WO2010104914A2 - Human-readable system and method for personal identification - Google Patents

Human-readable system and method for personal identification Download PDF

Info

Publication number
WO2010104914A2
WO2010104914A2 PCT/US2010/026769 US2010026769W WO2010104914A2 WO 2010104914 A2 WO2010104914 A2 WO 2010104914A2 US 2010026769 W US2010026769 W US 2010026769W WO 2010104914 A2 WO2010104914 A2 WO 2010104914A2
Authority
WO
WIPO (PCT)
Prior art keywords
arrangement
icons
language
independent
respective entity
Prior art date
Application number
PCT/US2010/026769
Other languages
French (fr)
Other versions
WO2010104914A3 (en
Inventor
William D. Shander
Eric W. Hinton
Original Assignee
Buzub, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Buzub, Inc. filed Critical Buzub, Inc.
Publication of WO2010104914A2 publication Critical patent/WO2010104914A2/en
Publication of WO2010104914A3 publication Critical patent/WO2010104914A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2428Query predicate definition using graphical user interfaces, including menus and forms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles

Definitions

  • the present technology relates generally to the field of human-readable, language independent representation and identity management.
  • One's identity depends upon context. At a family reunion, one is a "son,” “niece,” and/or “cousin.” In such familial contexts, many may know intimate details about one's life, including unflattering stories that would be better forgotten. But when social dating or speaking at a conference or writing for a blog, one might want to expose different parts of one's identity in different ways.
  • a new approach provides human-readable, language independent identification labels or tags that can be associated with an individual or other entity, such as a business.
  • the associations are made available remotely, as through a network, to allow others to easily obtain information about the associated individual or business through the associated human-readable, language independent identification tag.
  • a visual identification tag includes an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language -independent icons. The arrangement of one or more selected icons is indicative of a respective entity. A network-accessible association is provided of the arrangement of the one or more selected icons and a respective entity. The association allows for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
  • the one or more selected icons are non-textual.
  • the non-textual icons can be graphical symbols. Alternatively or in addition, the nontextual icons can be color coded.
  • an entity identity management system in another embodiment, includes an identification tag comprising an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language- independent icons. The arrangement of one or more selected icons is indicative of a respective entity.
  • a network-accessible server stores an association of the arrangement of one or more selected icons and the respective individual.
  • a user interface allows a user to access the stored association through the arrangement of one or more selected icons.
  • the user identity management system includes an entity management interface allowing for management of the entities' own publicly discoverable identity. The managed identity can be discoverable by the user's access to the stored association. Alternatively or in addition, the managed identity includes a link to another information source.
  • a process for managing an identity includes defining an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language-independent icons. The arrangement of one or more selected icons is indicative of a respective entity. An association of the arrangement of one or more selected icons and the respective entity is stored. The association is remotely accessible by others responsive to the defined two or more human-readable symbols.
  • the process for managing an identity allows others to remotely access stored associations using a network.
  • selectable information can be associated with the arrangement of one or more selected icons.
  • a process for creating a visual identification tag includes providing an arrangement of two or more human-readable symbols.
  • a language-independent icon is selected for each of the two or more human-readable symbols.
  • the arrangement of two or more selected icons is indicative of a respective entity.
  • the arrangement of two or more selected icons is associated with the respective entity, such that the association allows for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
  • FIG. 1 is an illustration of an embodiment of a language-independent visual identifier.
  • FIG. 2 is a series of frames illustrating an embodiment of a user interface used in the identification of an individual through an associated language- independent visual identifier.
  • FIG. 3 is an illustration of an exemplary personal information web page managed by a language -independent ID holder.
  • FIG. 4 is an illustration of an embodiment of a web page whereby a user can message a target language-independent ID holder.
  • FIG. 5 is an illustration of an embodiment of an embedded language- independent ID.
  • FIG. 6 is an illustration of an embodiment of a language-independent ID system.
  • a new approach provides human-readable, language independent identification labels or tags that can be associated with an individual or other entity, such as a business.
  • the associations are made available remotely, as through a network, to allow others to easily obtain information about the associated individual or business through the associated human-readable, language independent identification tag.
  • Such a resource beneficially allows users (e.g., individuals) to find out about holders of such identification tags, also referred to herein as entities, within the context of a current situation.
  • Such a capability allows users to start a relationship with such entities in a position of knowledge.
  • Such a system can also be used to protect privacy for those who are concerned about privacy, increase exposure for those who want it, and remove language barriers to reaching out to people.
  • Such a system which has a very specific real-world application, potentially fills a much larger role in online communications, potentially becoming a web standard, similar to an OpenID.
  • identifiers as arrangements of such icons can be employed as government-issued identifications such as license plates or even passports.
  • a short language -independent visual identifier using simple shapes and/or colors referred to herein as a language-independent ID is associated with an individual or other entity, such as a business an educational institution, or government agency, also referred to as an entity or ID holder for identification purposes.
  • a human-readable identifier 100 includes four symbols 102a, 102b, 102c, 102d, generally 102. Each symbol 102 is characterized by a respective icon: Symbol 102a is a star; Symbol 102B is an arrow; Symbol 102c is a bicycle; and
  • Symbol 102d is an airplane.
  • the symbols 102 can be black on white (e.g., Symbols 102a, 102c, 102d) or white on black (e.g., Symbol 102b).
  • the exemplary symbols are illustrated in black and white, it is envisioned that other colors could be used alone or in combination. When selecting different colors, common color blindness conditions can be considered, such that contrasting colors would be distinguishable.
  • the term human readable suggests that the individual icons are easily identifiable or otherwise recognizable by humans (e.g., not bar codes). This would include recognizable shapes, simple graphics or animations, colors, numbers, letters, and combinations of one or more of the like, such as those shown in the figure.
  • the icons/symbols are also readable by a machine.
  • a mobile application can be configured to automatically read or otherwise interpret the language-independent ID through optical recognition of the symbols.
  • Such an automated application could also be configured to automatically communicate with the managed language-independent ID server through well known techniques, upon recognition of the language- independent ID, to obtain the underlying association.
  • automated application can also be configured to obtain any managed identity information obtainable through the association, as may be provided at a linked hypertext page or web site.
  • This visual identifier can be displayed on a person's clothing and/or other personal accessories (or on their web page, blog, Facebook® page, etc.), allowing anyone, regardless of language, to identify him/her.
  • Association of the ID holder with the language-independent visual identification tag can be coupled with a remotely (e.g., network) accessible source, such as a web site, whereby a searcher selects the visual identifier using a simple interface, e.g., via their computer or mobile device, and is directed to the user's profile page.
  • a remotely accessible source such as a web site
  • An exemplary process for identifying an ID holder by their language -independent visual identifier is illustrated in FIG. 2.
  • a user wishing to learn the identity and or other information related to the ID holder accesses a user interface 200.
  • the user enters or otherwise selects a respective icon for each symbol 202a, 202b, 202c, 202d, generally 202, in the appropriate order to match the ID holder's arrangement of such symbols in a language-independent ID tag.
  • selection may be accomplished using a drop-down selection list 204 as shown in the second screen.
  • a user clicks on the first symbol 202a to access the selection list 204.
  • the user selects the appropriate icon 206 from the list 204 to associate it with one of the symbols 202a.
  • the symbol 202a can be updated to reflect the selection as shown in the third frame. The user can repeat such a process for each remaining symbol 202 in the ID 208 until complete.
  • the user Upon completion of the user ID or by some other user action after having entered the user ID, the user is presented with information related to the associated ID holder.
