Various embodiments related to mobile identity and recovery are presented.
Increasingly, one's mobile device, such as a mobile phone or other mobile device, serves as identification, payment, key etc. Today, payments from a mobile phone or sending commands to an electronic or electromechanical system like an automobile are practiced. With technologies like RFID and NFC combined with longer range telecom networks this type of application is believed to become widely used.
In one aspect, embodiments present a method comprising obtaining recovery data, which recovery data is normally used on a mobile device, and saving the recovery data in a database such that it is available for minimal identity recovery in case a user has no access to the mobile device.
Various embodiments present a method comprising providing recovery data by a server to a recovery agent, which recovery data is used normally on a mobile device belonging to a user, in case the user has no access to the mobile device.
In one aspect, embodiments present a method comprising obtaining recovery data from a server by a recovery agent, which recovery data is used normally on a mobile device, and which recovery data is used for minimal identity recovery in case a user has no access to the mobile device.
In one aspect, embodiments present a method comprising electronically loading recovery data onto a recovery medium, which recovery data is used normally on a mobile device, the method being used for minimal identity recovery in case a user has no access to the mobile device.
In one aspect, embodiments present a recovery medium for minimal identity recovery, comprising an active radio transmitter with a circuit, wherein the recovery medium also includes an antenna, wherein the circuit and the antenna are used in combination to send radio signals.
In one aspect, embodiments present a recovery medium for minimal identity recovery, comprising a passive radio transmitter having an antenna that resonates and reflects radio signal upon being in the vicinity of an active transmitter.
In one aspect, embodiments present a system comprising means for dispensing a recovery medium containing recovery data which recovery data is used normally on a mobile device.
In one aspect, embodiments present a recovery medium comprising means for storing recovery data, which recovery data is used normally on a mobile device.
In one aspect, embodiments present a method for providing recovery data, which recovery data is used normally on a first mobile device, said method comprising sending the recovery data to a second mobile device.
In one aspect, embodiments present a method for storing and providing recovery data for minimal identity recovery of a user, the recovery data normally residing on a mobile device, the method comprising allowing the user to choose in advance what capabilities the recovery data should provide.
In one aspect, embodiments present a method for providing a rental vehicle to a user, the method comprising providing code to a mobile device in possession of the user, which code is adapted to enable the mobile device to send a radio signal to operate a rental vehicle.
The embodiments and implementations described here are only exemplary. It will be appreciated by those skilled in the art that these embodiments may be practiced without certain specific details or with alternative detailed implementation without departing from the scope of the invention. In some instances however, certain obvious details have been eliminated to avoid obscuring inventive aspect the embodiments.
While losing one's car key or wallet has always been a nuisance, a number of traditional techniques have been in place to remedy that, which range from a coat hook to open a car door, a locksmith, calling DMV (or equivalent outside the US), bank of financial institution and cancelling all your credit cards and ordering new ones, etc. There is however no comprehensive solution to remedy losing one's mobile device so long as transportation, payment, entrance and other privileges are concerned.
Embodiments presented here relate to minimal identity recovery in cases where one does not have access to one's mobile device. Such instances may occur when one, among other occasions, loses, forgets, or misplaces one's mobile device. Or the mobile device might become inoperative, due to corruption, hacking, mobile identity theft, breaking, shattering, low battery or power, etc.
The embodiments presented therefor enable a user who has no longer access to his or her mobile device to perform such crucial functions as a smartkey function and a credit card function and a user identification function. These functions could be restored on a recovery medium for at least temporary use. The recovery medium should be easily accessible in case the user loses his or her mobile device and could be much cheaper and with more limited capabilities than the lost mobile device. The recovery medium could therefore be used on a temporary basis to perform these functions.
One example is that one might go out on a weekend night and stay late somewhere, and upon return to one's automobile not be able to locate one's mobile device.
Minimal identity recovery as presented here refers to retrieving and recovering enough data onto a recovery medium, for example on a temporary basis, such that the user could perform certain functions. In addition the recovery medium could optionally be valid for just enough time till the user's lost, unavailable, or non-functioning mobile device is recovered, repaired, or emulated and/or replaced.
In some embodiments, such as further shown in
In some embodiments, automatic electronic multi-factor authentication could be used to identify and validate the user. In some embodiments a live agent's identification and assistance could be used in addition.
In some embodiments, the recovery medium may include an ASIC (Application Specific Integrated Circuit) device or any other electronic structure on which the recovery data is loaded as firmware or software. It may also include a radio transmitter or reflector capable of communicating with desired devices and systems just as if the mobile device was present for certain purposes.
In some embodiments, the recovery medium includes an active radio transmitter system. Such a system is used in most smartkeys in vehicles today, where the transmitter sends short-range signal pulses to multiple antennae in a vehicle to ascertain that the user is near or inside the vehicle. It is then used to allow ignition. Such a system may require a power source like a battery which may come as a small component on the recovery medium.
In some embodiments the recovery medium includes a passive radio transmitter depending on use and application. Such a transmitter is basically a reflector that identifies the proximity of the user, e.g. to a house entry system. An example of this would be an RF resonator loop antenna. There might be a chance that certain vehicles could use this kind of passive key systems in the future.
