Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM TO INTEGRATE INFORMATION TECHNOLOGY WITH HUMAN BIOLOGICAL PRINT
Document Type and Number:
WIPO Patent Application WO/2011/032566
Kind Code:
A2
Inventors:
ABD EL GAWAD EZZAT AHMAD MONTASER (EG)
Application Number:
PCT/EG2009/000024
Publication Date:
March 24, 2011
Filing Date:
October 05, 2009
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ABD EL GAWAD EZZAT AHMAD MONTASER (EG)
International Classes:
G06Q90/00; G06Q99/00
Download PDF:
Claims:
Claims

1- This technique represents a revolution in the field of directed and safe electronic information. It is closely related to the mentioned system in the explanation. It is the transmitter and receiver by print or execution. We explain the idea of the system. It would be ineffective if no programmed. Therefore, a certain authority in the world shall be assigned to the manufacture this system at certain conditions to be presented to banks and governments for programming on the personal and corporate information and print with protection and assurance of the right of the person who holds the idea to execute the required invention (the system). This would be in the form of round, square or rectangular key medal with a focus that picks the print in one second or less through the offers of the different companies that participate in the bid, with reservation of the right of the person who provided the idea in every system made for this purpose.

2- Second component for the exploitation of the system:

- Regarding the local and international banks, this technique will make continuous income and revenue since it represents economic recovery and contributes to achieve a large growth rate for the new version and renewal of the current cards. Since, as mentioned in the explanation, it will largely contribute to regain the confidence in the safe electronic accounts, so the right of the holder in the share of every card issued or renewed subject to this technique shall be maintained against a contract that guarantees the rights. 3- The third component for the governments and ministries of defense shall be protection under a contract to be ensured by the international treaties for the protection of the patentee right.

Description:
A system to Integrate Information Technology with Human Biological Print

Technical Field

Field of applying the subject matter of the research:-

Information Technology

Background art:

Comparisons:

There is no system that uses biological print integrated with information for this purpose but there is in the market a system that uses the print like the modern computer systems and others for security purposes for the safe, houses, stores, and companies doors. This is an American product since it uses the abstract biological print after storing its drawing in the fixed purpose, and the print holder shall attend by himself to open the door or the safe rather than the old system that was explained before, since there is no similarity in the performance and advantages of service.

This form shall be submitted in original and copy

The student shall begin by writing the background art on this form, and blank sheets (A4) shall be used and writing shall be on one side only to complete the subject (if necessary).

Problem or Deficit in the Background Art:

The research authorities in the international experience offices and the marketing and control researches in the largest international banks still look for a means that prevents the illegitimate means of robbery, infiltration and fraud in the electronic accounts by the credit card (Visa Card), and the fraud on them to finance the organized crime of terrorism and money laundry, and large research centers in the ministries of defense look for a safer means for the military and logistic orders and secrets, and look for a means that provides a better service in other civil fields that can be safer with high confidentiality, and shall prevent falsification with all forms. To date, we did not reach a solution to these problems since penetration was made by identifying the gaps in this system by several means that include:

1 - The ports of the system, computer ports, shall be online since it depends on the client\ server system.

2- The hackers association in the United States devised a new method for penetration that depends on the data packages that flow with the telephone communications online since these data are blocked, and the victim system is controlled.

3- The hackers association uses the system of penetration by operation (UNIX) because it is a strong system, and much difficult than Windows.

4- The use of server systems that work on line, and using Tl lines that are quickly accessed to the network by having account.

