Sign In to Follow Application
View All Documents & Correspondence

Safeportpass

Abstract: [1] A system for SafePortPass, comprising a first device (106), held by a candidate, configured to:: generate a request for a code, determining a predetermined time period or a frequency of use, by the candidate, and store the code, wherein the code is indicative of an information, a second device (107), held by a requester, configured to receive a request for a code from the first device (106) of the candidate, and scan the code in real time, a processing module (102) configured to:: generate the code in real time for a specific timestamp, assign the code for the information for the predetermined time period or the frequency of use, send the code to the first device (106), activate the code for the predetermined time period or the frequency of use, deactivate the code after expiration of the predetermined time period or the frequency of use. [2] SafePortPass ( SafePortPass ) is a novel open-ended solution for two defined ends, infinitely expandable and usable, executed physically or electronically, multi-utility, user-centric, Identity and Privacy solution which allows two specific SafePortPass Users ( viz. Candidates and Requestors ) who are able to exercise independent control on their actions and decisions; wherein Candidates create, manage, allow or deny, access or usage to their specific credentials as and when a request for a specific set of, or general purpose of, or collection of, or any alternate set of, credential requirements is set forth by a specific or general set of Requestor ( s ). A unique SafePortPass-ID gets generated as and when a said Candidate initiates such SafePortPass and is accessible by the said Requestor ensuring never-seen before irrevocable and irrefutable trust, convenience, ease and security in a pre-defined rules-driven application; rules which are set forth by the said Requestor or general purpose set of rules acceptable to the said Requestor; in a submission process and is available for anyone and everyone along with redefined privacy control in a manner never seen before; making the submitter or the Candidate the driver of a process than be a chaser as seen in any process today and allowing Requestors to provide a real-time, live, rules-based decision or rules-based actions, which allows access to the specific Candidate’s aspiration to the said Candidate. Optionally, as defined or proscribed by said Requestors for the said submission, the said Identity or requisite details of the said Candidate may be through an Authentication procedure or Certified Procedure which includes self-certification. All this is driven through offline and / or online access medium and / or purpose wherein the offline process can be replicated digitally at a later point of time or an online process could provide a physical output as and when desired by either of the users. The said online process is independent of any specific or defined computer software or algorithm and is governed by the unique SafePortPass ID for each of such submissions and can also be executed through the innovative LIVE SafePortPass QR. [3] SafePortPass ( SafePortPass ) is a novel User-Centric, User-Driven and User-Controlled Authenticated or Self-Certified Identity & Privacy Management solution for claims and / or submissions for entitlement and eligibility and admissibility and / or eligibility fraud elimination and / or usage as an Identity Wallet. [FIG.1]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
13 April 2021
Publication Number
12/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
vivek@boudhikip.com
Parent Application

Applicants

Gaurav Sharma
FC – 95, Tagore Garden, New Delhi – 110027

Inventors

1. Gaurav Sharma
FC – 95, Tagore Garden, New Delhi – 110027

Specification

FIELD OF THE INVENTION
[1] The present invention generally relates to Identity usage, safety and security system having a user-controlled representation of status of an identity, of a machine or an individual or an organization or a body corporate and not limited to these alone, which includes, but not limited to information which may or may not be of the identity such as personal or based on a credential, which may be acquired or earned or awarded and includes general, confidential or private or personal or any type of information which could be trusted and should get trusted by another. Particularly, the present invention is related to a system to provide a digital identity wallet or named as SafePortPass.
[2] SafePortPass is a novel open-ended solution between two defined ends of specific user types viz. a Candidate or a Requestor, wherein the Candidate needs to avail of a product or service or transaction or similar, which may or may not be condition-based, and not limited to these alone, by utilizing specific information available with Candidate which may or may not match with information conditions set forth by a Requestor ( s ).
[3] SafePortPass is a novel solution in Identity Management which allows Candidate Users to exercise absolute control of their qualifying or aspirational information on one hand; while it also allows the Requestor Users to receive specific information to enable transparent and / or zero-influencing rule-based and / or discretionary decisioning.
[4] SafePortPass is a novel solution in Privacy Management which allows Candidate Users to exercise absolute control of their information in terms of allowing usage of a specified information for a specified purpose for a specified time period by specified Requestors
[5] SafePortPass is a novel solution in the field of Consent Management wherein it also allows the Requestor Users to receive specific information from specific Candidates with necessary declarations and or consents on allowance of usage of information received for specified purposes as and when a specific information is received for processing from a specific Candidate for a specific purpose.
[6] SafePortPass is a novel solution in the field of Perimeter and / or Entry Point Security Management which may be electronic or physical or hybrid ( physical, supported by electronic or digital ) or unmanned perimeter and / or entry points in nature. Each such point could comprise of a geographical or electronic or phygital boundary and act as a port such as an electronic access or airport or a seaport or even a metro station or similar ‘entry’ points as well as moving across different channels within any such physical entry point to facilitate movement and / or access to the next defined level. Each such point may also be a transaction point through which a transaction can get initiated or completed; such transaction can be monetary or payments or social or access or similar but not limited to these alone / only.
[7] SafePortPass is a novel solution in the field of Approvals Management which may or may not be physical allowance but also an electronic approval which may be utilized subsequently for further electronic process ( es ) or a physical and / or phygital and / or transactional entry point which may require presentation of such electronic approval and / or allowance
BACKGROUND OF THE INVENTION
[8] A Visa stamped on a Passport is typically seen as an allowance to enter a destination port. Not just a permission, it is also an indicator whether you would be allowed entry or turned back since one does not fulfil the criteria for a legal entry. Humanity would certainly hope, pray and wish that pathogens causing localized to pandemic spread also had a similar Passport to gain entry or be denied entry to our port – our body. But that is certainly not the case ever, especially when in a pandemic or a similar fast spreading disease spreads through contact or proximity and containment of infected is necessitated by isolation.
[9] At the same time, such containments, also restrict population which is less likely to get infected resulting in multi factorial hardships. Another factor is the fear of unknown or distrust, especially when the invading infection is happening due to contact/proximity. History has taught us that global battles against infections in a pandemic situation often trifurcates general population into Haves, Have Nots and Unawares. From one’s view, Haves may be the people who have the infection while Have Nots are the ones who do not have the infection while the unawares are blissfully ignorant of their situation.
[10] From another one’s view, Haves may be the people who have developed immunity against infection whether by emerging victorious or getting vaccinated through available vaccines. Have Nots again, are the ones who are blissfully ignorant of not just the infection, but vaccination too. With neither view being wrong at all, are still factually incorrect. But then how does one ascertain the facts to bring homogeneity to this ambiguity. Same way, for travel, Haves have the privilege of being allowed entry upon arrival, subject to fulfilment of pre-defined conditions; Have Nots being denied permission to enter; Unawares just not being aware of how to request entry in the first place, even though they may be well qualified / entitled for it.
