throbber
United States Patent
`Walker et al.
`
`[19]
`
`USOOS 884270A
`Patent Number:
`Date of Patent:
`
`[11]
`[45]
`
`5,884,270
`Mar. 16, 1999
`
`[54] METHOD AND SYSTEM FOR
`FACILITATING AN EMPLOYMENT SEARCH
`INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS
`
`Inventors: Jay S. Walker, Ridge?eld, Conn.;
`Bruce Schneier, Minneapolis, Minn; T.
`Scott Case, Darien, Conn.
`
`Assignee: Walker Asset Management Limited
`Partnership, Stamford, Conn.
`
`Appl. No.: 704,314
`Filed:
`Sep. 6, 1996
`
`Int. Cl.6 .................................................... .. G06F 17/30
`US. Cl. ........................... .. 705/1; 705/26; 379/93.12;
`395/200.57; 364/222.2; 364/284
`Field of Search .................................. .. 705/37, 1, 26;
`455/2; 380/20, 30, 25; 379/9312; 395/200.57;
`364/222.2, 284
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,218,738
`4,847,890
`4,870,591
`4,914,698
`4,961,224
`4,962,449
`4,962,532
`
`8/1980
`7/1989
`9/1989
`4/1990
`10/1990
`10/1990
`10/1990
`
`Matyas et al. .......................... .. 380/25
`Solomon et al.
`379/67
`Cicciarelli et al. ..
`364/468.14
`
`Chaum . . . . . . . . . . . . . . . . .
`
`. . . . .. 380/30
`
`Yung . . . . . . . . . . . .
`
`. . . . .. 380/25
`
`395/186
`Schlesinger .... ..
`Kasiraj et al. .......................... .. 380/25
`
`(List continued on neXt page.)
`
`FOREIGN PATENT DOCUMENTS
`
`6- 19943
`6-224938
`
`1/1994 Japan.
`8/1994 Japan.
`
`OTHER PUBLICATIONS
`
`A. Michael Froomkin, “Flood Control On The Information
`Ocean: Living With Anonymity, Digital Cash, and Distrib
`uted Databases,” Conference for the Second Century of the
`Univ. of Pittsburgh School of LaW: The Adequacy of Current
`
`Legal Paradigms to Meet Future Challenges (Sep. 21, 1995).
`Aaron Weiss, “Grad Seeks Job”, Internet World, pp. 76—79
`(Sep. 1996).
`Jeff Ubois, “Anonymity Has Its Place; Questions Concern
`ing On—Line Anonymity Arise,” Information Access Com
`pany, vol. 8, No. 8, p. 28(Apr. 28, 1995).
`Debora Sparr et al., “The Net”, Harvard Business Review, p.
`125(May/Jun. 1996).
`Gary H. Anthes, “Stealth E—mail Poses Corporate Security
`Rsik”, Computerworla', p. 1 (Feb. 12, 1996).
`Michelle Quinn, “Web Site For Fake E—Mail Back?res On
`Operator”, The San Diego Union—Tribune, Ed. 1—8, p. 7
`(Jun. 20, 1995).
`Jim MilloWay, “Corporate Employment Bulletin Board ”,
`WebSta?i Inc., 1996.
`Peter LeWis, “Cloaks and Daggers”, Vantage Point, p. 133
`(Jul. 1996).
`Lisa Sanders, “Smile, You’re On Job—Candidate Camera”,
`Business Week, p. 6 (Aug. 5, 1996).
`“Restrac Expands Internet Recruiting .
`(Jul. 10, 1996).
`“Romancing The Internet”, Business Wire (Jul. 12, 1995).
`Quay Partners Int’l., Ltd., “Net Gain For Recruiting”, U.S.
`Banker (Jul. 1996).
`Primary Examiner—Parshotam S. Lall
`Assistant Examiner—David M. OvedovitZ
`Attorney, Agent, or Firm—Jeffrey L. Brandt
`
`. ”, Business Wire
`
`.
`
`[57]
`
`ABSTRACT
`
`A system for facilitating employment searches using anony
`mous communications includes a plurality of party
`terminals, a plurality of requestor terminals, and a central
`controller. The system receives and stores employment data
`about prospective employment candidates. Upon receiving
`criteria for candidates of interest from an employer and
`authorization from the candidates, the central controller
`releases to the employer the employment data associated
`With the candidates. The system also establishes communi
`cations channels betWeen the employer and the candidates,
`While maintaining their anonymity.
`
`33 Claims, 12 Drawing Sheets
`
`K100
`
`PARTY
`TERMINAL
`
`PARTV
`TERMINAL
`
`PARTY
`TERMINAL
`
`PUBLIC
`SWITCHED TELEPHONE
`NETWORK
`m
`
`CENTRAL
`CONTROLLER
`m
`
`REQUESTOR
`TERMINAL
`
`Monster Worldwide, Inc. Exhibit 1022 (p.1/29)
`
`

