`Walker et al.
`
`[19]
`
`USOOS 884270A
`Patent Number:
`Date of Patent:
`
`[11]
`[45]
`
`5,884,270
`Mar. 16, 1999
`
`[54] METHOD AND SYSTEM FOR
`FACILITATING AN EMPLOYMENT SEARCH
`INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS
`
`Inventors: Jay S. Walker, Ridge?eld, Conn.;
`Bruce Schneier, Minneapolis, Minn; T.
`Scott Case, Darien, Conn.
`
`Assignee: Walker Asset Management Limited
`Partnership, Stamford, Conn.
`
`Appl. No.: 704,314
`Filed:
`Sep. 6, 1996
`
`Int. Cl.6 .................................................... .. G06F 17/30
`US. Cl. ........................... .. 705/1; 705/26; 379/93.12;
`395/200.57; 364/222.2; 364/284
`Field of Search .................................. .. 705/37, 1, 26;
`455/2; 380/20, 30, 25; 379/9312; 395/200.57;
`364/222.2, 284
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,218,738
`4,847,890
`4,870,591
`4,914,698
`4,961,224
`4,962,449
`4,962,532
`
`8/1980
`7/1989
`9/1989
`4/1990
`10/1990
`10/1990
`10/1990
`
`Matyas et al. .......................... .. 380/25
`Solomon et al.
`379/67
`Cicciarelli et al. ..
`364/468.14
`
`Chaum . . . . . . . . . . . . . . . . .
`
`. . . . .. 380/30
`
`Yung . . . . . . . . . . . .
`
`. . . . .. 380/25
`
`395/186
`Schlesinger .... ..
`Kasiraj et al. .......................... .. 380/25
`
`(List continued on neXt page.)
`
`FOREIGN PATENT DOCUMENTS
`
`6- 19943
`6-224938
`
`1/1994 Japan.
`8/1994 Japan.
`
`OTHER PUBLICATIONS
`
`A. Michael Froomkin, “Flood Control On The Information
`Ocean: Living With Anonymity, Digital Cash, and Distrib
`uted Databases,” Conference for the Second Century of the
`Univ. of Pittsburgh School of LaW: The Adequacy of Current
`
`Legal Paradigms to Meet Future Challenges (Sep. 21, 1995).
`Aaron Weiss, “Grad Seeks Job”, Internet World, pp. 76—79
`(Sep. 1996).
`Jeff Ubois, “Anonymity Has Its Place; Questions Concern
`ing On—Line Anonymity Arise,” Information Access Com
`pany, vol. 8, No. 8, p. 28(Apr. 28, 1995).
`Debora Sparr et al., “The Net”, Harvard Business Review, p.
`125(May/Jun. 1996).
`Gary H. Anthes, “Stealth E—mail Poses Corporate Security
`Rsik”, Computerworla', p. 1 (Feb. 12, 1996).
`Michelle Quinn, “Web Site For Fake E—Mail Back?res On
`Operator”, The San Diego Union—Tribune, Ed. 1—8, p. 7
`(Jun. 20, 1995).
`Jim MilloWay, “Corporate Employment Bulletin Board ”,
`WebSta?i Inc., 1996.
`Peter LeWis, “Cloaks and Daggers”, Vantage Point, p. 133
`(Jul. 1996).
`Lisa Sanders, “Smile, You’re On Job—Candidate Camera”,
`Business Week, p. 6 (Aug. 5, 1996).
`“Restrac Expands Internet Recruiting .
`(Jul. 10, 1996).
`“Romancing The Internet”, Business Wire (Jul. 12, 1995).
`Quay Partners Int’l., Ltd., “Net Gain For Recruiting”, U.S.
`Banker (Jul. 1996).
`Primary Examiner—Parshotam S. Lall
`Assistant Examiner—David M. OvedovitZ
`Attorney, Agent, or Firm—Jeffrey L. Brandt
`
`. ”, Business Wire
`
`.
`
`[57]
`
`ABSTRACT
`
`A system for facilitating employment searches using anony
`mous communications includes a plurality of party
`terminals, a plurality of requestor terminals, and a central
`controller. The system receives and stores employment data
`about prospective employment candidates. Upon receiving
`criteria for candidates of interest from an employer and
`authorization from the candidates, the central controller
`releases to the employer the employment data associated
`With the candidates. The system also establishes communi
`cations channels betWeen the employer and the candidates,
`While maintaining their anonymity.
