SlideShare a Scribd company logo
1 of 6
A MEETING MASTER PICTURE FOR A PATENT
For the SPARC Security Device (SSD)
“Smart SPARC Key”

John Hipsley, California
2 July 2013
MEETING OBJECTIVE
Map the transaction process for a patented security process
DISCLOSURE OF INVENTION AS DESCRIBED IN PATENT
Methods and systems for operating a secure communication system

1)

A security device 104 receives a request for a transaction from a programmable device 102
executing an application obtained from an application controlling institution (ACI) 101, and
verifies the validity of the transaction.

2)

A user is alerted; the user can indicate acceptance of the request.

3)

A one-time identifier is generated by the security device 104.

4)

The one-time identifier comprises a security device 104 identification and a one-time transaction
number, and optionally comprises a date, a time, an ACI 101 identifier, and a subject matter field.

5)

The one-time identifier is communicated to the programmable device 102, in which the
application verifies the validity of the security device 104 identification, and instructs the
programmable device 102 to communicate the one-time identifier and the transaction itself to
the application controlling institution 101 for processing.

6)

The application controlling institution 101 verifies the validity of the one-time identifier,

7)

and, if valid, securely processes the transaction.
OVERVIEW OF PATENT MAPPING OBJECTIVE
• Create a flow chart illustrating how the Security Device (SSD) works

The Security Device and its systems architecture,
as defined in our patent, PREVENTS:
• Use of lost and stolen devices

• Overheard voice transmissions and
• Downloading of fraudulent applications
to phone or device

• This is accomplished without the use of PINs, passwords or encryption.
• The Security Device system is 100% compatible with the bank industry
ISO track and data base architecture.
Meeting – Who will be there?
PATENT DESCRIPTION
Dual Device System for
Secure Financial Transactions & Data transmission

1
Patent
attorney

4
Inventors

1+
Intellectual Property
Licensing Specialist

1+
Investor(s)

1
Vivid Model
Designer
MAPPING OBJECTIVE
Transform the verbal descriptions into visual images
 What? The patented security device with near field communication
capabilities”
104 – key

 What? ANY programmable device
102 - mobile phone, smartcard, laptop
 How Much? Automatically generated algorithm in specific sequence
# - User Identification Number (sequence of numbers
 Where? The application controlling institution (ACI)
101 – your bankng institution and financial card processor
 When? Transaction completed when this number received on
device (mobile phone)
  - Approve or Deny the Financial transaction

 How? - Meeting Master Picture
 Why”? Ensure secure financial and data transactions
- lock or unlock device
The Meeting Master Patent Picture for SPARC
Secure Payment Application Rewarding Causes

More Related Content

What's hot

What's hot (20)

Bank locker system
Bank locker systemBank locker system
Bank locker system
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.
 
I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh I clock680 | Fingerprint Time Attendance Systems in Bangladesh
I clock680 | Fingerprint Time Attendance Systems in Bangladesh
 
Act500
Act500Act500
Act500
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
GSM Based Bank Security Control
GSM Based Bank Security ControlGSM Based Bank Security Control
GSM Based Bank Security Control
 
Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
System 6000
System 6000System 6000
System 6000
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
SmartWorld- What we Do!
SmartWorld- What we Do!SmartWorld- What we Do!
SmartWorld- What we Do!
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_En
 
S_IOT_Intro.pptx
S_IOT_Intro.pptxS_IOT_Intro.pptx
S_IOT_Intro.pptx
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Act1000
Act1000Act1000
Act1000
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 

Similar to A Meeting Master Picture for a Patent

MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of TrustProtecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Dan Griffin
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
Hai Nguyen
 

Similar to A Meeting Master Picture for a Patent (20)

Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
Document authentication system powered by assuretec
Document authentication system powered by assuretecDocument authentication system powered by assuretec
Document authentication system powered by assuretec
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of TrustProtecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
120 i143
120 i143120 i143
120 i143
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Mobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use CaseMobilized Secure Login - motionQR Use Case
Mobilized Secure Login - motionQR Use Case
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Intellectual Asset Protection - Case Study
Intellectual Asset Protection - Case StudyIntellectual Asset Protection - Case Study
Intellectual Asset Protection - Case Study
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 

More from Clarity Thinker

More from Clarity Thinker (20)

Negotiation "Getting to Yes"
Negotiation   "Getting to Yes" Negotiation   "Getting to Yes"
Negotiation "Getting to Yes"
 
The diplomatic moment - convergence model
The diplomatic moment - convergence modelThe diplomatic moment - convergence model
The diplomatic moment - convergence model
 
Eleven European Mystics by Rudolf Steiner
Eleven European Mystics by Rudolf SteinerEleven European Mystics by Rudolf Steiner
Eleven European Mystics by Rudolf Steiner
 
Healing into Immortality Course Outline
Healing into Immortality   Course OutlineHealing into Immortality   Course Outline
Healing into Immortality Course Outline
 