[11] In today’s technology defined world, Facts are not reliable anymore simply because Trust is missing owing to the easy availability of technology tools to manufacture/modify facts by influence or similar actions. It is indeed a precarious situation since both the above families of points of views experience the same predicament and continue to peddle one’s non-factual viewpoint.
[12] The above situation can also be understood from another aspect. Brakes have been around ever since the wheels came into motion. Knowing brakes work and when to apply those brakes and when to release them enables an optimized movement. Obviously, you don’t apply sudden brakes or a sudden release as well.
[13] But, in a pandemic situation when brakes get applied automatically, suddenly, whether as an own fear reflex or as sovereign mandated, it is imperative to get back in controlled release to allow return to previously optimal movement. But who mandates/dictates release of brakes when individual or collective fear persists. Yet again, it is the missing Trust that defines the outcome here. This millennium’s pandemic has certainly shown how things can go from awe to awful in a very quick span of time.
[14] In a different scenario or from a different SafePortPass’s application viewpoint, applying for a visa to visit a country is as similar to travelling on a bus or a train !. Simply put, a visa allows one access to a foreign land, a simple over the counter ticket lets you travel and so does a pass that may have been purchased or gifted or simply provided, etc.. While the checks on visa eligibility or entering a foreign land is subject to intense scrutiny with Candidates forthcoming to provide required details and information and even more eager to offer any additional details that may be needed for a successful visa application. Deploying the same level of scrutiny for a train ticket or a music show or any such non-critical public utility is never desired nor expected.
[15] How so ever different they may be on critical aspect or underlying scrutiny, they are actually same when executed as a process, viz – presentation of an application or a ticket; scrutinizing the request to grant a visa or access; allowance to travel on visa or train. And current processes are not only inefficient, the lack credibility at times other than being confusing, expansive, difficult to follow or implement for a non-expert.
[16] Additionally, this millennium’s pandemic has been able to show how can things go from awe to awful in a very quick span of time.
[17] Apart from irrecoverable losses of lives lost, commerce and economies have been sledgehammered like never before. A lot of solutions got proposed, some being very notable ones, but each had a fundamental flaw of not taking into account a fundamental variable of ‘dynamism’ relating to rapidly evolving as well as sudden changes on the ground, leave alone the expectation of something which is done or executed in real-time. A set of jurisdictions allowed a set of rules, while the other set allowed another set of rules. Confusions were galore since by the time populations understood a set of rules, the new ones were in place and when they adjusted or complied to the new ones, they found they were not applicable in another or for something else.
[18] Then came the much-debated Vaccination Certificate aka Vaccine Passport. Something that was not new to the world, but on one hand, naysayers had a credible roadblock of Privacy; on the other hand, Trust always remained an underlying issue. Additional complexity was that of language which at times was alien to the holder of such vaccine passport.
[19] At the same time, when jobs were being lost, support programs were facing challenges of their own; on one hand, sheer numbers to manage such a sudden tsunami of applicants were adding to backlogs and consequent hardships to deserving; on the other hand, Trust remained an underlying issue here as well. So many applications had to be processed and actioned, processors not sure how many were genuine or bogus
[20] Comparing this to a simple train ticket, one would not see any similarity, if only the outcome is compared. But the moment you compare the common factor – Trust, things fall in place. Commuters on a bus, train, boat or plane are indeed checked for a simple ticket to ride. The conductors cannot be allowed to think that each commuter has a valid ticket. Trust is indeed missing.
[21] Comparing this to a simple fun activity like a museum or a concert (where a paid ticket is essential), Trust deficit remains.
[22] Even for a free-to-join public programs, at times, restrictions are imposed to prevent unlawful or unwanted elements gaining entry / access. Trust is indeed a rare (seemingly, non-existent) element in the world we live in.
[23] Ab-initio, it is indeed the Candidate who could be seen in each of the situations shown above, Requestors may be different, being governed by a similar or different mandate of rules or instructions.
[24] But when a Candidate initiates any such action, there could be only three types of such Candidates, viz. eligible, ineligible and the ones ‘trying to be eligible’ ( simply put, trying, through correct or incorrect means ). Irrespective of which type of Candidate, a fruitful outcome would be dependent on primarily three actions, viz. choice, submission and resultant.
[25] Needless to say, we all have been witness to not just delays in the outcomes but also at times frauds and wrongdoings by a few, all the while Privacy concerns adding much more to the complexity.
[26] Effectively, there has not been one solution that could have eliminated not just Privacy concerns, but also delays, actual eligibility or frauds per se. Even technology driven solutions fell short; fake technology solutions, as well as faking technology solutions, were plentiful available to reach a desired outcome.
[27] It is also important to note that Users do not know what they do not know. Coupling this with universal affinity to convenience and easy effort and quick results, eye for detail becomes lacking. At times, Users face insurmountable difficulties during submissions and beyond, at times challenging their eligibility. This becomes playground for offenders who would misuse their expertise in contemporary systems for purposes which they or their concerns are not entitled for, probably depriving the deserving or worthy or eligible ones.
[28] SafePortPass addresses these concerns in a novel way by bringing just the required actors – Candidate and Requestor, to execute just what is needed – submission and outcome, with just the needed Trust – absolute and fraud proof with just the right ingredients – Trust and Privacy. The third Actor, Issuer, is not an essential factor and SafePortPass may remain independent of the same.
[29] In either (or any other) scenario, the common factor that defines return to, or, achievement of optimal forward surge. Therefore, there is a need of a system for a SafePortPass.
OBJECT OF THE INVENTION
[30] SafePortPass is a novel solution with the objective of providing a solution which is independent of underlying technology or workflow per se, brings an assured technical solution for submissions or gain access to a product or service through instant eligibility check and consequent submission and to check fraud and ensure privacy in a User-Driven, User-defined, User-Controlled environment, addressing the innate trust deficit. Another object of this novel solution is its ability to be open-ended in terms of applicability, independent of workflows, yet remains defined between two Actors – a Candidate and a Requestor, fully accommodating the dynamism and changing aspirations of both Candidate and Requestors in a real world.
[31] An object of the present invention is to provide a system for SafePortPass.
[32] An object of the present inventions is a User-Defined-Controlled Digital Identity Wallet.
[33] An object of the present invention is to provide users a trusted method of showing and / or viewing or receiving submitted details of someone’s vaccination or health related status or any other identity related details.
[34] Another object of the present invention is to provide a system for an innovative representation of an individual’s status on resistance/immunity to specific/prevalent disease which is private and trusted.
STATEMENT OF THE PRESENT INVENTION
[35] SafePortPass is an innovative digital identity wallet and submission system and process, which can be executed electronically or physically, which can be executed physically and then recorded electronically, which can be executed electronically and then used physically, providing the same outcome each time in a never-seen-before transparent and trusted manner and is executed with convenience of time or on demand basis by either Candidate or Requestor. Other aspects of innovative SafePortPass is the unique SafePortPass-ID and LIVE SafePortPass QR and S3 – Scan-Scan-Submit.