  • the ID holder information presented to the user can include a hypertext profile page. This profile page contains as much or as little information as that person chooses to expose at that time.
  • the social media maven it might include photos from their Flickr® page, all of their Facebook®, Twitter® and personal and business blog posts, etc.
  • For a private person it might be limited to his/her business blog and a link to his/her resume.
  • a web site or other network accessible service can contain or otherwise present a variety of features to make it easy to provide third-party information/feeds and some on-site content such as a very basic profile, including conversation starters and a "contact me” function.
  • Linking an ID holder's offline (i.e., real world) identity with their online identity is a powerful concept - allowing people to immediately research someone by seeing their "language -independent ID” from across a room, surreptitiously looking it up on their mobile device, and gaining information to use to start a conversation or follow-up with that person later.
  • the information can be managed locally, for example by a language-independent ID management entity acting as a profile aggregator.
  • an entity can choose to direct a user accessing their managed language-independent ID to a third-party destination (e.g., a web site, such as their Linkedln profile, or profilactic.com), or even a destination site containing content they like, such as a YouTube® video.
  • a third-party destination e.g., a web site, such as their Linkedln profile, or profilactic.com
  • a destination site containing content they like such as a YouTube® video.
  • respective entities choose or are assigned by a management authority a visual identifier (or multiple identifiers) made up of simple human-readable symbols, including various colors and shapes.
  • the management authority formulates an association between each entity's language-independent ID and their identity, persona, and/or entity-managed information.
  • entities Once entities have received their visual identifier(s), they are permitted to submit information via the web site to identify themselves and aggregate content from other sources.
  • an entity can add brief personalized profile 300 information directly onto the website, such as his/her links 302 to his/her web site, blog,
  • an entity may choose to enter his/her contact information 304 (email address, cell phone, etc.).
  • the entity answers one or more brief optional questions, designed to establish background and ice-breakers for conversation.
  • the entity is presented with features allowing them to choose how much of the information to expose to web visitors (i.e., users) who look the person up using their visual identifier. This information collection, whether stored locally or provided from third parties, can then be exposed to public visitors in different ways, depending on their preferences or the context in which they intend to use the system.
  • One of the key features of such entity-controlled identity is the ability to "anonymize" oneself - to create an identifier that allows one to remain anonymous to the degree one wishes. So while a user can look an entity up by its ID, the entity gets to choose how much information about itself to expose.
  • entities are able to download their visual identifier in low resolution for printing on business cards, stickers or other home-generated paraphernalia.
  • the web site generates high resolution print-ready visual identifiers which the entity has the option to print onto various clothing and accessories for purchase via the web site.
  • the process For users researching entities by way of their language-independent ID, or visual identifier, the process consists of selecting the various symbols or "digits" in the entity's respective identifier from a categorized list of shapes and colors as illustrated in FIG. 2. Once a match is found, the user, or searcher, is lead to the visual identifier's profile page, for example by an embedded hyperlink or uniform resource locator (URL).
  • URL uniform resource locator
  • This page contains whatever information the entity had previously determined should be publicly viewable. Once a searcher finds a match, additional features on the page might allow him/her to text message, email or otherwise reach out to the visual identifier holder. Control or access to such features can be controlled by the entity depending on the entity's preferences in the system.
  • entity, or language-independent ID holder can refer to an individual person or an organization, such as a business, referred to generally as an entity.
  • a searcher entering the visual identifier through a managed web site accesses the entity's identity or managed persona by re-direction to network-accessible information managed by a third party.
  • the network- accessible information may be a hypertext document or web site - the visual identifier can serve as a more generalized visual or graphical (e.g., non-textual) uniform resource locator (URL).
  • URL uniform resource locator
  • a user entering the visual identifier of a business entity may be directed to the business's profile page. This may be the entity's public web page, which may include customized Web content.
  • FIG. 4 An embodiment of a web page 400 is illustrated in FIG. 4, whereby a user can message a target language-independent ID holder through its respective ID 402.
  • the entity's web page may contain links to and feeds from other online profiles (Facebook®, Twitter®, Linkedln®, etc.) that would be available (based on preferences) for other people to view.
  • Other online profiles Facebook®, Twitter®, Linkedln®, etc.
  • Some exemplary applications in which the language-independent ID would be beneficial include:
  • the language-independent ID can be leveraged as an identification system for a variety of third party web sites. For instance, a Facebook® or Linkedln® app, allowing people to identify themselves on Facebook® using their visual identifier.
  • An exemplary Linkedln® page 500 including the entity's language-independent visual identifier 502 is illustrated in FIG. 5. So in addition to visiting a language- independent ID site managed by a provider of the language-independent IDs to find out about an entity, a user could look the entity up on a Facebook® implementation.
  • An embodiment of a mobile application for iPhone® devices or other smart phones mimics the features available on the web site. Additionally, the mobile application contains additional features, including the ability to automatically determine their current location to update their entity profile, upload photos or videos, tag people associated with their contacts list using their language- independent ID's, identify visual identifiers via optical recognition or RFID, etc.
  • an optical recognition system e.g., a machine reader
  • Such a managed language-independent identification can act as a security login, authentication, and/or encryption process. Since there are a nearly infinite number of combinations possible with the human-readable language independent icons, it can easily be adapted as a password mnemonic process. The process would rely on a centrally located "authority" service that could be subscribed to by 3 rd party companies. A widget, similar to those described above, could be integrated into any software requiring a security password. Given the unique nature of the managed language-independent ID system, it would be nearly impossible to decode or break using password-breaking technology or techniques. Since there would be no opportunity for someone to select a "weak" password (such as "1234" or one's spouse's birthday) - it would eliminate passwords that are easily guessed or broken and replace them with only passwords of the highest possible strength.
  • a "weak" password such as "1234" or one's spouse's birthday
  • Such a managed language-independent identification can be used as an advertising and/or couponing system as well.
  • An entity can be a company that creates a related language-independent ID, which allows users to see a company page. Users could find language-independent IDs in company ads, in product placements, on company literature, etc.
  • the company's identity management of the page can be branded and contain custom messaging, as well as the usual managed language-independent ID features (links, feeds, profile information, etc.).
  • Such an information page could be managed by company staff via an administration system at the language-independent managed service.
  • the company will be presented with the option of providing marketing or other text, graphics or rich media information.
  • the company can also offer language-independent-ID-specific promotions and coupons, thereby being able to track the effectiveness of a language-independent-ID campaign.
  • the world is full of information that is very complex and difficult to remember. Whether it is a language barrier (e.g., deciphering a company's or person's name), a technical concept (e.g., Global Positioning System (GPS) coordinates) or simply a long string of text (e.g., a long book title), there are many times when it is difficult to just explain to someone how and where to find something.
  • Language-independent IDs could be created to act as URL simplifiers, or visual URLs, for such things - so a GPS location or a book title could be simplified to just four characters using a language -independent ID.
  • the language -independent ID management service can offer event registration services.
  • An event organizer can sign up with the language-independent ID manager, create an event, and have an off-the-shelf event registration process available to them. This process will capture and manage the event attendee's database, provide badge printing (with language-independent IDs), a system for feeding this data to and from the event web site (for user profiles) and other related services.
  • language-independent IDs are made up of four symbols or "digits."
  • the icons to be associated with each digit can be selected from a common library of approximately 100 available icons.
