Method to search for affinities between subjects and relative apparatus
First Claim
1. A method to search for affinities between subjects, comprising the passages of:
- providing a certification authority that is able to act as a trustworthy subject in order to control divulgation of personal information of said subjects;
effecting a step of registering at least one user with said certification authority, wherein the registration involves memorizing, by the certification authority, a minimum set of said user'"'"'s personal information which cannot be divulged without authorization from said user himself;
effecting a step of receiving first information relating to said user and memorizing said first information in a portable electronic device of said user;
effecting a step of synthesizing said first information memorized in said portable electronic device by means of transmission to a user interface which provides to process said first memorized information;
effecting a step of encrypting said first information and memorizing said first encrypted information in said portable electronic device;
effecting a step of disseminating said first encrypted information to other portable electronic devices in geographical proximity;
effecting a step of collecting second encrypted information relating to other users registered in said certification authority, sent by other portable electronic devices in geographical proximity;
effecting a step of decrypting said first and second information encrypted, wherein said first and second encrypted information are sent to the certification authority and temporarily memorized therein and wherein the decryption is exclusively effected at said certification authority and wherein the certification authority verifies the authenticity of the data received and the non-falsifiable association with the user who generated said data;
effecting a step of processing and analyzing said first and second decrypted information, in order to identify affinities between said first and second information, at said certification authority;
effecting a step of notifying said affinities, by means of said certification authority, wherein the step of notifying involves signaling the affinity to the users, allowing them to decide whether to reciprocally reveal their identities and wherein the first and second information are canceled and not kept by the certification authority after notification of said affinities.
1 Assignment
0 Petitions
Accused Products
Abstract
A method to search for affinities between subjects comprises registering a user with a certification authority, receiving first information relating to the user, memorizing the first information in a portable electronic device of the user, and synthesizing the first information by transmitting it to a user interface which processes the first information memorized. The method also comprises encrypting the first information and memorizing the first information encrypted in the portable electronic device, disseminating the first encrypted information to other portable electronic devices in geographical proximity, collecting second encrypted information relating to other users, sent from other portable electronic devices in geographical proximity and decrypting the first and second information encrypted at the certification authority. Finally, the method provides for processing and analyzing the first and second decrypted information, in order to identify affinities between them, at the certification authority, and notifying the affinities, by the certification authority.
17 Citations
10 Claims
-
1. A method to search for affinities between subjects, comprising the passages of:
-
providing a certification authority that is able to act as a trustworthy subject in order to control divulgation of personal information of said subjects; effecting a step of registering at least one user with said certification authority, wherein the registration involves memorizing, by the certification authority, a minimum set of said user'"'"'s personal information which cannot be divulged without authorization from said user himself; effecting a step of receiving first information relating to said user and memorizing said first information in a portable electronic device of said user; effecting a step of synthesizing said first information memorized in said portable electronic device by means of transmission to a user interface which provides to process said first memorized information; effecting a step of encrypting said first information and memorizing said first encrypted information in said portable electronic device; effecting a step of disseminating said first encrypted information to other portable electronic devices in geographical proximity; effecting a step of collecting second encrypted information relating to other users registered in said certification authority, sent by other portable electronic devices in geographical proximity; effecting a step of decrypting said first and second information encrypted, wherein said first and second encrypted information are sent to the certification authority and temporarily memorized therein and wherein the decryption is exclusively effected at said certification authority and wherein the certification authority verifies the authenticity of the data received and the non-falsifiable association with the user who generated said data; effecting a step of processing and analyzing said first and second decrypted information, in order to identify affinities between said first and second information, at said certification authority; effecting a step of notifying said affinities, by means of said certification authority, wherein the step of notifying involves signaling the affinity to the users, allowing them to decide whether to reciprocally reveal their identities and wherein the first and second information are canceled and not kept by the certification authority after notification of said affinities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method to search for affinities between subjects who use a service for sharing vehicles, or car pooling, comprising the passages of:
-
providing a certification authority that is able to act as a trustworthy subject in order to control divulgation of personal information of said subjects; effecting a registration of each user with the certification authority wherein the registration involves memorizing, by the certification authority, a minimum set of said user'"'"'s personal information which cannot be divulged without authorization from said user himself; defining the user'"'"'s average route or datatrip and memorizing the route defined in a portable electronic device of each user; transferring uncoded the defined route, relating to a specific user, from the specific user'"'"'s portable electronic device to a user interface, again of the specific user, connected via Internet to said certification authority; encrypting, uncoded, the specific user'"'"'s route, by means of said user interface; transmitting the encrypted route from the user interface to the relative portable electronic device of the specific user and subsequently from the latter to other portable electronic devices of other users, registered in said certification authority, in geographic proximity; transmitting and sharing, due to proximity, the encrypted routes among the portable electronic devices of the users in geographic proximity; transmitting the encrypted route of the specific user from the user interface to the certification authority, via Internet, and the encrypted routes received from said other users from the portable electronic device of the specific user to the user interface of the same user and from this to the certification authority, again via Internet, wherein the encrypted routes are temporarily memorized in said certification authority; decrypting the encrypted routes, exclusively at the certification authority, both of the specific user and of the other users, and processing and evaluating potential compatibility of datatrips and vehicle pooling, wherein the certification authority verifies the authenticity of the data received and the non-falsifiable association with the user who generated said data; notifying users of the existence of potential compatibility of datatrips and vehicle pooling, based on the previous evaluation of potential compatibility; effecting a step of specific consent or dissent from the user interested in sharing his/her personal information with the users for whom the potential datatrip compatibility has been verified; canceling the decrypted routes memorized at the certification authority.
-
Specification