SUMMARY OF THE PRESENT INVENTION
[36] The present invention is described hereinafter by various embodiments. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those skilled in the art.
[37] According to an aspect of the present invention a system for SafePortPass is provided. The system comprises a first device, held by a candidate, configured to generate a request for a code, determining a predetermined time period or a predetermined frequency of use, by the candidate, and stores the code, wherein the code is indicative of an information, a second device, held by a requester, configured to receive a request for a code, scan the code in real time from the first device of the candidate, a processing module configured to generate the code in real time for a specific timestamp, assign the code for the information for the predetermined time period or the predetermined frequency of use, activate the code for the predetermined time period or the predetermined frequency of use, send the code to the first device, deactivate the code after expiration of the predetermined time period or the predetermined frequency of use rendering the code unusable. Further, the second device is configured to scan the code within the predetermined time period or the predetermined frequency of use to reveal and display the information with respect to the candidate on the scan being matched to the code stored in the first device. The said device may be substituted by a physical printed paper as well as detailed later in the disclosure.
[38] In accordance with an embodiment of the present invention, the code is selected from a group comprising QR code, bar code, a pattern, Alpha, Alphanumeric, Numeric, variable character (Varchar), colored bars, or a combination thereof or a picture or a set of pictures, each or all pictures in parts or in full or a custom made or custom developed code etc.
[39] In accordance with an embodiment of the present invention, the information is representative of the candidate, associated with the first device, which may be personal or carried in credentials of the candidate and / or information related to or submitted by Candidate.
[40] In accordance with an embodiment of the present invention, the information is a indicative of protocol or requirement of additional steps and / or information to be adhered to or undertaken, by the candidate.
[41] In accordance with an embodiment of the present invention, the code is indicative of a request for a product or service or transaction (or similar, but not limited to these alone ).
[42] In accordance with an embodiment of the present invention, the processing module is configured to update the information in the code when a candidate executes the request or receives an action from the said Requestor.
[43] In accordance with an embodiment of the present invention, the second device, held by the requester, is configured to request for credentials, indication of the candidate being eligible or other related information to the candidate and provide the code in response to the request by the candidate.
[44] In accordance with an embodiment of the present invention, the code is encrypted by the candidate using privacy locks accessible to the second device held by the requester.
[45] In accordance with an embodiment of the present invention, the system comprises a third device, held by an issuer of the code, wherein the third device is configured to receive the request for the code from the candidate using the first device, generate a code in response to the request by the issuer, and approve the request by assigning the requested information to the code.
[46] In accordance with an embodiment of the present invention, the processing module is configured to regulate specific credentials of the candidate, thereby enabling the candidate to create, manage, allow or deny, access or usage to their specific credentials as and when a request for a specific set of, or general purpose of, or collection of, or any alternate set of, credential requirements is set forth by the requester.
SOLUTION IN DETAIL
[47] SafePortPass is a novel infinitely expandable and usable, User-Centric, User-Driven and User-Controlled Authenticated or Self-Certified Identity & Privacy Management solution for claims and / or submissions for entitlement and eligibility and admissibility and / or eligibility fraud elimination executed physically or electronically, multi-utility, user-centric, Identity and Privacy solution which allows two specific SafePortPass Users ( viz. Candidates and Requestors ) who are able to exercise independent control on their actions and decisions; wherein Candidates create, manage, allow or deny, access or usage to their specific credentials as and when a request for a specific set of, or general purpose of, or collection of, or any alternate set of, credential requirements is set forth by a specific or general set of Requestor ( s ). Requestors on the other end are able to provide a real-time decisioning on the basis of details offered and / or provided by Candidate; allowing or disallowing an aspirational action or suggest remedial options to allow or disallow an aspirational action, in real time, with Candidate’s additional actions also happening in real-time
[48] A unique SafePortPass-ID gets generated as and when a said Candidate initiates such SafePortPass and is accessible by the said Requestor ensuring never-seen before irrevocable and irrefutable trust, convenience, ease and security in a workflow independent, rules-driven application making the submitter or the Candidate the driver of a process than be a chaser as seen in any process today and
[49] Submission Rules are set forth by the said Requestor or general-purpose set of rules acceptable to the said Requestor; in a submission process and is available for anyone and everyone along with redefined privacy control in a manner never seen before
[50] The said Requestor is also able to define acceptability of a specific or a recently generated or to-be-generated SafePortPass by Candidates as well as define multiple gates, each which may have acceptability of a SafePortPass IDs as a common SafePortPass ID or multiple SafePortPass IDs or sequential SafePortPass IDs or parallel SafePortPass IDs.
[51] Once submitted by said Candidate, Requestors are able to provide a real-time, live rules-based decision or rules-based actions, which allows access to the specific Candidate’s aspiration to the said Candidate.
[52] SafePortPass is driven through offline and / or online or hybrid actions wherein the offline process can be replicated digitally at a later point of time or an online process could provide a physical output as and when desired by either of the users or the entire process could be executed online or offline. The said online process is independent of any specific or defined computer software or algorithm.
[53] SafePortPass is an innovative open-ended submission process with live feedback or actions which can be initiated by either Candidate or Requestor.
[54] SafePortPass is an open-ended yet secure process that allows both registered and non-registered users of such system to undertake informed or advised actions or decisions for the said aspiration of the said Candidate for which the said submission has been initiated through SafePortPass.
[55] SafePortPass is an open-ended, yet secure process, which is also privacy defined and privacy driven and controlled by Candidate alone.
[56] SafePortPass is an innovative consent management which allows Candidate User controlled permissions accorded to Requestor Users to accept or process details being furnished by the said Candidate through SafePortPass. The said permissions could be action bound or time bound or as stipulated by Requestor or as advised to Requestors by law of land.
[57] SafePortPass is an end – to – end secure and transparent interface, wherein the applicant (i.e. the Candidate User) utilizes his / her Credential ( s ) or Identity ( ies ) or details which may have been previously authenticated or certified, including self-certification, to submit requisite details through a submission as an Initiator.
[58] The said Candidate may also provide the same (desired / expected / demanded) details on the solicitation of a Requestor. The applicant as well as the Requestor remain updated in real time on the status in the entire lifecycle of submitted application till its final disposal. Innovatively, both Candidate and Requestor are aware of any change in each submission component; changes that may have been effected by either or even an external party that may have been added by either for a specific purpose / action
[59] The initiation and subsequent generation of the SafePortPass ID can be executed through an online interface available as a website and / or an app and / or an innovative concept of S3.
[60] SafePortPass-ID is a unique identifier, structured as alpha string or numeric string or alphanumeric string or a URI or a shortened link etc. which gets generated on the Initiation by either a Candidate ( who submits or is requested by a Requestor to submit required details ) or a Requestor ( who receives the said details or requests a particular or a defined or undefined set of Candidates to submit their specified or unspecified details ) in a straight line process ( one – to – one ( Candidate to Requestor and vice-versa ) relationship ).
