7. The method of Personalized Graphical ID branding authenticating for Type B as shown in Fig 4 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos as shown in Fig 4. The personalized ID (e.g Joan Lai graphical ID) can be used first or last depends on the pre-set during registration to use the vital message.

8. The method of Personalized Graphical ID branding authenticating for Type C as shown in Fig 5 is by typing the http://www.picsecureid.com/ioanlai, then the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos with (e.g numeric) on the pictures/photos as shown in Fig 5. [ Documentation Name ] Claim

9. According to claim 8, the type C novelty invention has divided the original password to 3 parts, aware password, unaware password and reference of aware-unaware passwords. Aware password uses random ASCII string as its expression. Aware password is a temporary password for input. Unaware password uses the indirect visible objects, like graphical objects, positions and phrases etc. These indirect visible objects used as unaware password should only be catcher and familiar to the valid users, but against to non-valid users. Reference of aware-unaware password is used to relate aware password and unaware password.

10. According to claim 9, type C novelty invention process as shown in Fig 7 start with the Picture One Time Password sign on initial selection, and then the system will be on standby. Next new screen of ASCII string pictures will appear, the user will need to key in the new (e.g alphanumeric)/any local language on the Picture for authentication.

11. According to claim 8, the users will need to press on the personalized ID branding (e.g Joan Lai graphical ID) then key in the (e.g alphanumeric)/any local language password that act as the one time password on the Pre-selected Pictures. If the users select to use the (e.g alphanumeric)/any local language function on the personalized ID (e.g Joan Lai graphical ID) picture to send the vital message instead of pressing on the personalized ID, the users need to pre-set whether to use it first or last before selecting the picture authentication password with ASCII string.

12. The method of Personalized Graphical ID branding authenticating for Type B and Type C photos/pictures can also be used as corporate branding or advertising platform for organizations. Corporate branding or advertising can be done on the pictures/photos itself or by flipping on the chosen pictures/photos once the users are prepared to enter their passwords.

13. The method of Personalized Graphical ID branding authenticating for Type A, Type B, Type C and Type D can also be linked to advertiser or sponsor information pop-ups once the authentication is entered as part of the advertisers or sponsorship programme.

14. The method of Personalized Graphical ID branding authenticating as shown in Fig 8 for Type A, Type B, Type C and Type D will be activated once the logo of PicsecureID is pressed if this particular look and feel is pre-select at the time of registration. The advertisers branding or sponsorship programme can be custom designed for the look and feel in Fig 8. The section (i) allow captions etc for corporation branding or advertising while section (ii) [ Documentation Name ] Claim

can add corporation promotional tagline, contest questions, etc and section (iii) can be replaced with corporation branding.

15. The method of Personalized Graphical ID branding authenticating for Type A, Type B and Type C can be used to make transaction as shown in Fig 9 for Internet, mobile and other methods of transactions.

16. According to claim 15 with reference to Fig 9, the moment the users make a transaction using Type A or Type B, or Type C authentication, process (a) takes place and the information will be processed in system (b). If the process requires a payment transaction (e.g. using credit card, etc), process (c) will take place where the users ID will be used to verify as member before the payment is processed. Then, the processed transaction will be updated at system (b) before going through to the retailers system (d) for process and the notification will be sent back to system (e) for update and notify users (f). The retailers will notify the payment to loyalty program organization (g)

17. The method for authenticating a user as recited in claim 6 or 7 or 8 provides user access to confidential information and allow users to provide their personal particulars for registration for any sign up or contest etc as shown in Fig 10 submit particulars.

18. According to claim 1 and 3, the authentication can be used as a single log in (Master key) process that allow users to aggregate more of their proprietary content from the website, e-mails, database, and so on.

19. According to claim 18 where the picture authentication in claim 7, 8 , 9 and 10 is used as single log in (Master key), the Graphic ID manager uses a hash function to generate a sequence of characters from the images that the user has picked, and supplies this to the website as a character based password. The hash function is duplicatable, so that every hash function applied to the same sequence of graphic images will generate the same sequence of characters. In this way, the user only deals with graphic passwords at the interface level, and no longer needs to concern the user with memorizing character based passwords.

