Method and Apparatus for Passive Authentication of an Individual&#39;s Geo-Location Via a Communication Network and for User Authenticating Images, Video, Social Media Check in And Social Media Content

ABSTRACT

An geo-locations software management utility provides a method and system for passive authentication of an individual&#39;s geo-location via a communication network and for user authenticating images and video and social media content. Applications using the same are disclosed.

RELATED APPLICATIONS

This application claims priority to U.S. Patent Application Ser. No. 62/679,041 filed Jun. 3, 2018, titled Method and Apparatus for Passive Authentication of an Individual's Geo-Location via a Communication Network and for User Authenticating Images and Video and Social Media Check In and Social Media Content and Applications Using the Same” which application is incorporated herein by reference in its entirety.

This application is a continuation in part of U.S. patent application Ser. No. 15/790,328 filed Oct. 23, 2017 titled “Method and System for Authenticating an Individual's Geolocation Via a Communications Network and Applications Using the Same” which application is incorporated herein by reference in its entirety.

Application Ser. No. 15/790,328 is a continuation in part of U.S. patent application Ser. No. 14/699,460 filed Apr. 29, 2015 and which published Jan. 21, 2016 as United States Patent Application Publication Number 2016-0021535 and which issued as U.S. Pat. No. 9,801,058 on Oct. 24, 2017, which publication and patent are incorporated herein by reference in their entireties.

U.S. patent application Ser. No. 14/699,460 claims priority to U.S. Patent Application Ser. No. 61/985,693 filed Apr. 29, 2014, titled “Method and System for Accessing, Acquiring, Storing and Managing each Individual's Geo-Location Position Data via a Communication Network Providing an Internet of Things Geo-Location Software Management Utility” which application is incorporated herein by reference in its entirety.

BACKGROUND INFORMATION 1. Field of the Invention

The present invention relates to geo-locations software management utility. Specifically the present invention provides a method and system for a for passive authentication of an individual's geo-location via a communication network and for user authenticating images and video and social media check in and social media content.

2. Background Information

The term smartphone (or smartphone) is a mobile phone with an advanced mobile operating system which typically combines the features of a cell phone with those of other popular mobile devices, such as personal digital assistant (PDA), media players and GPS navigation units. Most smartphones have a touch screen user interface and can run third-party applications (apps), and are camera phones and audio recorders. Generally since at least 2012, smartphones have high-speed mobile broadband 4G LTE internet web browsing, motion sensors, and mobile payment mechanisms. In 2014, sales of smartphones worldwide topped 1.2 billion, which is almost a 30% increase from sales of 2013.

GPS, or global positioning satellite, is a satellite-based navigation system used to give exact location and time information anywhere on Earth. The system is maintained by the U.S. government and is accessible, free of charge, to anyone with a GPS receiver. Consumers have become increasingly reliant on GPS receivers for navigation while driving, as well as while biking and walking.

Originally, standalone GPS units, also known as personal navigation devices, were the only option available to consumers who wanted to take advantage of GPS technology. However, now that almost every current smartphone comes with a built-in GPS receiver, smartphones have largely replaced standalone units as consumers generally have found it is more convenient to just use their phones as navigation tools rather than bother with a separate standalone GPS unit. The smartphone GPS navigation apps are a subset of what can be considered broader geo-locations data management systems.

Smartphone GPS navigation apps gets frequent, automatic updates, meaning all the latest maps will always be on-hand and having the most current updates is invaluable when searching for points of interest along an unknown route, or when trying to re-route around heavy traffic. Using a smartphone as a GPS receiver taps into the idea of a smartphone as an all-in-one device. Many smartphone users always have their phones with them such that they will always have a GPS navigation tool on-hand. Smartphones are designed to be easily held in one hand, and thus are often the preferred choice for navigation while walking or biking. Smartphone GPS navigation apps not only have the ability to provide real-time traffic detection and avoidance, but can provide other services such as check gas prices. Additionally, the ability to call a business or tourist attraction to check hours and rates with a simple tap is one more advantage of using smartphone GPS navigation apps.

Smartphone GPS navigation apps allow for easy address entry. Smartphones allow users to look up a contact in their phone's address book and then navigate to that address without any additional typing. Also, addresses found via a smartphone Internet search or through another application can be sent directly to the GPS navigation app.

Current geo-locations data management systems such as the smartphone GPS based navigation apps are based on pinpointing the location of each individual's smartphone using the global positioning system (GPS) however, the geo-location position captured at any particular time does not confirm that the individual user (often owner) of the smartphone was also present at the time the geo-location position of their smartphone was captured. Furthermore, the data captured of the individual's location does not guarantee that this individual is the sole and unique owner of the smartphone used. It is one object of the present invention to address these deficiencies of the existing prior art.

SUMMARY OF THE INVENTION

This invention is directed to a cost effective, efficient, method and system for passively authenticating, accessing, acquiring, storing and managing each individual's geo-location position data via a communication networks. More precisely this invention is directed to a cost effective, efficient, method and system for authenticating, accessing, acquiring, storing and managing each individual's geo-location position data via a communication networks and private blockchain networks, the storing of the data on the private blockchain network, and the rendering of the stored data on the private blockchain available to be consumed as goods and services on the blockchain.

The method and associated system for authenticating an individual's geo-location via a communication network of one aspect of the invention provides wherein the biometric user identification technology utilizes the individual's electrocardiogram as a biometric characteristic that is unique to each human. The passive biometric user identification technology may effectively utilize a wristband worn by the individual for passive biometric user identification and wherein the wristband is wirelessly coupled to the smartphone. The biometric user identification technology thus may effectively utilize a wristband obtaining the individual's electrocardiogram with the wristband communicating with the smartphone.

The method for authenticating an individual's geo-location via a communication network of one aspect of the invention may further include recording the individual's authenticated geo-locations for at least a period of time, wherein during recording of the individual's authenticated geo-locations, the method may include recording any periods when the individual's geo-location cannot be authenticated. Periods when the individual's geo-location cannot be authenticated include when the biometric characteristics obtained by the biometric user identification technology fail to identify the user and when the biometric user identification technology is not within a preset proximity to the smartphone.

The method for authenticating an individual's geo-location via a communication network of one aspect of the invention provides wherein method includes incorporating user defined restricted areas for the individual. The restricted areas could be areas in which the individual must remain and operate (e.g., authorized work zones, house arrest limitations, school boundaries), or it could be areas that the individual is prevented from entering (e.g., restricted/high security areas, restraining order limitations) or both. The method may include the step of sending a warning message to the individual when the individual is approaching a boundary of the user defined restricted area. It is worthwhile to note that “approaching a boundary” is broadly defined in this application as it is intended to encompass both coming close to a restricted area or leaving a defined work area. Further it should be understood that the user defined areas may vary by time and/or by individual.

The method for authenticating an individual's geo-location via a communication network of one aspect of the invention may provide wherein a single user is authenticating multiple individual's geo-locations.

The method for authenticating an individual's geo-location via a communication network of one aspect of the invention may further include cross-checking the authenticated individual's geo-location with location based check-in data from location based platforms to further validate as proof-of-presence the geo-location data of the individual's presence at a certain location. The method may further include identifying any anomalous results between the authenticated individual's geo-location and the location based check-in data from location based platforms.

The method for authenticating an individual's geo-location via a communication network of one aspect of the present invention may further include marking recordings, such as pictures, videos or audio recordings, taken with the individual smartphone with the geo-location where the image was taken, the time the image was taken, and the authenticated geo-location data of the individual when and where the image was taken. The method will allow for authentication of any image, video, audio recording and/or sensor reading recorded by the smartphone to verify the individual making the record via the smartphone and their location, if needed. The biometric user identification technology in this context may be implemented as a fingerprint scan on the smartphone, and this technology may be made “passive” by implementing the fingerprint scan simultaneous with the implementing of the recording on the smartphone.

