1) Field of the Invention
The present invention combines 1) biometrics (fingerprint scans, iris scans, facial recognition scans, DNA, . . . ) with 2) a separate and secure network and email infrastructure, 3) email management processes, and 4) the addition of text, audio and visual format options to sending emails messages; all within the integrated, coordinated, easy-to-use framework of a fully certified email system. The result is a complete solution with major improvements in 1) sender and recipient identity verification, 2) security and privacy, 3) proof of delivery, and 4) effectiveness in communications, during the exchange of certified email messages and attachments while using the Invention.
2) Prior Art
The use of electronic mail (email) and attachments have grown substantially over the last few decades. Unfortunately, so have the problems of identity verification, security, privacy and proof of delivery; not to mention all the spam, viruses, and other harmful malware which has become the norm with using the popular, everyday email systems like Hotmail, AOL, Gmail and even Outlook. And, most use the “very public and very vulnerable” Internet as their worldwide network.
Millions of these international email users receive emails and attachments from people they don't know or from people they are not certain as to whether “they are who they say they are”. The challenge is, how does a recipient determine the legitimacy or know the true intentions of the sender in the world of the “Unvetted Public Internet”. Before a user opens their latest emails and/or attachments, they pause and worry; even when the senders' names are familiar to them, like a friend or their local banker. The questions—“is that really you?” and “what are your intentions?” haunts every recipient as they decide to either open or delete the latest entries in their Inbox. And, as spam filters try to assist, they often catch the good emails (with the bad) that users do want, causing them to continually review the contents of the spam log to identify and retrieve them for normal viewing.
Even the senders of emails worry and wonder if what they send gets to the right location or to the intended person, especially when exchanging important (e.g., confidential), high-value email messages and files. When the user hits the “send” button they are not certain that their message is secure, private, or if it gets to their named recipient or falls into the hands of an unintended recipient. Many emails never get to their intended recipient (for a variety of reasons) and that both the sender and recipient are never notified of that fact? In addition, if proof of delivery is important, how can senders prove the email got to the right location, the intended recipient and whether it was viewed and/or downloaded by the correct person? Or, might it have gone to, or been intercepted by, someone maliciously pretending to be the recipient? Or, might the recipient say they never received it when they actually did? All it takes these days in most everyday email systems is to know someone's User ID and password and they can wreak havoc in their personal or professional lives, or even cause the demise of a publicly traded company if insider information (within an email message) is stolen or intercepted by those not intended to see such confidential information. For more sophisticated intruders, many other tools and techniques are available to intercept and disrupt a supposedly-private communication.
Some earlier (so-called) certified email efforts have produced companies that have tried to provide certification services (to prove the trustworthiness of the senders). But, they do so within the low-security infrastructure of the popular, everyday email systems like Hotmail, AOL, Gmail and Outlook and the “very public and very vulnerable” Internet they use as their worldwide network. Plus, they allow marketing companies to become users of their service, which then try to give their mass number of recipients the feeling that their emails are worthy of opening. So, the sender of certified email in this environment may not have included a virus or malware in it, but it's still “junk mail” (a.k.a. unwanted spam) if it was unsolicited.
As a result, millions of senders and recipients worldwide spend billions of dollars each year to exchange “paper documents” via FedEx, UPS, Certified Postal Mail, and other international package delivery services; often simply to insure that the documents get there and to have some way of proving it. Although, these services simply get their package to “an adult at the address specified”, and make no guaranteed (or effort) to get it to the person named on the delivery form. Such delivery concerns, even minimally resolved, are causing senders and recipients to endure these substantial expenses and time delays. Many of these same documents could easily be exchanged electronically in their everyday email systems, but they require 1) recipient identity verification, 2) security and privacy and 3) proof of delivery.
Also, with busy days and hectic schedules few people talk directly these days and often settle to exchange email messages and attachments. But, textual (word based) email messages are one-dimensional, cumbersome to type, require use of a keyboard, are lacking in precision, add to confusion (e.g., what did they really mean by that?) and filled with popular typing short cuts like or
to try and add emphasis.
To fully and effectively communicate in an email message, the sender must have 3 message format options (text, audio and visual), plus some number of attachments. This is because in human communications, when two parties are not physically together, the exchange can involve only these 3 dimensions (i.e., smell and touch being the missing dimensions). It has been proven that this type of 3-dimension message configuration has the following value and effectiveness for each of the three; 7% to the words (text), 38% to “how” they are audibly spoken (e.g., intonation, cadence, modulation . . . ) and 55% to the body language (the visual) of the speaker.