`
`33 Claims, 12 Drawing Sheets
`
`K100
`
`PARTY
`TERMINAL
`
`PARTV
`TERMINAL
`
`PARTY
`TERMINAL
`
`PUBLIC
`SWITCHED TELEPHONE
`NETWORK
`m
`
`CENTRAL
`CONTROLLER
`m
`
`REQUESTOR
`TERMINAL
`
`Monster Worldwide, Inc. Exhibit 1022 (p.1/29)
`
`
`
`5,884,270
`Page 2
`
`US. PATENT DOCUMENTS
`
`5,416,694
`
`5/1995 Parrish et a1. ............................ .. 705/8
`
`570187096
`
`5/1991 Aoyama ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " 711/164
`
`5,459,859 10/1995 Senda ...................................... .. 707/10
`
`
`
`Solomon et a1~ ' 5,077,665 12/1991 Silverman et a1_
`
`4/1992 Smith et a1.
`5,107,443
`5,164,897 11/1992 Clark etal.
`275x53‘? 1513343‘ 5015931 etta1i~
`
`,
`
`,
`
`aoneea....
`
`~
`
`705/37
`
`. 345/331
`-- 705/1
`733/53;
`
`.... ..
`
`' 379/671
`
`5,495,412
`
`
`
`CO'TbCIt .................................. .. 2/1996 Thlessen ................................... .. 705/1
`
`5,500,513
`5,509,064
`5,553,145
`
`3/1996 Langhans et a1. .................... .. 235/380
`4/1996 Welner et a1. ........................ .. 370/265
`9/1996 Micali ..................................... .. 380/30
`
`5,608,446
`
`3/1997 Carr et a1. ................................. .. 348/6
`
`573617295 11/1994 Solomon et a1‘ '
`
`5,400,393
`
`3/1995 Knuth et a1. ....................... .. 379/8827
`
`5,689,799 11/1997 Dougherty etal- ....................... .. 455/2
`
`Morales ~~~~~~~ u
`
`Fraser ...................................... ..
`
`Monster Worldwide, Inc. Exhibit 1022 (p.2/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 1 0f 12
`
`5,884,270
`
`100
`/'
`
`PARTY
`TERMINAL
`£9
`
`PARTY
`TERMINAL
`w
`
`PARTY
`TERMINAL
`2%
`
`PUBLIC
`SWITCHED TELEPHONE
`NETWORK
`HQ
`
`CSETNJCZYXLLER
`E9
`
`REQUESTOR
`TERMINAL
`5%
`
`FIG. 1
`
`Monster Worldwide, Inc. Exhibit 1022 (p.3/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 2 0f 12
`
`5,884,270
`
`/ 200
`
`RAM
`
`m
`
`CRYPTOGRAPHIC
`PROCESSOR
`
`A‘!
`
`ROM
`
`12-9
`
`CPU
`203
`
`250
`
`TO/ FROM
`PUBLIC
`SWITCHED
`TELEPHQNE
`NETWORK 110
`
`I
`
`NETWORK
`INTERFACE
`E
`
`//,__
`V
`
`PARTY DATA
`DATABASE 2_5§
`
`REQUESTOR DATA
`DATABASE @
`
`VERIFICATION
`DATABASE ZZQ
`
`ACCOUNT
`DATABASE E
`
`V/
`
`FIG. 2A
`
`Monster Worldwide, Inc. Exhibit 1022 (p.4/29)
`
`
`
`US. Patent
`
`Mar. 16, 1999
`
`Sheet 3 0f 12
`
`5,884,270
`
`
`
`m._.<o_oz<oIo__._>>
`
`
`
`>z<n_s_oo10$.