Closing the loop zeigarnik effect
Closing the loop    zeigarnik effect Closing the loop    zeigarnik effect
Closing the loop zeigarnik effect
 
Lost Origins Rediscovering Visual Thinking
Lost Origins   Rediscovering Visual ThinkingLost Origins   Rediscovering Visual Thinking
Lost Origins Rediscovering Visual Thinking
 
The power of information mapping to inform
The power of information mapping to informThe power of information mapping to inform
The power of information mapping to inform
 
Carl Jung and Squaring the Circle
Carl Jung and Squaring the CircleCarl Jung and Squaring the Circle
Carl Jung and Squaring the Circle
 
Video thrive society Module 7
Video thrive society  Module 7Video thrive society  Module 7
Video thrive society Module 7
 
Mindmap of the Facebook Advertising System
Mindmap of the Facebook Advertising SystemMindmap of the Facebook Advertising System
Mindmap of the Facebook Advertising System
 
Video Thrive Society Module 6
Video Thrive Society  Module 6Video Thrive Society  Module 6
Video Thrive Society Module 6
 
The Pyramid Pie and the 6 X 6 Rule
The Pyramid Pie and the 6 X 6 RuleThe Pyramid Pie and the 6 X 6 Rule
The Pyramid Pie and the 6 X 6 Rule
 
Video Thrive Society Module 6 Lesson 1
Video Thrive Society  Module 6   Lesson 1Video Thrive Society  Module 6   Lesson 1
Video Thrive Society Module 6 Lesson 1
 
Video Thrive Society Module 4
Video Thrive Society  Module 4Video Thrive Society  Module 4
Video Thrive Society Module 4
 
Video Thrive Society Module 3
Video Thrive Society  Module 3Video Thrive Society  Module 3
Video Thrive Society Module 3
 
Video Thrive Society Module 2
Video Thrive Society  Module 2Video Thrive Society  Module 2
Video Thrive Society Module 2
 
Video Thrive Society Module 1
Video Thrive Society Module 1Video Thrive Society Module 1
Video Thrive Society Module 1
 
Setting your sites on a New Self
Setting your sites on a New SelfSetting your sites on a New Self
Setting your sites on a New Self
 
Canvas in the caves
Canvas in the cavesCanvas in the caves
Canvas in the caves
 
Tai Chi Chuan: Unity in Motion
Tai Chi Chuan:    Unity in MotionTai Chi Chuan:    Unity in Motion
Tai Chi Chuan: Unity in Motion
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

A Meeting Master Picture for a Patent

  • 1. A MEETING MASTER PICTURE FOR A PATENT For the SPARC Security Device (SSD) “Smart SPARC Key” John Hipsley, California 2 July 2013
  • 2. MEETING OBJECTIVE Map the transaction process for a patented security process DISCLOSURE OF INVENTION AS DESCRIBED IN PATENT Methods and systems for operating a secure communication system 1) A security device 104 receives a request for a transaction from a programmable device 102 executing an application obtained from an application controlling institution (ACI) 101, and verifies the validity of the transaction. 2) A user is alerted; the user can indicate acceptance of the request. 3) A one-time identifier is generated by the security device 104. 4) The one-time identifier comprises a security device 104 identification and a one-time transaction number, and optionally comprises a date, a time, an ACI 101 identifier, and a subject matter field. 5) The one-time identifier is communicated to the programmable device 102, in which the application verifies the validity of the security device 104 identification, and instructs the programmable device 102 to communicate the one-time identifier and the transaction itself to the application controlling institution 101 for processing. 6) The application controlling institution 101 verifies the validity of the one-time identifier, 7) and, if valid, securely processes the transaction.
  • 3. OVERVIEW OF PATENT MAPPING OBJECTIVE • Create a flow chart illustrating how the Security Device (SSD) works The Security Device and its systems architecture, as defined in our patent, PREVENTS: • Use of lost and stolen devices • Overheard voice transmissions and • Downloading of fraudulent applications to phone or device • This is accomplished without the use of PINs, passwords or encryption. • The Security Device system is 100% compatible with the bank industry ISO track and data base architecture.
  • 4. Meeting – Who will be there? PATENT DESCRIPTION Dual Device System for Secure Financial Transactions & Data transmission 1 Patent attorney 4 Inventors 1+ Intellectual Property Licensing Specialist 1+ Investor(s) 1 Vivid Model Designer
  • 5. MAPPING OBJECTIVE Transform the verbal descriptions into visual images  What? The patented security device with near field communication capabilities” 104 – key  What? ANY programmable device 102 - mobile phone, smartcard, laptop  How Much? Automatically generated algorithm in specific sequence # - User Identification Number (sequence of numbers  Where? The application controlling institution (ACI) 101 – your bankng institution and financial card processor  When? Transaction completed when this number received on device (mobile phone)   - Approve or Deny the Financial transaction  How? - Meeting Master Picture  Why”? Ensure secure financial and data transactions - lock or unlock device
  • 6. The Meeting Master Patent Picture for SPARC Secure Payment Application Rewarding Causes