The present invention relates to a secured system and method for sharing a user profile, and, in particular, the present invention relates to a secured system and method for relating the user profile with an NFC secured tag.
In day-to-day interactions, it is common for the persons exchanging contact data. The interactions can be business interaction or social interactions. For example, in business interactions, the contact information is often shared by the physical exchange of business cards. Also, known are digital contact cards, such as vCard's for sharing contact information over a network, such as an internet or Bluetooth. In social interaction, the person usually shares their contact information by writing down their contact details. Digital personal profiles or resume are also known which allows a user to send requests in the form of links.
Thus, a need is appreciated for an improved system and method that allows quick secured sharing of personal profiles of users.
The principal object of the present invention is therefore directed to a system and method for providing a tag that uniquely identifies a person.
It is a further object of the present invention that the secured system and method allow exchanging user profiles in a secure environment.
It is still a further object of the present invention that the system and method allow for quick sharing of user profiles via NFC secured tag.
In one aspect, disclosed is a system and method that allows a person to share their profile with other persons securely. The system includes an NFC secured tag containing a unique security code, wherein the unique security code is associated with a user profile. The NFC secured tag can be read by an NFC enabled electronic device.
In one aspect, the system further comprises a server, wherein the server includes a database for storing the personal profiles of users. The server can receive a query from the NFC enabled electronic device, wherein the query includes the unique security code associated with a specific user profile. The server query the database with the query and retrieve the user profile associated with the unique security code by the server.
In one aspect, the NFC secured tag can be configured in a wearable accessory. The wearable accessory can be a badge having a fastener. The fastener configured to couple the badge with an article of clothing. In one case, the fastener can be a cloth pin, a hook and loop fastener, or a snap button.
In one aspect, the server can connect to an NFC enabled electronic device through a network. The server configured to provide an interface onto the NFC enabled electronic device. The interface including an option to read the NFC secured tag, receive a user profile from the server, viewing the user profile, and allowing a user to update their profile.
These and other objects and advantages of the embodiments herein will become readily apparent from the following detailed description.
The accompanying figures, which are incorporated herein, form part of the specification and illustrate embodiments of the present invention. Together with the description, the figures further explain the principles of the present invention and to enable a person skilled in the relevant arts to make and use the invention.
Subject matter will now be described more fully hereinafter. Subject matter may, however, be embodied in a variety of different forms and, therefore, covered or claimed subject matter is intended to be construed as not being limited to any exemplary embodiments set forth herein; exemplary embodiments are provided merely to be illustrative. Likewise, a reasonably broad scope for claimed or covered subject matter is intended. Among other things, for example, the subject matter may be embodied as apparatus and methods of use thereof. The following detailed description is, therefore, not intended to be taken in a limiting sense.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. Likewise, the term “embodiments of the present invention” does not require that all embodiments of the invention include the discussed feature, advantage, or mode of operation.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of embodiments of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises”, “comprising,”, “includes” and/or “including”, when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The following detailed description includes the best currently contemplated mode or modes of carrying out exemplary embodiments of the invention. The description is not to be taken in a limiting sense but is made merely for the purpose of illustrating the general principles of the invention, since the scope of the invention will be best defined by the allowed claims of any resulting patent.
The following detailed description is described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, specific details may be set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and apparatus are shown in block diagram form in order to facilitate describing the subject innovation.
The present disclosure discloses an NFC secured system and method of sharing user profiles. The system and method disclosed herein allow a user to share his profile with other users. The profile of a user can include a biodata of the user. Now referring to
In one implementation, the processor 330 can be any logic circuitry that responds to and processes instructions fetched from the memory 340. In certain embodiments, the processor can be a microprocessor unit, e.g., Intel processors and AMD processor. The server 320 may be based on any of these processors, or any other processor capable of operating as described herein.
The memory 340 may include one or more memory chips capable of storing data and allowing any storage location to be directly accessed by the processor 330. The memory 340 may be a volatile memory, including Dynamic random access memory (DRAM) or any variants, including static random access memory (SRAM), Burst SRAM or Synch Burst SRAM (BSRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Single Data Rate Synchronous DRAM (SDR SDRAM), Double Data Rate SDRAM (DDR SDRAM), Direct Rambus DRAM (DRDRAM), or Extreme Data Rate DRAM (XDR DRAM). In some embodiments, the memory 340 may be non-volatile; e.g., Non-volatile read access memory (NVRAM), flash memory non-volatile static RAM (nvSRAM), Ferroelectric RAM (FeRAM), Magnetoresistive RAM (MRAM), Phase-change memory (PRAM), conductive-bridging RAM (CBRAM), Silicon-Oxide-Nitride-Oxide-Silicon (SONOS), Resistive RAM (RRAM), Racetrack, Nano-RAM (NRAM), or Millipede memory. The memory 340 may be based on any of the above-described memory chips, or any other available memory chips capable of operating as described herein.