[61] SafePortPass also features an internal or external or optionally linked repository, which may or may not be driven by the tenets of a mature Identity Management System ( though preferred, but certainly not essential ) providing a complete record of the said submission ( s ), resultant ( s ) or status ( es ), all available in user ( Candidate / Issuer / Requestor ) workspace in real -time.
[62] SafePortPass innovatively provides an instant fallback / audit trail that has defined contours between the involved / participants, all the while being technology agnostic and independent of any defined / circuitous workflows.
[63] BRIEF DESCRIPTION OF THE DRAWINGS
[64] So that the manner in which the above recited features of the present invention can be understood in detail, a more particular to the description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, the invention may admit to other equally effective embodiments.
[65] These and other features, benefits and advantages of the present invention will become apparent by reference to the following text figures, with like reference numbers referring to like structures across the views, wherein:
[66] Fig. 1 illustrates a system for SafePortPass, in accordance with an embodiment of the present invention;
[67] Fig. 2a-2b illustrate information flow and an exemplary implementation of system shown Fig. 1, in accordance with an embodiment of the present invention; and
[68] Fig. 3 illustrates exemplary SafePortPass, in accordance with an embodiment of the present invention.
[69] DETAILED DESCRIPTION OF THE DRAWINGS
[70] While the present invention is described herein by way of example using embodiments and illustrative drawings, those skilled in the art will recognize that the invention is not limited only to the embodiments of drawing or drawings described and is not intended to represent the scale of the various components. Further, some components that may form a part of the invention may not be illustrated in certain figures, for ease of illustration, and such omissions certainly do not limit the embodiments outlined in any way. It is implied that the drawings and detailed description thereto are not intended to in any manner limit the invention to the particular form disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the scope of the present invention as defined by the appended claims. As used throughout this description, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense, (i.e., meaning must). Further, the words "a" or "an" mean "at least one” and the word “plurality” means “one or more” unless otherwise mentioned. Furthermore, the terminology and phraseology used herein is solely used for descriptive purposes and should not be construed as limiting in scope. Language such as "including," "comprising," "having," "containing," or "involving," and variations thereof, is intended to be broad and encompass the subject matter listed thereafter, equivalents, and additional subject matter not recited, and is not intended to exclude other additives, components, integers or steps. Likewise, the term "comprising" is considered synonymous with the terms "including" or "containing" for applicable legal purposes. Any discussion of documents, acts, materials, devices, articles and the like has been included in the specification solely for the purpose of providing a context for the present invention. It is not suggested or represented that any or all these matters form a part of the prior art base or were common general knowledge in the field relevant to the present invention.
[71] The present invention is described hereinafter by various embodiments with reference to the accompanying drawings, wherein reference numerals used in the accompanying drawing correspond to the like elements throughout the description. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiment set forth herein alone / only. Rather, the embodiment is provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those skilled in the art. In the following detailed description, numeric values and ranges are provided for various aspects of the implementations described. These values and ranges are to be treated as examples only and are in no manner or understanding, not intended to limit the scope of the claims. In addition, a number of materials are identified as suitable for various facets of the implementations. These materials are to be treated as exemplary and are not intended to limit the scope of the invention.
[72] In accordance with an embodiment of the present invention, the system (100) for providing a SafePortPass (hereinafter referred to as “the system”) comprises a first device, held by a candidate, a second device held by a requester and a processing module.
[73] In accordance with an embodiment of the present invention, the first device (106) may be, but not limited to, any computing devices used by the one or more candidates to raise request for code. The first device (106) may be, but not limited to, desktop PCs, PDAs or portable computing devices such as a laptop, smartphone, tablet etc.
[74] In accordance with an embodiment of the present invention, the second device (107) are any computing devices used by the requesters. The second device (107) may be, a scanner to scan and decrypt a code which may be, but not limited to, a camera, an AI camera, pen wands, slot scanners, Charge-Couple Device (CCD) scanners, image scanners, and laser scanners or a combination thereof. In accordance with an embodiment of the present invention, the second device may (107) be desktop PCs, PDAs or portable computing devices such as a laptop, smartphone, tablet etc. The said code may also be entered by the Requestor through a simple keyboard or through a voice command or similar manner.
[75] Additionally, the processing module (102) is envisaged to include computing capabilities such as a memory unit (1022) configured to store machine readable instructions. The machine-readable instructions may be loaded into the memory unit (1022) from a non-transitory machine-readable medium, such as, but not limited to, CD-ROMs, DVD-ROMs and Flash Drives. Alternately, the machine-readable instructions may be loaded in a form of a computer software program into the memory unit (1022). The memory unit (1022) in that manner may be selected from a group comprising EPROM, EEPROM and Flash memory. Then, the processing module (102) includes a processor (1024) operably connected with the memory unit (1022). In various embodiments, the processor (1024) may be a microprocessor selected from one of, but not limited to an ARM based or Intel based processor or any other microprocessor in the form of field-programmable gate array (FPGA), a general-purpose processor and an application specific integrated circuit (ASIC) or an SOC. In accordance with an embodiment of the present invention, the system may comprise a third device, held by an issuer of a code. The third device may have a microprocessor having computational ability. The issuer may be an authority having rights to issue code. The issuer may be, but not limited to, any individual, government authority, health authority, testing facility etc.
[76] None of the components listed above or following below should be considered as mandatory for executing the SafePortPass process or system and any of these components could be substituted by any other single or multiple components as a technology advances.
[77] Further, the processing module (102) comprises a communication module (1028) configured for enabling connection of the first device (106) and the second device (107) and the processing module (102). The connection may be wired or wireless. In that sense, the communication module (1028) may include Power over Ethernet Switch, USB ports etc. These may allow transferring of data from the one or more first device to the processing module (102) and data from the processing module (102) to the second device (107) and vice versa via Ethernet cable, USB cable etc. Additionally, or alternately, the communication module (1028) may be an Internet of Things (IOT) module, Wi-Fi module, Bluetooth module, RF module etc. adapted to enable a wireless communication between the first devices (106), the processor (1024) and the second device (107) via a wireless communication network (110).
[78] The wireless communication network (110) may be, but not limited to, Bluetooth network, RF network, NFC, WIFI network, Local Area Network (LAN) or a Wide Area Network (WAN). The wireless communication network (110) may be implemented using a number of protocols, such as, but not limited to, TCP/IP, 3GPP, 3GPP2, LTE, IEEE 802.x, etc. In one embodiment, all the components of the system (100) are connected with each other via the communication network (100).
[79] In accordance with an additional or alternative embodiment of the present invention, the processing module (102) may also include a registration module (1026) adapted to receive candidates and requesters details and register them on the system (100). The details may include, but not limited to, username, contact number, email ID, age, gender, or any other information of the Candidate. Besides, the registration module (1026) may also have a biometrics receiver configured to register the candidates and the requesters via his/her biometrics. The biometrics may include, fingerprint recognition, face recognition, Iris recognition or voice recognition or any individual profiling or user-only-knowing code or a combination thereof. In one embodiment, the processing module (102) may be a stand-alone device where the candidates and the requesters may come and register himself/herself with their details.