`
`mm.QE
`
`8Nmm<mE<o<20mohmmzomm
`
`
`
`mm<mjmmH02._.__>>Qz<._.=>>
`
`
`
`mw<m._mm.52._.__>>oz<._.__>>
`
`
`>z<ms_oomI._.mm._.<n_52<o”.0575mm
`Cm:w§<z o_mw§32<_._n_._<E52:919.3393
`
`
`O._.Qmm<m_._mmmm._.__>>zo_r~<§mou_z_
`«6530mm2:EWEE”.98m:mEzoDBwn.no5:c95:5283me
`
`mmaaozOm._<.9.zO_._.<s_mOu_z_zo_._.<NEOI_b<
`
`
`
`
`._.<_._>>OHm<zO_H<s_mOu_z_EEO”?—
`
` o_._.w_mm._.o<m<_._oBmIm__>_<zDEEq38$
`
`OEDSOmQSPxE>mo._.m=._>z<a_>_oo
`
`
`OHSfiOmoSfiXE.men—OWE._<_oz<zE
`
`
`O_QD<\Omn__>>_.Xm._.szEmEOmmomow
`
`
`._.xm_._...__<s_-m
`
`._.xm_._.szIQ
`
`m._.<n__oz<om_.:.ww_z<n=200mom..__u_0mn_
`mawaits<20>55
`
`9.omm<mjmmmm.3_>>zO_._.<s_mo.._z_
`
`tag259ESE9am:26283meno5:cm:5:5283me
`
`
`
`mmo:._oz_Om._<.OHzO_._.<s_mon_z_zO_._.<N_mOIS<
`
`._.<_._>>O._.w<zOF<_>_mou_z_Manama
`oEmEDz<IE<msgz:o.>E<m
` o_._.w_mm:o<m<IoQ._m__n_m=2<z9mmw58$
`
`
`
`
`
`O_QD<\Omo_>:.xm._.>mo._.w=._zO_._.<oaom
`
`
`O_QD<\Om_n=>me._.wkwmmmkzmeSO
`
`
`O_DD<\OmQ_>\._.wa>mO._.w_I._.2m_s_>o._n=2m
`b9mszz
`
`._.xw._.MZOIm
`
`CAB.wmmmoo<
`
`Monster Worldwide, Inc. Exhibit 1022 (p.5/29)
`
`Monster Worldwide, Inc. Exhibit 1022 (p.5/29)
`
`
`
`US. Patent
`
`Mar. 16, 1999
`
`Sheet 4 0f 12
`
`5,884,270
`
`Hzaooo<
`
`
`0Em232<zn3<E62:9mohwmnomfimo>E<mo_mm§:z<zn:<£6239mmEEm>
`o_._.w_m_m._o<m<_._oSuims_<z0dr.ofiwEmB<m<Io9mmm2<z9mm
`
`
`
`
`
`oEmzzzmozS<mFzmmmso
`
`._.xm_._."03.2.5
`Cm:QmOHwMSOmE
`wkmm<m<p<oHzaooo<cummw<m<._.<n_zo_.r<o_u__mm_>
`8ng33
`oz_._.=m:.zw2><n_o_mm§32<xn_._<mngzamo>._.~_<n_
`
`
`
`..=<s_-m.szIm02530;.rxmz.
`
`
`o._.mzo_._.<s_mon_z_mz_._zozo_h<2mou_z_.5<._.zoo
`
`
`
`
`
`
`
`wmx<2dm=u=mm>zmmmw<I._.<I._.
`
`
`
`omEEmS
`
`zO_._.<s_mOu_z_
`
`Monster Worldwide, Inc. Exhibit 1022 (p.6/29)
`
`QOIEE
`
`
`
`>momo_>omn_zO_._.<_2mOmz_mo.5:
`
`
`
`mOHwMDOmmmo>._.m_<n_omh<60mw<
`
`0N.®_u_
`
`Hmmsowm
`
`
`
`._<:._z_mm._...._<mm5<mzO_._.<o_n=mm>
`
`
`
`
`
`
`
`
`
`Monster Worldwide, Inc. Exhibit 1022 (p.6/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 5 0f 12
`
`5,884,270
`
`K- 300
`
`RAM
`M
`
`ROM
`§1_5
`
`VIDEO
`MONITOR
`m
`
`VIDEO
`DRIVER
`E
`
`CRYPOTOGRAPHIC _ CPU _ COMMUNICATION
`PROCESSOR
`PORT
`E
`
`E
`
`m
`
`TO/FROM
`PUBLIC
`SWITCHED
`TELEPHONE
`NETWORK 1 10
`
`I
`
`MODEM
`E
`
`INPUT
`DEVICE
`
`INFORMATION
`STORAGE w
`
`FIG. 3
`
`Monster Worldwide, Inc. Exhibit 1022 (p.7/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 6 0f 12
`
`5,884,270
`
`VIDEO
`MONITOR
`5%
`
`VIDEO
`DRIVER
`4.2;
`
`f 400
`
`RAM
`41_0
`
`ROM
`%
`
`TO/FROM
`PUBLIC
`SWITCHED
`TELEPHONE
`NETWORK 1 10
`
`I
`
`CRYPOTOGRAPHIC
`PROCESSOR
`@
`
`CPU
`
`E
`
`COMMUNICATION
`PORT
`
`m
`
`MODEM
`{I5_0
`
`INPUT
`DEVICE
`M
`
`INFORMATION
`STORAGE @
`
`FIG. 4
`
`Monster Worldwide, Inc. Exhibit 1022 (p.8/29)
`
`
`
`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 7 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES ENCRYPTED PARTY DATA
`AND REQUESTOR DATA, DECRYPTS THE RECEIVED DATA, AND
`STORES THE DATA IN APPROPRIATE DATABASES _50—0
`
`7
`CENTRAL CONTROLLER PERFORMS A SEARCH OF THE
`PARTY DATA BASED UPON A SEARCH REQUEST AND
`TRANSMITS INFORMATION IN RESPONSE m
`
`V
`CENTRAL CONTROLLER RECEIVES "VERIFICATION OF
`INFORMATION" REQUEST AND VERIFIES THE PARTY
`DATA AN D/OR THE REQUESTOR DATA
`
`E
`
`7
`CENTRAL CONTROLLER ESTABLISHES, UPON REQUEST
`AND AGREEMENT, ANONYMOUS COMMUNICATIONS
`CHANNEL BETWEEN PARTY AND REQUESTOR
`
`530
`
`7
`
`CENTRAL CONTROLLER TRANSMITS BILL TO REQUESTOR
`AND DEBITS REQUESTOR ACCOUNT
`
`FIG. 5
`
`Monster Worldwide, Inc. Exhibit 1022 (p.9/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 8 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES SEARCH CRITERIA
`FROM REQUESTOR
`I
`CENTRAL CONTROLLER SEARCHES THE DATABASE FOR
`PARTY DATA MATCHING THE SEARCH CRITERIA
`610 T
`
`@Q
`
`I
`CENTRAL CONTROLLER TRANSMITS THE NUMBER OF PARTIES
`MATCHING THE SEARCH CRITERIA TO REQUESTOR
`
`DOES CENTRAL
`CONTROLLER RECEIVE SEARCH
`REQUEST CRITERIA CHANGES?