So, with a maximum of 100% effectiveness as a possibility, a text-only email message can be no more than 7% as effective as a comparable visual (video) message, with sound. An audio-only email message can be no more than 45% as effective as a comparable visual message, with sound. The “benchmark” against which all remote communications are valued in effectiveness are based on a visual message with sound that allows the recipient to hear the words spoken and see the speaker's body language (e.g., facial expressions, posture, hand motions, head motion and so on). Yet, even if 100% effective communication options were possible today in most popular message exchanges, many senders and recipients would be reluctant to use them for fear that such crisp, clear and concise messages might fall into improper hands due to lesser security and greater vulnerability of popular, public-Internet-based email systems.
This section conveys competitors and existing solutions available in the market today and highlights why they are an inadequate solutions when compared to those provided by the Invention documented herein.
3) Prior Existing Solutions
1. Goodmail—www.goodmailsystems.com
2. ReadNotify—www.readnotify.com
3. Point of Mail—www.pointofmail.com
4. Rpost—www.rpost.com
5. Digi-Sign—www.digi-sign.com
6. Whale Mail—www.whalemail.com
7. YouSendIt—www.yousendit.com
8. Digital Persona—www.digitalperosna.com
9. Package/Shipping Companies (Fed/Ex, UPS, DHL & USPO)
The Invention is the first-ever, biometric-enabled, point-to-point encrypted, certified email system providing a worldwide community of users with the highest levels of identity verification, security and privacy, and proof of delivery when exchanging important, high-value email messages and files. See
Professionals wanting a complete solution and worldwide eDelivery options designed to be a maximum-security, as-needed alternative to their everyday email systems, including; Corporate Executives, Entrepreneurs, Government Representatives, Security Specialists, Lawyers, Accountants & CPA's, Bankers, Doctors, M & A Professionals, Students, Researchers, Consultants, Engineers, Designers, Builders, Realtors, Photographers, Musicians and other Professionals.
Four things distinguish the Invention, the Invention provides its certified email senders and recipients with the highest levels of (See
1. Biometric Identify Verification
2. Security and Privacy
3. Proof of Delivery
4. Additional Message Formats
First, this multi-option set of formats is not the simple attaching of text (the written word), audio (voice) or visual (video) files to an email message. These message options relate to integration with, and are specific to, the main purpose of the email message itself, and are not “just attachments” to an email. The addition of audio and visual format options to the standard text format option provides senders more effectiveness, more preciseness, more personalization and more flexibility (e.g., no keyboard use necessary) in creating their communications with the intended recipient.
The main purpose of an email is to communicate a message (thought, idea, reaction, instructions, . . . ) or to introduce an attachment(s). The challenge is that the written word is not always the most convenient, expeditious or appropriate way to communicate to others. But, it is the standard in our everyday email exchanges.
Envision hearing these messages in an audio format or even watching them in a visual (video) recorded format.
For example:
The ability to conveniently record and send such an audio or visual message within a certified email system (along with its biometric identity verification, secure infrastructure and proof-of-delivery features), would provide senders the effectiveness, precision, personalization and flexibility mentioned above, all within a safe and secure environment.
If the email message included an introduction of an attachment(s), which is common, the examples might read, sound or look like this:
The drawings aid the understanding of the Invention and are not intended to limit the scope of the invention in any manner beyond the scope of the claims.
FIG. 1—a high-level graphic contrasting the message exchange of two email users interacting in the “Public Internet” vs. the Private, Bio-Enable Network of the Invention.
FIG. 2—a detailed graphic showing how the system uses both the “Public Internet” for alert notices and the Invention's Private, Bio-Enable Network for sending, receiving, tracking and managing certified emails.
FIG. 3—a process flowchart showing the main procedures in the Invention; which collectively provide a complete solution for its users wanting a certified email message and attachment system with the features and benefits previously stated herein.
The inventors have an initial preferred embodiment of a company, a website, a network, an infrastructure, a series of servers, an email management system and an operator to support the implementation of a certified email system with the main processes described below. Such website, network, infrastructure, servers and email management system is collectively the first-ever, biometric-enabled, point-to-point encrypted, certified email system providing a worldwide community of users with a “complete solution” including the highest levels of identity verification, security and privacy, proof of delivery and effectiveness in communications when exchanging important, confidential, high-value email messages and attachments. These email messages can be communicated in text, audio and visual formats, and include large attachments, for example 4 gigabytes or larger in size.
