The present invention relates to data transfer and more particularly to systems and methods for transferring personal information.
Current apparatus and methods of sharing personal and private information, such as contact information, demographic information, or medical information is generally insecure, tedious and time consuming. Paper documents with vital information can be lost or mishandled, leaving both parties open to security risks and allow for mistakes during subsequent data entry. Contact with physical materials during these processes can facilitate germ and virus transmission as well.
Previously, medical offices, veterinary offices, schools, or sport registrations, and the like utilize a volume of paperwork, requiring a user to fill out necessary personal and private details.
The inconvenience, cost and use of materials, and consumption of time with filling out paper forms could be completely eliminated through digital transfer methods. However, other digital transfer systems are designed for the specificity of the organization requesting the information and once the data is entered from the user, that data persists only on the recipient's system.
As can be seen, there is a need for improved systems, methods, and apparatus that allow the user to store their personal information on their mobile device, ready to be securely transferred to a recipient using the system.
In one aspect of the present invention, a computer program product configured for providing a secure exchange of a personal information data is disclosed. The computer program product including at least one non-transitory computer-readable storage medium having computer-executable program code instructions stored therein. The computer-executable program code instructions comprising program code instructions for generating, by a recipient computing device, a unique visual code embedded with an identification data of a recipient. The unique visual code is transmitted to a recipient computing device via a communication network. A one-time use shared key pair code is received from a sender computing device via the communications network. The one-time use shared key pair code generated responsive to an acceptance of the unique visual code by a sender of the personal information data. An end-to-end encrypted connection is created on the communication network between the recipient computing device and the sender computing device.
In some embodiments, the instructions may include those for receiving an encrypted personal information data on the recipient computing device via the end-to-end encrypted connection.
In some embodiments, the instructions include those for decrypting the encrypted personal information data as a sender personal information data on the recipient computing device utilizing the one-time use shared key pair code.
In some embodiments, the instructions include those for displaying the sender personal information data on a display of the recipient computing device.
In other aspects of the invention, a computer program product configured for providing a secure exchange of personal information data is disclosed. The computer program product includes at least one non-transitory computer-readable storage medium having computer-executable program code instructions stored therein. The computer-executable program code instructions include program code instructions for imaging by a camera of a sender computing device, a unique visual code embedded with an identification data of a recipient and a personal information data request from the recipient. A sender personal information data corresponding to the personal information data request is received via an input device of a sender computing device. The sender personal information data is encrypted as an encrypted personal information data on the sender computing device, The encrypted personal information data is stored in the at least one non-transitory computer-readable storage medium of the sender computing device. An identification data of the recipient is presented on a display of the sender computing device. A one-time use shared key pair code is transmitted from the sender computing device via a communication network. An end-to-end encrypted connection is created on the communication network between the sender computing device and a recipient computing device according to the one-time use shared key pair code.
In some embodiments, the instructions include those for transmitting the encrypted personal information data from the recipient computing device via the end-to-end encrypted connection.
In some embodiments, the instructions include those for decrypting the encrypted personal information data as a sender personal information data on the recipient computing device utilizing the one-time use shared key pair code.
In some embodiments, the instructions include those for displaying the sender personal information data on a display of the recipient computing device.
In some embodiments, the instructions include those for receiving an acceptance of the recipient personal information data request via a user interface of the sender computing device.
In some embodiments, the instructions include those for creating the end-to-end encrypted connection after receiving the acceptance.
These and other features, aspects and advantages of the present invention will become better understood with reference to the following drawings, description and claims.
The following detailed description is of the best currently contemplated modes of carrying out exemplary embodiments of the invention. The description is not to be taken in a limiting sense but is made merely for the purpose of illustrating the general principles of the invention, since the scope of the invention is best defined by the appended claims.
Broadly, embodiments of the present invention provide a system method and apparatus that provides convenience for both the user and the recipient of personal data in the form of speed of information transfer and encrypted security of the information shared, all with the safety of being a contact less transfer.
Previously, medical offices, veterinary offices, school or sport registrations, and the like would utilize a volume of paperwork requiring a user to fill out necessary personal and private details. Employing the present invention allows that process to be bypassed quickly while being contact free and secure. These previous digital and paper systems do not allow the user to easily and securely store, maintain and share their personal information using their own mobile device(s). This gives the user an added convenience of already having their information stored securely and ready to share.
The present invention provides convenience for both the user and the recipient of the data in the forms of speed of information transfer and encrypted security of the information shared with the safety of being contact less.
As seen in reference to
All computer and peripherals, computer monitor 15, computer keyboard or other manually manipulable computer controlling device 17 are connected to a computer 10, 14 with an internet connection to access a recipient version of an application software 20. The recipient provides a visible unique code 12 via screen or print which the recipient and sender utilize for secure exchange of personal information from the sender. The user version of this software 26 is installed on a mobile device 10 to scan the visible unique code 12 of the recipient, which initiates a secure data transfer connection.