The method for authenticating an individual's geo-location via a communication network of one aspect of the invention further includes limiting access to at least some of the smartphone applications, e.g. banking applications, to the individual as verified by the biometric user identification technology. The method may further provide wherein the step of limiting access to at least some of the smartphone applications to the individual as verified by the biometric user identification technology includes limited access to at least some of the smartphone applications when the individual and the smartphone are within pre-defined geo-locations. For example, a bank ATM may utilize and interact with the smartphone of the individual to quickly and safely access a proper individual's account and the bank ATM may further verify the identity of the individual both with the biometric technology and by the presence of the phone and individual at the designated ATM geo-location, thereby passively providing a high level of security. The biometric user identification technology in this context may be implemented as a fingerprint scan on the smartphone, and this technology may be made “passive” by implementing the fingerprint scan simultaneous with the opening of and/or performing a designated function within an associated banking application on the smartphone.

The method for authenticating an individual's geo-location via a communication network of the present invention provides wherein the individual owner of the smartphone interacts with Internet-Of-Things devices. The biometric user identification technology in this context may be implemented as a fingerprint scan on the smartphone, and this technology may be made “passive” by implementing the fingerprint scan simultaneous with the opening of and/or performing a designated function within an associated ITO device application on the smartphone.

One aspect of this invention is passive geoauthentication system using a phones camera system coupled with fingerprint scanning to have the finger scan be activated with the same motion/user action as taking the picture. This is not just for passive geoauthentication, but can be implemented for passively authenticating images and video (or audio or other sensor activations) taken with the phone outside of geoauthentication. In practice some smartphones already allow the user to unlock the phone with stored fingerprint biometrics. The present invention implements this technology into the camera and/or video application on the phone as the method of activating the camera for still pictures or video recording. Thus when the user selects the camera application on the phone the activation to take a picture or begin recording will be to press a finger (or thumb) onto the screen wherein the phone can scan the finger and verify the user's biometric and simultaneously operate the camera for taking an image or recording a video. This biometric can be used to authenticate the geoposition of the user as identified in this application. Additionally the image or video recording can be authenticated or verified and appropriately marked regarding the verified author, regardless of whether the users geolocation is also identified on the image or recording. This can be very valuable for providing verified authorship to images and video recordings. It should be apparent that the same concept is applicable to audio recordings as well wherein the user actuates the recording and authenticates the user with a biometric, namely finger scan.

The system and method may be described as relating to a comprehensive geo-location software management utility and includes a wristband equipped with a digital ECG wireless transmitter, a secured user-to-smartphone unique cardiac rhythms identification access system, a cellular network, a storage network, a database and online software as a service application. The present invention system and method secures that the both the individual, e.g. the owner of the smartphone, and the associated smartphone were both present at same geo-location position of the smartphone through global positioning system (GPS) when the data was captured and logged-in in to the database by the geo-location software management utility. Furthermore, the present system and method secures that the smartphone used when the data was captured indeed belongs to the individual at the time the geo-location position GPS of the smartphone was captured and logged-in.

The method for authenticating an individual's geo-location via a communication network, a private blockchain network, A Dapp, smart contracts, tokens, a distributed file sharing called swarm of one aspect of the invention may further include recording the individual's authenticated geo-locations for at least a period of time on the private blockchain, wherein during recording of the individual's authenticated geo-locations, the method may include recording any periods when the individual's geo-location cannot be authenticated. Periods when the individual's geo-location cannot be authenticated include when the biometric characteristics obtained by the biometric user identification technology fail to identify the user and when the biometric user identification technology is not within a preset proximity to the smartphone.

The method for authenticating an individual's geo-location via a communication network, a private blockchain network, A Dapp, smart contracts, tokens, a distributed file sharing called swarm of one aspect of the invention may further include integrating and writing on the blockchain the authenticated individual's geo-location with location based social networks data (e.g., FACEBOOK®, FOURSQUARE®, etc) as proof-of-presence of the individual in the location based social network data.

The system and method may be described as relating to a comprehensive geo-location software management utility and includes a wristband equipped with a digital ECG wireless transmitter, a secured user-to-smartphone unique cardiac rhythms identification access system, a cellular network, a storage network, a private blockchain database network, A Dapp, smart contracts, tokens, a distributed file sharing called swarm, an online software as a service application. The present invention system and method secures that the both the individual, e.g. the owner of the smartphone, and the associated smartphone were both present at same geo-location position of the smartphone through global positioning system (GPS) when the data was captured and logged-in in to the private blockchain database by the blockchain geo-location smart contract software management utility. Furthermore, the present system and method secures that the smartphone used when the data was captured and written to the blockchain indeed belongs to the individual at the time the geo-location position GPS of the smartphone was captured and logged-in.

These and other aspects of the present invention will be clarified in the description of the preferred embodiment of the present invention described below in connection with the attached figures in which like reference numerals represent like elements throughout.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of a system for authenticating an individual's geo-location via a communication network in accordance with one aspect of the present invention;

FIG. 2 is a schematic diagram of an individual to smartphone distance management layer of the system of FIG. 1;

FIG. 3 is a schematic diagram of a ECG signal ID management layer of the system of FIG. 1;

FIG. 4 is a schematic diagram of a geo-location application login session management layer of the system of FIG. 1;

FIG. 5 is a schematic diagram of a process for verifying the same location of the individual and their smartphone of the system of FIG. 1;

FIG. 6 is a schematic diagram of a process for communication between an individual's smartphone geo-location utility and geo-location Saas networks of the system of FIG. 1;

FIG. 7 is a schematic diagram of a process for communication of Smartphone to address geo-position identification and warning in accordance with one aspect of the system of FIG. 1;

FIG. 8 is a schematic diagram of a process for communication of Smartphone to smartphone(s) geo-position identification and warning in accordance with one aspect of the system of FIG. 1;

FIG. 9 is a schematic diagram of a process for communication of Smartphone to perimeter geo-position identification and warning in accordance with one aspect of the system of FIG. 1;

FIG. 10 is a schematic diagram of a process for Individual to social networks data integrations in accordance with one aspect of the system of FIG. 1;

FIG. 11 is a schematic diagram of aspects of the geo-location software utility in accordance with one aspect of the system of FIG. 1;

FIG. 12 is a schematic diagram of aspects of a geo-location internet of things utility in accordance with one aspect of the system of FIG. 1;

FIG. 13 is a schematic diagram of a Private Blockchain incorporating an individual's authenticated geo-locations data in accordance with one aspect of the present invention;

BRIEF DESCRIPTION OF THE PREFERRED EMBODIMENTS

As discussed above the present invention relates to user geo-location software and also to an on the blockchain geo-locations software management utility. Specifically the present invention provides a method and system for storing an individual's geo-location via a communication network, and may further include incorporation into a private blockchain network, and applications using the same. The details and operation of private blockchain networks are known in general in the art. The revolutionary aspects of blockchain technology is commonly being touted, but they still suffer from the “garbage in-garbage out” problem. The application of, or incorporation of, user geo-location software of the present invention with a blockchain network is further detailed in co pending application PCT/US18/66754, which application is incorporated herein by reference, and this helps verify user inputs into a blockchain network.

The blockchain networks should be briefly discussed herein. As an example, a bank or credit card processing company may wish to validate that a bank transaction that is actually taking place is indeed being carried by the person holder of the credit card. The present invention systems and method in this case scenario shows how the communications network, the private blockchain and the token software management issues a token access for the bank or associated company to use and points to the private blockchain where the individual of concern's geo-location certified data by the individual's heart signature is located. Once the validation of the individual's geo-location takes place the bank or processing company then can approve or deny the transaction. Thus the token will be used as virtual ticket or access pass to a private blockchain to exploit an authenticated geolocation service.

Smart contracts allow anonymous parties to enter into binding agreements, with each participant having full transparency on the deal being made. Value can be transferred between accounts or held in escrow inside the smart contract itself. As the contract is just code, the application is only limited by the developer's imagination. Thus the present invention may be utilized to help create, execute and/or defines a smart contract on the private blockchain network between the banks, the courts, the lawyers and other entities for an exchange of bitcoin for an access pass to exploit our authenticated geolocation services verified using heart rate wristband biometrics (or other biometrics) tethering the individual to their smartphones as proof-of-presence of their location at a point of time.

As well known, blockchains can be used for a wide variety of applications, such as tracking ownership or the provenance of documents, digital assets, physical assets or voting rights and in our present invention to store the individual's heart rate signature along with the individual's geo-location verified by the wristband tethered to the smartphone. Blockchain technology was popularized by the Bitcoin digital currency system, but, essentially, a blockchain is just a special kind of database. So the blockchain system has been designed to use nodes agreement to order transactions and prevent fraud described.