20. According to claim 19, extending on the hash function concept, the user can (in his/her memory) assign specific icons to specific websites that he/she has registered with. For example, the user could file an amazon-related icon or image with the graphic ID manager. When he/she registers with the amazon website for the first time and needs to enter a personal password, he/she precedes his/her own personal graphic password sequence with [Documentation Name] Claim

the amazon icon (graphically indicating that he/she wants to login to amazon). The graphic ID manager then generates a character based keyword sequence which becomes his/her amazon password. He/She proceeds to do the same for all other websites (get an icon for yahoo, another icon for google, etc, etc).

21. According to claim 20, the user can now effectively generate different character passwords using exactly the same personal graphic password sequence, simply by preceding his graphic password sequence with an icon appropriate or corresponding to the various websites he wishes to log into. This in effect creates a single sign on functionality.

22. According to claim 20, Periodically, the internal implementation of the hash function will change to allow a chosen password sequence to change. This means that the sequence of characters generated from a given sequence of pictures will change. At this point in time, graphic manager will, without user intervention, connect to the various websites that the user has a registered account with and change the passwords there manually. Of course, from the user's point of view, he/she still uses the same sequence of graphical passwords that he has been using all along, only that this time the sequence of characters generated from it change, effectively changing the password as far as the different websites are concerned.

23. The method for authenticating a user as recited in claim 6 or 7 or 8, the authentication can be used as anti-spam system where the users will allow the messages to pass through after the authentication is done.

24. The method for authenticating a user as recited in claim 1 and 3 provides the user the option to use the personal graphical ID branding as secret code to send vital messages in case of emergency during authentication process as shown in Fig 10.

25. According to claim 24, type D display shown in Fig 6 and the application process shown in Fig 10 are good way to use the Personalized Graphical ID branding as the secret code and speed authentication to send vital message during time of need to communication with loved ones and/or assigned parties. For example a child or an elderly person can press on the picture of ambulance and the personalized Graphical ID branding set so that the response team from the operator or the affiliate parties can respond to the request. At the same time, the system will alert the family members. [ Documentation Name ] Claim

26. According to claim 24, type D as shown in Fig 6 speed authentication to send vital messages can be called out by typing the http://www.sos.picsecureid.com/ioanlai on the Internet, the personalized ID branding (e.g Joan Lai graphical ID) will appear together with the pre-selected affiliations photos/pictures.

27. According to claim 24, as for the case of mobile phone, the users can just use the # to call out the Type D or pre-set it as screen saver or other easy methods to the users' preference. In the case of TV cable provider station, the users can call our Type D by pressing on # 1 or any other method provided by the TV operators. The methods will vary depending on the operators since this section is customizable.

28. The type D authentication (vital alert) systems are able to be deployed on the mobile phone, Internet, a service provided by TV operators etc. Type D authentication (vital alert) system, it can also work by pressing on the pictures with/without the personalized Graphical ID branding that link to the location base services provided by telecommunications companies or using the GPS on the mobile phone to send the location to the alert receivers.

29. A program that causes the system to function as personal graphical ID branding authentication and acts as secret code to send vital messages that is automated with application process described in the documents.

Description:
i

[Documentation Name] Description (Invention Details)

[Invention Name]

Personalize Graphical ID Branding Manager as the secret code and authentication to send vital messages.

[Field of Invention]

[0001 ]

The invention is directed to methods and system of authenticating personal identity utilizing the customizable graphical ID branding that stores vital personal particulars as shown in Fig 1 in the system. In particular, the present invention is directed to personalize graphical (ID) identity branding authentication system as the secret code to send the vital message to assigned parties. The invention consists of a system (using string/algorithm and any other methods) for generating, identifying, authenticating the application process and programme.

[Background]

[0002]

The evolution of the Internet, mobile, bank ATM and cable/satellite TV has greatly influenced the way individuals, society, companies and institutions communicate, educate, conduct transactions, and store and retrieve documents, images, music, and video etc. Today's world of communication with convenience, ease of use, speed, and low overhead costs are contributing factors to the widespread use of these technologies.