`

`5,884,270
`Page 2
`
`US. PATENT DOCUMENTS
`
`5,416,694
`
`5/1995 Parrish et a1. ............................ .. 705/8
`
`570187096
`
`5/1991 Aoyama ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " 711/164
`
`5,459,859 10/1995 Senda ...................................... .. 707/10
`
`
`
`Solomon et a1~ ' 5,077,665 12/1991 Silverman et a1_
`
`4/1992 Smith et a1.
`5,107,443
`5,164,897 11/1992 Clark etal.
`275x53‘? 1513343‘ 5015931 etta1i~
`
`,
`
`,
`
`aoneea....
`
`~
`
`705/37
`
`. 345/331
`-- 705/1
`733/53;
`
`.... ..
`
`' 379/671
`
`5,495,412
`
`
`
`CO'TbCIt .................................. .. 2/1996 Thlessen ................................... .. 705/1
`
`5,500,513
`5,509,064
`5,553,145
`
`3/1996 Langhans et a1. .................... .. 235/380
`4/1996 Welner et a1. ........................ .. 370/265
`9/1996 Micali ..................................... .. 380/30
`
`5,608,446
`
`3/1997 Carr et a1. ................................. .. 348/6
`
`573617295 11/1994 Solomon et a1‘ '
`
`5,400,393
`
`3/1995 Knuth et a1. ....................... .. 379/8827
`
`5,689,799 11/1997 Dougherty etal- ....................... .. 455/2
`
`Morales ~~~~~~~ u
`
`Fraser ...................................... ..
`
`Monster Worldwide, Inc. Exhibit 1022 (p.2/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 1 0f 12
`
`5,884,270
`
`100
`/'
`
`PARTY
`TERMINAL
`£9
`
`PARTY
`TERMINAL
`w
`
`PARTY
`TERMINAL
`2%
`
`PUBLIC
`SWITCHED TELEPHONE
`NETWORK
`HQ
`
`CSETNJCZYXLLER
`E9
`
`REQUESTOR
`TERMINAL
`5%
`
`FIG. 1
`
`Monster Worldwide, Inc. Exhibit 1022 (p.3/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 2 0f 12
`
`5,884,270
`
`/ 200
`
`RAM
`
`m
`
`CRYPTOGRAPHIC
`PROCESSOR
`
`A‘!
`
`ROM
`
`12-9
`
`CPU
`203
`
`250
`
`TO/ FROM
`PUBLIC
`SWITCHED
`TELEPHQNE
`NETWORK 110
`
`I
`
`NETWORK
`INTERFACE
`E
`
`//,__
`V
`
`PARTY DATA
`DATABASE 2_5§
`
`REQUESTOR DATA
`DATABASE @
`
`VERIFICATION
`DATABASE ZZQ
`
`ACCOUNT
`DATABASE E
`
`V/
`
`FIG. 2A
`
`Monster Worldwide, Inc. Exhibit 1022 (p.4/29)
`
`

`

`US. Patent
`
`Mar. 16, 1999
`
`Sheet 3 0f 12
`
`5,884,270
`
`
`
`m._.<o_oz<oIo__._>>
`
`
`
`>z<n_s_oo10$.
`
`mm.QE
`
`8Nmm<mE<o<20mohmmzomm
`
`
`
`mm<mjmmH02._.__>>Qz<._.=>>
`
`
`
`mw<m._mm.52._.__>>oz<._.__>>
`
`
`>z<ms_oomI._.mm._.<n_52<o”.0575mm
`Cm:w§<z o_mw§32<_._n_._<E52:919.3393
`
`
`O._.Qmm<m_._mmmm._.__>>zo_r~<§mou_z_
`«6530mm2:EWEE”.98m:mEzoDBwn.no5:c95:5283me
`
`mmaaozOm._<.9.zO_._.<s_mOu_z_zo_._.<NEOI_b<
`
`
`
`
`._.<_._>>OHm<zO_H<s_mOu_z_EEO”?—
`
` o_._.w_mm._.o<m<_._oBmIm__>_<zDEEq38$
`
`OEDSOmQSPxE>mo._.m=._>z<a_>_oo
`
`
`OHSfiOmoSfiXE.men—OWE._<_oz<zE
`
`
`O_QD<\Omn__>>_.Xm._.szEmEOmmomow
`
`
`._.xm_._...__<s_-m
`
`._.xm_._.szIQ
`
`m._.<n__oz<om_.:.ww_z<n=200mom..__u_0mn_
`mawaits<20>55
`
`9.omm<mjmmmm.3_>>zO_._.<s_mo.._z_
`
`tag259ESE9am:26283meno5:cm:5:5283me
`
`
`
`mmo:._oz_Om._<.OHzO_._.<s_mon_z_zO_._.<N_mOIS<
`
`._.<_._>>O._.w<zOF<_>_mou_z_Manama
`oEmEDz<IE<msgz:o.>E<m
` o_._.w_mm:o<m<IoQ._m__n_m=2<z9mmw58$
`
`
`
`
`
`O_QD<\Omo_>:.xm._.>mo._.w=._zO_._.<oaom
`
`
`O_QD<\Om_n=>me._.wkwmmmkzmeSO
`
`
`O_DD<\OmQ_>\._.wa>mO._.w_I._.2m_s_>o._n=2m
`b9mszz
`
`._.xw._.MZOIm
`
`CAB.wmmmoo<
`
`Monster Worldwide, Inc. Exhibit 1022 (p.5/29)
`
`Monster Worldwide, Inc. Exhibit 1022 (p.5/29)
`
`