The largest world banks suffered huge losses because of the lack of a system that tighten the domination and control of the electronic accounts that prevent the theft and larceny of them and these were among the reasons that caused the bankruptcy of many banks. The media systems have for long discussed this subject from time to time regarding the problems resulting from this penetration. Al Jazeera TV discussed this subject by analysis and expert opinion in the episodes of March 25 and August 9, 2009 in the program of Hadith El Sabah. In addition, the meeting of the Arab ministers of interior in Tunisia on August 28, 2009 called to exert effort in the means of minimizing and controlling the fraud processes on the electronic accounts to finance the organized crime and money laundering. The summary is that the personal accounts are accessed by several methods the most recent of them is mentioned before. These include the knowledge of the name and numbers of the credit card (Visa Card). When this penetration is made, the fraud and larceny is made, larceny and theft is made. In most cases after the withdrawal, deposit or payment of the service value (reservation of air tickets, payment of the hotel or restaurant bill..) or after purchase, whether from supermarket or from other commodity companies.

Banks and individuals suffered much from these frequent cases and the larceny and fraud still increase, especially for the holders of huge balances in these banks that cost them hundreds of millions. To date, the control of this problem is not tightened, and this penetration is not stopped. They are often detected after the robbery or hold up and block of the card or account holder. All the solutions and researches reached for protecting the accounts and credit cards does not exceed the protection of the system against viruses or not setting private personal information in the system or access to prohibited and immoral sites. However, they incur huge losses to date, and did not reach a final solution to this. Penetration and infiltration is still continuous, and the media apparatuses still shed light on and discuss this subject in their analyses. This urged me, by help of Allah, with my vision, believing that the human mind that Allah dedicated to man is in continuous infinite creation and invention, and with help of Allah, we managed to reach a final and decisive solution to this problem.

-The last means of electronic accounts robbery was in the kingdom of Saudi Arabia in the cities of al Khubar, Riyadh and Jeddah, by robbing the password and card from the ATM

-This is accomplished by the ATM Machines in streets where the Magnetic Reader can be set over the Original card ,s hole as A Scanner , then , a false keyboard will be set over the original keyboard for storing the password inside it, a well as , an additional Box will be set over the original hole where the can enter and still permanently , then , the thief come to remove the original keyboard , and Card entry Box , consequently , he has got the card and the password , and , he used it in the same set or in another to rob a part of the balance.

Recent Developments in the Subject Matter of the invention.

1- Regarding the crimes of infiltration, penetration and robbery of the electronic accounts by the credit card :

Totally eradicating the financial robbery of the electronic bank accounts the tool of which is the credit card. This system prevents penetration of all forms.

2- Regarding Computer:

Preventing the email penetration and dispensing wok by secret number (password) and using the new technique in the way that secures the private, personal and confidential information with no penetration or infiltration in full safety.

3- Regarding the bank services

Providing the time, effort and many documentary cycles like (granting loans- opening account- selling and purchasing securities) without the presence of the customer to the bank or executing any writings so that this be preceded by recording the personal and vital information of the customer on computer.

4- Regarding the intelligence systems:

The new system shall replace the coded messages or secret ink or telephone conversations and ending work there forever since it is safer and more confidential, and can not be accessed, penetrated or tabbed.

5- regarding the defense systems and during the wars:

This detection presents a new organization that includes the delivery of instructions and orders to their target only in full safety in the military operations, maneuvers, information and military orders of the strategic weapons, maritime, organizational and logistic parts, and releasing the hostages, the new system can not be penetrated or tabbed.

6- Regarding the crimes of financial fraud for the accounts of financing terrorism and money laundering crimes:

By approving this system, it will eradicate and detect them on time, and there is no means of fraud. If any, this would be by the will of the account holder. Here, we would like to refer to the meeting of the meeting of the Arab Ministries of Interior in Tunisia on August 27, 2009 which called to exert effort to combat these crimes.

7- Regarding the statistics, mobilization and confidential information systems:

The new system ensures the saving of their files in complete safety and non penetration or infiltration by any means.

8- Regarding the researches and intellectual property rights:

This new system will prevent the safety or quotation of information and researches, and provides complete protection of the intellectual property rights.