[80] Further, the processing module (102) may also include a user interface. The user interface may or may not include a display of any size and dimensions and display type, envisaged to show the data received from the first device (106), the second device (107) and the results of the processor analysis. The display may be, but not limited to, Light-emitting diode display (LED), electroluminescent display (ELD), liquid crystal display (LCD), Organic light-emitting diode (OLED) & AMOLED display. Furthermore, the user interface may include accessories like keyboard, mouse etc. envisaged to provide input capability to enable the candidate and requester to enter his/her details mentioned above. In another embodiment, the user interface may be a touch input-based display that integrates the input-output functionalities.
[81] This said user interface is intended to provide processing or information feedback may possibility be display less and may have automated or triggered actions on other hardware like, but not limited to, light of any configured color across the light spectrum or sound with any configured output irrespective of frequency used
[82] Additionally, the first device (106) and the second device (107) are connected with the processing module (102) via a wired or wireless connection. Herein, the first device (106) and the second device (107) may be selected from computing devices such as desktop PC, laptop, PDA or hand-held computing device such as smartphones and tablets. It has already been mentioned, the first device (106) and the second device (107) are associated with the candidate and the requester respectively. In another embodiment, instead of a processing module (102) and the first device (106) and the second device (107) being a stand-alone device, the first device (106) and the second device (107) may house the processing module (102) along with their functionalities. The first device (106) and the second device (107) already includes microprocessor (1024) for processing and communication capabilities via wired or wireless connections.
[83] In yet another embodiment, the system (100) could be implemented as a distributed system (100) where the first device (106) and the second device (107) and the processing module (102) may be at disposed at a different locations from each other and/or the processing module (102) could be implemented in a server side computing device or cloud computing environment. It will be appreciated by a skilled addressee that there are multiple arrangement in which the present invention can be implemented, without departing from the scope of the present invention. The processing module (102) is also envisaged to implement Artificial Intelligence, Machine Learning and deep learning for data collation and processing.
[84] In accordance with an embodiment of the present invention, the system (100) may also include a data repository (108). The data repository (108) may be a local storage (such as SSD, eMMC, Flash, SD card, etc.) or a cloud-based storage. In any manner, the data repository (108) is envisaged to be capable of providing the data to the processing module (102), when the data is queried appropriately using applicable security and other data transfer protocols. The data repository (108) may store, but not limited to, previous data, analysis, data related to Candidate information or details, and/or live images, videos, audios, 3D immersive content etc. It is also envisaged to store various charts, tables, videos, presentations, 3D content, prepared for the requesters and candidates. In one embodiment of the present invention, the processing module (102) may include AI and deep learning-based trained models using the above data, to compare and assess and update the database based on the received data from the first device (106) and the second device (107) or the internet in real-time.
[85] Figure 2a illustrates information flow and an exemplary implementation of the system (100) shown Figure 1. As shown in figure 2a, the first device (106), held by a candidate, configured to generate a request for a code, determining a predetermined time period or a predetermined frequency of use, by the candidate.
[86] Further, the second device (107), held by a requester, configured to receive a request for a code from the first device (106) of the candidate. The Candidate, who needs to submit required details to Requesters. Any such Candidate can be of two sub-types CR or Candidate Registered:: simply a Candidate who has registered with the system (100). Only CRs would be able to initiate any SafePortPass in the system (100). CN or Candidate Not Registered:: simply a Candidate who has not registered with the system (100). The requester, who needs to receive required details from the Candidate. Any such Requester needs to be registered with the system (100) to receive the Candidate submitted and mandated details. However, in case of payment related SafePortPass or SafePortPass QR S3, said Requesters may not need any registration with SafePortPass and be registered with the financial service provider of their choice.
[87] Furthermore, as shown in figure 2a, the processing module (102) configured to generate the code in real time for a specific timestamp. In accordance with an embodiment of the present invention, the code may be selected from a group comprising, but not limited to, a QR code, a bar code, a pattern, Alpha, Alphanumeric, Numeric, variable character (Varchar), ASCII Number or combination, colored bars, or a combination thereof. Further, as shown in figure 2a, the processing module (102) is configured to assign the code for the information for the predetermined time period or the predetermined frequency of use.
[88] Figure 2b illustrates information flow and an exemplary implementation of system shown Figure 1. In accordance with an embodiment of the present invention, the processing module (102) is configured to send the code to the first device (106). Further, as shown in figure 2b, the first device (106) is configured to store the code. In an embodiment of the present invention, the code is encrypted by the candidate using privacy locks accessible to the second devices (107) held by the requester. In accordance with an embodiment, the code is indicative of an information. The information is representative of the candidate, associated with the first device (106), and derived from ‘Authenticated Credential Based’ or ‘Certified Info’ or ‘Self-Certified Detail’ of the candidate and/or any related or entered information. Further, in an additional or alternative embodiment, the information may be a protocol indicative of requirement of additional steps to be adhered to, by the candidate. Additionally, in an additional or alternative embodiment, the code is indicative of a request for certain product or service or transaction or like.
[89] Furthermore, as shown in figure 2b, the processing module (102) is configured to activate the code on the first device (106) for the predetermined time period or the predetermined frequency of use. Next, the second device (107), held by a requester, configured to scan the code in real time from the first device (106) of the candidate. In accordance with an embodiment of the present invention, the second device (107) is configured to scan the code within the predetermined time period or the predetermined frequency of use to reveal and display the information with respect to the candidate on the scan being matched to the code stored in the first device (106).
[90] In an embodiment of the present invention, the second device (107), held by the requester, may be configured to request for credentials, of the candidate or other information related to the candidate and provide the code in response to the request by the candidate. In an embodiment of the present invention, the processing module (102) may be configured to regulate specific credentials of the candidate, thereby enabling the candidate to create, manage, allow or deny, access or usage to their specific credentials as and when a request for a specific set of, or general purpose of, or collection of, or any alternate set of, credential requirements is set forth by the requester.
[91] In accordance with an alternative or additional embodiment, the request for the code is indicative of a request for certain product or service or transaction or like. In this case, the processing module (102) is configured to update the information in the code when a candidate or the requestor undertakes any action.