`

`US. Patent
`
`Mar. 16, 1999
`
`Sheet 4 0f 12
`
`5,884,270
`
`Hzaooo<
`
`
`0Em232<zn3<E62:9mohwmnomfimo>E<mo_mm§:z<zn:<£6239mmEEm>
`o_._.w_m_m._o<m<_._oSuims_<z0dr.ofiwEmB<m<Io9mmm2<z9mm
`
`
`
`
`
`oEmzzzmozS<mFzmmmso
`
`._.xm_._."03.2.5
`Cm:QmOHwMSOmE
`wkmm<m<p<oHzaooo<cummw<m<._.<n_zo_.r<o_u__mm_>
`8ng33
`oz_._.=m:.zw2><n_o_mm§32<xn_._<mngzamo>._.~_<n_
`
`
`
`..=<s_-m.szIm02530;.rxmz.
`
`
`o._.mzo_._.<s_mon_z_mz_._zozo_h<2mou_z_.5<._.zoo
`
`
`
`
`
`
`
`wmx<2dm=u=mm>zmmmw<I._.<I._.
`
`
`
`omEEmS
`
`zO_._.<s_mOu_z_
`
`Monster Worldwide, Inc. Exhibit 1022 (p.6/29)
`
`QOIEE
`
`
`
`>momo_>omn_zO_._.<_2mOmz_mo.5:
`
`
`
`mOHwMDOmmmo>._.m_<n_omh<60mw<
`
`0N.®_u_
`
`Hmmsowm
`
`
`
`._<:._z_mm._...._<mm5<mzO_._.<o_n=mm>
`
`
`
`
`
`
`
`
`
`Monster Worldwide, Inc. Exhibit 1022 (p.6/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 5 0f 12
`
`5,884,270
`
`K- 300
`
`RAM
`M
`
`ROM
`§1_5
`
`VIDEO
`MONITOR
`m
`
`VIDEO
`DRIVER
`E
`
`CRYPOTOGRAPHIC _ CPU _ COMMUNICATION
`PROCESSOR
`PORT
`E
`
`E
`
`m
`
`TO/FROM
`PUBLIC
`SWITCHED
`TELEPHONE
`NETWORK 1 10
`
`I
`
`MODEM
`E
`
`INPUT
`DEVICE
`
`INFORMATION
`STORAGE w
`
`FIG. 3
`
`Monster Worldwide, Inc. Exhibit 1022 (p.7/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 6 0f 12
`
`5,884,270
`
`VIDEO
`MONITOR
`5%
`
`VIDEO
`DRIVER
`4.2;
`
`f 400
`
`RAM
`41_0
`
`ROM
`%
`
`TO/FROM
`PUBLIC
`SWITCHED
`TELEPHONE
`NETWORK 1 10
`
`I
`
`CRYPOTOGRAPHIC
`PROCESSOR
`@
`
`CPU
`
`E
`
`COMMUNICATION
`PORT
`
`m
`
`MODEM
`{I5_0
`
`INPUT
`DEVICE
`M
`
`INFORMATION
`STORAGE @
`
`FIG. 4
`
`Monster Worldwide, Inc. Exhibit 1022 (p.8/29)
`
`