As shown in
The NFC secured tag 310 includes a unique identification code generated by the registration module 355. Alternatively, the NFC secured tag 310 can include a preset unique identification code that can be registered by the registration module 355. The unique identification code is linked to a user profile. As discussed above, the NFC secured tag can be integrated into a wearable accessory, such as a watch or badge shown in
The network 430 can be wired or wireless network. The wired network may include Digital Subscriber Line (DSL), coaxial cable lines, or optical fiber lines. The wireless network may include BLUETOOTH, Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), an infrared channel or satellite band. The wireless network may also include any cellular network standards used to communicate among mobile devices, including standards that qualify as 3G, 4G, or 5G. Examples of cellular network standards include AMPS, GSM, GPRS, UMTS, LTE, LTE Advanced, Mobile WiMAX, and WiMAX-Advanced. Cellular network standards may use various channel access methods e.g. FDMA, TDMA, CDMA, or SDMA. The geographical scope of the network 130 may vary widely and the network 130 can be a body area network (BAN), a personal area network (PAN), a local-area network (LAN), e.g. Intranet, a metropolitan area network (MAN), a wide area network (WAN), or the Internet. The network 430 may utilize different techniques and layers or stacks of protocols, including, e.g., the Ethernet protocol, the internet protocol suite (TCP/IP), the ATM (Asynchronous Transfer Mode) technique, the SONET (Synchronous Optical Networking) protocol, or the SDH (Synchronous Digital Hierarchy) protocol. The TCP/IP internet protocol suite may include the application layer, transport layer, internet layer (including, e.g., IPv6), or the link layer. The network 430 may be a type of a broadcast network, a telecommunications network, a data communication network, or a computer network.
The one or more one or more NFC enabled electronic devices 420 can be authorized by the system 300 as NFC readers that can read the unique security code configured onto the NFC secured tag 310. In one case, the NFC enabled electronic devices 420 can be a smartphone with NFC circuitry, a tablet computer with NFC circuitry, or a similar electronic device with the NFC circuitry. The NFC enabled electronic devices 420 can include an operating system, such as Android, iOS, and Windows. Moreover, the NFC enabled electronic devices 420 can be provided with an application that may allow the NFC enabled electronic devices 420 to communicate with the system 300 disclosed herein. Such an application can be developed for the known operating system of the NFC enabled electronic devices 420, for example, the application can be developed for Android, iOS, and Windows. The application software can be made available through a distribution service provider, for example, Google Play operated and developed by Google and the app store by Apple. In addition to the application software, a website-based interface can also be provided through the world-wide-web. In one case, the network 430 can be secured through known encryption, such as SSL. Also, it is to be understood that
The system disclosed herein can allow sharing personal profiles to other users during social interaction. A user can simply scan the NFC secured tag of another user and retrieve his personal profile. The system and method can allow salespersons to quickly share their contact information by presenting the badge. The salesperson on the other hand can quickly take the contact details of the customer by scanning their NFC secured tags. The present invention is further advantageous by avoiding any errors in taking contact information. The NFC secured tag can be used to identify a person, wherein the NFC secured tag can be scanned by the NFC and query module to retrieve the profile of the person to be identified. People no longer need to exchange paper-based business cards, which are easily misplaced or lost. Moreover, personal profiles can include product information to be advertised. Any interested user can simply scan the NFC secured tag to retrieve the personal profile containing the product information.
In one aspect, the system disclosed herein is secure. A user can retrieve a profile of another user only by scanning the NFC secured tag of another user. Moreover, the system may not allow a user to save the profile of another user in their devices either in the permanent memory or cache memory, to further enhance security and safeguarding confidentially of the user. The NFC secured tag is secured from hacking, cloning, and manipulation for preventing any fraud. The code can be encrypted, and the encryption can be hardware level to further secure the NFC secured tag. The security of data is further enhanced by allowing only authorized devices to read the NFC secured tag. In case, an NFC secured tag is lost, the user can report losing the NFC secured tag. The system upon receiving the request for lost NFC secured tag can block the NFC secured tag. The same procedure can be used in case the NFC secured tag is stolen. All measures to secure the system including the NFC secured tag to maintain confidentially of data are within the scope of the present invention. For example, compromised or unlocked user devices may not be allowed to read the NFC secured tags. All these measures makes the system secure.
While the foregoing written description of the invention enables one of ordinary skill to make and use what is considered presently to be the best mode thereof, those of ordinary skill will understand and appreciate the existence of variations, combinations, and equivalents of the specific embodiment, method, and examples herein. The invention should therefore not be limited by the above-described embodiment, method, and examples, but by all embodiments and methods within the scope and spirit of the invention as claimed.
This application claims priority to the U.S. provisional patent application Ser. No. 63/016,100 filed on Apr. 27, 2020, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63016100 | Apr 2020 | US |