  • the value of 100 available icons is used herein for illustrative purposes and is in not intended to limit any embodiment to such a number. For example, other embodiments may have 500 available icons, 750 icons, or any other number.
  • a different library of icons is provided for one or more of the digits.
  • the icons can be offered in more than one color, such as in both black and white.
  • the 100 icons and two colors which are easily discernible in all lighting conditions and by all sighted people, including the color-blind, combine to form 200 combinations for each digit.
  • a language-independent ID includes a relatively short number of digits (e.g., less than four). A reduced number of digits would be easier to remember, thereby offering more value. A greater purchase, licensing, or subscription fee could be charged to entities desiring three or two digits for their ID.
  • one or more additional symbols are provided, such as a final optional digit (a fifth digit in the optimal case).
  • Such additional symbol(s) could be used to offer some context to a user's profile. For instance, a wingtip shoe to indicate a business profile or a flip-flop sandal to indicate a "fun" profile. Since these variations would be easily decoded, this would not be intended to provide secure contextual variations, but would rather allow a user to manage multiple profiles and thereby emphasize his/her business or personal profile in the context of a situation.
  • Cost for obtaining and/or maintaining one or more language-independent IDs can be varied, for example adding a premium charge for an additional ID, or a discount for having two or more such IDs.
  • respective entities will be given randomly generated icons.
  • respective entities may select their own icon, similar to a vanity license plate.
  • Such value-added service would allow entities to manage their "personal brand.” Icons may also be selected or otherwise presented to an entity based upon preference, such as sports icons, or nature icons.
  • An exemplary system configuration 600 is illustrated in FIG. 6.
  • One or more user devices 602 such as user computers, user mobile devices access one or more user ID managed servers 604 (e.g., buzub servers) via a network 606.
  • user ID managed servers 604 e.g., buzub servers
  • a wide area network 606 is illustrated (e.g., the World Wide Web), users may access the user ID managed servers by any conceivable network and/or combination of networks (WAN, LAN MAN, etc.).
  • User devices 602 such as personal data assistants, mobile phones, smart phones, computers, handheld computers, and the like, can be used to access, configure, and manage their user IDs and related identity information available through the one or more user ID servers 604.
  • Exemplary third-party servers 608 are also shown as may be accessible directly by the users through one or more networks, or by the user ID server 604, either locally or remotely through a network 606.
  • the user ID servers 604 may include or otherwise have access to a database application for creating or otherwise formulating associations between the entities and their respective language -independent IDs, and for storing such associations and other information as it may relate to provision and maintenance of the services.
  • the user ID server 604 includes different interfaces for managed entities and users, with hosted applications managing each interface and interaction with managed identification data.
  • the above-described systems and methods can be implemented in digital electronic circuitry, in computer hardware, firmware, and/or software.
  • the implementation can be as a computer program product (i.e., a computer program tangibly embodied in an information carrier).
  • the implementation can, for example, be in a machine-readable storage device, for execution by, or to control the operation of, data processing apparatus.
  • the implementation can, for example, be a programmable processor, a computer, and/or multiple computers.
  • a computer program can be written in any form of programming language, including compiled and/or interpreted languages, and the computer program can be deployed in any form, including as a stand-alone program or as a subroutine, element, and/or other unit suitable for use in a computing environment.
  • a computer program can be deployed to be executed on one computer or on multiple computers at one site or at multiple sites.
  • Computer programs include web-based applications, including web-pages (e.g., hypertext documents that may or may not include embedded or linked functionality, such as
  • Method steps can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by and an apparatus can be implemented as special purpose logic circuitry.
  • the circuitry can, for example, be a FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit). Modules, subroutines, and software agents can refer to portions of the computer program, the processor, the special circuitry, software, and/or hardware that implements that functionality.
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
  • a processor receives instructions and data from a read-only memory or a random access memory or both.
  • the essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data.
  • a computer can include, can be operatively coupled to receive data from and/or transfer data to one or more mass storage devices for storing data (e.g., magnetic, magneto-optical disks, or optical disks).
  • Data transmission and instructions can also occur over a communications network.
  • Information carriers suitable for embodying computer program instructions and data include all forms of non- volatile memory, including by way of example semiconductor memory devices.
  • the information carriers can, for example, be EPROM, EEPROM, flash memory devices, magnetic disks, internal hard disks, removable disks, magneto-optical disks, CD-ROM, and/or DVD-ROM disks.
  • the processor and the memory can be supplemented by, and/or incorporated in special purpose logic circuitry.
  • the above described techniques can be implemented on a computer having a display device.
  • the display device can, for example, be a cathode ray tube (CRT) and/or a liquid crystal display (LCD) monitor and/or a light emitting diode (LED) display, organic LED (OLED) and/or a projection device.
  • the interaction with a user can, for example, be a display of information to the user and a keyboard and a pointing device (e.g., a mouse or a trackball) by which the user can provide input to the computer (e.g., interact with a user interface element).
  • Other kinds of devices can be used to provide for interaction with a user.
  • Other devices can, for example, be feedback provided to the user in any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback).
  • Input from the user can, for example, be received in any form, including acoustic, speech, and/or tactile input.
  • the above described techniques can be implemented in a distributed computing system that includes a back-end component.
  • the back-end component can, for example, be a data server, a middleware component, and/or an application server.
  • the above described techniques can be implemented in a distributing computing system that includes a front-end component.
  • the front-end component can, for example, be a client computer having a graphical user interface, a Web browser through which a user can interact with an example implementation, and/or other graphical user interfaces for a transmitting device.
  • the components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, wired networks, and/or wireless networks.
  • LAN local area network
  • WAN wide area network
  • the Internet wired networks, and/or wireless networks.
  • the system can include clients and servers.
  • a client and a server are generally remote from each other and typically interact through a communication network.
  • the relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • Packet-based networks can include, for example, the Internet, a carrier internet protocol (IP) network (e.g., local area network (LAN), wide area network (WAN), campus area network (CAN), metropolitan area network (MAN), home area network (HAN)), a private IP network, an IP private branch exchange (IPBX), a wireless network (e.g., radio access network (RAN), 802.11 network, 802.16 network, general packet radio service (GPRS) network, HiperLAN), and/or other packet-based networks.
  • IP carrier internet protocol
  • LAN local area network
  • WAN wide area network
  • CAN campus area network
  • MAN metropolitan area network
  • HAN home area network
  • IP network IP private branch exchange
  • wireless network e.g., radio access network (RAN), 802.11 network, 802.16 network, general packet radio service (GPRS) network, HiperLAN
  • GPRS general packet radio service
  • HiperLAN HiperLAN
  • Circuit-based networks can include, for example, the public switched telephone network (PSTN), a private branch exchange (PBX), a wireless network (e.g., RAN, bluetooth, code-division multiple access (CDMA) network, time division multiple access (TDMA) network, global system for mobile communications (GSM) network), and/or other circuit-based networks.
  • PSTN public switched telephone network
  • PBX private branch exchange
  • CDMA code-division multiple access
  • TDMA time division multiple access
  • GSM global system for mobile communications
  • the client device can include, for example, a computer, a computer with a browser device, a telephone, an IP phone, a mobile device (e.g., cellular phone, personal digital assistant (PDA) device, laptop computer, electronic mail device), and/or other communication devices.
  • the browser device includes, for example, a computer (e.g., desktop computer, laptop computer) with a world-wide web browser (e.g., Microsoft® Internet Explorer® available from Microsoft Corporation, Mozilla® Firefox available from Mozilla Corporation).
  • the mobile computing device includes, for example, a personal digital assistant (PDA), a mobile computer, a mobile phone (e.g., smartphone).
  • PDA personal digital assistant