9- Regarding the elections of all types, voting and ballot:

The new system prevents forgery and falsification of all types. It cancels the currently adopted system of phosphorus ink, registration in the election tables, loss of time and forgery in the election tables, voting for others or for the dead. In addition, this system is an alternative to the elections committees and the person can vote from his home by computer. He shall only have one vote in any place in the country, and no one can vote by proxy. The biologically integrated personal information shall only be registered for the person for one time and in the country, which would prevent the manipulation and forgery and does not give any significant opportunity for forgery. This provides transparency and neutrality, and this would save time and effort, and support democracy.

10- Regarding parliaments and municipal councils:

By this technique, all current systems would be dispensed whether by lifting hands for stopping whether secret or open voting. This would include a real voting with no pressure or compliment since voting is made by integrated print for the person, which would provide complete freedom and transparency.

11- Regarding the real estate registration and notarization authority:

This system prevents forgery of all types, and if any, it will be detected in time, since the personal and biological information of the individual, which would represent protection that can not be penetrated like the sale and purchase of real estates, lands and cars ...etc.

12- Security Reasons:

This system would be approved as a tight control for the entry of the royal and presidential palaces officers and movable and fixed guards, and main bank safes.

13- administrative affairs of workers:

This system would ensure the optimum performance to control as an alternative to the attendance and leaving books to the factories and companies, especially the factories of gold works and jewels, places of currency monetization by recording the personal data integrated with the biological print of the person only for those entitled to enter, and can be used for the vital facilities like radio and television, studios and registration.

14- Regaining the customers confidence in the credit cards.

15- multiple uses of credit cards

This solution provides a wider area rather than the current situation, so that it allows the card holder, its family, secretary or server to use it, even if the bank issued them in its name only. There is no need to issue credit cards for his family members based on the join responsibility that is currently followed in some banks in complete tranquility, and it saves time, effort and cost, which increases and grows the process of continuous purchase.

16- The customer can use more than one card and more than one account for more than one bank in the same system.

17- This system can be used anywhere in the world at any time.

18- Identifying the apparent number and password of the card does not represent any danger.

19- Eradicating the problem of losing or stealing the card does not represent any problem or reason for the quick notice of the certification authority.

20- Security in dealing at any time and anywhere in the world.

21- The card holder can move without it, and all processes shall be made for one of its family members, his secretary or servant with no fear or hesitation.

22- The withdrawal and deposit process shall be limited to what the card holder, rather than others, decides even if a representative used it.

23- This system shall cover an infinite area in the safe use of electronic accounts by 100%.

24- Rising the consumer loans rates by large percentages that exceed all potential expectations because of the fulfillment of the security principle, which would increase the bank resources.

25- This system can not be penetrated by internet or bugging systems.

26- This system will close the theft, penetration and infiltration used by the electronic mafia for the personal accounts, and there would be no gap in it or any probability due to the safety of dealing with it.

27- The peoples' need to safe services can not be penetrated in different fields like intelligence and during the wars, services, mobilization, statistics, computer systems, elections and many other fields. This would represent a safe information revolution that can not be penetrated.

28- The need of leaders, decision-makers and heads of states to a safe system that ensures the confidentiality of information, military orders, logistics, secret messages with no penetration or bugging.

29- This system shall secure the email messages (the median that can be penetrated), even if it will be sent by the same method. However, the biological factor penetration to the human print would ensure that the message will not be opened and the text will not be read except for only its holder, whenever he needs since the receptor would be the first reader.

30- many management services:

This system of optimum performance to control time would ensure an alternative to the attendance and leaving books to the local administrations, ministries, factories and companies, especially the factories of gold and jewelry works, and places of currency printing and monetization, by registering the personal data integrated with biological print of the person, for those who are entitled to enter only. In addition, it can be used for the vital facilities like radio and television, studios and recording.

Every country that aspires to progress shall follow this system and shall register the vital information of the individual in addition to the personal information that is currently registered personal information. This would save much time, effort and work, and cancels any probability for error. In addition, it would largely contribute to transparency and give the right of every person.