[92] In an alternative or additional embodiment the third device, held by an issuer of the code is configured to receive the request for the code from the candidate using the first device (106). Further the third device may generate a code in response to the request by the candidate. Further, the issuer, which is the single source of truth as the issuing authority may approve the request by assigning the required truthful and trusted, authenticated information to the code. The issuer, who has and / or can issue a Credential or detail or opinion to / for any Candidate at the request of either Candidate or Requester. Such issuance could be in real-time, near time or in future. Any previously issued Credentials could be authenticated by the said Issuer as they remain the single source of truth forever. Any such Issuer can be of two sub-types:: IR or Issuer Registered :: simply an Issuer who is registered with the system (100). The IRs are of two further sub types :: IRI or Issuer Registered Internal :: simply a registered Issuer, and are peers belonging to the same machine group / entity / body corporate / organization of the requester with whom the CR has actually Initiated the SafePortPass. IRE or Issuer Registered External:: simply a registered Issuer, but, not peer to the requester of the same organization. IN or Issuer Not Registered:: simply an Issuer who has not registered with the system (100). Each of the above roles, Candidate, Issuer, Requester; and their sub – types; could be a machine or an individual / entity / body corporate / organization etc. Templatization:: At the very first step after registration, the SafePortPass gets defined by the requester and required details defined which would lead to an acceptance by Requester or grant a product or service to the said submitter, viz. the Candidate.
[93] The system (100) allots a specific Template ID for a template created by the requester for their exclusive usage. The said ID may be numeric or alphanumeric or any combination of contemporary or future identifiers. The system (100) may also provide a set of general templates to Requesters to choose and seek general submissions, which would be common to other Requesters, but unique to them when submitted and accessible to them alone when successfully submitted. The system (100) may also allow Requesters to clone any general or any of their previous templates. Though not mandatory as an option, requesters may be allowed to change their templates based on feedback received by them to make the entire submission process more dynamic and sensitive. The requester may choose to use the S3 (explained briefly below) system at this point which allows the solicited Candidates to simply just scan the said template through its QR and the system (100) actions the rest. The said QR should only be seen as a representative, and may be replaced by an alternative usage mechanism such as any numeric or alphanumeric or pictorial or voice based input or a URI etc. used for a unique identity of a template Usage:: Initiated by Candidate, the said Candidate simply needs to input the ID Of the template or use the S3 (scan to scan and submit) process / tool. CRs have the advantage of the system (100) providing all the requisite details as defined by the Template of the requester.
[94] Each of such details would also get marked as ‘Authenticated Credential Based’ or ‘Certified Info’ or ‘Self-Certified Detail’ to impart absolute clarity on status of details being submitted for the said template by the said Candidate
[95] ‘Authenticated Credential Based’ details mean the said detail, has been duly authenticated by only the Issuer through a Credential accorded / provided to the said Candidate. This process may be referencing to or fetching details from a federated / non-federated Identity system or a more wholistic, trusted global benchmark, system like CertiSafe.
[96] ‘Certified Info’ details mean the said detail / credential has been notarized by a designated notary who is also registered on a system from where the said details are being fetched or being referenced to, such as a federated / non-federated Identity system or a more wholistic global system like CertiSafe or a third party vouches for the said detail, but the said detail has not been accorded / provided by the Issuer to the said Candidate.
[97] Optionally, the system (100) may, or if defined by the requester through the template, provide the number of times the said detail has been used or deemed as trusted by other users with/out disclosing any information about the said users of the said information.
[98] ‘Self-Certified Details’ simply mean that the Candidate providing the said information or detail assumes full responsibility on the correctness and trueness of the said details. This may arise due to the non-availability of the said Issuer of the said Credential to the said Candidate, but the ability of the Candidate to use the system (100) is not impeded in any way. CNRs have the option to fill the desired details independently. Needless to say, all such information would be marked as ‘Self-Certified Details’
[99] The Candidate has the privilege, convenience, and freedom to append the said system with other information of choice as mandated by the requester Template which provides the option of accepting multiple or different details for a said template. Say for example, the requester Template designates to provide Full Name as per Passport or Driving Licence or a National Identifier. Now, if the Candidate has all three sources available and somehow Candidate’s Full Name in each of the said sources is listed differently, which may be due to choosing different initials or likewise or Candidate may have undergone a Name-Change previously, the Candidate would have the option to choose and provide the said Full Name corresponding to the said Credential.
[100] The said process is repeated for all requisite details by the Candidate itself or Candidate allows the system (100) to choose the most preferred Credential for the defined Template. The ‘most preferred Credential’ previously gets defined by the requester while creating the template. Say for example; only for the purpose of explanation and not limiting to these two examples alone; at an Air Port or a Sea Port, the Passport becomes the most obvious preferred Credential, while at a healthcare facility the Health System ID Card or Social Security Number Card becomes the most preferred one.
[101] Once submitted, the system (100) is instantly reflected in Requester ’s work area / queue for further actions. The system (100) engrains Privacy and Choice to the very core since Candidate and Candidate alone have the privilege to initiate a SafePortPass.
[102] SafePortPass engrains Trust and Transparency to the very core since each SafePortPass initiated by Candidate would instantly provide feedback to the Candidate on the possibility of acceptability for such submission. This may be based on defined details available or defined conditions being met before the actual submission is executed by the said Candidate. This allows the Candidate to either change the detail, add an acceptable Credential in repository, have the right details pulled from the right credential or select the right credential having the defined details, for the said purpose
[103] Scan Scan Submit or S3 ( SCube ) or S3imple :: As meant, Candidates and Requesters simply scan to submit. SafePortPass brings in the epitome of convenience through multi-faceted S3, which automatically initiates required execution at the click of a simple scan. S3 is of the following types:
[104] Candidate Initiated:: Scan Requester QR, automatically the template is loaded with requisite details which the Candidate can then simply submit. Once submitted, a new QR appears which the requester can then scan and check submission and for conformance to requisite details being available.
[105] Requester Initiated:: Scan Candidate QR, automatically the template based submission gets loaded with requisite details which the requester can then simply review / action. Once scanned by Requester, Candidate is also alerted that the said Submission was reviewed by the said Requester. Requester then sends a consent to use the said details based on acceptance criteria to which Candidate can approve usage or deny or schedule usage for a defined period of time.
[106] Scan a Scan and Submit:: This interesting version takes convenience to an even higher level. Once Candidate has scanned a template through a QR and submitted, the requester template automatically allows Candidate to go through multiple points post submission and acceptance. This can be of further two types:
[107] Same Submission being used at multiple places where the same Requester Template is to be used. Same Submission becoming a primary or parent or an umbrella submission and subsequent usage appends the parent submission with requisite details. Anonymization :: Though not mandatory, but based on the defined template, SafePortPass provides the option to Candidates to self-anonymize by selecting this option. This gets executed by using state-of-the-art cryptographic tools such as UltraSafe. This ensures zero data leakage or unauthorized access by anyone else other than the intended Requester, even at the said Requester ’s end.