[0003]

These technologies are useful for communications, education, purchasing goods as well as conducting confidential transactions. Nevertheless, this has also contributed to the crime rate with the use of these technologies. Therefore, Personalize Graphical ID branding manager as the secret code and authentication to send vital messages becomes essential during time of need to communication with loved ones and/or assigned parties.

[Invention Introduction]

[Solved Issues]

[0004]

This invention provides a safe process for users to authenticate themselves and tell someone in case an emergency arises using the Personalize Graphical ID branding as the secret code. The messages need to be preset at the time of registration and changes can be done anytime at user request. [Documentation Name] Description (Invention Details)

[0005]

In the case of bank using it for transaction, an individual can set in such a way that the bank will be informed to cancel the next transaction since the person doing it at this point in time is not on his/her free will. This will send an alert to the banking system and someone should look into it urgently. At the same time, the system will alert the relevant parties set in the system requesting for assistance. This is done to safe-guard the person who does the transaction involuntarily. For example a person may be forced to conduct transaction at knife/gun point?

[0006]

In the case of Type D authentication as shown in the Fig 6, a child or an elderly person can press on the picture of ambulance and the personalize Graphical ID branding set so that the response team from the operator or the affiliate parties can respond to the request. At the same time, the system will alert the family members. Type D authentication (vital alert) system is able to be deployed on the mobile phone, Internet, a service provided by TV operators etc. Type D authentication (vital alert) system can also be operated by pressing on the pictures with/without the personalize Graphical ID branding, it can also link to the location base services provided by telecommunications companies or using the GPS on the mobile phone to send the location to the alerted receivers.

[0007]

The users can also use this application as the normal authentication just minus the use of personalized graphical ID branding. The personalized graphical ID branding is the additional feature that acts as the secret code to send vital message. The personalized graphical ID can also be used as an anti-phising solution for the Internet environment authentication. Type B as shown in Fig 4 can be designed to overcome captcha issue beside anti-pishing and Type C as shown in Fig 5 will be able to overcome shoulder surfing attack beside captcha and anti-phising. Graphical ID manager can help to overcome keyloggers activities.

[0008]

The invention is able to identify the users' personal particulars. This allows the users to use this invention of the Personalize Graphical ID branding as an authentication for any applications that require their personal particulars. This will save time for the users to fill up their personal particulars again.

[0009]

This invention can also be extended to be used as anti-spam so that it only allows authorized parties messages to pass through into the system at the users' requests. [Documentation Name] Description (Invention Details)

[0010] Personalize Graphical ID branding can also be replaced by any other pictures, video, etc.

[How the systems work?]

[0011 ]

The mechanism of the invention is to generate the unique personalized graphical ID as the personal branding when the user register the Personal ID as shown in Fig 1 using the system specially programmed for this application. If the Personal ID is Joan Lai as shown in Fig 2, Joan Lai graphical ID will appear. Then, the users will be given a list of vital messages to the assigned parties which are customizable for personal use or provided by the operators.

[0012]

The users can select their preference of authentication provided by the operators like Type A shown in Fig 3 or Type B shown in Fig 4 or Type C shown in Fig 5 and Type D as shown in Fig 6 with their personalized graphical ID branding.

[0013]

In the case of Type A, by typing the http://www.picsecureid.com/joanlai, the personalize ID branding (e.g Joan Lai graphical ID) will appear together with the user log in and password as shown in Fig 3. The users will press the personalized ID (e.g Joan Lai graphical ID) first before typing in their usual pictures authentication password so that the vital message set will be sent together with normal User ID and password.

[0014]

In the case of Type B, by typing the http://www.picsecureid.com/joanlai, the personalized ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos as shown in Fig 4. The personalize ID (e.g Joan Lai graphical ID) can be used first or last depends on the pre-set during registration to use the vital message.