Geoposition Authentication

This invention is directed in some aspects to a cost effective, efficient, system 10 for authenticating accessing, acquiring, storing and managing the geo-location position data of each individual 12 via a communication network 14 associated with the individual's smartphone 20, which includes a GPS receiving unit. The system 10 uses a biometric user identification technology, preferably passive biometric user identification technology, and in one preferred embodiment a continuous and passive wristband based electrocardiogram 30.

There are many types of biometric user identification technologies, but there are several types that are most commonly used. Biometric user identification is basically the recognition of human characteristics that are unique to each human, which can include fingerprints, hand geometry, retinal scanning, iris scanning, facial recognition, vein pattern, voice recognition, DNA, electrocardiograms, and more.

FINGERPRINT TECHNOLOGY—Fingerprint identification techniques fall into two major categories—Automated Fingerprint Identification Systems (AFIS) and fingerprint recognition systems. AFIS is typically restricted to law-enforcement use. Fingerprint recognition derives a unique template from the attributes of the fingerprint without storing the image itself or even allowing for its reconstruction. Fingerprint recognition for identification acquires the initial image through live scan of the finger by direct contact with a reader device that can also check for validating attributes such as temperature and pulse. Since the finger actually touches the scanning device, the surface can become oily and cloudy after repeated use and reduce the sensitivity and reliability of optical scanners. Solid state sensors overcome this and other technical hurdles because the coated silicon chip itself is the sensor. Solid state devices use electrical capacitance to sense the ridges of the fingerprint and create a compact digital image, so they are less sensitive to dirt and oils. Fingerprint recognition is generally considered reliable and readers are in commercial use, and some vendors have actively marketed readers as part of Local Area Network login schemes.

HAND GEOMETRY—The essence of hand geometry is the comparative dimensions of fingers and the locations of joints. One of the earliest automated biometric systems, INDENTIMAT, installed at the Shearson-Hamill investment bank on Wall St. during the late 60s, used hand geometry and stayed in production for almost twenty years. Some systems perform simple, two-dimensional measurements of the palm of the hand. Others attempt to construct a simple three-dimensional image from which to extract template characteristics. In one of the most popular descendants of the IDENTIMAT system, a small digital camera captures top and side images of the hand. Reference marks on a platen allow calibration of the image to improve the precision of matching.

RETINAL SCAN—Retinal recognition creates an “eye signature” from the vascular configuration of the retina, an extremely consistent and reliable attribute with the advantage of being protected inside the eye itself. An image of the retina is captured by having the individual look through a lens at an alignment target. Diseases or injuries that would interfere with the retina are comparatively rare in the general population, so the attribute normally remains both consistent and consistently available.

IRIS SCANNING—Iris scanning is less intrusive than retinal recognition because the iris is easily visible from several feet away. Responses of the iris to changes in light can provide secondary verification that the iris presented as a biometric factor is genuine. A balance of light, focus, resolution, and contrast can be necessary (depending upon the scanner) to extract the attributes or minutiae from the localized image. It is noteworthy that while the iris seems to be consistent throughout adulthood, it does vary somewhat up to adolescence.

FACIAL RECOGNITION—Face recognition technology has made substantial advances in the last few years. Acquisition for biometric identification purposes generally requires the individual's face to be presented to a video camera. A facial thermogram works much like face recognition except that the image is captured by way of an infrared camera, and the heat signature of the face is used to create the biometric template used for matching.

VEIN PATTERN—Hand vein recognition attempts to distinguish individuals by measuring the differences in subcutaneous features of the hand using infrared imaging. Like face recognition, it must deal with the extra issues of three-dimensional space and the orientation of the hand. Like retinal scanning, it relies on the pattern of the veins in the hand to build a template with which to attempt matches against templates stored in a database. The use of infrared imaging offers some of the same advantages as hand geometry over fingerprint recognition in manufacturing or shop-floor applications where hands may not be clean enough to scan properly using a conventional video or capacitance technique.

VOICE RECOGNITION—Voice recognition techniques are generally categorized according to two approaches—Automatic Speaker Verification (ASV) and Automatic Speaker Identification (ASI). Speaker verification uses voice as the authenticating attribute in a two-factor scenario. Speaker identification attempts to use voice to identify who an individual actually is. Voice recognition distinguishes an individual by matching particular voice traits against templates stored in a database. Voice systems must be trained to the individual's voice at enrollment time, and more than one enrollment session is often necessary. Feature extraction typically measures formants or sound characteristics unique to each person's vocal tract. The pattern matching algorithms used in voice recognition are similar to those used in face recognition.

DNA—DNA is the gold standard of biometric user identification, but presently there is no efficient scanner to provide practical real time results.

ELECTROCARDIOGRAMS—Electrocardiograms (ECG also called EKG—from Greek with “kardia” meaning heart) are records of electrical currents generated by the beating heart, and have been found to be a distinctive identifying human characteristic, since ECG waveforms and other properties of the ECG depend on the anatomic features of the human heart and body. It has been suggested that the use ECG for biometric identification is supported by the fact that the physiological and geometrical differences of the heart in different individuals display certain identifiable uniqueness in their ECG signals. See “Biometric human identification based on electrocardiogram.” [Master's thesis of Lugovaya T. S.] Faculty of Computing Technologies and Informatics, Electrotechnical University, Saint-Petersburg, Russian Federation, June 2005. See also Biometric human identification based on electrocardiogram. Nemirko A. P., Lugovaya T. S. Proc. XII-th Russian Conference on Mathematical Methods of Pattern Recognition, Moscow, MAKS Press, 2005, pp. 387-390. See also Biometric Identification System Based on Electrocardiogram Data by Y. Gahi, et al University of Ontario Institute of Technology, 2000 Simcoe Street North, Oshawa, Ontario, Canada. L1 H 7K4, 2008. For a systematic review and discussion of the current associated methods and the techniques that have been applied to the use of the electrocardiogram for biometric recognition see ECG Biometric Recognition: A Comparative Analysis by Odinaka, I and Preston M. Green in Information Forensics and Security, IEEE Transactions on (Volume: 7, Issue: 6) Biometrics Compendium, IEEE, Pgs. 1812-1824, 2012.

Although traditional ECGs have been through the chest of the user other application sites are known. For example, a finger based ECG has been disclosed and implemented, see Unveiling the Biometric Potential of Finger-Based ECG Signals by Andre{acute over ( )} Lourenço, Hugo Silva, and Ana Fred, Computational Intelligence and Neuroscience Volume 2011 (2011), Article ID 720971. The present invention prefers to utilize a wrist based ECG acquisition unit 30 as described below. A suitable ECG device is the biometric ECG bracelet manufactured by Bionym, although others have proposed such devices. The wrist worn ECG 30 is one preferred biometric identification technology because it is passive and monitors effectively continuously. It is passive as it does not require the user to take a scanning step like placing a finger or hand or face within a scanning perimeter, the user merely needs to put on the bracelet 30 (or other implementing device). The unit 30 is continuous as it can regularly perform an ECG at defined intervals (e.g. every 10 seconds) in an automated fashion.

In certain implementations the finger scan technology can be made “passive”, namely where the finger scan is combined with actuation of some other activity on the smartphone, thus “eliminating” the extra scanning step. For example, the if the video camera on the smartphone 20 is actuated (with user authentication to be added to the recording) with a user's finger pressed onto the screen which simultaneously i) operates the camera to take an image or begin a recording and ii) performs a biometric finger scan; then in this context the biometric identification is deemed passive because there is no added scanning step because it has been integrated into another action already required by the user.

The alternative biometric user identification technologies discussed above could be implemented into the system with the addition of an associated scanner (which scanners are, outside of DNA, already commercially available), however the alternative biometric user identification technologies will generally require an active authentication step by the user (allowing a retinal scan, iris scan, hand scan or facial scan, speaking for a voice sample) and can limit the automatic authentication further than is available with the continuous passive monitoring of the wrist worn ECG 30.