Abstract

A system and method for managing identities includes a visual identification tag including one or more human-readable symbols, whereby each symbol is selected from a predetermined set of non-textual icons. The one or more selected icons are indicative of an individual. An association of the one or more selected icons and a respective individual is remotely accessible, as by a network. The association allows for retrieval of information related to the respective individual through the one or more selected icons. In some embodiments, the individual can manage additional information that is accessible by others through the association.

Description

HUMAN-READABLE SYSTEMAND METHOD FOR PERSONAL IDENTIFICATION
FIELD
The present technology relates generally to the field of human-readable, language independent representation and identity management.
BACKGROUND
One's identity depends upon context. At a family reunion, one is a "son," "niece," and/or "cousin." In such familial contexts, many may know intimate details about one's life, including unflattering stories that would be better forgotten. But when social dating or speaking at a conference or writing for a blog, one might want to expose different parts of one's identity in different ways.
The explosion of the use of social media has expanded an already problematic issue whereby one has multiple identities across multiple web properties, requiring many user IDs and public personae. A person's persona on Facebook® may be very different from his/her persona on Linkedln®. Keeping these various platforms up-to-date can be very time-consuming for those who take it seriously. And tracking one's "friends" on these systems can be even more of a commitment. Some of these sites allow for easy cross-pollination, including linking or sharing of content. There are social media aggregation services that are now providing a platform for combining the content from these various sources, such as FriendFeed. There are also several approaches (OpenID and FacebookConnect seem to be leading the way currently) to creating a single user identification/authentication system whereby users could share data and have single sign-on access to multiple sources of content.
But there is one place where a person's identity and ability to share that identity in a controlled way is still very difficult — the "real world." SUMMARY
There remains a need in various situations for one to quickly and easily identify others, such as individuals and/or organizations such as businesses encountered in the real world, without necessarily approaching or otherwise directly contacting or interacting with such other individuals and/or companies. There is also a need for such entities to promote their identities or other online content in the real world in subtle and/or semi-anonymous and/or language-independent ways.
A new approach provides human-readable, language independent identification labels or tags that can be associated with an individual or other entity, such as a business. The associations are made available remotely, as through a network, to allow others to easily obtain information about the associated individual or business through the associated human-readable, language independent identification tag.
In one embodiment, a visual identification tag includes an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language -independent icons. The arrangement of one or more selected icons is indicative of a respective entity. A network-accessible association is provided of the arrangement of the one or more selected icons and a respective entity. The association allows for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
In some embodiments, the one or more selected icons are non-textual. The non-textual icons can be graphical symbols. Alternatively or in addition, the nontextual icons can be color coded.
In another embodiment, an entity identity management system includes an identification tag comprising an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language- independent icons. The arrangement of one or more selected icons is indicative of a respective entity. A network-accessible server stores an association of the arrangement of one or more selected icons and the respective individual. A user interface allows a user to access the stored association through the arrangement of one or more selected icons. In some embodiments, the user identity management system includes an entity management interface allowing for management of the entities' own publicly discoverable identity. The managed identity can be discoverable by the user's access to the stored association. Alternatively or in addition, the managed identity includes a link to another information source.
In another embodiment, a process for managing an identity includes defining an arrangement of one or more human-readable symbols. Each symbol is selected from a predetermined set of language-independent icons. The arrangement of one or more selected icons is indicative of a respective entity. An association of the arrangement of one or more selected icons and the respective entity is stored. The association is remotely accessible by others responsive to the defined two or more human-readable symbols.
In some embodiments, the process for managing an identity allows others to remotely access stored associations using a network. Alternatively or in addition, selectable information can be associated with the arrangement of one or more selected icons.
In yet another embodiment, a process for creating a visual identification tag includes providing an arrangement of two or more human-readable symbols. A language-independent icon is selected for each of the two or more human-readable symbols. The arrangement of two or more selected icons is indicative of a respective entity. The arrangement of two or more selected icons is associated with the respective entity, such that the association allows for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, features, and advantages of the present invention, as well as the invention itself, can be more fully understood from the following description of various embodiments, when read together with the accompanying drawings. FIG. 1 is an illustration of an embodiment of a language-independent visual identifier. FIG. 2 is a series of frames illustrating an embodiment of a user interface used in the identification of an individual through an associated language- independent visual identifier.
FIG. 3 is an illustration of an exemplary personal information web page managed by a language -independent ID holder.
FIG. 4 is an illustration of an embodiment of a web page whereby a user can message a target language-independent ID holder.
FIG. 5 is an illustration of an embodiment of an embedded language- independent ID. FIG. 6 is an illustration of an embodiment of a language-independent ID system.
DETAILED DESCRIPTION
A new approach provides human-readable, language independent identification labels or tags that can be associated with an individual or other entity, such as a business. The associations are made available remotely, as through a network, to allow others to easily obtain information about the associated individual or business through the associated human-readable, language independent identification tag. Such a resource beneficially allows users (e.g., individuals) to find out about holders of such identification tags, also referred to herein as entities, within the context of a current situation. Such a capability allows users to start a relationship with such entities in a position of knowledge. Such a system can also be used to protect privacy for those who are concerned about privacy, increase exposure for those who want it, and remove language barriers to reaching out to people. Such a system, which has a very specific real-world application, potentially fills a much larger role in online communications, potentially becoming a web standard, similar to an OpenID.
The generation and use of human-readable, language independent identification labels also lends itself as a strong password/security process. As security of sensitive information becomes more and more important, and the need for technology that thwarts typical hacking methodology continues to increase; language-independent identification labels can be used to satisfy these needs. Since the labels or tags are language independent, they can be used by any entity, e.g., a person of any culture and of nearly any age.
Given the nature of the human-readable icons and easy language- independent visual mnemonic, identifiers as arrangements of such icons can be employed as government-issued identifications such as license plates or even passports.
Exemplary scenarios in which such language-independent visual mnemonics might be helpful are numerous:
1) where one needs near-anonymous identification, such as with a luggage tag; 2) where one needs quick and language-independent identification, such as at international events (allowing an English speaker to find out about a Chinese person or business without being familiar with the English phonetics of their name on a tag OR having to read or otherwise distinguish Chinese characters); 3) where one needs discreet identification, such as at singles events (allowing a person to learn about another before walking up and reading their name tag up close); and 4) where one needs easily to distribute and remember links to information, thereby allowing one to communicate/promote content via a replicable and distributable format, e.g., stickers or other suitable markers that can be perpetual and easy to remember, such markers being usable to link to associated information or content.
A short language -independent visual identifier using simple shapes and/or colors, referred to herein as a language-independent ID is associated with an individual or other entity, such as a business an educational institution, or government agency, also referred to as an entity or ID holder for identification purposes. Such an exemplary language-independent visual identifier is illustrated in FIG. 1. Here, a human-readable identifier 100 includes four symbols 102a, 102b, 102c, 102d, generally 102. Each symbol 102 is characterized by a respective icon: Symbol 102a is a star; Symbol 102B is an arrow; Symbol 102c is a bicycle; and
Symbol 102d is an airplane. The symbols 102 can be black on white (e.g., Symbols 102a, 102c, 102d) or white on black (e.g., Symbol 102b). Although the exemplary symbols are illustrated in black and white, it is envisioned that other colors could be used alone or in combination. When selecting different colors, common color blindness conditions can be considered, such that contrasting colors would be distinguishable. In general, the term human readable suggests that the individual icons are easily identifiable or otherwise recognizable by humans (e.g., not bar codes). This would include recognizable shapes, simple graphics or animations, colors, numbers, letters, and combinations of one or more of the like, such as those shown in the figure. Although the individual icons or symbols are identified herein as human readable, it is envisioned that in at least some embodiments, the icons/symbols are also readable by a machine. For example, a mobile application can be configured to automatically read or otherwise interpret the language-independent ID through optical recognition of the symbols. Such an automated application could also be configured to automatically communicate with the managed language-independent ID server through well known techniques, upon recognition of the language- independent ID, to obtain the underlying association. In at least some instances, automated application can also be configured to obtain any managed identity information obtainable through the association, as may be provided at a linked hypertext page or web site. This visual identifier can be displayed on a person's clothing and/or other personal accessories (or on their web page, blog, Facebook® page, etc.), allowing anyone, regardless of language, to identify him/her. Association of the ID holder with the language-independent visual identification tag can be coupled with a remotely (e.g., network) accessible source, such as a web site, whereby a searcher selects the visual identifier using a simple interface, e.g., via their computer or mobile device, and is directed to the user's profile page. An exemplary process for identifying an ID holder by their language -independent visual identifier is illustrated in FIG. 2. A user wishing to learn the identity and or other information related to the ID holder accesses a user interface 200. In the first frame, the user enters or otherwise selects a respective icon for each symbol 202a, 202b, 202c, 202d, generally 202, in the appropriate order to match the ID holder's arrangement of such symbols in a language-independent ID tag. Such selection may be accomplished using a drop-down selection list 204 as shown in the second screen. A user clicks on the first symbol 202a to access the selection list 204. The user then selects the appropriate icon 206 from the list 204 to associate it with one of the symbols 202a. The symbol 202a can be updated to reflect the selection as shown in the third frame. The user can repeat such a process for each remaining symbol 202 in the ID 208 until complete.