`

`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 7 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES ENCRYPTED PARTY DATA
`AND REQUESTOR DATA, DECRYPTS THE RECEIVED DATA, AND
`STORES THE DATA IN APPROPRIATE DATABASES _50—0
`
`7
`CENTRAL CONTROLLER PERFORMS A SEARCH OF THE
`PARTY DATA BASED UPON A SEARCH REQUEST AND
`TRANSMITS INFORMATION IN RESPONSE m
`
`V
`CENTRAL CONTROLLER RECEIVES "VERIFICATION OF
`INFORMATION" REQUEST AND VERIFIES THE PARTY
`DATA AN D/OR THE REQUESTOR DATA
`
`E
`
`7
`CENTRAL CONTROLLER ESTABLISHES, UPON REQUEST
`AND AGREEMENT, ANONYMOUS COMMUNICATIONS
`CHANNEL BETWEEN PARTY AND REQUESTOR
`
`530
`
`7
`
`CENTRAL CONTROLLER TRANSMITS BILL TO REQUESTOR
`AND DEBITS REQUESTOR ACCOUNT
`
`FIG. 5
`
`Monster Worldwide, Inc. Exhibit 1022 (p.9/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 8 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES SEARCH CRITERIA
`FROM REQUESTOR
`I
`CENTRAL CONTROLLER SEARCHES THE DATABASE FOR
`PARTY DATA MATCHING THE SEARCH CRITERIA
`610 T
`
`@Q
`
`I
`CENTRAL CONTROLLER TRANSMITS THE NUMBER OF PARTIES
`MATCHING THE SEARCH CRITERIA TO REQUESTOR
`
`DOES CENTRAL
`CONTROLLER RECEIVE SEARCH
`REQUEST CRITERIA CHANGES?
`
`DOES CENTRAL
`CONTROLLER RECEIVE REQUEST FOR
`PARTY DATA?
`Q?
`
`NO
`
`END
`TRANSACTION
`%
`
`GO TO FIG. 6B
`STEP 650
`
`FIG. 6A
`
`Monster Worldwide, Inc. Exhibit 1022 (p.10/29)
`
`

`

`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 9 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER TRANSMITS REQUEST FOR
`PARTY DATA TO PARTY
`
`END
`TRANSACTION
`@
`
`DOES CENTRAL
`CONTROLLER RECEIVE
`AUTHORIZATION TO RELEASE
`PARTY DATA?
`@
`
`CENTRAL CONTROLLER
`TRANSMITS
`AUTHORIZED PARTY
`DATA TO REQUESTOR
`
`CENTRAL CONTROLLER RECEIVES QUERY FROM PARTY
`FOR REQUESTOR DATA
`I
`CENTRAL CONTROLLER TRANSMITS QUERY FOR REQUESTOR
`DATA TO REQUESTOR
`
`??
`
`§7_0
`
`END
`TRANSACTION
`%
`
`NO
`
`DOES CENTRAL
`CONTROLLER RECEIVE
`REQUESTER'S AUTHORIZATION TO
`RELEASE REQUESTOR
`DATA?
`
`CENTRAL CONTROLLER TRANSMITS
`REQUESTOR DATA TO PARTY
`
`FIG. 6B
`
`Monster Worldwide, Inc. Exhibit 1022 (p.11/29)
`
`

`

`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 10 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES REQUEST FROM
`REQUESTOR TO VERIFY PARTY DATA
`
`7
`
`CENTRAL CONTROLLER TRANSMITS REQUEST TO
`VERIFICATION AUTHORITY
`
`7
`
`CENTRAL CONTROLLER RECEIVES VERIFICATION STATUS
`7_20
`
`7
`
`CENTRAL CONTROLLER TRANSMITS VERIFICATION
`STATUS TO REQUESTOR
`
`FIG. 7
`
`Monster Worldwide, Inc. Exhibit 1022 (p.12/29)
`
`

`

`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 11 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES REQUEST FROM
`REQUESTOR TO OPEN COMMUNICATION CHANNEL
`WITH PARTY
`I
`CENTRAL CONTROLLER TRANSMITS COMMUNICATION
`REQUEST TO PARTY
`
`m
`
`m
`
`DOES
`CENTRAL CONTROLLER
`RECEIvE ACCEPTANCE FROM PARTY TO
`OPEN COMMUNICATION
`CHANNEL?
`w
`
`END OF
`TRANSACTION
`830
`
`CENTRAL CONTROLLER OPENS REAL-TIME
`COMMUNICATIONS CHANNEL
`
`m
`
`CENTRAL CONTROLLER DEBITS REQUESTOR
`BILLING ACCOUNT
`
`850
`
`FIG. 8
`
`Monster Worldwide, Inc. Exhibit 1022 (p.13/29)
`
`