As a broad overview, one embodiment of the present invention provides a system 10 for authenticating a geo-location of an individual 12 via a communication network 14 comprising a) a smartphone 20 having a GPS receiving unit, generally 28, associated with a communications network 14, wherein the system 10 is configured to obtain via the communications network 14 the geo-location of the smartphone 20 utilizing the GPS receiving unit 28; and b) a biometric user identification technology in the form of ECG bracelet 30 worn by the individual configured to obtain biometric characteristics that are unique to each human, wherein the system 10 is configured to identify, generally at 32, the individual 12 with the biometric user identification technology of ECG bracelet 30 and to verify the biometric user identification technology of ECG bracelet 30 is within a preset proximity, generally at 34, to the smartphone 20 to authenticate the individual's geo-location, generally at 36.

A broad overview of the method of the present invention is that the invention provides a method for authenticating the geo-location of an individual 12 via a communication network 14 comprising the steps of: a) providing an individual 12 with a smartphone 20 having a GPS receiving unit (generally 28) associated with a communications network 14; b) providing the individual 12 with a biometric user identification technology, such as ECG bracelet 30; c) obtaining via the communications network 14 the geo-location of the smartphone 20 utilizing the GPS receiving unit 28; d) identifying at 32 the individual 12 with the biometric user identification technology formed by ECG bracelet 30 by obtaining biometric characteristics that are unique to each human; and e) verifying at 34 the biometric user identification technology of ECG bracelet 30 is within a preset proximity to the smartphone 12 to authenticate the individual's geo-location at 36.

Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention may further include recording, possibly at a remote service provider 42, the individual's authenticated geo-locations for at least a period of time, wherein during recording of the individual's authenticated geo-locations, the method may include recording any periods when the individual's geo-location cannot be authenticated. Periods when the individual's geo-location cannot be authenticated include when the biometric characteristics obtained by the biometric user identification technology fail to identify the individual and when the biometric user identification technology is not within a preset proximity to the smartphone 20.

Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention provides wherein system 10 includes incorporating user defined restricted areas for the individual. The restricted areas could be areas in which the individual must remain and operate (e.g., authorized work zones, house arrest limitations, school boundaries), or it could be areas that the individual is prevented from entering (e.g., restricted/high security areas, restraining order limitations) or both. The system may include sending a warning message to the individual when the individual is approaching a boundary of the user defined restricted area. As noted above, “approaching a boundary” is broadly defined in this application as it is intended to encompass both coming close to a restricted area or leaving a defined work area. Further it should be understood that the user defined areas may vary by time and/or by individual.

Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention may provide wherein a single user, such as a service provider 42 is authenticating multiple individual's geo-locations. Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention may further include a system 10 which integrates the authenticated individual's geo-location with location based social networks data (e.g., FACEBOOK®, FOURSQUARE®, etc) as proof-of-presence of the individual in the location based social network data, and for managing and/or authenticating images and videos and recordings posted by the individual user 12.

Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention may further include cross-checking the authenticated individual's geo-location with location based check-in data from location based platforms to further validate as proof-of-presence the geo-location data of the individual's presence at a certain location. The system 10 may further include identifying any anomalous results between the authenticated individual's geo-location and the location based check-in data from location based platforms.

The system 10 for authenticating an individual's geo-location via a communication network 14 of one aspect of the present invention may further include marking recordings, such as pictures, videos or audio recordings, taken with the individual smartphone 20 with the geo-location where the image was taken, the time the image was taken, and the authenticated geo-location data of the individual 12 when and where the recording (image or the like) was taken. The system 10 will allow for authentication of any image, video, audio recording and/or sensor reading recorded by the smartphone 20 to verify the location and individual 12 making the record via the smartphone 20. In this implementation of the present invention a passive biometric user identification technology may be a fingerprint scan on the user smartphone 20, wherein the scan is integrated into the video or image or recording actuation on the smartphone 20. Several commercial smartphones already incorporate such scanning for user access (AKA “unlocking the phone”) and thus the present invention merely integrates this scan with the signal to begin recording or take an image. The recording can have the authenticating information incorporated therewith. This can be used for managing social media as well. With the authentication the recording (image or video or the like) can be linked to an individuals desired social media and uploaded with a quick swipe of the finger. It is anticipated that a single phone 20 may have several authorized users, with each user being able to seamlessly couple and upload authenticated images to their respective social media accounts.

Authenticating an individual's geo-location via a communication network 14 of one aspect of the invention may further include limiting access to at least some of the smartphone 20 applications, e.g. banking applications, to the individual 12 as verified by the biometric user identification technology of the ECG bracelet 30 or other biometric user identification technology. The system 10 may further provide wherein the limiting access to at least some of the smartphone applications to the individual 12 as verified by the biometric user identification technology includes limited access to at least some of the smartphone applications when the individual 12 and the smartphone 20 are within pre-defined geo-locations. For example, a bank ATM may utilize and interact with the smartphone 20 of the individual 12 to quickly and safely access a proper individual's account and the bank ATM may further verify the identity of the individual 12 both with the biometric technology of the ECG bracelet 30 or other biometric technology and by the presence of the phone 20 and individual 12 at the pre-designated ATM geo-location, thereby passively providing a high level of security. In this application the bracelet 30 and a fingerprint scan can yield passive authentication. The fingerprint scan can be made passive where it is integrated into another function such as actuating an App on the phone 20 or conducting a transaction on the phone 20 within such and application.

Authenticating an individual's geo-location via a communication network 14 with the system 10 provides wherein the individual owner of the smartphone interacts with Internet-Of-Things devices 61. All of these aspects will be described further below.

The system 10 and method may be described as relating to a comprehensive web3.0 software utility, an Internet of Things (IoT) geo-locations software management utility via a communication network 14 and includes a ECG wristband 30 (with Bluetooth transmitter) that an individual 12 wears on his/her wrist, a secured user-to-smartphone identification access management system, a cellular network 14, a storage network, a database and an online software as a service application provider 42. More simply, the present invention deals with securing that both the individual 12 and the smartphone 20 are always present at the same geo-location at the time the geo-location of the smartphone 20 via (GPS) position is captured and logged-in by the geo-location software into the database via a communications network 14 as schematically illustrated in FIG. 1.

In order to determine that both the individual 12 (sometimes who may be the owner of the smartphone 20) and the smartphone 20 are, were both present at the same geo-location position, the individual must wear a wrist band 30 that is equipped with a wireless data transmitter so that the geo-location software management utility can manage the individual's presence with their smartphone 20. Further if the wristband 30 is worn by an individual 12 at all times the geo-location software management utility 42 can capture and store data via a communications network 14 of individual's traveled path history. The ECG wristband 30 is equipped with heart signal transmitter and obtains unique cardiac rhythm signals for each individual 12 which can be used to verify at 32 the identity of the individual 12 according to pre-existing ECG signals associated with the individual. The particular algorithms used for matching ECG signals are known to those in the biometric art. In addition to verifying the geo-position of the individual 12 the ECG wristband 30 of system 10 may be used to give the individual 12 a wireless, non-contact auto access to their smartphone 20 or selected apps thereon. In other words the wearing of the wristband 30 may be required for the individual 12 to access and use select apps of the phone 20.

Practically the present invention includes a geo-location software application the individual 12 (or distinct system 10 user such as employer, oversight official or the like) needs to download and install in the smartphone 20. Once the geo-location software application is installed in the individual's smartphone 30, a listening engine 44 process is launched and runs as a hidden process in the smartphone 20 background. At the same time, the geo-location software that is now running as an application on the individual's phone 20 alerts the geo-software networks 42 letting them know that a new individual 12 will be using the geo-location software management services and to create a database to store this new and unique individual's data.

Now that geo-location software management utility is installed in the individual's smartphone 20, and the listening engine 44 is running as a process in the background the auto-detect process to secure that both the individual 12 and their smartphone 20 are both present at the same location for proof-of-presence can start.

As noted above, the system 10 integrates an ECG wristband 30 to be worn by an individual 12 at all times. The wristband 30 is equipped with heart rhythm signal wireless transmitter 46 and generates unique cardiac rhythms for each individual. Like a fingerprint (and other identifying biomarkers), each individual's ECG heart rhythms are unique to each individual 12. The present invention system 10 uses the individual cardiac rhythms of the ECG from wristband 30 to authenticate the individual 12's identity, allowing individuals 12 to wirelessly authenticate and gain access to select apps on their smartphone 20. This log-in state data is stored in a register in the smartphone 20 memory and is to be used by the software management listening engine 44.