`
`DOES CENTRAL
`CONTROLLER RECEIVE REQUEST FOR
`PARTY DATA?
`Q?
`
`NO
`
`END
`TRANSACTION
`%
`
`GO TO FIG. 6B
`STEP 650
`
`FIG. 6A
`
`Monster Worldwide, Inc. Exhibit 1022 (p.10/29)
`
`
`
`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 9 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER TRANSMITS REQUEST FOR
`PARTY DATA TO PARTY
`
`END
`TRANSACTION
`@
`
`DOES CENTRAL
`CONTROLLER RECEIVE
`AUTHORIZATION TO RELEASE
`PARTY DATA?
`@
`
`CENTRAL CONTROLLER
`TRANSMITS
`AUTHORIZED PARTY
`DATA TO REQUESTOR
`
`CENTRAL CONTROLLER RECEIVES QUERY FROM PARTY
`FOR REQUESTOR DATA
`I
`CENTRAL CONTROLLER TRANSMITS QUERY FOR REQUESTOR
`DATA TO REQUESTOR
`
`??
`
`§7_0
`
`END
`TRANSACTION
`%
`
`NO
`
`DOES CENTRAL
`CONTROLLER RECEIVE
`REQUESTER'S AUTHORIZATION TO
`RELEASE REQUESTOR
`DATA?
`
`CENTRAL CONTROLLER TRANSMITS
`REQUESTOR DATA TO PARTY
`
`FIG. 6B
`
`Monster Worldwide, Inc. Exhibit 1022 (p.11/29)
`
`
`
`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 10 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES REQUEST FROM
`REQUESTOR TO VERIFY PARTY DATA
`
`7
`
`CENTRAL CONTROLLER TRANSMITS REQUEST TO
`VERIFICATION AUTHORITY
`
`7
`
`CENTRAL CONTROLLER RECEIVES VERIFICATION STATUS
`7_20
`
`7
`
`CENTRAL CONTROLLER TRANSMITS VERIFICATION
`STATUS TO REQUESTOR
`
`FIG. 7
`
`Monster Worldwide, Inc. Exhibit 1022 (p.12/29)
`
`
`
`U.S. Patent
`
`Mar. 16,1999
`
`Sheet 11 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES REQUEST FROM
`REQUESTOR TO OPEN COMMUNICATION CHANNEL
`WITH PARTY
`I
`CENTRAL CONTROLLER TRANSMITS COMMUNICATION
`REQUEST TO PARTY
`
`m
`
`m
`
`DOES
`CENTRAL CONTROLLER
`RECEIvE ACCEPTANCE FROM PARTY TO
`OPEN COMMUNICATION
`CHANNEL?