`

`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 12 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES MESSAGE
`FROM REQUESTOR
`
`‘
`w
`
`CENTRAL CONTROLLER STRIPS IOENTITY
`INFORMATION FROM MESSAGE
`
`910
`
`CENTRAL CONTROLLER TRANSMITS MESSAGE TO PARTY
`QC
`
`CENTRAL CONTROLLER RECEIVES RESPONSE FROM PARTY
`m
`
`CENTRAL CONTROLLER sTRIPs IDENTITY FROM MESSAGE
`CL
`
`CENTRAL CONTROLLER SENDS RESPONSE TO REOuEsTOR
`9L0
`
`FIG. 9
`
`Monster Worldwide, Inc. Exhibit 1022 (p.14/29)
`
`

`

`5,884,270
`
`1
`METHOD AND SYSTEM FOR
`FACILITATING AN EMPLOYMENT SEARCH
`INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS
`
`BACKGROUND OF THE INVENTION
`
`Field of the Invention
`
`The present invention relates to establishing anonymous
`communications betWeen tWo or more parties. More
`speci?cally, the invention relates to controlling the release of
`con?dential or sensitive information of at least one of the
`parties in establishing anonymous communications.
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`10
`
`15
`
`This application is related to US. patent application Ser.
`No. 08/711,437 entitled “METHOD AND SYSTEM FOR
`FACILITATING WHISTLE-BLOWING INCORPORAT
`20
`ING USER-CONTROLLED ANONYMOUS
`COMMUNICATIONS”, noW abandoned; application Ser.
`No. 08/708,969 entitled “METHOD AND SYSTEM FOR
`MATCHMAKING INCORPORATING USER
`CONTROLLED ANONYMOUS COMMUNICATIONS”;
`application Ser. No. 08/708,968 entitled “METHOD AND
`SYSTEM FOR ESTABLISHING AND MAINTAINING
`USER-CONTROLLED ANONYMOUS COMMUNICA
`TIONS”; and application Ser. No. 08/711,436 entitled
`“METHOD AND SYSTEM FOR FACILITATING NEGO
`TIATIONS INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS”, noW abandoned,
`each of Which ?led on Sep. 6, 1996 and assigned to the
`assignee of the present invention.
`
`25
`
`30
`
`Description of the Related Art
`
`The need for anonymous communications can be found in
`everyday situations. Police hotlines solicit tips from the
`public to help solve a crime, often Without requiring callers
`to give their names. Cash reWards are often offered for the
`return of missing items With no questions asked.
`One form of anonymity involves “shielded identity,”
`Where a trusted agent knoWs the identity of a masked party,
`but does not reveal that identity to others except under very
`special circumstances. Unless otherWise speci?ed, the term
`“anonymity” is used throughout this application inter
`changeably With the notion of shielded identity.
`Shielded identity appears in a Wide range of useful and
`commercial functions. Acompany might run an employment
`advertisement in a neWspaper With a blind PO. box knoWn
`only to the publisher. A grand jury could hear testimony
`from a Witness Whose identity is knoWn only to the pros
`ecutor and the judge, but is concealed from the jurors, the
`accused, and opposing counsel. A person could identify a
`criminal suspect from a lineup of people Who cannot see
`him. A recruiter could contact potential candidates for a job
`opening Without revealing the client’s name. Witness pro
`tection programs are designed to shield the true identity of
`Witnesses enrolled in the programs. A sexual harassment
`hotline could be set up for victims of sexual harassment to
`call in With their complaints, While promising to protect the
`callers’ identities.
`The above examples illustrate the need for anonymity or
`shielded identity due to a fear of exposure. The nee for
`anonymity can also be motivated by a desire for privacy. For
`instance, donors may Wish to make an anonymous charitable
`
`35
`
`45
`
`55
`
`60
`
`65
`
`2
`contribution, an adoption agency typically shields the is