It's important to point out that there are usually two email systems used with the Invention. First, there is the registered user's current, everyday email system (e.g., Hotmail, AOL, MSN, Outlook, etc.), if they have one, where they will receive alerts (called eDelivery forms) from the Invention that say “you've got certified mail”. Note—such alert notices can also be sent to a user's cell phone (via SMS—Short Message System) or to their land line phone (via IVR—Integrated Voice Response), or equivalent, if such alert options are selected by the user. Second, there is the Invention's separate, private, high-security email network and infrastructure (including secure servers) that such users utilize when actually sending, receiving, tracking and managing email messages and attachments via the Invention's website (referred to as “website” or “system” or “the Invention's website or system” in the process discussion below). See
Home—The Home process 1.0, as illustrated in
User Registration—The Invention's website visitor selects the “User Registration” process 2.0 (
Note 1—the Invention's certified email messages and attachments are private and confidential between sender and recipient, and its registered users are vetted in many ways (credit card, fingerprint, notary certification, phone number, address, email address and more). And, such vetting levels are displayed by the system to both senders and recipients. Note 2—the system does not allow mass marketing companies, who send large numbers of emails to recipients (that they may or may not know), to become registered users of the website. These companies and spammers in general have no ability to send large numbers of emails in the Invention; which has purposely limited the number recipients per email to dissuade any such attempt by any registered user. Note 3—the Invention works on the premise that vetted user/senders (identified at various levels) are far less likely to intentionally send a virus, spyware or other malware in their emails and attachments.
User ID—A registered user's current, everyday email address is often used as their User ID in the Invention's website. Their cell phone number or landline phone number can also be used as an User ID in the system. These are also a key in its databases and can only be changed by special system request.
Fees and Service Levels—Registration and usage of the website requires paying a monthly or annual fee; or, a per-unit (per email) fee can be charged. There are many ways to charge for such services. Registered users of the Invention will initially have service levels as follows (which are subject to change): 1) unlimited sending and receiving of local and international emails via the system, each with a 4 GB attachment maximum, 2) 10-20 GB in long-term attachment storage and 3) 100 GB in monthly download bandwidth. Additional storage and bandwidth can be purchased.
User Login—To get started after a new user's status is activated, select the “User Login” process 2.0 (
Send (Compose) Certified Mail—Select the “Send (Compose) Certified Mail” processes 5.0 and 5.1 (
When users select the “Send (Compose) Certified Mail” process and begin with 5.0 then proceed to process 5.1 to create their certified email and identify the recipients. There are a variety of reasons for this 2-step compose process, including the need to determine if the specified recipients are already registers users (and if they have their fingerprint registered as well); which would give the sender more options to specify their recipients' delivery acceptance rules. They can enter a text version of the email “subject line” and “message” (other formats described below) at this point and identify all intended recipients. If such an alert option is selected in process 10.0, the email subject line is also displayed in the alert notice (eDelivery form), generated in process 5.2, sent to the recipient to inform them that have certified email waiting for delivery. The subject line gives them an idea of what the email concerns.
Because the system will inform the user/sender if they have entered an email address for a registered or unregistered recipient, as they proceed from processes 5.0 to 5.1, senders can then set the delivery acceptance rules for each recipient and select their attachments in process 5.1. These delivery acceptance rules includes 1) an electronic signature (the default), 2) an access code (a secret code or password only known by the sender and the recipient), 3) a fingerprint scan to insure the recipient's identity (note—the system knows if a recipient has activated this biometric capability), and 4) the sender can insist that a non-registered recipient registers before taking delivery of their certified email. For non-registered recipients the sender is required to spell their name (first and last) for the system so the electronic signature process knows what name to check for during delivery acceptance.
Audio and visual email message format options, also created on the “Compose Certified Email” process, are described below.
Email Message Format Options—the “Send (Compose) Certified Email” process 5.0 (
The numerous combinations of text, audio and visual formats, presented in an integrated and coordinated fashion within the Invention's certified email system, create an appealing and powerful way to send email messages, including: 1) a text message by itself, 2) text message and attachment, 3) audio message, 4) audio message and attachment, 5) visual message, and 6) visual message and attachment. The combinations are many and ultimately get to this combination: a text message, an audio message, a visual message and an attachment (one or many).
Attachments—In the “Attachment” process (a sub process within Send-Compose Email Message process 5.1), the Invention's system allows for the attachments in many formats such as PDF, DOC, pictures, voice files, movie files, virtually any of the formats can become attachments within the system's secure environment. In this system, the user is essentially uploading their attachments to the Invention's secure server rather then attempting to send them to, and risk clogging up of, the recipient's everyday email system. This is particularly a problem with very large files causing many such emails to be rejected (a.k.a. “Undelivered Mail Returned to Sender”). When a recipient receives (takes delivery of) the system's certified email message (7.1) they also can take delivery of the attachments (7.3, via 7.2), if supplied by the sender. The sender can also designate whether the attachment can to be “viewed” only or if the recipient will be also be allowed to actually download it (see process 7.3). If view only, the file will not physically leave the invention's secure servers and, as a result, is not transferred to the recipient's computer. Each of these actions is logged, as they occur, to provide the sender proof of delivery and proof of what files were delivered and how.