`w
`
`END OF
`TRANSACTION
`830
`
`CENTRAL CONTROLLER OPENS REAL-TIME
`COMMUNICATIONS CHANNEL
`
`m
`
`CENTRAL CONTROLLER DEBITS REQUESTOR
`BILLING ACCOUNT
`
`850
`
`FIG. 8
`
`Monster Worldwide, Inc. Exhibit 1022 (p.13/29)
`
`
`
`U.S. Patent
`
`Mar. 16, 1999
`
`Sheet 12 0f 12
`
`5,884,270
`
`CENTRAL CONTROLLER RECEIVES MESSAGE
`FROM REQUESTOR
`
`‘
`w
`
`CENTRAL CONTROLLER STRIPS IOENTITY
`INFORMATION FROM MESSAGE
`
`910
`
`CENTRAL CONTROLLER TRANSMITS MESSAGE TO PARTY
`QC
`
`CENTRAL CONTROLLER RECEIVES RESPONSE FROM PARTY
`m
`
`CENTRAL CONTROLLER sTRIPs IDENTITY FROM MESSAGE
`CL
`
`CENTRAL CONTROLLER SENDS RESPONSE TO REOuEsTOR
`9L0
`
`FIG. 9
`
`Monster Worldwide, Inc. Exhibit 1022 (p.14/29)
`
`
`
`5,884,270
`
`1
`METHOD AND SYSTEM FOR
`FACILITATING AN EMPLOYMENT SEARCH
`INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS
`
`BACKGROUND OF THE INVENTION
`
`Field of the Invention
`
`The present invention relates to establishing anonymous
`communications betWeen tWo or more parties. More
`speci?cally, the invention relates to controlling the release of
`con?dential or sensitive information of at least one of the
`parties in establishing anonymous communications.
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`10
`
`15
`
`This application is related to US. patent application Ser.
`No. 08/711,437 entitled “METHOD AND SYSTEM FOR
`FACILITATING WHISTLE-BLOWING INCORPORAT
`20
`ING USER-CONTROLLED ANONYMOUS
`COMMUNICATIONS”, noW abandoned; application Ser.
`No. 08/708,969 entitled “METHOD AND SYSTEM FOR
`MATCHMAKING INCORPORATING USER
`CONTROLLED ANONYMOUS COMMUNICATIONS”;
`application Ser. No. 08/708,968 entitled “METHOD AND
`SYSTEM FOR ESTABLISHING AND MAINTAINING
`USER-CONTROLLED ANONYMOUS COMMUNICA
`TIONS”; and application Ser. No. 08/711,436 entitled
`“METHOD AND SYSTEM FOR FACILITATING NEGO
`TIATIONS INCORPORATING USER-CONTROLLED
`ANONYMOUS COMMUNICATIONS”, noW abandoned,
`each of Which ?led on Sep. 6, 1996 and assigned to the
`assignee of the present invention.
`
`25
`
`30
`
`Description of the Related Art
`
`The need for anonymous communications can be found in
`everyday situations. Police hotlines solicit tips from the
`public to help solve a crime, often Without requiring callers
`to give their names. Cash reWards are often offered for the
`return of missing items With no questions asked.
`One form of anonymity involves “shielded identity,”
`Where a trusted agent knoWs the identity of a masked party,
`but does not reveal that identity to others except under very
`special circumstances. Unless otherWise speci?ed, the term
`“anonymity” is used throughout this application inter
`changeably With the notion of shielded identity.
`Shielded identity appears in a Wide range of useful and
`commercial functions. Acompany might run an employment
`advertisement in a neWspaper With a blind PO. box knoWn
`only to the publisher. A grand jury could hear testimony
`from a Witness Whose identity is knoWn only to the pros
`ecutor and the judge, but is concealed from the jurors, the
`accused, and opposing counsel. A person could identify a
`criminal suspect from a lineup of people Who cannot see
`him. A recruiter could contact potential candidates for a job
`opening Without revealing the client’s name. Witness pro
`tection programs are designed to shield the true identity of
`Witnesses enrolled in the programs. A sexual harassment
`hotline could be set up for victims of sexual harassment to
`call in With their complaints, While promising to protect the
`callers’ identities.
`The above examples illustrate the need for anonymity or
`shielded identity due to a fear of exposure. The nee for
`anonymity can also be motivated by a desire for privacy. For
`instance, donors may Wish to make an anonymous charitable
`
`35
`
`45
`
`55
`
`60
`
`65
`
`2
`contribution, an adoption agency typically shields the is
`entity of a child’s birth mother, a Catholic confessional
`offers anonymous unburdening of the soul, and local phone
`companies maintain millions of unlisted telephone numbers
`accessible only by special operators.
`The concepts of anonymity and shielded identity do not
`lend themselves to conventional communication systems.
`While it is possible to send and receive anonymous
`messages, such as a postcard With no return address or a call
`placed from a pay phone, it is difficult for parties e gaged in
`multiple communication episodes to remain anonymous
`from one another. In general conventional communication
`systems are premised upon the notion that communicating
`parties knoW each other’s identity. For the purposes of this
`invention, the term “communications system” refers to any
`system that facilitates an ongoing cycle of messages and
`responses.