Expectations: (the progress of peoples is measured by their ability to accommodate change)

The world countries will compete to use this system. We expect that this system prevails all the world countries with no exception, and we expect extraordinary increase in dealing with the credit cards that will exceed 50% of the world population for those whose ages exceed twenty years during the next ten years from the release of wage, pension and public and private services and tuitions to the private and confidential messages and military orders during the wars, codes of nuclear and strategic weapons with the expenses of schools and universities.

There must have been a third party in addition to the personal and corporate information of the customer for the financial bank and confidential purposes to ensure the performance efficiency and privacy, which is the biological print of man. Therefore, only one thing that reaches this large benefit; namely, merging the biological print of man to the personal and corporate information, was reached, but how?????

Disclosure of Invention

1 :- This is made by a new technology system that combines the information and biological system of man.

(the account holder whether debtor or creditor and decision maker)

2:- The card performance is programmed with the mentioned trilateral organization (personal information + corporate information + biological print)

And dispensing the password by programming the association of this information together in a computer provided that the card performs its services in the different outlets at anywhere subject to dealing with credit cards or other services mentioned in the field of application of the subject matter of the research. Therefore, the association between personal and corporate information and biological print of the card holder.

3- The beneficiary of the system shall hold a system that works by a special batter in the size of watch or key medal. It is programmed on its print so that the system be a receiver and transmitter, and opens and approves the service process including withdrawal, purchases or any service expenses and other utilities since it issues approval or disapproval.

4- This system receives the total result of the process, message or military order, and produces resonance that the account holder watches, like the SMS. When the amount is verified, it puts its print on the system focus that was previously programmed with its personal and corporate information for his bank account and the approval is made and the process gets competed.

5- If the amount is not approved, the touch "cancel" is pressed, and the display shows the service source and the process stops.

6- In addition, the above advantages, the biological print of man (card holder) or decision-maker stops performance if man cut his finger or died, since it works on the vitality of blood flow under the print which stops by cutting the fingers or death of man.

7- There are alternatives for the beneficiary through which he can change the print to evade abduction or to anesthesia for a surgical operation, he can change the print to another finger so that the recording of all his fingerprints in the bank accounts precedes this until the new print is stored, and he shall complete the opening of the account.

8- Every process shall have one print that certainly ends on the service performance system in the different outlets.

Example :-

A credit card holder gave his card to one of his family members to buy items from the supermarket or to withdraw amounts from the ATM. In case the ATM is touched to release from the system or to put the card in the cashier system, it would automatically transmit an immediate message that does not take 3 seconds to the system held by the card holder. When he is certain of this, he puts his print on the system that he holds. The system is in the size of watch or key medal, and the process is completed at this point.

10- If the card holder dies, its work will stop automatically even if the print is used since the order is conditioned with the biological print of man (because the blood circulation of man stops by his death). Therefore, the card holder can give it to the person he likes on behalf of himself until performance stops by his personal will through his print.

The world countries will compete to use this system. We expect that this system prevails all the world countries with no exception, and we expect extraordinary increase in dealing with the credit cards that will exceed 50% of the world population for those whose ages exceed twenty years during the next ten years from the release of wage, pension and public and private services and tuitions to the private and confidential messages and military orders during the wars, codes of nuclear and strategic weapons with the expenses of schools and universities.

1- Regarding the crimes of infiltration, penetration and robbery of the electronic accounts by the credit card :

Totally eradicating the financial robbery of the electronic bank accounts the tool of which is the credit card. This system prevents penetration of all forms.

2- Regarding Computer:

Preventing the email penetration and dispensing wok by secret number (password) and using the new technique in the way that secures the private, personal and confidential information with no penetration or infiltration in full safety.

3- Regarding the bank services

Providing the time, effort and many documentary cycles like (granting loans- opening account- selling and purchasing securities) without the presence of the customer to the bank or executing any writings so that this be preceded by recording the personal and vital information of the customer on computer.

4- Regarding the intelligence systems:

The new system shall replace the coded messages or secret ink or telephone conversations and ending work there forever since it is safer and more confidential, and can not be accessed, penetrated or tabbed.

