최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0018756 (2013-09-05) |
등록번호 | US-9208346 (2015-12-08) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 513 |
A persona-notitia intellection codifier (P-NIC) server intelligently codifies and disburses personal user information from a user device (smartphone, laptop, etc.) to a multiplicity of designee devices. Masking Persona-Notitia Intellection Codes (a.k.a. PICs) are created that each stipulate control(
A persona-notitia intellection codifier (P-NIC) server intelligently codifies and disburses personal user information from a user device (smartphone, laptop, etc.) to a multiplicity of designee devices. Masking Persona-Notitia Intellection Codes (a.k.a. PICs) are created that each stipulate control(s) and parametric limitation(s) for the associated one of a variety of personal user information. The Persona-Notitia Intellection Codifier (P-NIC) server rapidly produces a mask comprising a multiple bit “key” value (i.e., a persona-notitia intellection code (PIC)) that is uniquely distinguishable from every other PIC that's ever been generated for a given user. The value of the PIC is typically many bytes in length, and associates attributes to a unique key value that describes a desired subset of all the user's available personal user information to be unlocked by the key value (i.e., by the PIC).
1. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user informati
1. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;decrypting said PIC code into association with particular personal user information including a requested social networking identity for said given user; andproviding said social networking identity for said given user to a requesting device from which said PIC code is received. 2. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein: said code is numerous bytes in length. 3. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: an identity of said given user. 4. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: a personal finance account number of said given user. 5. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: a presence of a given user device. 6. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: a phone number of a given user device. 7. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: an email address of a given user device. 8. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: an instant messenger address of a given user. 9. The method of isolating a nature of personal user information from unauthorized devices according to claim 1, wherein said isolated personal user information comprises: a mailing address of a given user. 10. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;decrypting said PIC code into association with isolated personal user information including a level of accuracy of device location to be reported for said given user; andproviding said particular personal user information to a requesting device from which said PIC code is received. 11. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;decrypting said PIC code into association with isolated personal user information including an identity of a vehicle relating to a given user; andproviding said particular personal user information to a requesting device from which said PIC code is received. 12. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;decrypting said PIC code into association with isolated personal user information including an identity of a relative of a given user; andproviding said particular personal user information to a requesting device from which said PIC code is received. 13. A method of isolating a nature of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;decrypting said PIC code into association with isolated personal user information including an identity of a friend of a given user; andproviding said particular personal user information to a requesting device from which said PIC code is received. 14. A method of isolating a nature of personal user information from unauthorized devices, comprising: obtaining personal user information including a level of accuracy of device location to be reported for relating to a given user;encrypting a PIC code into a mapped association with said obtained personal user information relating to said given user, said PIC code not including any indication as to a nature of what personal user information is associated therewith; andproviding said personal user information only to a requesting device that provides said encrypted PIC code. 15. A method of isolating the use of personal user information from unauthorized devices, comprising: receiving a PIC code uniquely associated with a given user for which personal user information is requested, said PIC code not including any indication as to a nature of what personal user information is associated therewith;utilizing said PIC code to identify requested particular personal user information including comparing time of request to time said information is allowed to be accessed as identified by said given user; andproviding said particular personal user information to a requesting device from which said PIC code is received.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.