[0015]

In the case of Type C, by typing the http://www.picsecureid.com/ioanlai, the personalize ID (e.g Joan Lai graphical ID) will appear together with the rest of the pre-selected pictures/photos with (e.g alphanumeric)/any local language on the pictures/photos as shown in Fig 5. This novelty invention divided the original password to 3 parts, aware password, unaware password and reference of aware-unaware passwords. Aware password uses random ASCII string as its expression. Aware password is a temporary password for input. Unaware password uses the indirect visible objects, like graphical objects, positions and phrases etc. These indirect visible [Documentation Name] Description (Invention Details)

objects used as unaware password should only be catcher and familiar to the valid users, but against to non- valid users. Reference of aware-unaware password is used to relate aware password and unaware password.

[0016]

As users of Type C who want to send the vital messages, the users will need to press on the personalized ID branding (e.g Joan Lai graphical ID) then key in the (e.g alphanumeric)/any local language password that act as the one time password on the Pre-selected Pictures. If the users select to use the (e.g alphanumeric)/any local language function on the personalized ID (e.g Joan Lai graphical ID) picture to send the vital message instead of pressing on the personalized ID, the users need to pre-set whether to use it first or last before selecting the picture authentication password with ASCII string.

[0017]

The moment the users make a transaction using personalized ID branding either Type A or Type B or Type C as shown in Fig 7, process (a) takes place and the information will be processed in system (b). If the process requires a payment transaction (e.g. using credit card, etc), process (c) will take place where the users ID branding will be used to verify as member before the payment is processed. Then, the processed transaction will be updated at system (b) before going through to the retailers system (d) for process and the notification will be sent back to system (e) for update and notify users (f). The retailers will notify the payment to loyalty program organization (g)

[0018]

The personalized graphical ID branding will only be used as the secret code to send vital messages or else it will be used as ordinary authentication. In the case of personal particular registration, the message will be "Do you want to use your personalized graphical ID branding to register for the contest etc? If your reply is yes, then the authentication either Type A or Type B or Type C will appear depending on your pre selected Types for the use as personal particular for registration set during the creation of the personalized graphical ID branding. Usually, this will happen when the users click on the affiliate parties branding or advertising.

[0019]

In the case of Type D, by typing the http://www.sos.picsecureid.com/ioanlai for Internet, the personalized ID branding (e.g Joan Lai graphical ID) will appear together with the pre-selected affiliations photos/pictures for speed authentication to send pre-set vital messages for services [Documentation Name] Description (Invention Details)

required by pressing on the pictures/photos. As for the case of mobile phone, the users can just use the # to call out the Type D or pre-set it as screen saver or any other easy methods to the users' preference. In the case of TV cable provider station, the users can call our Type D by pressing on # 1 or any other method provided by the TV operators. The methods will vary depending on the operators since this section is customizable. The users only require calling out Type D authentication and pressing on the photos/pictures for the vital messages to be sent to relevant parties as speed ID branding authentication to identify the person and the requested services from the parties pre-set.

[Best Utilization]

[0020]

The invention can be implemented not only in PCs, complex networked systems, and Satellite/Cable TV systems but also in stand-alone systems, resource limited devices, like mobile phone, PDA etc. It may be applied as a revenue generating branding component to an integrated authentication solution. It can be optionally integrated into existing business and authentication processes. Therefore, different aspects of the invention can be appreciated individually, collectively or as a combination of both.

[Conclusion] [0021 ]

Please note that while the particular applications have been illustrated and described, various modifications can be made thereto and are contemplated herein. It should be understood that the invention is not intended and be limited by the specific examples provided within the specification. The descriptions and illustrations herein are not meant to be interpreted in a limiting sense. These are described as examples in relation to the drawings, texts attached hereto and further modifications, apart from those shown or suggested herein, may be made within the spirit and scope of the invention. Furthermore, it shall be understood that all aspects of the invention are not limited to the specific configurations set forth herein which depend upon a variety of conditions and variables. This include various modifications in any form of the invention will be apparent to a person's skill and creativity. It is therefore contemplated that the invention shall also cover any such modifications, variations and equivalents.