5- regarding the defense systems and during the wars:

This detection presents a new organization that includes the delivery of instructions and orders to their target only in full safety in the military operations, maneuvers, information and military orders of the strategic weapons, maritime, organizational and logistic parts, and releasing the hostages, the new system can not be penetrated or tabbed.

6- Regarding the crimes of financial fraud for the accounts of financing terrorism and money laundering crimes:

By approving this system, it will eradicate and detect them on time, and there is no means of fraud. If any, this would be by the will of the account holder. Here, we would like to refer to the meeting of the meeting of the Arab Ministries of Interior in Tunisia on August 27, 2009 which called to exert effort to combat these crimes.

7- Regarding the statistics, mobilization and confidential information systems:

The new system ensures the saving of their files in complete safety and non penetration or infiltration by any means.

8- Regarding the researches and intellectual property rights:

This new system will prevent the safety or quotation of information and researches, and provides complete protection of the intellectual property rights.

9- Regarding the elections of all types, voting and ballot:

The new system prevents forgery and falsification of all types. It cancels the currently adopted system of phosphorus ink, registration in the election tables, loss of time and forgery in the election tables, voting for others or for the dead. In addition, this system is an alternative to the elections committees and the person can vote from his home by computer. He shall only have one vote in any place in the country, and no one can vote by proxy. The biologically integrated personal information shall only be registered for the person for one time and in the country, which would prevent the manipulation and forgery and does not give any significant opportunity for forgery. This provides transparency and neutrality, and this would save time and effort, and support democracy.

10- Regarding parliaments and municipal councils:

By this technique, all current systems would be dispensed whether by lifting hands for stopping whether secret or open voting. This would include a real voting with no pressure or compliment since voting is made by integrated print for the person, which would provide complete freedom and transparency.

11- Regarding the real estate registration and notarization authority:

This system prevents forgery of all types, and if any, it will be detected in time, since the personal and biological information of the individual, which would represent protection that can not be penetrated like the sale and purchase of real estates, lands and cars ...etc.

12- Security Reasons:

This system would be approved as a tight control for the entry of the royal and presidential palaces officers and movable and fixed guards, and main bank safes.

13- administrative affairs of workers:

This system would ensure the optimum performance to control as an alternative to the attendance and leaving books to the factories and companies, especially the factories of gold works and jewels, places of currency monetization by recording the personal data integrated with the biological print of the person only for those entitled to enter, and can be used for the vital facilities like radio and television, studios and registration.

14- Regaining the customers confidence in the credit cards.

15- multiple uses of credit cards

This solution provides a wider area rather than the current situation, so that it allows the card holder, its family, secretary or server to use it, even if the bank issued them in its name only. There is no need to issue credit cards for his family members based on the join responsibility that is currently followed in some banks in complete tranquility, and it saves time, effort and cost, which increases and grows the process of continuous purchase.

16- The customer can use more than one card and more than one account for more than one bank in the same system.

17- This system can be used anywhere in the world at any time.

18- Identifying the apparent number and password of the card does not represent any danger.

19- Eradicating the problem of losing or stealing the card does not represent any problem or reason for the quick notice of the certification authority.

20- Security in dealing at any time and anywhere in the world.

21- The card holder can move without it, and all processes shall be made for one of its family members, his secretary or servant with no fear or hesitation.

22- The withdrawal and deposit process shall be limited to what the card holder, rather than others, decides even if a representative used it.

23- This system shall cover an infinite area in the safe use of electronic accounts by 100%.

24- Rising the consumer loans rates by large percentages that exceed all potential expectations because of the fulfillment of the security principle, which would increase the bank resources.

25- This system can not be penetrated by internet or bugging systems.

26- This system will close the theft, penetration and infiltration used by the electronic mafia for the personal accounts, and there would be no gap in it or any probability due to the safety of dealing with it.