[108] Scan to Scan and Submit:: This version is useful for Candidates to identify the requisite Template of choice from multiple listed Templates, each template being characterized by its own unique QR or a SafePortPass ID for Requester Templates. This could be a simple print or display of multiple QRs together or dispersed across a larger area where identifying the correct machine and / or screen and / or place and / or gate and / or counter etc. may be difficult. Examples :: SafePortPass can be easily and perfectly visualized through the following suppositious examples ::
[109] Example 1 :: A Music Concert :: Imagine a Candidate purchasing a ticket for a concert which is ‘Authenticated’ by the Event Organizers or Ticket Sellers. All that a Candidate now needs to do is to show up at the venue at the right date and time, approach a gate, Scan the Gate QR; which would automatically fetch the requisite details, such as Ticket Number, Wing or Section Number, Seat Number, Privileges etc.; and reach the allocated space / place. Further stretching the example, if there were an event QR for every seat at the venue, the Candidate needs to simply reach the designated seat and scan the requester QR (Multiple Type) and be seated comfortably. This would also mark the seat as occupied / ticket used for the requester.
[110] As can be seen, this is not only efficient, fast, but assured as well. The degree of certainty for everyone gets elevated to a new benchmark high.
[111] Example 2:: A Vaccination Point :: Imagine a Candidate is in need for a specific Vaccination and is entitled / eligible for a specific Vaccine for a specific purpose say travel. To bring realism to this example, let’s consider a Covid-19 Vaccine. On scanning the Hospital QR of template for Booster Dose (by intentional mistake), imagine the system (100) alerting the Candidate that s/he is ineligible for the same since the second dose has not yet been taken. Further, the Candidate finds or moves to ‘Scan to Scan and Submit’ to find the right QR. This would be easy as well as essential since the assumed Notice Board may be listing many other vaccines, not just Covid-19 Vaccines.
[112] Example 3:: An Airport :: Imagine a traveller flying from City A to City B and has duly purchased a ticket for the same. Now, traveller has multiple options to choose from, a Single Gate – By – Gate Approach or Multiple Gates Approach with a single scan. Let’s look at both. Gate – By – Gate Approach:: Traveler reaches the airport, scans the Entry Gate QR, Security personnel get to see the requisite details instantly available on their screen, allow the traveller to enter. Traveller then reaches the Airline Counter and scans another Gate QR. After this, the Traveller scans Security Checkpoint Gate QR and then finally the Boarding Gate QR.
[113] [0096] Multiple Gates Approach: :: Traveler reaches the airport, scans the Entry Gate QR. This time, Security personnel scan the submitted SafePortPass and mark it as Entered, then Airline counter staff scan the same QR of Candidate Submission and mark as Seat allotted, then Security Check Point Personnel scan the same Candidate QR and mark as allowed, then Boarding Gate Personnel mark as disembarked after scanning the Candidate QR. Now, if assuming this was an International Travel and the traveler is expected to have a Valid Visa or sufficient expiry period of the passport, any issues get flagged at the requisite point itself and necessary action taken. Taking this example further, imagine the visiting Country stipulating the requirement of a specific medical condition test to be done prior to flying out from City A. Or the results of the said tests be mandatory or if the test was to be carried out upon landing, and so on and so forth, all such conditions can simply be defined as a template. Further, in this example, other than stamping the passport of the traveler, if the Alien Control Point also marks the traveler’s SafePortPass as allowed, the traveler could furnish the same completed QR to any Law Enforcement Agency’s personnel on demand and they be provided with not just instant information, but correct information, which is actually the desired outcome. Imagine the enhanced ability of LEAs ( Law Enforcement Agency Personnel or Border Controls or Customs ) to be expecting the said traveler even before the said traveler has actually taken off.
[114] Further imagine the utility of SafePortPass at a remote Border post between friendly countries where at times minimal or no personnel are stationed. SafePortPass allows even faster, securer and lawful travel of people at such places too. Say, if there is a border post, with actually no border control personnel. With SafePortPass, Trust is maintained and so is the law, by simply scanning a QR at the border post, a touchless, paperless, lawful enablement of citizens could be a reality. Further, the entire cycle could be done in reverse if the suppositious examples’ template so allows. It can be noted that at each Gate Point, or the Safe Port Point, each allowance gets marked as SafePortPass. And each detail appended gets utilized at the next Safe Port Point or Gate. It can be noted that at each Gate Point, or the Safe Port Point, each allowance gets marked as SafePortPass. And each detail appended gets utilized at the next Safe Port Point or Gate. SafePortPass, as can be seen is an instant assurance on the LIVE status in real time. SafePortPass allows the Candidate Users to exercise absolute control on each action of the Requestor or Requestors.
[115] Requestors have the following additional options:: Templates :: Requestors have the ability to create or modify or replace or add supplemental templates suiting their extant requirements. They further can modify the validity and visibility of the said Templates. Request more information and / or request a specific Credential:: This condition is met as and when a particular Candidate uses an Authenticated Credential based detail. The CSID ( if linked to CertiSafe, but not mandatory ) or an ID from a federated / non-federated Identity provider, the Credential itself could be appended to the said template as a requirement.
[116] Request LIVE information :: Requestors, say for example, see a mismatch between the photographs used and the person itself, Requestors could ask the Candidate ( say a traveler ) to use a Supplementary SafePortPass template which allows a LIVE Photograph to be taken at that very instant. Further the same could be executed similarly for any other information which may be available with the person at that instant. Say, a Requestor template does not need a Driving Licence, but to allow the Candidate through to the next point, the Requestor can allow an exception on the basis of a valid Driving Licence.
[117] Use Canned SafePortPass s / Physical SafePortPass :: Candidates have the following additional options :: Restrict Information :: Candidates can allow or disallow a specific information to be transmitted to the said Requestor through the said Template. Say, for example, while buying the ticket to the concert, Candidate is expected to be of specific age. This gets validated during the purchase part, and during the entry process, the Requesters need to be sure of the age and this mandated that the age be used from a Driving Licence or a Passport. While the Candidate uses the SafePortPass at the Event Gate, while the details are shown to the personnel manning the gate, they need not be aware of the actual date of birth or say, any other information pulled from the said Licence or Passport. SafePortPass ensures that the information could be seen, but strong Privacy Controls ensure that the said additional information is not transmitted.
[118] Anonymize:: As explained earlier, Candidates have the option to use global benchmarks in anonymization techniques, such as UltraSafe, but can also obfuscate the said information for unauthorized access. This option, depending on the template allows the Requestors to never or temporarily view the said information. Other safeguards like Multi Factor Authentication could also be used to ensure that it is indeed the said Candidate who is using the said SafePortPass.
[119] Instant Consent :: Other than Candidate having the absolute privilege to allow or deny any specific request for additional information, the Candidate could also use the said SafePortPass to provide an instant consent for a specific condition imposed or implemented by the Requestor.
[120] Generate Physical SafePortPass :: A Candidate is able to generate a physical copy by converting the SafePortPass details submitted to a Requestor through contemporary document creation tools such as a screenshot or a PDF document or Screen Print etc. The said Physical SafePortPass would automatically be provided with a specific QR for the Requestor to Scan and execute process further, in the Hybrid SafePortPass process. The Candidate or the Requestor additionally can include and / or modify default Privacy controls relating to validity or usage or consents provided etc. Figure 3 illustrates exemplary SafePortPass, in accordance with an embodiment of the present invention.