Upon completion of the user ID or by some other user action after having entered the user ID, the user is presented with information related to the associated ID holder. For example, the ID holder information presented to the user can include a hypertext profile page. This profile page contains as much or as little information as that person chooses to expose at that time. For the social media maven, it might include photos from their Flickr® page, all of their Facebook®, Twitter® and personal and business blog posts, etc. For a private person, it might be limited to his/her business blog and a link to his/her resume. A web site or other network accessible service can contain or otherwise present a variety of features to make it easy to provide third-party information/feeds and some on-site content such as a very basic profile, including conversation starters and a "contact me" function. Linking an ID holder's offline (i.e., real world) identity with their online identity is a powerful concept - allowing people to immediately research someone by seeing their "language -independent ID" from across a room, surreptitiously looking it up on their mobile device, and gaining information to use to start a conversation or follow-up with that person later. The information can be managed locally, for example by a language-independent ID management entity acting as a profile aggregator. Alternatively or in addition, an entity can choose to direct a user accessing their managed language-independent ID to a third-party destination (e.g., a web site, such as their Linkedln profile, or profilactic.com), or even a destination site containing content they like, such as a YouTube® video.
1. Visual Identification and Web-Based Profile System.
Referring again to FIG. 1, respective entities choose or are assigned by a management authority a visual identifier (or multiple identifiers) made up of simple human-readable symbols, including various colors and shapes. The management authority formulates an association between each entity's language-independent ID and their identity, persona, and/or entity-managed information. Once entities have received their visual identifier(s), they are permitted to submit information via the web site to identify themselves and aggregate content from other sources. As illustrated in FIG. 3, an entity can add brief personalized profile 300 information directly onto the website, such as his/her links 302 to his/her web site, blog,
Linkedln®, Facebook® and Twitter® pages, etc. Alternatively or in addition, an entity may choose to enter his/her contact information 304 (email address, cell phone, etc.). In some embodiments, the entity answers one or more brief optional questions, designed to establish background and ice-breakers for conversation. In some embodiments, the entity is presented with features allowing them to choose how much of the information to expose to web visitors (i.e., users) who look the person up using their visual identifier. This information collection, whether stored locally or provided from third parties, can then be exposed to public visitors in different ways, depending on their preferences or the context in which they intend to use the system. One of the key features of such entity-controlled identity is the ability to "anonymize" oneself - to create an identifier that allows one to remain anonymous to the degree one wishes. So while a user can look an entity up by its ID, the entity gets to choose how much information about itself to expose.
In addition to assigning a visual identifier and profile information, entities are able to download their visual identifier in low resolution for printing on business cards, stickers or other home-generated paraphernalia. Alternatively or in addition, the web site generates high resolution print-ready visual identifiers which the entity has the option to print onto various clothing and accessories for purchase via the web site. For users researching entities by way of their language-independent ID, or visual identifier, the process consists of selecting the various symbols or "digits" in the entity's respective identifier from a categorized list of shapes and colors as illustrated in FIG. 2. Once a match is found, the user, or searcher, is lead to the visual identifier's profile page, for example by an embedded hyperlink or uniform resource locator (URL). This page contains whatever information the entity had previously determined should be publicly viewable. Once a searcher finds a match, additional features on the page might allow him/her to text message, email or otherwise reach out to the visual identifier holder. Control or access to such features can be controlled by the entity depending on the entity's preferences in the system. As used herein, the term entity, or language-independent ID holder can refer to an individual person or an organization, such as a business, referred to generally as an entity.
In some embodiments, a searcher entering the visual identifier through a managed web site accesses the entity's identity or managed persona by re-direction to network-accessible information managed by a third party. The network- accessible information may be a hypertext document or web site - the visual identifier can serve as a more generalized visual or graphical (e.g., non-textual) uniform resource locator (URL). For example, a user entering the visual identifier of a business entity may be directed to the business's profile page. This may be the entity's public web page, which may include customized Web content. In general, there is no practical limit to the style or content that can be managed by an entity and thereby made available to a user seeking information or identity of the entity through the entity's language-independent ID.
An embodiment of a web page 400 is illustrated in FIG. 4, whereby a user can message a target language-independent ID holder through its respective ID 402. The entity's web page may contain links to and feeds from other online profiles (Facebook®, Twitter®, Linkedln®, etc.) that would be available (based on preferences) for other people to view.
Some exemplary applications in which the language-independent ID would be beneficial include:
• Events (various, including business events, conferences, college orientation, dating events, etc.);
• General public use;
• Hospital bracelet;
• Mailing/shipping tags;
• ID badges in general; • Object identification (stickers, luggage tags, etc.);
• Kid safety tracking system;
• Web site, blog or other promotional online destination; and • Dog collar.
2. Language-independent ID Widget for Incorporating Visual Identification into Non-managed Web Sites.
In addition to the web-based identification and profile/aggregation service, the language-independent ID can be leveraged as an identification system for a variety of third party web sites. For instance, a Facebook® or Linkedln® app, allowing people to identify themselves on Facebook® using their visual identifier. An exemplary Linkedln® page 500 including the entity's language-independent visual identifier 502 is illustrated in FIG. 5. So in addition to visiting a language- independent ID site managed by a provider of the language-independent IDs to find out about an entity, a user could look the entity up on a Facebook® implementation. This connection between Facebook® and the managed language-independent IDs would allow the entity's Facebook® content to also flow to the language- independent ID provider managed site, providing at least two different points of entry for the information. Other web sites could use the platform in a similar fashion: language-independent ID widget allows any web site in the world to easily add the language-independent ID to their users' profiles.
3. Mobile Device Applications.
An embodiment of a mobile application for iPhone® devices or other smart phones mimics the features available on the web site. Additionally, the mobile application contains additional features, including the ability to automatically determine their current location to update their entity profile, upload photos or videos, tag people associated with their contacts list using their language- independent ID's, identify visual identifiers via optical recognition or RFID, etc. In some embodiments, an optical recognition system (e.g., a machine reader) is provided or otherwise used to automatically read the arrangement of one or more human-readable, language-independent symbols.
4. Security Login/ Authentication/Encryption Process.
Such a managed language-independent identification can act as a security login, authentication, and/or encryption process. Since there are a nearly infinite number of combinations possible with the human-readable language independent icons, it can easily be adapted as a password mnemonic process. The process would rely on a centrally located "authority" service that could be subscribed to by 3rd party companies. A widget, similar to those described above, could be integrated into any software requiring a security password. Given the unique nature of the managed language-independent ID system, it would be nearly impossible to decode or break using password-breaking technology or techniques. Since there would be no opportunity for someone to select a "weak" password (such as "1234" or one's spouse's birthday) - it would eliminate passwords that are easily guessed or broken and replace them with only passwords of the highest possible strength.
5. Advertising and/or Couponing System. Such a managed language-independent identification can be used as an advertising and/or couponing system as well. An entity can be a company that creates a related language-independent ID, which allows users to see a company page. Users could find language-independent IDs in company ads, in product placements, on company literature, etc. The company's identity management of the page can be branded and contain custom messaging, as well as the usual managed language-independent ID features (links, feeds, profile information, etc.). Such an information page could be managed by company staff via an administration system at the language-independent managed service. The company will be presented with the option of providing marketing or other text, graphics or rich media information. The company can also offer language-independent-ID-specific promotions and coupons, thereby being able to track the effectiveness of a language-independent-ID campaign.
6. URL Simplifier.
The world is full of information that is very complex and difficult to remember. Whether it is a language barrier (e.g., deciphering a company's or person's name), a technical concept (e.g., Global Positioning System (GPS) coordinates) or simply a long string of text (e.g., a long book title), there are many times when it is difficult to just explain to someone how and where to find something. Language-independent IDs could be created to act as URL simplifiers, or visual URLs, for such things - so a GPS location or a book title could be simplified to just four characters using a language -independent ID. If a user were to look up one of these IDs, which could be temporary, they would be redirected to the appropriate web site in question (an Amazon.com page or Google Maps with a pushpin activated, for instance) or to an item specific language-independent ID profile page explaining and linking to the item in question.
7. Event Registration Services. The language -independent ID management service can offer event registration services. An event organizer can sign up with the language-independent ID manager, create an event, and have an off-the-shelf event registration process available to them. This process will capture and manage the event attendee's database, provide badge printing (with language-independent IDs), a system for feeding this data to and from the event web site (for user profiles) and other related services.
8. Language-independent IDs.
In some embodiments, language-independent IDs are made up of four symbols or "digits." The icons to be associated with each digit can be selected from a common library of approximately 100 available icons. The value of 100 available icons is used herein for illustrative purposes and is in not intended to limit any embodiment to such a number. For example, other embodiments may have 500 available icons, 750 icons, or any other number. In some embodiments, a different library of icons is provided for one or more of the digits. The icons can be offered in more than one color, such as in both black and white. The 100 icons and two colors, which are easily discernible in all lighting conditions and by all sighted people, including the color-blind, combine to form 200 combinations for each digit. Therefore, there are 1.6 billion possibilities within a four-digit label. Such a four- digit combination keeps the number of digits short enough so that it will be memorable yet each symbol selectable from a broad enough pool of icons to allow for many, many users. In some applications, a language-independent ID includes a relatively short number of digits (e.g., less than four). A reduced number of digits would be easier to remember, thereby offering more value. A greater purchase, licensing, or subscription fee could be charged to entities desiring three or two digits for their ID.
In some applications, one or more additional symbols are provided, such as a final optional digit (a fifth digit in the optimal case). Such additional symbol(s) could be used to offer some context to a user's profile. For instance, a wingtip shoe to indicate a business profile or a flip-flop sandal to indicate a "fun" profile. Since these variations would be easily decoded, this would not be intended to provide secure contextual variations, but would rather allow a user to manage multiple profiles and thereby emphasize his/her business or personal profile in the context of a situation. For secure contextual identification variations. Entities may choose to two or more language-independent IDs. Cost for obtaining and/or maintaining one or more language-independent IDs can be varied, for example adding a premium charge for an additional ID, or a discount for having two or more such IDs. In some cases, respective entities will be given randomly generated icons. In others, respective entities may select their own icon, similar to a vanity license plate. Such value-added service would allow entities to manage their "personal brand." Icons may also be selected or otherwise presented to an entity based upon preference, such as sports icons, or nature icons. An exemplary system configuration 600 is illustrated in FIG. 6. One or more user devices 602, such as user computers, user mobile devices access one or more user ID managed servers 604 (e.g., buzub servers) via a network 606. Although a wide area network 606 is illustrated (e.g., the World Wide Web), users may access the user ID managed servers by any conceivable network and/or combination of networks (WAN, LAN MAN, etc.). User devices 602, such as personal data assistants, mobile phones, smart phones, computers, handheld computers, and the like, can be used to access, configure, and manage their user IDs and related identity information available through the one or more user ID servers 604. Exemplary third-party servers 608 are also shown as may be accessible directly by the users through one or more networks, or by the user ID server 604, either locally or remotely through a network 606. The user ID servers 604 may include or otherwise have access to a database application for creating or otherwise formulating associations between the entities and their respective language -independent IDs, and for storing such associations and other information as it may relate to provision and maintenance of the services. In some embodiments, the user ID server 604 includes different interfaces for managed entities and users, with hosted applications managing each interface and interaction with managed identification data. Although an exemplary system configuration is shown, various configurations are conceivable using commonly available devices and network connectivity.
The above-described systems and methods can be implemented in digital electronic circuitry, in computer hardware, firmware, and/or software. The implementation can be as a computer program product (i.e., a computer program tangibly embodied in an information carrier). The implementation can, for example, be in a machine-readable storage device, for execution by, or to control the operation of, data processing apparatus. The implementation can, for example, be a programmable processor, a computer, and/or multiple computers. A computer program can be written in any form of programming language, including compiled and/or interpreted languages, and the computer program can be deployed in any form, including as a stand-alone program or as a subroutine, element, and/or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or at multiple sites. Computer programs include web-based applications, including web-pages (e.g., hypertext documents that may or may not include embedded or linked functionality, such as applets).
Method steps can be performed by one or more programmable processors executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by and an apparatus can be implemented as special purpose logic circuitry. The circuitry can, for example, be a FPGA (field programmable gate array) and/or an ASIC (application-specific integrated circuit). Modules, subroutines, and software agents can refer to portions of the computer program, the processor, the special circuitry, software, and/or hardware that implements that functionality.
Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor receives instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer can include, can be operatively coupled to receive data from and/or transfer data to one or more mass storage devices for storing data (e.g., magnetic, magneto-optical disks, or optical disks).
Data transmission and instructions can also occur over a communications network. Information carriers suitable for embodying computer program instructions and data include all forms of non- volatile memory, including by way of example semiconductor memory devices. The information carriers can, for example, be EPROM, EEPROM, flash memory devices, magnetic disks, internal hard disks, removable disks, magneto-optical disks, CD-ROM, and/or DVD-ROM disks. The processor and the memory can be supplemented by, and/or incorporated in special purpose logic circuitry.
To provide for interaction with a user, the above described techniques can be implemented on a computer having a display device. The display device can, for example, be a cathode ray tube (CRT) and/or a liquid crystal display (LCD) monitor and/or a light emitting diode (LED) display, organic LED (OLED) and/or a projection device. The interaction with a user can, for example, be a display of information to the user and a keyboard and a pointing device (e.g., a mouse or a trackball) by which the user can provide input to the computer (e.g., interact with a user interface element). Other kinds of devices can be used to provide for interaction with a user. Other devices can, for example, be feedback provided to the user in any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback). Input from the user can, for example, be received in any form, including acoustic, speech, and/or tactile input.
The above described techniques can be implemented in a distributed computing system that includes a back-end component. The back-end component can, for example, be a data server, a middleware component, and/or an application server. The above described techniques can be implemented in a distributing computing system that includes a front-end component. The front-end component can, for example, be a client computer having a graphical user interface, a Web browser through which a user can interact with an example implementation, and/or other graphical user interfaces for a transmitting device. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, wired networks, and/or wireless networks.
The system can include clients and servers. A client and a server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Packet-based networks can include, for example, the Internet, a carrier internet protocol (IP) network (e.g., local area network (LAN), wide area network (WAN), campus area network (CAN), metropolitan area network (MAN), home area network (HAN)), a private IP network, an IP private branch exchange (IPBX), a wireless network (e.g., radio access network (RAN), 802.11 network, 802.16 network, general packet radio service (GPRS) network, HiperLAN), and/or other packet-based networks. Circuit-based networks can include, for example, the public switched telephone network (PSTN), a private branch exchange (PBX), a wireless network (e.g., RAN, bluetooth, code-division multiple access (CDMA) network, time division multiple access (TDMA) network, global system for mobile communications (GSM) network), and/or other circuit-based networks.
The client device (e.g., entity and/or user) can include, for example, a computer, a computer with a browser device, a telephone, an IP phone, a mobile device (e.g., cellular phone, personal digital assistant (PDA) device, laptop computer, electronic mail device), and/or other communication devices. The browser device includes, for example, a computer (e.g., desktop computer, laptop computer) with a world-wide web browser (e.g., Microsoft® Internet Explorer® available from Microsoft Corporation, Mozilla® Firefox available from Mozilla Corporation). The mobile computing device includes, for example, a personal digital assistant (PDA), a mobile computer, a mobile phone (e.g., smartphone).
The terms comprise, include, and/or plural forms of each are open ended and include the listed parts and can include additional parts that are not listed. The term and/or is open ended and includes one or more of the listed parts and combinations of the listed parts. One skilled in the art can realize the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The foregoing embodiments are therefore to be considered in all respects illustrative rather than limiting of the invention described herein. Scope of the invention is thus indicated by the appended claims, rather than by the foregoing description, and all changes that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims

WHAT IS CLAIMED IS:
1. A visual identification apparatus, comprising: arrangement of one or more human-readable symbols, each symbol selected from a predetermined set of language-independent icons, the one or more selected icons being indicative of a respective entity; a network-accessible association of the arrangement of one or more selected icons and the respective entity, the association allowing for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
2. The apparatus of claim 1, wherein the one or more selected icons are nontextual.
3. The apparatus of claim 1, wherein the language-independent icons are graphical symbols.
4. The apparatus of claim 1, wherein at least some of the language-independent icons are differentiated by color.
5. The apparatus of claim 1, wherein the respective entity is a business entity.
6. A user identity management system, comprising: an identification tag comprising arrangement of one or more human-readable symbols, each symbol selected from a predetermined set of language-independent icons, the one or more selected icons being indicative of a respective entity; a network-accessible server storing an association of the arrangement of one or more selected icons and the respective entity; and a user interface allowing a user to access associated content through the arrangement of one or more selected icons.
7. The system of claim 6, further comprising a management interface allowing for the management of associated content indicative of each respective entity's own identity.
8. The system of claim 7, wherein the managed identity is discoverable by the user's access to the stored association.
9. The system of claim 8, wherein the managed identity comprises a link to another information source.
10. The system of claim 9, wherein the other information source comprises a different network-accessible server.
11. The system of claim 9, wherein the other information source is a social networking service.
12. A method for managing an identity comprising: defining an arrangement of one or more human-readable symbols, each symbol selected from a predetermined set of language-independent icons, the one or more selected icons being indicative of a respective entity; storing an association of the arrangement of one or more selected icons and the respective entity, whereby the association is remotely accessible by others responsive to the defined one or more human-readable symbols.
13. The method of claim 10, wherein others having the defined arrangement of one or more human-readable symbols remotely access associated information via stored associations using a network.
14. The method of claim 13, wherein remotely accessing associated information comprises: identifying the defined arrangement of one or more human-readable symbols; identifying the stored association corresponding to the identified defined arrangement of symbols; and providing predetermined information associated to the defined arrangement of symbols.
15. The method of claim 14, wherein the predetermined information comprises at least one identifier of the respective entity.
16. The method of claim 14, wherein the predetermined information comprises at least one link to at least one identifier of the respective entity.
17. The method of claim 10, further comprising associating selectable information with the one or more selected icons.
18. A method for creating a visual identification tag, comprising: providing an arrangement of two or more human-readable symbols; selecting a language-independent icon for each of the two or more human- readable symbols, the arrangement of selected icons being indicative of a respective entity; and associating the arrangement of two or more selected icons with a respective entity, such that the association allows for retrieval of information related to the respective entity through the arrangement of one or more selected icons.
19. The method of claim 18, wherein selecting a language-independent icon comprises selecting such icon from a predetermined list of icons.
20. The method of claim 18, wherein associating the arrangement the arrangement of two or more selected icons with a respective entity comprises creating a relationship between the arrangement of two or more selected icons and information indicative of the respective entity.
PCT/US2010/026769 2009-03-12 2010-03-10 Human-readable system and method for personal identification WO2010104914A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15978709P 2009-03-12 2009-03-12
US61/159,787 2009-03-12