Alert Notifications—“You've got certified email” alert notices are sent in the Notification Alert to Recipient process 5.2 (
If such option is selected by the user in process 10.0, alerts can also be sent to users of the system to indicate that activity has occurred on certified emails and attachments they have previously sent. This could include, for example, that a recipient has taken delivery of (e.g., signed for delivery) of the email the user sent them. This saves the user from having to log into the system to determine that this has occurred.
For textual, audio and visual email messages sent by users in the Send (Compose) Certified Email processes 5.0 and 5.1, such certified messages can also be delivered directly to a cell phone (or cell phone-computer device like the Apple iPhone) or landline phone via IVR as long as the recipient can prove who they are and can meet the delivery requirements (e.g., identity verification) set by the sender in process 5.1.
View Sender Log and View Recipient Log—Users can select the “View Sender Log” process 6.0 or the “View Recipient Log” process 7.0 (both in
The sender and recipient logs (6.0 and 7.0) in the Invention contain valuable tracking information. They tell the sender (and recipient) when the user's certified email was sent, when an alert notice email was sent to the recipient(s), if and when the certified email was “signed for” (called “delivery acceptance” 7.1), and if and when it was viewed and/or downloaded. Note—if a user is logged in (3.0) to the website and receives an email from another registered user of the system (or from themselves when testing the Invention), they can take delivery (7.1) of the email from within the website directly from the Recipient Log 7.0, just as if they had clicked the link provided on the alert notice email from the sender, if so selected by user in the Set Alert Options process 10.0. Note—such alert notices can also be sent via cell phone using SMS or landline phone using IVR, or equivalent, if so selected in process 10.0.
From the View Sender Log process 6.0 senders can “recall” or “resend” (in process 6.4) their previously sent certified email messages and attachments, sent via the Invention. This gives the sender the ability to quickly react if they made a mistake or if the recipient wanted the alert notice sent to a different address or in a different format. In other, everyday email systems, there is no certainty that a sender can successfully recall (pull back) an email before it is placed for viewing in the recipient's email system (especially if there are multiple recipients). This Invention does allow the sender to recall the certified email and be certain, by viewing the related sender log entries (6.0 and 6.2), that a specific recipient (which could be one of many) has or has not yet seen the contents.
Print Log and Proof of Delivery Document—Users can print a “Proof of Delivery” (a.k.a. “Proof of Service”) document in process 6.3 (
Fingerprint Scanners—refer to the Biometric Device Setup process 11.0 (
Registration Update—Select the “Registration Update” process 8.0 (
Biometric Device Setup—Select the Biometric Device Setup process 11.0 (
My Dashboard—Select the “My Dashboard” process 4.0 (
Suggestions—Lastly, select the “Suggestions” process 9.0 (
Log Out—the Log Out process 12.0 (
In a preferred embodiment, a method of communication between a sender and a recipient initiates once a sender logs onto “SenditCertified.com”, a private network, and identifies themselves. The sender composes a message via text, audio and/or video format on a network device. A network device is a computer, a cellular phone, a PDA, or other type device capable of communicating with a server or computer. The sender then seals the message via a biometric indentification, secret access code, electronic signature or by independent verification. In other words the sender seals the message by identifing himself or herself, preferably by biometric indentification. Thereafter the server of the private network encrypts the message and the sender sends it to the recipient over the private network. The private network does not use the internet, does not use server to server duplication or store and forward protocol. The encrypted message proceeds from the sender's network device to the private network server where it waits delivery to the recipient. The server notifies the recipient of the message and states the conditions under which the recipient can take delivery of the message. After the recipient meets the conditions to take delivery, the server un-encrypts the message and the recipient takes delivery of the message, via a second network device, which may be under the control of the recipient.
The server tracks the progress of the send message, records the tracking information, such as time and place sent, size of message, type of message, conditions of delivery, and recipient identification, such as name, secret access code, biometric indentification information and/or other information of recipient.
The biometric identification may be fingerprinting, iris scan, facial recognition, or DNA. Preferably the biometric information is fingerprinting. Additionally, the sender and recipient may confirm their identity via an independent vetting process with said private network. The independent vetting process may include electronic signature, secret access code, or other independent information, such as credit card numbers, answering secret questions, driver's license, and/or passport or social security information.
Thus it is apparent that there has been provided, in accordance with the invention, an improved certified email messages and attachments, that fully satisfy the objects, aims, and advantages set forth above. While the invention has been described in conjunction with specific embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alternatives, modifications, and variations as fall within the spirit and broad scope of the appended claims.
The current application claims the benefit of the earlier priority filing date of the provisional application Ser. No. 61/044,544, that was filed on Apr. 14, 2008.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US2009/040175 | 4/10/2009 | WO | 00 | 11/16/2010 |
Number | Date | Country | |
---|---|---|---|
61044544 | Apr 2008 | US |