[121] LIVE SafePortPass QR or SafeQR :: This innovative step allows both users to switch to LIVE SafePortPass QR (or similar scannable or usable code) which is generated in real time and its validity is defined by the said user. This is particularly useful innovation has wide application areas and not limited to Identity Wallet or Identity Usage or as described across above. In particular, while making payments, LIVE SafePortPass QR is expected to be supremely useful and be exceptionally helpful in reducing payment frauds, including payments arising out of eligibility for a particular grant, support or refunds or routine payments or payments in foreign currency (or any currency, including digital currencies, irrespective of issuing organization being sovereign governed and / or regulated or private organization. For example, a Candidate user generates a LIVE SafePortPass QR for a merchant seeking payment as the first step. Next, the merchant simply scans the just generated LIVE SafePortPass QR and the Candidate is duly debited from its payment preferences and the merchant credited. Additionally, any multi factor authentication procedure as mandated or desired by law of land could easily be included for compliance. Similarly, in another example, Merchant presents a demand note for which a LIVE SafePortPass QR gets generated, which is then scanned by Candidate and payment executed as seen in the first example here. Such transactions also get provided a unique SafePortPass ID. Particularly interesting is the ability of the system (100) to also be in a position to service across user types viz, Candidates and Requestors who may or may not be registered with the system (100) but may be using a particular financial service provider for such secure financial transactions. Additionally, Geo-tagging could be included in SafePortPass QR to add additional layer of physical presence parameter for the entire system or process execution location.
[122] SAFE SMS:: SafeSMS is a special detail oriented SMS which a Requestor can request from the Candidate by selecting specific details needed by the Requestor to further proceed on request submitted by Candidate. This is particularly useful in areas with limited or no internet connectivity, but could also be executed through cellular or similar network and even by dialling into an IVR System. Similarly, Candidate can provide the requisite details to the Requestor by initiating a detail oriented SafeSMS. Like for Requestor, this would be useful in areas with limited or no internet connectivity, but could also be executed through cellular or similar network and even by dialling into an IVR System. Additionally, the SafeSMS could provide system details if requested by Requestor on the Trust level of the Credential whose details have been submitted by the said Candidate, as to if the said Credential and its details thereof marked as ‘Authenticated Credential Based’ or ‘Certified Info’ or ‘Self-Certified Detail’. Further SafeSMS also acts as an appointment scheduler, wherein the receiving user is alerted on the requested time slot. Say for example, scheduling a Doctor’s appointment or confirming the appointment as well. This is also particularly useful for Children traveling alone, wherein Parents can not only confirm child’s travel, but also alert all concerned.
[123] The invention has various advantages. The system (100) engrains transparency to the very core since each SafePortPass initiated by Candidate may also provide feedback to the Candidate on the probability of success for such submissions. The invention can help prevent misuse of data. Data safety is increased. The invention can dynamically eliminate the uncertainties around submissions, physical or electronic, which cause unnecessary anxiety to one and all. The invention provides a cost effective and safe solution over the existent prior arts. Since, the disclosure of data is controlled by the candidate that too on demand of requester or issuer, the probability of misplacing of data is drastically reduced. Due to limited time usage of code within a limited interval, cluster formation is not possible due to every candidate being on time. The system works on real time, therefore, there is almost no delay in crowd management and distribution.
[124] In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, for example, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as an EPROM. It will be appreciated that modules may comprised connected logic units, such as gates and flip-flops, and may comprise programmable units, such as programmable gate arrays or processors. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of computer-readable medium or other computer storage device.
[125] Further, while one or more operations have been described as being performed by or otherwise related to certain modules, devices or entities, the operations may be performed by or otherwise related to any module, device or entity. As such, any function or operation that has been described as being performed by a module could alternatively be performed by a different server, by the cloud computing platform, or a combination thereof.
[126] Examples of the computing device may include, but are not limited to, a personal computer, a portable computing device, a tablet, a laptop, a mobile computer, a wearable computer, a communication device such as a smartphone, and a personal digital assistant, and the like. Moreover, the computing device includes a plurality of electronic components for example, such as a microprocessor, a graphics processor unit (GPU), a memory unit, a power source and a user interface. Exemplary user interface includes one or more buttons, a gesture interface, a knob, an audio interface, and a touch-based interface, and the like.
[127] Further, one would appreciate that the communication network can be a short-range communication network and/or a long-range communication network, wire or wireless communication network. The communication interface includes, but not limited to, a serial communication interface, a parallel communication interface or a combination thereof.
[128] Various modifications to these embodiments are apparent to those skilled in the art from the description and the accompanying drawings. The principles associated with the various embodiments described herein may be applied to other embodiments. Therefore, the description is not intended to be limited to the embodiments shown along with the accompanying drawings but is to be providing broadest scope of consistent with the principles and the novel and inventive features disclosed or suggested herein. Accordingly, the invention is anticipated to hold on to all other such alternatives, modifications, and variations that fall within the scope of the present invention and the appended claims.

CLAIMS:

I claim:
[1] A technology and workflow independent system facilitating creation, maintenance and usage of an Identity wallet for a machine or an individual or an organization or a body corporate comprising: a memory, the memory comprising an electronic repository, and program instructions; an optional electronic repository; comprising a first plurality of records each representing one of a set of candidate users registered or not registered as a candidate user with the system, a second plurality of records each representing one of a set of requestor users registered or not registered as a requestor with the system; and a processor that executes the program instructions to execute communications between the candidate users and the requestor users; the instructions configured such that either of the registered candidate or registered requestor initiates an online or physical submission to asses and allow respectively a request based on details submitted by the candidate user and the said requestor provides a service or product or similar action to the said candidate in real time.
[2] A SafePortPass ID that gets generated on initiation by a candidate user and registered requestor provides a real time resultant or decision or advice for additional action to the said candidate.
[3] S3:: Scan Scan Submit:: A Process wherein either user initiates the SafePortPass simply by providing an input of a template ID which could be a numeric or alphanumeric or URI or any unique identifier or by a scanning a QR or similar available scannable or input methods for uniquely identifying a template for the Requestor to receive the details provided by a Candidate through the said template.
[4] LIVE SafePortPass QR Code (or similar such usable code) which allows execution of payments between Candidate and Requestors by simply scanning the just generated QR Codes (or similar such usable code).

Documents

Application Documents

# Name Date
1 202111017298-PROVISIONAL SPECIFICATION [13-04-2021(online)].pdf 2021-04-13
2 202111017298-FORM 1 [13-04-2021(online)].pdf 2021-04-13
3 202111017298-DRAWING [13-04-2022(online)].pdf 2022-04-13
4 202111017298-COMPLETE SPECIFICATION [13-04-2022(online)].pdf 2022-04-13
5 202111017298-FORM-26 [15-03-2023(online)].pdf 2023-03-15
6 202111017298-FORM 18 [15-04-2025(online)].pdf 2025-04-15