Publications (2)

Publication Number Publication Date
WO2010104914A2 true WO2010104914A2 (en) 2010-09-16
WO2010104914A3 WO2010104914A3 (en) 2011-01-06

Family

ID=42729069

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2010/026769 WO2010104914A2 (en) 2009-03-12 2010-03-10 Human-readable system and method for personal identification

Country Status (1)

Country Link
WO (1) WO2010104914A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8712850B1 (en) 2012-02-03 2014-04-29 Google Inc. Promoting content
US9304985B1 (en) 2012-02-03 2016-04-05 Google Inc. Promoting content
US9311472B2 (en) 2012-12-21 2016-04-12 Abbott Laboratories Methods and apparatus for authenticating user login
US9378191B1 (en) 2012-02-03 2016-06-28 Google Inc. Promoting content

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030033232A (en) * 2001-10-19 2003-05-01 에스케이텔레텍주식회사 Method for Displaying State of Selected-User on Mobile Communication Device and simply Transmitting Message
US20060005133A1 (en) * 2004-06-30 2006-01-05 International Business Machines Corporation Graphical representation of the availability of an instant messaging user for communication
KR20060065290A (en) * 2004-12-10 2006-06-14 엘지전자 주식회사 Method for providing messaging many languages of instant messenger
US20080229216A1 (en) * 2005-09-08 2008-09-18 International Business Machines Corporation Attribute Visualization of Attendees to an Electronic Meeting

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030033232A (en) * 2001-10-19 2003-05-01 에스케이텔레텍주식회사 Method for Displaying State of Selected-User on Mobile Communication Device and simply Transmitting Message
US20060005133A1 (en) * 2004-06-30 2006-01-05 International Business Machines Corporation Graphical representation of the availability of an instant messaging user for communication
KR20060065290A (en) * 2004-12-10 2006-06-14 엘지전자 주식회사 Method for providing messaging many languages of instant messenger
US20080229216A1 (en) * 2005-09-08 2008-09-18 International Business Machines Corporation Attribute Visualization of Attendees to an Electronic Meeting

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8712850B1 (en) 2012-02-03 2014-04-29 Google Inc. Promoting content
US9304985B1 (en) 2012-02-03 2016-04-05 Google Inc. Promoting content
US9378191B1 (en) 2012-02-03 2016-06-28 Google Inc. Promoting content
US9471551B1 (en) 2012-02-03 2016-10-18 Google Inc. Promoting content
US10061751B1 (en) 2012-02-03 2018-08-28 Google Llc Promoting content
US10579709B2 (en) 2012-02-03 2020-03-03 Google Llc Promoting content
US9311472B2 (en) 2012-12-21 2016-04-12 Abbott Laboratories Methods and apparatus for authenticating user login

Also Published As

Publication number Publication date
WO2010104914A3 (en) 2011-01-06

Similar Documents

Publication Publication Date Title
US10956457B2 (en) Systems and methods for registering, administering, and using non-locational identifiers as locational addresses through location name and identifier registries
US10862843B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
US11423126B2 (en) Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content
JP6164808B2 (en) Recommended share box
US8914859B2 (en) Managing the progressive legible obfuscation and de-obfuscation of public and quasi-public broadcast messages
Neuhaus et al. Agile ethics for massified research and visualization
US9871757B1 (en) Sharing user-generated content to external social networks
Malathy et al. Application of mobile technologies to libraries
US8266712B2 (en) Privacy through artificial contextual data generation
EP2864854A1 (en) Recommended content for an endorsement user interface
Tan et al. Big data privacy: changing perception of privacy
WO2010104914A2 (en) Human-readable system and method for personal identification
Jedrzejczyk et al. I know what you did last summer: risks of location data leakage in mobile and social computing
Al-Nuaim Context-aware mobile interface design for M-government
Saxena et al. An intelligent recommendation-cum-reminder system
US20130117374A1 (en) Social Network with Blocked Network Users and Accessible Network Users
Han et al. Implementation of new services to support ubiquitous computing for campus life
Nicely et al. Application of Android enabled mobile device for personal information systems
Goh et al. Finding trafficked children through crowdsourcing
Prakash et al. Navigation Technology to meet new people using Fused Location API
US20120323810A1 (en) Social networking identification method
Hejazinia A framework for the requirements of e-health 2.0 in developing countries: a qualitative approach
Thomas Intentions to Use Location-Based Services: Refining a Predictive Model and Understanding Contexts of Use
WO2022162414A1 (en) Method and system for generating email address based on country code, mobile phone number and domain name
Bartolomeo et al. Design and Implementation of Mobile Electronic Memos: a tool to capture and share information in mobile environments

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10751327

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24.01.12)

122 Ep: pct application non-entry in european phase

Ref document number: 10751327

Country of ref document: EP

Kind code of ref document: A2