`entity of a child’s birth mother, a Catholic confessional
`offers anonymous unburdening of the soul, and local phone
`companies maintain millions of unlisted telephone numbers
`accessible only by special operators.
`The concepts of anonymity and shielded identity do not
`lend themselves to conventional communication systems.
`While it is possible to send and receive anonymous
`messages, such as a postcard With no return address or a call
`placed from a pay phone, it is difficult for parties e gaged in
`multiple communication episodes to remain anonymous
`from one another. In general conventional communication
`systems are premised upon the notion that communicating
`parties knoW each other’s identity. For the purposes of this
`invention, the term “communications system” refers to any
`system that facilitates an ongoing cycle of messages and
`responses.
`Most current communications systems, Whether Written or
`oral, do not permit an ongoing, multi-party, shielded identity
`dialogue. For example, letters need an address to be
`delivered, calling someone on the phone requires a phone
`number, and meeting face-to-face provides for visual iden
`ti?cation. The process involved in most ongoing communi
`cation systems is simply not conducive to retaining con
`cealed identities.
`Yet, in some cases, concealing identity can actually
`encourage or facilitate communication betWeen unWilling or
`cautious parties. For example, a party negotiating a peace
`treaty With another may be unWilling to reveal his identity
`because, if the negotiations fail, that party might be exposed
`or subjected to potential blackmail.
`One speci?c example of the need for concealing identities
`is in the employment search process, Where the release of the
`name of the hiring company (or the position involved) could
`be damaging to the company. The hiring company might be
`concerned about hoW potential competitors Would use the
`knoWledge that the company is searching for employees to
`upset customers Who are relying on the stability of the
`company. Mere speculation that a company is searching for
`a neW president could dramatically reduce the price of the
`company’s stock. To ?nd potential candidates for the vacant
`position, the company could engage an employment search
`?rm to discretely ?nd potential candidates Without disclos
`ing to the market, or even potential candidates, the compa
`ny’s identity until the company decides to con?de in or hire
`a particular candidate.
`In engaging such employment search ?rms, hoWever, a
`hiring company entails some risk that the search ?rm Will
`prematurely or indiscriminately reveal the company’s iden
`tity to a potential candidate. Search ?rms are generally
`compensated based upon the number of successful
`placements, and thus are motivated to make vacant positions
`appear as attractive as possible to potential candidates. In
`doing so, search ?rms could be tempted to reveal enough
`information about the company for potential candidates to
`discover the identity of the company, or, for that matter, the
`?rms may reveal the company’s identity itself. Accordingly,
`hiring companies cannot be counted upon to maintain effec
`tive control of What information is released to potential
`candidates, and thus are unable to instill any satisfactory
`degree of con?dence in their clients about the con?dential
`status of their search for job replacements.
`The use of search ?rms also creates inef?ciencies. In
`dealing With a search ?rm, candidates looking for a neW job
`may engage in a dialogue With the search ?rm, asking a
`series of detailed questions about the particular job, com
`
`Monster Worldwide, Inc. Exhibit 1022 (p.15/29)
`
`