The geo-software management listening engine 44 runs as a process in the smartphone 20 background and is always looking at detecting and validating two conditional states: 1] The log-in state, that the individual 12 has securely gained access, and is now logged-in to their smartphone 20. 2] That the distance or the tolerated threshold set to be maintained at all times between the worn wristband 30 by the individual 12 and their smartphone 20 is maintained and is valid. These two states validation are essential and must be valid in order for the geo-location software management to start or stop capturing and storing the individual's authenticated geo-location position.

The listening engine 44 continuously reads the logged-in state register data that is previously stored in the smartphone 20 memory when the individual 12 has gained access to their smartphone 20 (because the band 30 has verified the identity of the individual with the biometric). If the log-in state is true, then the listening engine 44 only needs verify if the distance between the wristband 30 and the smartphone 20 is within the assigned threshold. If the distance measured between the wristband 30 and the smartphone 20 is with-in the threshold, then the present system 10 authenticates that the individual 12 and the smartphone 20 are both present at the same geo-location position.

The present invention system 10 is a geo-location software management utility 42 which can capture the individual's geo-location position and stores the data in a database online (at 42) which can be accessed online at a later time for viewing and printing. This geo-location software application must be downloaded and installed by the individuals 12 in their smartphone 20. When the geo-location software application is installed in the individual's smartphone 20, the geo-location software application alerts the geo-location software online service network 42 via a communications network 14 letting them know that an individual 12 has installed the software application and wants the geo-location services to begin capturing and storing their geo-location position. The geo-location software management utility contains a software sub-routine process called the listening engine 44 and runs automatically and continually without the intervention or need of input of the individual 12. This listening engine 44 runs as a process in the background of the smartphone 20 and monitors if the user/individual 12 is still logged-in and has access to their smartphone 20, which operation is schematically shown in the figures.

The system 10 and associated method solves one issue that can be called a proof-of-presence of the individual at a certain location at a certain time. The geo-location software as a service application provider 42 not only captures and stores data online via a communications network 14 of the location of the individual's smartphone 12 using GPS but also secures that the individual 12 who is the owner/registered user of the cell phone 20 is also present when the smartphone's geo-position was captured and stored. In this invention, the data captured and stored provides a verified history of the locations of the individual's traveled path. Individuals (or the system 10 user which may be an employer or the like) can access, on demand, through their smartphones 20 their geo-locations data history and be able to view or print a hard copy of their geo-location's whereabouts for any specific day and time in the past.

The present system 10 and associated method allows individuals 12 to access the geo-location software utility 28 that is running on their smartphones 20 to turn on the smartphone-to-address distance warning. Here the individual 12 (or system 10 user for given individuals 12) can setup a comfortable distance between their smartphone geo-location position and an address they want the geo-location utility to alert them they are approaching when on a traveled path. Individuals 12 can select an address, using multi-touch over a map on their smartphone 20, or by keying the address in the geo-location database, and set a range or distance threshold, as shown in FIG. 7. As the individual 12 is traveling, the geo-location software management continually measures the distance between the address stored in the database and the individual's smartphone (GPS) location. A real-time warning is issued, when the smartphone-to-address has entered the threshold distance. Individuals 12 can target multiple address locations, and set threshold distances to all using the geo-location software management service.

Furthermore, the present system 10 allows individuals to access the geo-location software service that is running on their smartphones 20 and activate smartphone-to-smartphone(s) threshold alert options as shown in FIG. 8. Individuals 12 can select other smartphones numbers as targets they wish to maintain a certain geo-position distance away from. As the individual 12 is traveling, the geo-location software management continually measures the distance between the smartphone's (GPS) target number(s) stored in the database and the individual's own smartphone (GPS) geo-location, assuming the target phone has GPS and is accessible to the system 10. A real-time warning is issued, when the pre-set target threshold is violated. Individuals can target multiple smartphones, and set thresholds to all using the geo-location software management service.

Additionally, the present invention system 10, as shown in FIG. 9, deals with smartphones-to-perimeter tracking. The process deals with the tracking of several individuals 12 using their smartphone cell numbers (GPS) position.

As defined above a smartphone 20 is a hand carried personal computer with a mobile operating system with the capabilities of a cell phone. Smartphones are typically pocket-sized hand held devices, but not exclusively. One category or subset of smartphones is a wrist based smartphone, sometimes called a smartwatch. Wrist based communication devices have held a long fascination with the United States public dating back to at least Jan. 13, 1946, with the appearance of the 2-Way Wrist Radio in a Dick Tracy comic which became one of the strip's most immediately recognizable icons. By the end of 2013 there were at least three commercial smartwatches incorporating smartphone technology including Samsung Galaxy Gear, Sony SmartWatch 2, and the Qualcomm Toq. The most well-known smartwatch was the Apple Watch announced in 2014. The present invention can be implemented with the smartphone 20 being a smartwatch with smartphone capabilities. Additionally, it is anticipated that such a system could further integrate the wristband 30 and the smartphone 20 into a single integrated component. The integrated smartwatch (smartphone 20) and bracelet 30 yields a far easier implemented system and prevents the phone 20 from being removed from the wristband 30, however the operation of the system would remain the same in such an integrated system. As a handheld smartphone 20 is more common than a wrist mounted smart watch type smartphone 20, the system is generally described herein in connection with the handheld version of the smartphone 20.

For the sake of clarification the following is a representative example to illustrate the utility of the system 10, in this case: Parents who would like to make sure that their kids do not leave the perimeter of a certain address, namely a school's address. The parents using the geo-location software management that is installed on their child's smartphone 20 (or the smartphone 20 that the child uses as the child 12 does not own the smartphone 20 in this case) can select the address of the school and set a threshold, which is a specific geo-location perimeter and radius. The parents also key in their kids' smartphone numbers to be tracked in the geo-location software management database located at 42. With the Child 12 wearing the bracelet 30, the moment the threshold of the tracked smartphones 20 exceeds the stored threshold, a warning is send to the parent's smartphone that is running the geo-location software management service. A warning can also be sent to the parents if the phone 20 is distanced from the bracelet 30 beyond a threshold distance (which has both phone theft or loss prevention aspects and prevents the child from thwarting the desired tracking) or if the bracelet is no longer identifying the unique ECG's of the child 12 (which feature will yield both medical safety aspects and compliance aspects for the parent).

The present system 10 also allows individuals 12 to access the geo-location software service that is running on their smartphones and activate the application programming interface (API) to automatically allowing other social network(s) location based check-ins software platforms data to be added and integrated to the individual's geo-location software management database, as generally shown in FIG. 10. Other platforms' data may be such as FACEBOOK® location base check-in data, FOURSQUARE® location base check-in data. The present system 10's API integration of social networks location base to the geo-location software management service is not limited to just FACEBOOK® and FOURSQUARE® data integration. The term check-in data in this present invention is not limited to only the time and the location base check-ins but also includes the pictures posted at the time of the check-ins as well as the embedded date, time stamp and the geo-location associated with each picture as well as the text message associated with the check-in message data.

Consider for example a work collaboration website that allows input from authorized users, and the present system can allow and manage inputs via user's phones 20 into the website from only authorized and verified users 12. For example, a news media outlet can allow reporters, photographers and/or editors as users 12 to upload and add verified managed content from their phones 20 to the media outlet webpage. In this era of “fake news” the added verification of the system 10 can become critical for news media outlets and social media outlets.

Social media platforms can utilize the system 10 to prevent anonymous or falsely attributed postings, minimizing the occurrence of “fake news” and providing for accountability for any such postings. The system 10 allows for managing of such inputs as well. Consider a University associated social platform that can assure that posting or commenting users 12 are in fact associated with the university and authorized to do so and can add the requisite information to a post automatically, such as adding “John Doe, 2006 alumni BS Electrical Engineering, commented on the Engineering Departments Grant Announcement:” to an authorized comment from John Doe. The tagging of postings and the amount of detail provided in such tags is easily modified by the administrators and likely allowed to be modified by the user 12 themselves, as known in the art. The present system 10 merely provides a seamless method of user authentication, including adding geo-authentication aspects. Consider again the University associated social platform and a section relating to comments relating to, for example, a University art exhibit, the system allows for system control or management to receive inputs only from authorized users 12 who are in a designated geo-location, thus only authorized users 12 who are in the vicinity of the art show (during times it is viewable) can post their reviews (or simply verify that they have in fact viewed the requisite show).