`Most current communications systems, Whether Written or
`oral, do not permit an ongoing, multi-party, shielded identity
`dialogue. For example, letters need an address to be
`delivered, calling someone on the phone requires a phone
`number, and meeting face-to-face provides for visual iden
`ti?cation. The process involved in most ongoing communi
`cation systems is simply not conducive to retaining con
`cealed identities.
`Yet, in some cases, concealing identity can actually
`encourage or facilitate communication betWeen unWilling or
`cautious parties. For example, a party negotiating a peace
`treaty With another may be unWilling to reveal his identity
`because, if the negotiations fail, that party might be exposed
`or subjected to potential blackmail.
`One speci?c example of the need for concealing identities
`is in the employment search process, Where the release of the
`name of the hiring company (or the position involved) could
`be damaging to the company. The hiring company might be
`concerned about hoW potential competitors Would use the
`knoWledge that the company is searching for employees to
`upset customers Who are relying on the stability of the
`company. Mere speculation that a company is searching for
`a neW president could dramatically reduce the price of the
`company’s stock. To ?nd potential candidates for the vacant
`position, the company could engage an employment search
`?rm to discretely ?nd potential candidates Without disclos
`ing to the market, or even potential candidates, the compa
`ny’s identity until the company decides to con?de in or hire
`a particular candidate.
`In engaging such employment search ?rms, hoWever, a
`hiring company entails some risk that the search ?rm Will
`prematurely or indiscriminately reveal the company’s iden
`tity to a potential candidate. Search ?rms are generally
`compensated based upon the number of successful
`placements, and thus are motivated to make vacant positions
`appear as attractive as possible to potential candidates. In
`doing so, search ?rms could be tempted to reveal enough
`information about the company for potential candidates to
`discover the identity of the company, or, for that matter, the
`?rms may reveal the company’s identity itself. Accordingly,
`hiring companies cannot be counted upon to maintain effec
`tive control of What information is released to potential
`candidates, and thus are unable to instill any satisfactory
`degree of con?dence in their clients about the con?dential
`status of their search for job replacements.
`The use of search ?rms also creates inef?ciencies. In
`dealing With a search ?rm, candidates looking for a neW job
`may engage in a dialogue With the search ?rm, asking a
`series of detailed questions about the particular job, com
`
`Monster Worldwide, Inc. Exhibit 1022 (p.15/29)
`
`
`
`5,884,270
`
`3
`pany expectations, various quali?cation criteria, bene?ts,
`options, perks, and other factors, all Without the candidate
`knowing the name of the hiring company. In response, the
`search ?rm may reveal, from general to speci?c, information
`about the hiring company. For instance, in response to
`questions, the search ?rm may successively reveal that the
`hiring company is a Fortune 500 company, a transportation
`company, an airline, headquartered in the MidWest, and,
`?nally, that it is United Airlines. In return, the candidate may
`also authoriZe the search ?rm to release information about
`itself For instance, the search ?rm may disclose that the
`candidate is employed at a small softWare company, that he
`is the head of a softWare development group of seven
`programmers, then that he is earning $75,000 plus a $20,000
`bonus in his current job, then that he is located in the
`Stamford, Conn. area and then ?nally his identity.
`From the outside, these actions may appear to be a type
`of “dance,” Where each party seeks to learn the necessary
`information to keep the process moving forWard. To ansWer
`any dif?cult questions, the search ?rm, trusted by both
`parties, facilitates an assisted dialogue betWeen the candi
`date and the company.
`By creating this additional layer in the communication
`process, hoWever, the amount of effort and expense incurred
`by the hiring party and the candidates increases. Further,
`using such a search ?rm creates delays in communicating
`information betWeen the company and the candidates and
`increases the likelihood that misunderstandings may occur.
`In addition, the success of a search ?rm to ?ll a position
`is limited by the number of candidates that the search ?rm
`contacts. Search ?rms may target only certain individuals
`While overlooking many other quali?ed candidates Who, if
`contacted, Would have been very interested in considering
`the available positions. As such, search ?rms often do not
`reach a large pool of potential candidates. Search ?rms also
`knoW that the candidates most quali?ed for jobs are those
`that are currently employed. Recruiters Would love to be
`able to shoW these coveted employees even better opportu
`nities. Unfortunately, search ?rms have no Way of identify
`ing and contacting these prime candidates. Present systems
`for recruiting typically rely on the candidate to present
`himself to the recruiter—at a substantial risk to the
`employee. No system currently gives an employee the
`incentive and protection he needs to feel comfortable sub
`mitting his resume.
`Another area in Which shield identity may be desirable is
`dating. For example, a person could serve as a match-maker
`by setting up tWo people With Whom he is acquainted on a
`blind date. Before agreeing to go on the date, each acquain
`tance may ask the match-maker questions about the other
`person and instruct the match-maker not to reveal his/her
`identity Without prior authoriZation. Once each of the
`acquaintances feels comfortable about the other person,
`he/she may authoriZe the match-maker to reveal his/her
`identity and agree to the date.
`Again, hoWever, the use of match-makers suffers from the
`same draWbacks as the search ?rms. There is little or no
`control over What information match-makers disclose. For
`instance, a match-maker may feel greater loyalty to one of
`the acquaintances and Willingly divulge the identity of the
`other acquaintance. Also, using match-makers sloWs doWn
`the communication process and can result in miscommuni
`cation. Finally, the number of people that a match-maker can
`set up is limited by the number of people to Whom the
`match-maker is acquainted.
`Attempts have been made to automate the employment
`search process and matchmaking process. For instance, US.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`4
`Pat. No. 5,164,897 discloses an automated method for
`selecting personnel matching certain job criteria. Databases
`storing employee quali?cations are searched to identify
`Which personnel have quali?cations matching search crite
`ria. Such a system, hoWever, does not provide anonymous
`communications betWeen the employer and the employee
`and does not provide control over the release of information
`stored Within those systems to others. Thus, there is a need
`for a system that alloWs users to exercise control over the
`release of information to others and that provides ef?cient
`anonymous communication.
`
`SUMMARY OF THE INVENTION
`
`Accordingly, the present invention is directed to a com
`munications method and system that obviates problems due
`to limitations and disadvantages of the prior art.
`A goal of the invention is to provide a communication
`system incorporating a central database of information sup
`plied by one or more of parties and managed by a central
`administrator, Where all parties to the system can manage
`and control the release of any or all information about
`themselves or their identities, and Where such a system
`alloWs for electronic-based communications betWeen the
`parties Without the necessity of revealing the identity of
`either party.
`Another goal of the invention to alloW parties to submit
`criteria for searching a trusted agent’s con?dential database
`and receive a count of the number of records that satisfy the
`criteria, Without revealing the identities of the parties asso
`ciated With those records.
`A further goal of the invention is to alloW a system
`administrator to send a request for authoriZation to release
`information about a party to a searching party.
`Other goals of the invention are to provide a system that
`encrypts communications betWeen parties to maintain the
`anonymity of the parties; to authenticate searchable infor
`mation contained in a central database for release to parties;
`to alloW one or both parties to receive compensation for
`contributing or maintaining information accessible in a
`database; and to alloW one party to apply a customiZed
`scoring algorithm to information contained about other
`parties in a database.
`Still other goals of this invention are to provide a system
`for a trusted agent to act as an anonymous remailer or
`communicate via e-mail or other electronic means With
`speci?c outside parties requested or identi?ed by one of the
`parties to validate information about the parties.
`Yet another goal of the invention is to be able to store and
`authenticate such information that may be provided by
`outside parties in a central database While alloWing the
`outside parties to retain control over the release of respective
`information to other parties.
`This invention meets these goals by alloWing a party to
`maintain effective control over the timing and release of
`certain information stored in a database, including the par
`ty’s identity and other relevant data about the party, to
`another party. This controlled release of identity can be
`performed gradually in a series of steps Where the party
`authoriZes release of more and more information. The inven
`tion also authenticates information stored in the database
`before releasing the information, thereby improving the
`reliability of the released information. Finally, the invention
`establishes a communications channel betWeen a party and
`a requestor While not necessarily revealing the identity of the
`party and/or the requestor to each other. The controlled
`release of information in the invention alloWs for neW
`
`Monster Worldwide, Inc. Exhibit 1022 (p.16/29)
`
`
`
`5,884,270
`
`5
`improvements in the quality of the communication process
`When one party to the process Would suffer signi?cant costs
`or be exposed to signi?cant risks if their identity Were
`released prematurely or indiscriminately.
`According to the present invention, a method and system
`is disclosed for operating a computer system to facilitate an
`exchange of identities betWeen tWo anonymous parties. The
`method and system are operative to receive from a ?rst party
`?rst data including an identity of the ?rst party and to receive
`from the ?rst party at least tWo ?rst-party rules for releasing
`the ?rst data including a rule for releasing the identity of said
`?rst party. The system and method are further operative to
`receive from a second party a search request comprising at
`least one search criterion; receive from the second party
`second data including an identity of the second party; and
`receive from the second party at least tWo second-party rules
`for releasing the second party data including a rule for
`releasing the identity of the second party.
`The system and method are further operative to process
`said search request to determine if the ?rst data satis?es the
`search criterion and if so, then exchanging the ?rst and
`second data, except the identities of the ?rst and second
`parties, betWeen the ?rst and second parties in accordance
`With the ?rst-party and second-party rules. The system and
`method are further operative to transmit the identity of the
`?rst party to the second party after the exchanging step, upon
`satisfying the ?rst-party rule for releasing the identity of the
`?rst party, and after the exchanging step, upon satisfying the
`second-party rule for releasing the identity of the second
`party, transmitting the identity of the second party to the ?rst
`party.
`BRIEF DESCRIPTION OF THE DRAWINGS
`The accompanying draWings provide a further under
`standing of the invention and are incorporated in and con
`stitute a part of this speci?cation. The draWings illustrate
`preferred embodiments of the invention, and, together With
`the description, serve to explain the principles of the inven
`tion.
`In the draWings:
`FIG. 1 illustrates one embodiment of the present inven
`tion;
`FIG. 2A illustrates a block diagram of the central con
`troller of the system in accordance With the embodiment in
`FIG. 1;
`FIG. 2B illustrates the contents of a party data database
`and a requestor data database in accordance With the
`embodiment in FIG. 1;
`FIG. 2C illustrates the contents of a veri?cation database
`and an account database in accordance With the embodiment
`in FIG. 1;
`FIG. 3 illustrates a block diagram of a party terminal in
`accordance With the embodiment in FIG. 1;
`FIG. 4 illustrates a block diagram of a requestor terminal
`in accordance With the embodiment in FIG. 1;
`FIG. 5 illustrates a How diagram of a preferred method for
`establishing anonymous communications in accordance
`With this invention;
`FIGS. 6A—6B illustrate a How diagram of a preferred
`method for searching for and releasing party data in accor
`dance With this invention;
`FIG. 7 illustrates a How diagram of a preferred method for
`verifying the authenticity and accuracy of party data in
`accordance With this invention;
`FIG. 8 illustrates a How diagram of a preferred method for
`opening a communications channel betWeen a party and a
`requestor in accordance With this invention; and
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`6
`FIG. 9 illustrates a detailed ?oW diagram of a preferred
`method for transmitting party and requestor information in
`a communications channel in accordance With this inven
`tion.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`System Structure
`
`FIG. 1 illustrates one embodiment of an anonymous
`communication system 100 according to this invention.
`System 100 identi?es parties having characteristics of inter
`est to a requestor, releases certain information about the
`identi?ed parties to the requestor With authoriZation from the
`parties, releases certain information about the requestor to
`the identi?ed parties With authoriZation from the requestor,
`and provides a communications channel betWeen the iden
`ti?ed parties and the requestor While maintaining their
`anonymity. For example, system 100 can be used to alloW an
`employer (the requestor) to communicate With prospective
`candidates (the parties) Whose background satis?es employ
`ment criteria provided by the employer Without revealing the
`identity of the employer or the identities of the candidates.
`In a speci?c example, a softWare company may Want to hire
`a programmer With 5+ years experience in Writing C++, Who
`is Willing to live in Seattle, Who Will Work 12—14 hour days
`6 days a Week, Who Will Work for betWeen $100,000 to
`$150,000 in salary plus bonuses, and Who Wants the oppor
`tunity to Work for a startup With stock options in a publicly
`traded company that could effectively double his salary.
`System 100 could identify a doZen candidates from resumes
`stored in a database, release information about these candi
`dates only as authoriZed to the company, and deliver mes
`sages betWeen the company and candidates Without the
`company ever knoWing the candidates identities. Although
`the invention can be used in connection With other
`applications, for the purpose of illustration, the employment
`search example is used throughout the speci?cation.
`System 100 includes a public sWitched phone netWork
`110, a central controller 200, party terminals 300, and
`requestor terminals 400. Central controller 200, party ter
`minals 300, and requestor terminal 400 preferably connect
`to netWork 110 through respective tWo-Way communication
`links. Parties (e.g., candidates) access system 100 through
`respective party terminals 300, and a requestor (e.g., an
`employer) accesses system 100 through requestor terminal
`400. The How of data from terminals 300 and 400 is
`preferably limited and controlled by central controller 200.
`Under the control of central controller 200, public
`sWitched telephone netWork 110 routes data to and from
`central controller 200, party terminals 300, and requestor
`terminal 400. In a preferred embodiment, netWork 110
`comprises a commercially-implemented netWork of
`computer-controlled telephone sWitches operated by, for
`example, a telephone company. NetWork 110 may also
`include communication netWorks other than a public
`sWitched telephone netWork, such as a Wireless netWork, a
`paging netWork, or the Internet.
`Central controller 200 controls the How of data to and
`from party terminals 300 and requestor terminal 400.
`Preferably, central controller 200 stores and authenticates
`the authorship of “party data” and “requestor data” received
`from party terminals 300 and requestor terminal 400, re