A process for secure exchange of personal information is shown in reference to
When the software 26 is authenticated from a recipient computer 14 connected to the internet, the sender mobile application 26 and device 10 will create an end-to-end encrypted connection with the recipient 40 computing device 14 via a one-time use shared key pair code 16. The sender 30 device 10 will send the encrypted personal information 18 to the recipient device 14. The recipient device 14 then decrypts the encrypted personal information 18 for the recipient to be able to view as a shared personal information data 28 on their display 15.
When a sender 30 scans the unique recipient code 12 utilizing the camera 11 of their mobile computing, the application software decodes one or more recipient data elements embedded, the recipeint 40 destination information embedded in the unique recipient code 12 to inform the sender 30 of an identity of the recipient 40 the identity providing the sender 30 an identifying date of exactly where/who their personal information data is being transferred to. The sender 30 can then accept or reject the transferring of their personal information to the recipient 40.
The system of the present invention may include at least one computer with a user interface. The computer may include any computer including, but not limited to, a desktop, laptop, and smart device, such as, a tablet and smart phone. The computer includes a program product including a machine-readable program code for causing, when executed, the computer to perform steps. The program product may include software which may either be loaded onto the computer or accessed by the computer. The loaded software may include an application on a smart device. The software may be accessed by the computer using a web browser. The computer may access the software via the web browser using the internet, extranet, intranet, host server, internet cloud and the like.
The computer-based data processing system and method described above is for purposes of example only, and may be implemented in any type of computer system or programming or processing environment, or in a computer program, alone or in conjunction with hardware. The present invention may also be implemented in software stored on a non-transitory computer-readable medium and executed as a computer program on a general purpose or special purpose computer. For clarity, only those aspects of the system germane to the invention are described, and product details well known in the art are omitted. For the same reason, the computer hardware is not described in further detail. It should thus be understood that the invention is not limited to any specific computer language, program, or computer. It is further contemplated that the present invention may be run on a stand-alone computer system, or may be run from a server computer system that can be accessed by a plurality of client computer systems interconnected over an intranet network, or that is accessible to clients over the Internet. In addition, many embodiments of the present invention have application to a wide range of industries. To the extent the present application discloses a system, the method implemented by that system, as well as software stored on a computer-readable medium and executed as a computer program to perform the method on a general purpose or special purpose computer, are within the scope of the present invention. Further, to the extent the present application discloses a method, a system of apparatuses configured to implement the method are within the scope of the present invention.
It should be understood, of course, that the foregoing relates to exemplary embodiments of the invention and that modifications may be made without departing from the spirit and scope of the invention as set forth in the following claims.
This application claims the benefit of priority of U.S. provisional application No. 62/705,473 filed Jun. 29, 2020, the contents of which are herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6523116 | Berman | Feb 2003 | B1 |
7784087 | Yami et al. | Aug 2010 | B2 |
7857225 | Challa et al. | Dec 2010 | B2 |
8746568 | Edwards | Jun 2014 | B2 |
8849718 | Dala et al. | Sep 2014 | B2 |
9026797 | Yi | May 2015 | B2 |
9107065 | Dharawat et al. | Aug 2015 | B2 |
9197637 | Sy et al. | Nov 2015 | B2 |
9251723 | Moses et al. | Feb 2016 | B2 |
9292697 | Dougharty et al. | Mar 2016 | B2 |
9432182 | Barrus et al. | Aug 2016 | B2 |
9824186 | Lacey | Nov 2017 | B2 |
9965565 | Bu et al. | May 2018 | B2 |
10348699 | Starosielsky et al. | Jul 2019 | B2 |
10535062 | Rule et al. | Jan 2020 | B1 |
20060009692 | Fukuda et al. | Jan 2006 | A1 |
20090307497 | Appenzeller et al. | Dec 2009 | A1 |
20110055547 | Lee et al. | Mar 2011 | A1 |
20110281630 | Omar | Nov 2011 | A1 |
20150178721 | Pandiarajan et al. | Jun 2015 | A1 |
20160034990 | Kannair | Feb 2016 | A1 |
20170270249 | Beerling | Sep 2017 | A1 |
20180307846 | Hertling et al. | Oct 2018 | A1 |
20190130082 | Alameh et al. | May 2019 | A1 |
20190356479 | Grimme | Nov 2019 | A1 |
20200076772 | Kapp | Mar 2020 | A1 |
20200154276 | Minakawa | May 2020 | A1 |
20210044558 | Eisen | Feb 2021 | A1 |
20210243185 | Thasale | Aug 2021 | A1 |
20210304197 | Pomassl | Sep 2021 | A1 |
20210314376 | Doida | Oct 2021 | A1 |
Entry |
---|
Overview and an Approach for QR-Code Based Messaging and File Sharing on Android Platform in View of Security, by Shah et al., published 2017 (Year: 2017). |
Number | Date | Country | |
---|---|---|---|
62705473 | Jun 2020 | US |