`

`5,884,270
`
`3
`pany expectations, various quali?cation criteria, bene?ts,
`options, perks, and other factors, all Without the candidate
`knowing the name of the hiring company. In response, the
`search ?rm may reveal, from general to speci?c, information
`about the hiring company. For instance, in response to
`questions, the search ?rm may successively reveal that the
`hiring company is a Fortune 500 company, a transportation
`company, an airline, headquartered in the MidWest, and,
`?nally, that it is United Airlines. In return, the candidate may
`also authoriZe the search ?rm to release information about
`itself For instance, the search ?rm may disclose that the
`candidate is employed at a small softWare company, that he
`is the head of a softWare development group of seven
`programmers, then that he is earning $75,000 plus a $20,000
`bonus in his current job, then that he is located in the
`Stamford, Conn. area and then ?nally his identity.
`From the outside, these actions may appear to be a type
`of “dance,” Where each party seeks to learn the necessary
`information to keep the process moving forWard. To ansWer
`any dif?cult questions, the search ?rm, trusted by both
`parties, facilitates an assisted dialogue betWeen the candi
`date and the company.
`By creating this additional layer in the communication
`process, hoWever, the amount of effort and expense incurred
`by the hiring party and the candidates increases. Further,
`using such a search ?rm creates delays in communicating
`information betWeen the company and the candidates and
`increases the likelihood that misunderstandings may occur.
`In addition, the success of a search ?rm to ?ll a position
`is limited by the number of candidates that the search ?rm
`contacts. Search ?rms may target only certain individuals
`While overlooking many other quali?ed candidates Who, if
`contacted, Would have been very interested in considering
`the available positions. As such, search ?rms often do not
`reach a large pool of potential candidates. Search ?rms also
`knoW that the candidates most quali?ed for jobs are those
`that are currently employed. Recruiters Would love to be
`able to shoW these coveted employees even better opportu
`nities. Unfortunately, search ?rms have no Way of identify
`ing and contacting these prime candidates. Present systems
`for recruiting typically rely on the candidate to present
`himself to the recruiter—at a substantial risk to the
`employee. No system currently gives an employee the
`incentive and protection he needs to feel comfortable sub
`mitting his resume.
`Another area in Which shield identity may be desirable is
`dating. For example, a person could serve as a match-maker
`by setting up tWo people With Whom he is acquainted on a
`blind date. Before agreeing to go on the date, each acquain
`tance may ask the match-maker questions about the other
`person and instruct the match-maker not to reveal his/her
`identity Without prior authoriZation. Once each of the
`acquaintances feels comfortable about the other person,
`he/she may authoriZe the match-maker to reveal his/her
`identity and agree to the date.
`Again, hoWever, the use of match-makers suffers from the
`same draWbacks as the search ?rms. There is little or no
`control over What information match-makers disclose. For
`instance, a match-maker may feel greater loyalty to one of
`the acquaintances and Willingly divulge the identity of the
`other acquaintance. Also, using match-makers sloWs doWn
`the communication process and can result in miscommuni
`cation. Finally, the number of people that a match-maker can
`set up is limited by the number of people to Whom the
`match-maker is acquainted.
`Attempts have been made to automate the employment
`search process and matchmaking process. For instance, US.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`4
`Pat. No. 5,164,897 discloses an automated method for
`selecting personnel matching certain job criteria. Databases
`storing employee quali?cations are searched to identify
`Which personnel have quali?cations matching search crite
`ria. Such a system, hoWever, does not provide anonymous
`communications betWeen the employer and the employee
`and does not provide control over the release of information
`stored Within those systems to others. Thus, there is a need
`for a system that alloWs users to exercise control over the
`release of information to others and that provides ef?cient
`anonymous communication.
`
`SUMMARY OF THE INVENTION
`
`Accordingly, the present invention is directed to a com
`munications method and system that obviates problems due
`to limitations and disadvantages of the prior art.
`A goal of the invention is to provide a communication
`system incorporating a central database of information sup
`plied by one or more of parties and managed by a central
`administrator, Where all parties to the system can manage
`and control the release of any or all information about
`themselves or their identities, and Where such a system
`alloWs for electronic-based communications betWeen the
`parties Without the necessity of revealing the identity of
`either party.
`Another goal of the invention to alloW parties to submit
`criteria for searching a trusted agent’s con?dential database
`and receive a count of the number of records that satisfy the
`criteria, Without revealing the identities of the parties asso
`ciated With those records.
`A further goal of the invention is to alloW a system
`administrator to send a request for authoriZation to release
`information about a party to a searching party.
`Other goals of the invention are to provide a system that
`encrypts communications betWeen parties to maintain the
`anonymity of the parties; to authenticate searchable infor
`mation contained in a central database for release to parties;
`to alloW one or both parties to receive compensation for
`contributing or maintaining information accessible in a
`database; and to alloW one party to apply a customiZed
`scoring algorithm to information contained about other
`parties in a database.
`Still other goals of this invention are to provide a system
`for a trusted agent to act as an anonymous remailer or
`communicate via e-mail or other electronic means With
`speci?c outside parties requested or identi?ed by one of the
`parties to validate information about the parties.
`Yet another goal of the invention is to be able to store and
`authenticate such information that may be provided by
`outside parties in a central database While alloWing the
`outside parties to retain control over the release of respective
`information to other parties.
`This invention meets these goals by alloWing a party to
`maintain effective control over the timing and release of
`certain information stored in a database, including the par
`ty’s identity and other relevant data about the party, to
`another party. This controlled release of identity can be
`performed gradually in a series of steps Where the party
`authoriZes release of more and more information. The inven
`tion also authenticates information stored in the database
`before releasing the information, thereby improving the
`reliability of the released information. Finally, the invention
`establishes a communications channel betWeen a party and
`a requestor While not necessarily revealing the identity of the
`party and/or the requestor to each other. The controlled
`release of information in the invention alloWs for neW
`
`Monster Worldwide, Inc. Exhibit 1022 (p.16/29)
`
`