The present system 10 allows individuals 12 to access the geo-location software service 42 that is running on their smartphones 20 and activate the application programming interface (API), see FIG. 10, to automatically allow the individual's bank transaction(s) data to be added and integrated to the individual's geo-location software management database. The system 10 allows individuals 12 to access the geo-location software service 42 that is running on their smartphones 20 and activate the application programming interface (API), again shown in FIG. 10, to automatically allow the individual's wireless communication data to be added and integrated to the individual's geo-location software management database. Wireless communication data is not limited to the individual's cellphone data, but also includes the location region and or address of the cellphone towers where the calls and data communications came from.

The present invention system 10 allows individuals 12 with the use of a wrist band 30's heart signal ECG based identification signature method to wirelessly and without the individual touching their smartphone to automatically authenticate and access their smartphone 20 allowing at that specific access instance for the geo-location software management service to automatically start capturing and recording the individual's smartphone geo-location (GPS) position data, see generally FIG. 11. Furthermore the present system 10 allows individuals 12 with the use of the wrist band 30 to enable the Internet-of-Things (IoT) devices 61 to identify the individual 12 who has authenticated to the IoT device(s) 61, shown in FIG. 12. The geo-location software utility 42 will register and retrieve data from the associated device 61: Data which is not limited to the Internet protocol (IP) of the devices and may be associated with address location, time of interaction(s) with the device, etc. Examples of such devices 61 can be a car, washing machines, refrigerator, TV, coffee maker, smart bulb. As a brief representative example, an apartment building may, as a safety concern, only allow interaction and operation with a washing machine or dryer with an authenticated user 12 when the user is located close to the device (e.g. in the building, on the same floor, etc), and the system 10 easily accommodates this application for the building manager. Note further billing for use of the interaction with the device 61 by the authenticating user can be handled/verified with the system 10 replacing the complex coin operated and related systems now in place. As a further example, parental control of TVs, Refrigerators and other smart devices 61 is easily implemented with the system 10 and the system 10 allows the device 61 to submit relevant information to the system 10 regarding the particulars of the interaction that can be relevant for the parent. The uses of smart devices 61 are legion and the present system 10 adds a simple cost effective individual and geographic verification aspect to the implementation of such devices 61, and further the information obtained from such devices 61 associated with authorized interaction and control of such devices 61 further enhances the applications of the system 10.

The present system 10 and associated method can be described or summarized as a comprehensive web3.0 software utility, an Internet of Things (IoT) geo-locations software management utility 42 to manage the individual 12's geo-location of their traveled path via biometric user identification coupled with capturing, recording and storing their smartphone 20's GPS location via a communications network 14. The individual 12 can access online via their smartphone 12 (or a desktop computer) the geo-location software utility to view and print the history of their traveled path. The present invention integrates the use of a biometric ECG wristband 30 that integrates a wireless heart rhythm (ECG) identification signature transmitter and allows for a wireless authentication of the individual 12 to access their smartphone 20. The present system 10 includes a process which starts automatically at the instance it detects that the individual 12 has gained access to their smartphone 20 and begins capturing and recording the individual's authenticated smartphone geo-location (GPS) position data. The individual's captured data includes the geo-location position of their smartphone's (GPS) position and the time it was captured. More particularly, the present invention deals with securing that both the individual 12 and the smartphone 20 are always present at the same geo-location at the time the geo-location of the smartphone via (GPS) position is captured and logged-in into the software as a service 42 database via a communications network 14. The present system 10 secures that the individual 12, and possible owner of the smartphone 20, is the unique user/owner of the smartphone 20 with the use the individual's cardiac rhythm ECG like a fingerprint signature to authenticate and gain access to the smartphone 20.

The above description is in the abstract but some representative examples may further highlight the applications for the system 10.

Fleet and Crew GPS Tracking

One implementation of the system 10 and associated method of the present invention is for what is known as GPS Fleet Tracking in which a company which operates a number of vehicles and drivers (e.g., for deliveries/pickups) desires to utilize GPS trackers for vehicle and driver management. Implementing existing GPS fleet tracking is known to reduce fuel costs by tracking driver behaviors that can drive fuel bills up and single out fuel charges by vehicle and eliminate unauthorized fuel-ups; and is known to potentially lower insurance premiums by allowing the entity to proactively manage and encourage driver safety; and is known to yield automatic governmental compliance with digital logbooks because the entity will obtain real time status information (e.g. HOS status) in the office and send proactive alerts to drivers to help prevent violations. As examples of conventional GPS Fleet Tracking systems see Fleetmatics Development Limited's FLEETMATICS™ system and Verizon's NETWORKFLEET™ system.

The system 10 of the present invention described above is easily operable as a cost effective GPS Fleet Tracking system and the current system 10 yields the additional benefits (above conventional GPS Fleet Tracking) of authenticating and tracking each individual 12 driver and/or crew member via their own smartphone 20. This system 10 also allows for tracking of a single driver 12 with multiple vehicles and individual crew members 12 even in interchanging crews (e.g. a crew member begins a shift with one vehicle and switches to a second or third vehicle throughout the shift). The vehicles may themselves, in some cases, be devices 61 that interact with the system 10 to give further detailed information regarding each individual's use of the vehicle (in addition to the identity and position data of the phone 20). However, one significant use of the system 10 is for inexpensive fleet tracking without retrofitting an existing vehicle fleet.

Legal System Individual Location Verification

1. Restraining Orders

Several distinct but related implementations of the system 10 and associated method of the present invention are presented in the legal system which has reason to verify and track the location of select individuals 12. One implementation is often found in the area of restraining orders, also known as protective orders, that are common in family law. Alleged violations of restraining orders can clog the court process and cost the parties substantial sums in excess attorney fees as proof of violation or non-violation is difficult. The system 10 of the present invention can easily provide a provable court record of an individual 12 location when associated with their cell phone 20. Restrictions on coming close to another party's home, or place of business is easily implemented. Further, the system 10 allows the restriction and warnings to be expanded to a zone around select third party cell phones to be added. Warnings can be sent to the individual and the court and the other parties in the case. Further periods when the user does not have a verified location can be noted by the system. Voluntary adoption of the system 10 by users will likely be driven by the reduced legal fees.

2. Bail

The system 10 can be used by a court to inexpensively and effectively enforce bail restrictions on an individual 12 in criminal matters and thus allow far greater number of individuals qualify for bail and greatly reduce the cost of housing suspects awaiting trial. Geographic restrictions can be easily added for any individual 12 (e.g. prohibitions on leaving the state, prohibitions on going to certain locations). Restrictions on coming into contact with certain parties (e.g., witnesses, alleged victims) can easily be added via telephone numbers of the third parties and associated thresholds (with such numbers being withheld from the individual 12). Compliance with the system 10 is likely another condition of bail (e.g. an individual is advised “you must have your phone on at all times and also have the wristband 30 on so the system can track you”). Again voluntary adoption of the system 10 by individuals 12 will likely be driven by the reduced bail fees associated with adopting and complying with the system 10.

3. Parole/House Arrest Enforcement

The system 10 can be used by a court to inexpensively and effectively enforce parole and/or house arrest restrictions on an individual 12 in criminal matters and thus allow far greater number of individuals qualify for an automated supervised parole or house arrest and greatly reduce the costs to the criminal justice system. The system 10 is easily modified for individual parolees and or house arrest individuals. It can verify that they are at work during scheduled work days and at home when scheduled to be at home with alerts. Geographic restrictions and third party restrictions can also be added and monitored automatically. Warnings and or violations of the conditions or compliance can be sent to the individual and the court (e.g., the parole officer). The system 10 is cost effective and efficient.

Geographic Validation of Smartphone Captured Data

The system 10 for authenticating an individual 12's geo-location via a communication network 12 may include marking recordings, such as pictures, videos or audio recordings, taken with the individual's smartphone 20 with the geo-location where the image was taken, the time the image was taken, and the authenticated geo-location data of the individual 12 when and where the image was taken. The system 10 will allow for authentication of any image, video, audio recording and/or sensor reading recorded by the smartphone to verify the location and individual making the record via the smartphone. In this implementation of the invention a finger scan can be used as a passive biometric authentication technology.

1. Inspection-Inspector Authentication

Inspectors, such as building inspectors, will often obtain images or video (or even sensor readings) of the inspection to supplement the inspection. Sometimes it is questioned whether an image or video was taken at a given time, and/or taken by a given inspector at that time. The system 10 verifies the authorized individual 12 was with the phone 20 when the subject recording was taken and the data is stamped (also called an electronic watermark) on the recording. The system 10 thus validates the inspection, and as noted above In this implementation of the invention a finger scan can be used as a passive biometric authentication technology.

2. Photographer—Copyright Owner

A copyright in an image or video will vest when the image is fixed in tangible form (when the image is taken) and the ownership will vest in the author (e.g. the photographer), outside of a work made for hire. A timely image of a current event can be a valuable commodity for the author (photographer) and purchasers sometimes need some assurance that the person proffering authorship and ownership of the work in question actually holds title thereto or are authorized to post on a given site. The system 10 verifies the authorized individual 12 was with the phone 20 when the subject recording was taken and the image/video is stamped (also called an electronic watermark) on the recording, thus the system 10 corroborates ownership of the work in question, and again in this implementation of the invention a finger scan can be used as a passive biometric authentication technology.

3. Research-Researcher Authentication

Smartphones 20 can take almost an unlimited type of data as any number of sensors have been designed to couple to a portable phone 20. The system 10 allows a simple inexpensive method for researchers to validate the time, place and person obtaining the data by electronic watermarking the recordings with the relevant information. Questions regarding timing or validity of the data (or who obtained such data), which can needlessly question the veracity of a test, are simply removed with implementation of the system 10. Arguably the system 10 can be part of a researcher's best practices, and in this implementation of the invention a finger scan can be used as a passive biometric authentication technology when integrated into sensor activation.

Geographic Limits for App Access

As described above the system 10 can be used to give the user access to operation of the cell phone 20 completely. The system may also be used to restrict access to only a portion of the cell phone apps (i.e. a third party may use the phone 20 but some apps will be locked out because there is no verification of identity.) However the present system 10 can go further than merely limiting access to certain applications, the system 10 can tie the access the further requirement of the phone 20 and the verified user 12 being in a designated location. For example an employer can give a user 12 a phone 20 with select apps that are only accessible at the office by the user 12.

1. Financial Services Authentication—Bank Atm, On-Line Banking and Credit Cards

One application for geographic limits for application access is interaction financial services authentication such as with bank ATMs. In the ATM environment, the system 10 will verify the identity of the individual 12 via the biometric ECG band (or other biometric identification technology) to add an initial layer of security, but will also verify that the individual and the phone are in close proximity to the designated ATM to add a further layer of security difficult to defeat.

The ATM is merely a representative example in the banking field as the system 10 is adopted for fighting bank fraud in general. Mobile banking on smartphones 20 and other devices is increasing, as is the issues with bank fraud. The present system 10 used with mobile apps is again hard to defeat, even if someone takes the smartphone 20 and knows the passwords to the online banking accounts. The mobile banking app used in conjunction with the present system may be on the smartphone 20 or on a separate device like a laptop or a desktop, but use of the system 10 for user authentication for these financial services adds a layer of simple biometric security that banking customers may pay a significant premium to enjoy. In this implementation of the invention a finger scan can be used as a passive biometric authentication technology when the scan is integrated with a transaction authorization or the like.

ATM card usage is analogous to credit card usage, and credit card fraud is estimated to exceed $35 billion dollars in 2020. The present system can be associated with credit card usage to verify the users and substantially eliminate fraud on cards tied to the system 10.

2. Phone Applications that an Individual can Only Access at a Designated Location

It may be desirable to allow individuals to have simple access to and interact with “on-site systems”, such as hospital employees accessing patient records at a hospital, through the individuals phone, and to automatically prevent such access when the individuals leave a designated area (e.g. when the individual hospital employee leaves the hospital). The system 10 allows this functionality to be easily implemented and improve employee's ability to cost effectively interact with secure records in a desired and secure manner.

3. Devices that an Individual can Only Access at A Designated Location

It may be desirable to allow authenticated individuals to have access to and interact with on-site devices 61, such as a worksite washing machine, through the individuals phone 20, and to automatically prevent such access when the individual leaves a designated area (e.g. when the individual employee leaves the workplace). The system 10 provides for authenticating the user 12 via the communications network for interaction of the individual user with these Internet-Of-Things devices 61. The system 10 allows this functionality to be easily implemented and improve employee's ability to cost effectively interact with an onsite device 61 in a desired and controlled manner. The device 61 can communicate information to the system 10 relevant to the individual's interaction with the device 61 sufficient for the efficient control of the resource/device 61 (e.g. finding out that the marketing department is using the coffee maker or copier or 3d printer or similar device 61 more than the engineering department and accounting department and human recourses combined and it warrants getting them their own device 61—and accounting for the device 61 accordingly for more efficient business management). A cooperative Laundromat (such as at an apartment building) using washing machine and dryers as devices 61, or a library using onsite resource devices 61 (copiers, printers, etc) represent other obvious applications of the system 10 in this context. The system 10 can quickly and easily be updated with adding new authenticated persons 12 and deleting those no longer authorized in a relatively simple manner, making the system useful for settings in which personnel with access rapidly turns over, such as a University setting and Lab access. Further the devices 61 will have a record of the proof of presence of the specific user that will even stand up in court. In this implementation of the invention a finger scan can be used as a passive biometric authentication technology when the scan is integrated into the device 61 interaction on the app of the phone 20 of the user 12.

Transportation

The system 10 can be implemented to verify users at variable locations, such as would be practical for Uber and Lift (both for real time verifying of both passengers and drivers) or TAA applications. For example, prescreened users of the system 10 can be granted expedited security protocols through TAA as an improved supplement to an existing program of TAA. In this implementation of the invention a finger scan can be used as a passive biometric authentication technology when combined with other interaction, such as a verification made by the user 12 during the screening (e.g. “Press here to verify that you are not carrying the following materials . . . .”).

Parental Supervision

Most of the above applications can have separate utility for parents supervising their children as the users 12 and their children's use of phones 20.

Blockchain Applications

The present invention defines a systems and method of a communications network, a private blockchain network and a token issuance schema that grants access to the private blockchain network’ data-as-a-service.

This invention is directed to a cost effective, efficient, system 10 see FIG. 13 for a write-a private blockchain network 20 to write-to and read-from the individual's authenticated data 20, smart contracts 52 issuing a token 106 to consume as-a-service the goods and services of the stored hashes of the on-chain of the geo-location data in 110, 112, 114, 116, 118, 120, 122, 124, 126 and the actual data 10, 112, 114, 116, 118, 120, 122, 124, 126 on the private blockchain network 20 associated with the individual's smartphone 12, which includes a GPS receiving into the blockchain 20 the hashes of the geo-location authenticated data in 110, 112, 114, 116, 118, 120, 122, 124, 126 of each individual 12 via a communication network, a private blockchain network 20.

This invention is directed to a cost effective digital rights management (DRM), efficient on the blockchain monetization of the stored geolocation authenticated photo(s) data records of the individual who actually captured the photo 122 via smartphone 12 while wearing the wristband, system 10 see FIG. 1 and FIG. 2 for private blockchain network 20 to read-from the blockchain an individual's authenticated profile records data 20 in this case the history records of the captured photo, photos 122, place picture was taken, time the picture was taken all negotiated through swarm executed via a read-from the blockchain 20, with access arbitration via smart contracts 52, for granted access issued in tokens 106.

FIG. 13 demonstrates that the present invention is directed to a cost effective, efficient incorporation into a blockchain data storage and security. BlockChain presents a number of challenges to all establishment not least of which is the fundamental difference between programming for a shared virtual computer versus, say, some high-powered machine. One of the challenges of working with this platform is data storage. The only obstacle is the astronomical costs associated with storing data on the Ethereal blockchain networks 20. Generally the cost to store data such as 110, 112, 114, 116, 118, 120, 122, 124, 126 on the Ethereum blockchain can be prohibitive, for example storing 1 GB would require 32 000 Ether a cost of around $20 000 000! Therefore, the present invention resorts to storing the bulk data 110, 112, 114, 116, 118, 120, 122, 124, 126 off-chain on the “cloud” via Swarm and hashes of the data on-chain, allowing users to easily verify the integrity of the data without actually paying the massive costs of storing on the blockchain itself. This invention is directed to a cost effective, efficient, system 10 incorporated into a private blockchain Dapp instance running web 3.0 18.

The present application or system has many advantages and uses only some of which are touched on above. The system 10 may be implemented into the business logic that governs the process of In-App Purchasing, especially Subscription Management, AppStore receipt validation and finally a batch treatment or a program that runs automatically on each subscription expiration date to check the renewal of the subscription (payment). The present invention contemplates the integration into the system 10 solution (in server side: Database, Business logic and web API) of elements such as Sales management and Business Intelligence (BI), which is a technology-driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users, make informed business decisions.

The present invention yields, as discussed above a passive geolocation authentication utility interfaces via an API with facebook, instagram, foursquare, yelp and other social media. Alternatively the system 10 provides in some implementations a passive image geoauthentication using a fingerprint button that both scans for fingerprint and takes image, the image is geo-watermarked with option through an (API) to chose to store watermarked image into a person's profile in the geoauthentication utility itself, instagram, facebook, yelp, foursquare and other social media using one click. The system 10, as described above can provide a passive/face-id image geoauthentication using face-id, wherein the image is geo-watermarked with option select through an (API) to store watermarked image into a person's profile on instagram, facebook, yelp, foursquare and other social media using one click. The system 10 may provide a passive geoauthentication using fingerprint button to check into places using geoauthentication software management utility, the geoauthenticated check in to a place with option select through an (API) to add and store the verified check in into a person's social media profile on instagram, facebook, yelp, foursquare and other social media using one click. The system 10 can yield a passive/face-id geoauthentication using face-id to check into places using geoauthentication software management utility, the geoauthenticated check in to a place with option select through an (api) to add and store the verified check into a place into a person's social media profile on instagram, facebook, yelp, foursquare and other social media using one click. The system 10 overcomes the fake/false check-ins and postings that is taking place in social media and to instagram, snapchat, facebook in particular. The system 10 can add “a verified you!” claim to all image/video postings and check-ins into locations when using social media.

It is apparent that many variations to the present invention may be made without departing from the spirit and scope of the invention. The present invention is defined by the appended claims and equivalents thereto. 

What is claimed is:
 1. A method for authenticating an individual via a communication network comprising the steps of: a) providing an individual with a smartphone having a GPS receiving unit associated with a communications network; b) providing the individual with a passive biometric user identification technology coupled to the smartphone; c) obtaining via the communications network the geo-location of the smartphone utilizing the GPS receiving unit; d) identifying the user with the passive biometric user identification technology by passively obtaining biometric characteristics that are unique to each human via the communications network; and e) authenticating the user via the communications network for at least one of: i) interaction of the individual user with at least one Internet-Of-Things devices; ii) interaction of the individual user with financial services applications; iii) access to at least one application of the smartphone to the user; iv) verification of user presence in defined geographic areas for a user; v) verification of no user presence in defined restricted areas for a user; vi) verification of user of least one application use of the smartphone by the user in a known geographic location.
 2. The method for authenticating an individual via a communication network of claim 1, wherein the biometric user identification technology utilizes the individual's electrocardiogram as a biometric characteristic that is unique to each human.
 3. The method for authenticating an individual via a communication network of claim 1, wherein the biometric user identification technology utilizes a wristband worn by the individual and wherein the wristband is coupled to the smartphone, and further including the step of verifying via the communications network the biometric user identification technology is within a preset proximity to the smartphone to authenticate the individual's mobile geo-location anywhere within a geographic scope of the communications network of the smartphone.
 4. The method for authenticating an individual via a communication network of claim 1, further including the step of recording the individual's authenticated geo-locations for at least a period of time.
 5. The method for authenticating an individual via a communication network of claim 4, wherein during the step of recording the individual's authenticated geo-locations for at least a period of time, the method includes the steps of recording any periods when the individual's geo-location cannot be authenticated including when the biometric characteristics obtained by the biometric user identification technology fails to identify the user and recording any periods when the biometric user identification technology is not within a preset proximity to the smartphone.
 6. The method for authenticating an individual via a communication network of claim 1, wherein the method includes the step of incorporating defined restricted areas for the user.
 7. The method for authenticating an individual via a communication network of claim 6, wherein the method includes the step of sending a warning message to the user when the user is approaching a boundary of the user defined restricted area.
 8. The method for authenticating an individual via a communication network of claim 1 wherein the method includes authenticating multiple users, wherein at least some users use a smartphone worn on the wrist.
 9. The method for authenticating an individual via a communication network of claim 8, wherein the method includes the step of incorporating defined restricted areas for each user.
 10. The method for authenticating an individual via a communication network of claim 9, wherein the defined restricted areas for each user is configured to be able to be varied by time.
 11. The method for authenticating an individual via a communication network of claim 10, wherein the method includes the step of sending a warning message to a user when the user is approaching a boundary of the defined restricted area for that user.
 12. The method for authenticating an individual via a communication network of claim 1, further including the step of integrating the authenticated individual user with location based social networks data as proof-of-presence of the user in the location based social network data.
 13. The method for authenticating an individual via a communication network of claim 1, further including the step cross-checking the authenticated user's geo-location with location based check-in data from location based platforms to further validate as proof-of-presence the geo-location data of the user's presence at a certain location.
 14. The method for authenticating an individual via a communication network of claim 13, further including the step of identifying any anomalous results between the authenticated user's geo-location and the location based check-in data from location based platforms.
 15. The method for authenticating an individual via a communication network of claim 1, further including the step of marking images taken with the individual user's smartphone with the geo-location where the image was taken, the time the image was taken, the authenticated geo-location data of the individual user when and where the image was taken.
 16. The method for authenticating an individual via a communication network of claim 1, wherein the smartphone is worn on the wrist and is integrated with the biometric user identification technology into a single wrist-worn unit.
 17. A method for authenticating an individual's mobile geo-location via a communication network, comprising the steps of: a) providing an individual with a smartphone having a GPS receiving unit associated with a communications network; b) providing the individual with a biometric user identification technology coupled to the smartphone; c) obtaining via the communications network the geo-location of the smartphone utilizing the GPS receiving unit; d) identifying the user with the biometric user identification technology by obtaining biometric characteristics that are unique to each human; and e) verifying via the communications network the biometric user identification technology is within a preset proximity to the smartphone to authenticate the individual's mobile geo-location anywhere within a geographic scope of the communications network of the smartphone; and f) authenticating the user via the communications network for at least one of: i) interaction of the individual user with at least one Internet-Of-Things devices; ii) interaction of the individual user with financial services applications; iii) access to at least one application of the smartphone to the user; iv) verification of user presence is defined geographic areas for a user; v) verification of no user presence in defined restricted areas for a user; vi) verification of user of least one application use of the smartphone by the user in a known geographic location.
 18. The method for authenticating an individual's geo-location via a communication network of claim 17, wherein the step of limiting access to at least some of the smartphone applications to the individual as verified by the biometric user identification technology includes limited access to at least some of the smartphone applications when the individual and the smartphone are within pre-defined geo-locations.
 19. The method for authenticating an individual's geo-location via a communication network of claim 17, wherein the individual owner of the smartphone interacts with Internet-Of-Things devices.
 20. A system for authenticating an individual's geo-location via a communication network comprising: a) a smartphone having a GPS receiving unit associated with a communications network, wherein the system is configured to obtain via the communications network the geo-location of the smartphone utilizing the GPS receiving unit; and b) a biometric user identification technology worn by the individual configured to obtain biometric characteristics that are unique to each human, wherein the system is configured to identify the user with the biometric user identification technology and to verify the biometric user identification technology is within a preset proximity to the smartphone to authenticate the individual's geo-location. 