In some embodiments, a server may obtain or check the built and design of, e.g. user's vehicle, or other device attributes like smartkey or keyless entry system upon registration or use. Other information may include financial institution credit card or payment information etc.
A minimal identity recovery system could be either subscribed to by at a subscription fee, or alternatively the system could charge at a use-based fee upon use rather than using a subscription based.
In a subscription case, user might be allowed certain number of uses per year or other period or other bases.
Different levels of subscription could be used. For instance, in a more comprehensive and expensive systems, recovery data may include contacts information, certain settings, etc.
In one embodiment, the present invention presents a method comprising obtaining recovery data, which is normally used on a mobile device, and saving the data in a database such that it is available for minimal identity recovery in case one has no access to the mobile device.
Such a database may be maintained in secure place with a failover mechanism and a certain record or file in that database could become readily available upon request.
Such a request might be a query request to the database which is done at specific instances by a server.
Such a server might, for instance. be contacted by an automatic or semi-automatic machine (or software application) upon request and/or identification, validation, authorization.
Such validation might, for instance, be a secure authentication or other validation. One example would be a multi-factor authentication which may or may not use biometric information. Alternatively the authentication could be semi-automatic in which case a representative on the provider side would be present.
Some embodiments present a method comprising providing recovery data by a server to a recovery agent which data is used normally on a mobile device, for minimal identity recovery in case one has no access to the mobile device.
The recovery agent could, for instance, be a machine that has dispensable recovery medium upon request and validation.
Some embodiments provide a method comprising obtaining recovery data from a server by a recovery agent, which data is used normally on a mobile device, and which data is used for minimal identity recovery in case one has no access to the mobile device.
Some embodiments provide a method comprising electronically loading recovery data onto a recovery medium, which info is used normally on a mobile device, for minimal identity recovery in case one has no access to the mobile device.
Such recovery agent could, for instance, load the recovery data as firmware onto the recovery medium. In this case the recovery medium could include electronic circuitry, like an ASIC circuit or other electronic platform on which the recovery data is loaded.
For certain applications, the recovery medium could, for instance, include an active radio transmitter with a circuit, wherein the recovery medium may also include at least one of a battery and antenna.
For certain applications, the recovery medium could, for instance, include a passive radio transmitter which could, for instance, be an antenna loop or similar device that resonates and or reflects radio signal.
In one embodiment, the present invention presents a system comprising means for dispensing s recovery medium of the methods described.
In one embodiment, the present invention presents a recovery medium comprising means for storing recovery data.
Such medium may be ASIC based and recovery data could loaded as firmware.
Such medium could be set to expire via at least one of battery life and encoded information.
In one embodiment the recovery medium may be another mobile device. As a particular case it could be an inexpensive mobile device with limited capability picked up or purchased from a store or dispensed.
In some embodiments a friend or stranger's mobile device could be used as a recovery medium.
In case the recovery medium is another mobile device, the recovery data may be loaded from a special app or from a feature in the software the cell phone already has. One may choose to load recovery data only temporarily.
In some embodiments, to enable security against and in case of misuse of such a feature, when a user is indeed in possession of own mobile device, a user may get a notification on the mobile device in case a perpetrator tries to revoke recovery data. The user may be prompted to speak or enter a PIN to inhibit misused data recovery.
In some embodiments, the user may choose in advance what capabilities the recovered data should provide.
In some embodiments, certain providers may choose to limit the capabilities of the recovery mode. For example, a bank may limit recovery purchases to a certain limit, such that the user could purchase food or water but not a TV. As another example a recovered smartkey may limit the speed or the range of travel of the car to a certain value in recovery mode.
In some embodiments, there could be more than one level of recovery. For instance, a user may want quick access to limited functionality, but when the user wants a greater set of functionalities or to permanently replace a lost or damaged mobile device with full functionality, a more rigorous security processes may be in place.
In some embodiments, a camera on a mobile device may be used to initiate a video call with to the customer service department. Alternatively the camera could be used to take certain biometric measures such as a headshot. A camera or a different sensor could be used for fingerprint or retinal scan. All or any of these could be used as security measures to enable or inhibit data recovery and could be performed on the recovery medium which could be another mobile device or the original mobile device accordingly.
In some embodiments, certain authentication measures may be pulled by a provider. For instance, a challenge question such as “whom did you call first this morning” may be asked of the user.
In some embodiments, after authentication, a provider may pull up a device locator, for instance on a recovery app, to indicate to the user the location of the lost mobile device. In some embodiments, same app or a different one might be used by the user or provider to trigger a remote wipe of the lost mobile device.
In some embodiments, a rental car company could send code upon a network to a mobile device belonging to a person who wishes to rent a car. The code could for instance run as an application on a smartphone. When the code is run, the mobile device could acts like a smartkey since it has all the capabilities like RF and antenna and power source. It could then be used to operate the rental car or vehicle. All other contractual issues could also be done via the smartphone and the applications and codes within the smartphone. Validation and authentication measures could also be built into the smartphone to ensure that the person having the phone is indeed the person who pays for and is under rental contract agreement.
The present application claims priority to U.S. Provisional Application Ser. No. 61/512,404, titled “Minimal Identity Recovery System and Method”, filed on Jul. 28, 2011.
Number | Date | Country | |
---|---|---|---|
61512404 | Jul 2011 | US |