27- The peoples' need to safe services can not be penetrated in different fields like intelligence and during the wars, services, mobilization, statistics, computer systems, elections and many other fields. This would represent a safe information revolution that can not be penetrated.

28- The need of leaders, decision-makers and heads of states to a safe system that ensures the confidentiality of information, military orders, logistics, secret messages with no penetration or bugging.

29- This system shall secure the email messages (the median that can be penetrated), even if it will be sent by the same method. However, the biological factor penetration to the human print would ensure that the message will not be opened and the text will not be read except for only its holder, whenever he needs since the receptor would be the first reader.

30- many management services:

This system of optimum performance to control time would ensure an alternative to the attendance and leaving books to the local administrations, ministries, factories and companies, especially the factories of gold and jewelry works, and places of currency printing and monetization, by registering the personal data integrated with biological print of the person, for those who are entitled to enter only. In addition, it can be used for the vital facilities like radio and television, studios and recording.

■ Every country that aspires to progress shall follow this system and shall register the vital information of the individual in addition to the personal information that is currently registered personal information. This would save much time, effort and work, and cancels any probability for error. In addition, it would largely contribute to transparency and give the right of every person.

Expectations: (the progress of peoples is measured by their ability to accommodate change)

Every country that aspires to progress shall follow this system and register the biological information of the individual in addition to the personal and corporate information that is currently registered. This would save much time, effort and work , and cancel any probability of error. In addition, it would largely contribute to the transparency, high confidentially and prevents the potential of forgery, falsification, penetration or robbery.

Conditions for using this discovery

First: This discovery is the private property of Mr. Ezzat Ahmed Montasser, as a result of continuous researches and data analyses from all authorities concerned with this subject for more than two years.

Second, Mr. ezzat ahmed montasser, rather than any other person or previous power of attorney for legalization, reservation and publication, shall have the right to give franchise to the right of exploiting this discovery whether by publication in the advertisements or electronic correspondence to the banks, international companies and governments based on the contract to exploit the utility according to a legal contract that ensures the rights of the parties.

Third, Mr. Ezzat Ahmed Montasser shall have the right to litigation and legal attachment against any authority that exploits this system without his approval in the domestic and foreign courts and international arbitration organizations. Fourth:- This discovery shall be recorded in the concerned authorities in Egypt and it is currently registered in the internationally concerned authorities.

Brief Description of the Drawing;

The drawing shall consist of a closed circle that contains three equal triangles, namely:

DA. This represents the personal information of the bank account holder (card holder) like the name, address, means of communication, etc. or the prepared information whether a nuclear or strategic weapon, the leader, the sender and receptor of confidential message, decision-maker or commander.

DB. This represents corporate information of the service source like the bank name, account number, account type, loan conditions, etc... or the information of leadership and military target, time of attack... etc., or confidential messages like the message text.

DC. biological information (biological print) of the service holder, receptor, sender, or the person who executes the military operation.

This system shall apply to all the above mentioned fields to reach a distinguished utility to be safer and more confidential. This represents the left side of the equation.

As for the right side of the equation, it is ABC, the agreement or execution in all the above mentioned research fields of application.

This is represented in the following equation

DA + DB + DC = ABC Conditions for using this discovery

First: This discovery is the private property of Mr. Ezzat Ahmed Montasser, as a result of continuous researches and data analyses from all authorities concerned with this subject for more than two years.

Second, Mr. ezzat ahmed montasser, rather than any other person or previous power of attorney for legalization, reservation and publication, shall have the right to give franchise to the right of exploiting this discovery whether by publication in the advertisements or electronic correspondence to the banks, international companies and governments based on the contract to exploit the utility according to a legal contract that ensures the rights of the parties.

Third, Mr. Ezzat Ahmed Montasser shall have the right to litigation and legal attachment against any authority that exploits this system without his approval in the domestic and foreign courts and international arbitration organizations.

Fourth:- This discovery shall be recorded in the concerned authorities in Egypt and it is currently registered in the internationally concerned authorities.