`

`5,884,270
`
`5
`improvements in the quality of the communication process
`When one party to the process Would suffer signi?cant costs
`or be exposed to signi?cant risks if their identity Were
`released prematurely or indiscriminately.
`According to the present invention, a method and system
`is disclosed for operating a computer system to facilitate an
`exchange of identities betWeen tWo anonymous parties. The
`method and system are operative to receive from a ?rst party
`?rst data including an identity of the ?rst party and to receive
`from the ?rst party at least tWo ?rst-party rules for releasing
`the ?rst data including a rule for releasing the identity of said
`?rst party. The system and method are further operative to
`receive from a second party a search request comprising at
`least one search criterion; receive from the second party
`second data including an identity of the second party; and
`receive from the second party at least tWo second-party rules
`for releasing the second party data including a rule for
`releasing the identity of the second party.
`The system and method are further operative to process
`said search request to determine if the ?rst data satis?es the
`search criterion and if so, then exchanging the ?rst and
`second data, except the identities of the ?rst and second
`parties, betWeen the ?rst and second parties in accordance
`With the ?rst-party and second-party rules. The system and
`method are further operative to transmit the identity of the
`?rst party to the second party after the exchanging step, upon
`satisfying the ?rst-party rule for releasing the identity of the
`?rst party, and after the exchanging step, upon satisfying the
`second-party rule for releasing the identity of the second
`party, transmitting the identity of the second party to the ?rst
`party.
`BRIEF DESCRIPTION OF THE DRAWINGS
`The accompanying draWings provide a further under
`standing of the invention and are incorporated in and con
`stitute a part of this speci?cation. The draWings illustrate
`preferred embodiments of the invention, and, together With
`the description, serve to explain the principles of the inven
`tion.
`In the draWings:
`FIG. 1 illustrates one embodiment of the present inven
`tion;
`FIG. 2A illustrates a block diagram of the central con
`troller of the system in accordance With the embodiment in
`FIG. 1;
`FIG. 2B illustrates the contents of a party data database
`and a requestor data database in accordance With the
`embodiment in FIG. 1;
`FIG. 2C illustrates the contents of a veri?cation database
`and an account database in accordance With the embodiment
`in FIG. 1;
`FIG. 3 illustrates a block diagram of a party terminal in
`accordance With the embodiment in FIG. 1;
`FIG. 4 illustrates a block diagram of a requestor terminal
`in accordance With the embodiment in FIG. 1;
`FIG. 5 illustrates a How diagram of a preferred method for
`establishing anonymous communications in accordance
`With this invention;
`FIGS. 6A—6B illustrate a How diagram of a preferred
`method for searching for and releasing party data in accor
`dance With this invention;
`FIG. 7 illustrates a How diagram of a preferred method for
`verifying the authenticity and accuracy of party data in
`accordance With this invention;
`FIG. 8 illustrates a How diagram of a preferred method for
`opening a communications channel betWeen a party and a
`requestor in accordance With this invention; and
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`FIG. 9 illustrates a detailed ?oW diagram of a preferred
`method for transmitting party and requestor information in
`a communications channel in accordance With this inven
`tion.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`System Structure
`
`FIG. 1 illustrates one embodiment of an anonymous
`communication system 100 according to this invention.
`System 100 identi?es parties having characteristics of inter
`est to a requestor, releases certain information about the
`identi?ed parties to the requestor With authoriZation from the
`parties, releases certain information about the requestor to
`the identi?ed parties With authoriZation from the requestor,
`and provides a communications channel betWeen the iden
`ti?ed parties and the requestor While maintaining their
`anonymity. For example, system 100 can be used to alloW an
`employer (the requestor) to communicate With prospective
`candidates (the parties) Whose background satis?es employ
`ment criteria provided by the employer Without revealing the
`identity of the employer or the identities of the candidates.
`In a speci?c example, a softWare company may Want to hire
`a programmer With 5+ years experience in Writing C++, Who
`is Willing to live in Seattle, Who Will Work 12—14 hour days
`6 days a Week, Who Will Work for betWeen $100,000 to
`$150,000 in salary plus bonuses, and Who Wants the oppor
`tunity to Work for a startup With stock options in a publicly
`traded company that could effectively double his salary.
`System 100 could identify a doZen candidates from resumes
`stored in a database, release information about these candi
`dates only as authoriZed to the company, and deliver mes
`sages betWeen the company and candidates Without the
`company ever knoWing the candidates identities. Although
`the invention can be used in connection With other
`applications, for the purpose of illustration, the employment
`search example is used throughout the speci?cation.
`System 100 includes a public sWitched phone netWork
`110, a central controller 200, party terminals 300, and
`requestor terminals 400. Central controller 200, party ter
`minals 300, and requestor terminal 400 preferably connect
`to netWork 110 through respective tWo-Way communication
`links. Parties (e.g., candidates) access system 100 through
`respective party terminals 300, and a requestor (e.g., an
`employer) accesses system 100 through requestor terminal
`400. The How of data from terminals 300 and 400 is
`preferably limited and controlled by central controller 200.
`Under the control of central controller 200, public
`sWitched telephone netWork 110 routes data to and from
`central controller 200, party terminals 300, and requestor
`terminal 400. In a preferred embodiment, netWork 110
`comprises a commercially-implemented netWork of
`computer-controlled telephone sWitches operated by, for
`example, a telephone company. NetWork 110 may also
`include communication netWorks other than a public
`sWitched telephone netWork, such as a Wireless netWork, a
`paging netWork, or the Internet.
`Central controller 200 controls the How of data to and
`from party terminals 300 and requestor terminal 400.
`Preferably, central controller 200 stores and authenticates
`the authorship of “party data” and “requestor data” received
`from party terminals 300 and requestor terminal 400, re

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket