`
`- 1 -
`
`UNIVERSAL SECURE REGISTRY
`
`CROSS REFERENCE TO RELATED APPLICATIONS
`
`This application claims the benefit under 35 U.S.C. § 120 as a continuation of U.S.
`
`5
`
`patent application No. 12/393,586 filed February 26, 2009, which is a continuation-in-part of
`
`each of U.S. patent application serial no. 11/760,732 filed June 8, 2007, now U.S. Patent No.
`
`7,809,651; U.S. patent application serial no. 11/760,729 filed June 8, 2007, now U.S. Patent
`
`No. 7,805,372; and U.S. patent application serial no. 11/677,490 filed February 21, 2007, now
`
`U.S. Patent No. 8,001,055. This application also claims the benefit under 35 U.S.C. § 120 as a
`
`10
`
`continuation-in-part of U.S. patent application no. 13/168,556 filed on June 24, 2011, which
`
`claims the benefit under 35 U.S.C. § 120 as a continuation of U.S. application no. 11/677,490.
`
`Each of U.S. application nos. 11/760,732, 11/760,729 and 11/677,490 claim priority under 35
`
`U.S.C. § 119 (e) to U.S. Provisional Application Nos. 60/812,279 filed on June 9, 2006, and
`
`60/859,235 filed on November 15, 2006. U.S. application no. 11/677,490 also claims priority
`
`15
`
`under 35 U.S.C. § 119 (e) to U.S. Provisional Application No. 60/775,046 filed on February
`
`21, 2006. Each of the above-identified applications is hereby incorporated herein by reference
`
`in its entirety.
`
`Application serial no. 12/393,586 filed February 26, 2009 claims priority under 35
`
`U.S.C. § 119(e) to U.S. Provisional Application Serial No. 61/031,529, entitled "UNIVERSAL
`
`20
`
`SECURE REGISTRY," filed on February 26, 2008, which is herein incorporated by reference
`
`in its entirety.
`
`1.
`
`Field of Invention
`
`BACKGROUND OF INVENTION
`
`25
`
`Embodiments of the invention generally relate to systems, methods, and apparatus for
`
`authenticating identity or verifying the identity of individuals and other entities seeking access
`
`to certain privileges and for selectively granting privileges and providing other services in
`
`response to such identifications/verifications. In addition, embodiments of the invention relate
`
`1155585.2
`
`USR Exhibit 2010, page 1
`
`
`
`2
`
`generally to systems and methods for obtaining information from and/or transmitting
`
`information to a user device and, in particular, to systems, methods, and apparatus that provide
`
`for contactless information transmission.
`
`5
`
`2.
`
`Discussion of Related Art
`
`Control of access to secure systems presents a problem related to the identification of a
`
`person. An individual may be provided access to the secure system after their identity is
`
`authorized. Generally, access control to secure computer networks is presently provided by an
`
`authentication scheme implemented, at least partly, in software located on a device being
`
`to
`
`employed to access the secure computer network and on a server within the secure computer
`
`network. For example, if a corporation chooses to provide access control for their computer
`
`network, they may purchase authentication software that includes server-side software installed
`
`on a server in their computer system and corresponding client-side software that is installed on
`
`the devices that are used by employees to access the system. The devices may include desktop
`
`15
`
`computers, laptop computers, and handheld computers (e.g., PDAs and the like).
`
`In practice, the preceding approach has a number of disadvantages including both the
`
`difficulty and cost of maintaining the authentication system and the difficulty and cost of
`
`maintaining the security of the authentication system. More specifically, the software resides
`
`in the corporation's computers where it may be subject to tampering/unauthorized use by
`
`20
`
`company employees. That is, the information technology team that manages the authentication
`
`system has access to the private keys associated with each of the authorized users. As a result,
`
`these individuals have an opportunity to compromise the security of the system. Further, any
`
`modification and/or upgrade to the authentication system software is likely to require an update
`
`to at least the server-side software and may also require an update of the software located on
`
`25
`
`each user/client device. In addition, where the company's computer systems are
`
`geographically distributed, software upgrades/updates may be required on a plurality of
`
`geographically distributed servers.
`
`There is also a need, especially in this post September 11 environment, for secure and
`
`valid identification of an individual before allowing the individual access to highly secure
`
`30
`
`areas. For example, an FBI agent or an air marshal may need to identify themselves to airport
`
`security or a gate agent, without compromising security. Typically such identification may
`
`1155585.2
`
`USR Exhibit 2010, page 2
`
`
`
`3
`
`comprise the air marshal or FBI agent showing identification indicia to appropriate personnel.
`
`However, there are inherent flaws in this process that allow for security to be compromised,
`
`including falsification of identification information and failure of the airport security or other
`
`personnel to recognize the situation. Of course this process could be automated, for example,
`
`5
`
`by equipping airport personnel or security with access to a database and requiring the FBI
`
`agent or air marshal to appropriately identify themselves to the database, for example, by again
`
`providing identification which airport personnel can then enter into the database to verify the
`
`identity of the person seeking access to a secure area. However, this process also has the
`
`inherent flaws in it as described above. In addition, there may be times when airport security
`
`to
`
`or personnel may not be able to communicate with the database to check the identity of the
`
`person seeking access, for example, when they are not near a computer terminal with access to
`
`a database or are carrying a hand-held device that does not have an appropriate wireless signal
`
`to access the database. In addition, there is a need to ensure that if such a hand-held device
`
`ends up the wrong hands, that security is not compromised.
`
`15
`
`Further, both commercial (e.g., banking networks) and non-commercial (e.g., security
`
`systems) information systems often rely on magnetic card readers to collect information
`
`specific to a user (e.g., a security code, a credit card number, etc.) from a user device (e.g., a
`
`transaction card). Credit card purchases made in person provide an example of the most
`
`common transaction-type that relies on a user device, the credit or debit card, which is read by
`
`20
`
`a magnetic card reader. User devices that rely on magnetic-stripe based technology
`
`magnetically store information (e.g., binary information) in the magnetic stripe. The magnetic
`
`stripe reader provides an interface to a larger computerized network that receives the user's
`
`information to determine, for example, whether to authorize a transaction, to allow the user
`
`access to a secure area, etc.
`
`25
`
`Recently, such devices have seen technological advances that increase their capabilities
`
`and improve their security. For example, such devices may now include embedded processors,
`
`integral biometric sensors that sense one or more biometric feature (e.g., a fingerprint) of the
`
`user, and magnetic stripe emulators. As one result, such devices may provide greater security
`
`by dynamically generating the necessary information, for example, generating the credit card
`
`30
`
`number at the time of a transaction. Improved security can also be provided by such devices
`
`because more sophisticated authentication schemes can be implemented with the devices.
`
`1155585.2
`
`USR Exhibit 2010, page 3
`
`
`
`4
`
`In addition, user devices such as transaction cards may now also provide for one or
`
`more modes of information transmission other than transmission via a magnetic stripe/card
`
`reader combination. For example, user devices that may transmit information optically or via
`
`radio frequency ("RF") signal transmission to a compatible system interface are now available.
`
`5
`
`Further, the architecture of a user device that includes a processor is generally compatible with
`
`both the improved security features described above and the contactless transmission modes
`
`such as optical and RF signal transmission. As a result of the improved security and greater
`
`functionality of some current user devices, there is a desire to replace magnetic-stripe based
`
`user devices with devices that include forms of information transmission other than the reading
`
`to
`
`of a magnetic-stripe.
`
`There is, however, a substantial installed base of interfaces (for example, at points of
`
`sale, at automatic teller machines ("ATM"), and the like) that include magnetic card readers
`
`which are not equipped to receive information from a user device in any other format other
`
`than from a magnetic stripe. As a result of the cost to replace or retrofit the installed base,
`
`15
`
`efforts to more-widely introduce user devices that do not employ magnetic stripe devices have
`
`not been developed. Because of the potential to substantially reduce fraud, however, the
`
`further implementation of such devices is of great interest to financial institutions among
`
`others. RF devices that transmit information wirelessly are expected to become much more
`
`prevalent and at some point, the predominant form of information transmission for user
`
`20
`
`authentication based on a hand-held device, for example, credit card, debit card, drivers
`
`license, passport, social security card, personal identification, etc. Thus, new and improved
`
`methods for transitioning from a purely magnetic based form of communication to a wireless
`
`form of communication are desired.
`
`One current approach that is intended to "transform" a smart card for use with a
`
`25 magnetic stripe card reader employs a "bridge" device. The bridge device requires that the
`
`smart card be inserted within it. The bridge device includes a slot for receiving the smart card,
`
`a key pad whereby the user may enter information (e.g., a PIN number), and a credit card sized
`
`extension member. Operation of the bridge device requires that the smart card be inserted
`
`within it and that an electrical contact surface of the smart card engage a similar surface within
`
`30
`
`the bridge device before the bridge device (i.e., the extension member) can be used with a
`
`magnetic card reader. Thus, the contactless nature of more advanced information transmission
`
`1155585.2
`
`USR Exhibit 2010, page 4
`
`
`
`5
`
`systems is lost with the bridge device because it does not support wireless signal transmission.
`
`Accordingly, there is a desire for one or more devices, systems and methods for
`
`accomplishing any of the herein mentioned objectives.
`
`5
`
`SUMMARY OF INVENTION
`
`There is thus a need for an identification system that will enable a person to be
`
`accurately identified ("identification" sometimes being used hereinafter to mean either
`
`identified or verified) and/or authenticated without compromising security, to gain access to
`
`secure systems and/or areas. Likewise, there is a need for an identification system that will
`
`to
`
`enable a person to be identified universally without requiring the person to carry multiple
`
`forms of identification.
`
`Accordingly, this invention relates, in one embodiment, to an information system that
`
`may be used as a universal identification system and/or used to selectively provide information
`
`about a person to authorized users. Transactions to and from a secure database may take place
`
`15
`
`using a public key/private key security system to enable users of the system and the system
`
`itself to encrypt transaction information during the transactions. Additionally, the private
`
`key/public key security system may be used to allow users to validate their identity. For
`
`example, in one embodiment, a smart card such as the Secure IDTm card from RSI Security,
`
`Inc. may be provided with the user's private key and the USR system's public key to enable
`
`20
`
`the card to encrypt messages being sent to the USR system and to decrypt messages from the
`
`USR system 10.
`
`The system or database of the invention may be used to identify the person in many
`
`situations, and thus may take the place of multiple conventional forms of identification.
`
`Additionally, the system may enable the user's identity to be confirmed or verified without
`
`25
`
`providing any identifying information about the person to the entity requiring identification.
`
`This can be advantageous where the person suspects that providing identifying information
`
`may subject the identifying information to usurpation.
`
`Access to the system may be by smart card, such as a Secure IDTm card, or any other
`
`secure access device. The technology enabling the user to present their identity information
`
`30 may be physically embodied as a separate identification device such as a smart ID card, or may
`
`be incorporated into another electronic device, such as a cell phone, pager, wrist watch,
`
`1155585.2
`
`USR Exhibit 2010, page 5
`
`
`
`6
`
`computer, personal digital assistant such as a Palm PilotTm, key fob, or other commonly
`
`available electronic device. The identity of the user possessing the identifying device may be
`
`verified at the point of use via any combination of a memorized PIN number or code, biometric
`
`identification such as a fingerprint, voice print, signature, iris or facial scan, or DNA analysis,
`
`5
`
`or any other method of identifying the person possessing the device. If desired, the identifying
`
`device may also be provided with a picture of the person authorized to use the device to
`
`enhance security.
`
`According to one embodiment of the invention, a method of controlling access to a
`
`plurality of secure computer networks using a secure registry system located remotely from the
`
`to
`
`secure computer networks is disclosed. The secure registry system includes a database
`
`containing selected data of a plurality of users each authorized to access at least one of the
`
`plurality of secure computer networks. The method comprises acts of receiving authentication
`
`information from an entity at a secure computer network, communicating the authentication
`
`information to the secure registry system, and validating the authentication information at the
`
`15
`
`secure registry system. The method also includes receiving from the secure registry system an
`
`indication of whether the entity is authorized to access the secure computer network, granting
`
`the entity access to the secure computer network when the authentication information of the
`
`entity corresponds to one of the plurality of users, and denying the entity access to the secure
`
`computer network when the authentication information of the user does not correspond to one
`
`20
`
`of the plurality of users.
`
`Another embodiment of the invention comprises a method of controlling access to a
`
`secure computer network using a secure registry system. The secure registry system includes a
`
`database containing selected data of a plurality of users authorized to access the secure
`
`computer network and selected data identifying the secure computer network. The method
`
`25
`
`comprises receiving an access request including authentication information and a computer
`
`network ID from an entity, determining whether the authentication information is valid for any
`
`of the plurality of users, accessing data when the authentication information of the entity is
`
`valid for one of the plurality of users to determine whether the entity is authorized to access the
`
`computer network identified by the computer network ID, and allowing the entity to access the
`
`30
`
`secure computer network when the authentication information of the entity is valid for one of
`
`1155585.2
`
`USR Exhibit 2010, page 6
`
`
`
`- 7 -
`
`the plurality of users authorized to access the computer network identified by the computer
`
`network ID.
`
`Another embodiment of the invention comprises a method of authenticating an identity
`
`of a first entity. The method comprises the acts of wirelessly transmitting from a first device,
`
`5
`
`first encrypted authentication information of the first entity, receiving with a second device the
`
`wirelessly transmitted first encrypted authentication information, decrypting with the second
`
`device, the first wirelessly encrypted authentication information to provide the first
`
`authentication information of the first entity to the second device; and authenticating the
`
`identity of the first entity based upon the first authentication information; and acting based on
`
`to
`
`the assessed identity of the first entity.
`
`Another embodiment of the invention comprises a system for authenticating an identity
`
`of a first entity, comprising a first wireless device comprising a first wireless transmitter and
`
`receiver configured to transmit a first wireless signal including first encrypted authentication
`
`information, a first processor configured to compare stored biometric data with detected
`
`15
`
`biometric data of the first entity and configured to enable or disable use of the first device
`
`based on a result of the comparison, and configured to encrypt first authentication information
`
`with a first private key of the first entity into the first encrypted authentication information, a
`
`first biometric detector for detecting biometric data of the first entity, and a first memory for
`
`storing biometric data of the first entity, a private key of the first entity authorized to use the
`
`20
`
`first device, and the first authentication information.
`
`According to some embodiments, the system further comprises a second wireless
`
`device comprising a second wireless transmitter and receiver configured to receive the first
`
`wireless signal and to process the first wireless signal, a second processor configured to
`
`compare detected biometric data of a second entity with stored biometric data and configured
`
`25
`
`to enable or disable use of the second device based upon a result of the comparison, and
`
`configured to decrypt the first authentication information received in the first wireless signal, a
`
`biometric detector for detecting biometric data of a second entity, and a second memory
`
`storing biometric data of the second entity and a plurality of public keys of a plurality of first
`
`entities.
`
`30
`
`Another embodiment of the invention provides a first wireless device comprising a
`
`processor configured to enable operation of the first wireless device if it receives an
`
`1155585.2
`
`USR Exhibit 2010, page 7
`
`
`
`8
`
`enablement signal validating first biometric information of a first entity and configured to
`
`generate a non-predictable signal from the biometric information, a first wireless transmitter
`
`and receiver configured to transmit a first wireless signal including first encrypted biometric
`
`information of the first entity and to receive the enablement signal, and a first biometric
`
`5
`
`detector for detecting the first biometric information of the first entity.
`
`In one aspect of the invention, a device converts a wireless transaction device to a
`
`magnetic-stripe emulator device. In one embodiment, the device includes a wireless signal
`
`receiver that is configured to receive a wireless signal and provide information from the
`
`wireless signal. In addition, the device may include a magnetic-stripe emulator which is
`
`to
`
`communicatively coupled to the wireless signal receiver and adapted to provide a time-varying
`
`signal which emulates data provided by a magnetic-stripe card to a magnetic card reader in
`
`response to receiving the information from the wireless signal. In one embodiment, the device
`
`includes a processor communicatively coupled to the wireless signal receiver and to the
`
`magnetic-stripe emulator. The device may also include an LED. In a version of this
`
`15
`
`embodiment, the processor is configured to control the LED to indicate that the device is
`
`properly aligned with the magnetic card reader. In another embodiment, the device includes an
`
`output device that can provide information to a network or to a network device. In a version of
`
`this embodiment, the output device is a wireless transmitter device.
`
`Further embodiments of the invention may include additional features, for example, in
`
`20
`
`one embodiment the output device is a data port to which the device can provide data to a
`
`network or to a network device. In a version of this embodiment, the data port is also
`
`configured to receive data from the network or the network's device. In a further embodiment,
`
`the device is configured to communicate with the magnetic card reader via the data port.
`
`In a further embodiment, the wireless receiver and/or processors configure, decrypt and
`
`25
`
`encrypt the wireless signal. In a further embodiment, the processor is configured to determine
`
`whether a user is authorized to provide the information contained within the wireless signal
`
`from data within the wireless signal. In a version of this embodiment, the data contained
`
`within the wireless signal includes user ID information. In yet another embodiment, the data
`
`contained within the wireless signal includes biometric information of the user.
`
`30
`
`According to another aspect, the invention provides a system for validating an identity
`
`of a user to enable or prevent an occurrence of an event. In one embodiment, the system
`
`1155585.2
`
`USR Exhibit 2010, page 8
`
`
`
`9
`
`includes a first device including a wireless transmitter which is configured to transmit
`
`validation information, a second device including a wireless receiver, where the second device
`
`is configured to receive the validation information and further transmit the validation
`
`information; and a secure system in communication with the second device. According to one
`
`5
`
`embodiment, the secure system includes a database. In a further embodiment, the secure
`
`system is configured to receive the validation information transmitted from the second device,
`
`and to transmit additional information to the second device following a receipt of the validation
`
`information to assist the second device in either enabling or preventing the occurrence of the
`
`event. In various embodiments, the event that is enabled or prevented may be a transaction
`
`to
`
`(e.g., a financial transaction), access control (e.g., physical or electronic access) or other action
`
`that is either enabled or prevented.
`
`According to a further aspect, the invention provides a method employing a system to
`
`validate an identity of a user to enable or prevent an occurrence of an event. In one
`
`embodiment, the system includes a first device, a second device and a secure system including
`
`15
`
`a database. According to one embodiment, the method includes acts of receiving at the second
`
`device validation information wirelessly transmitted from the first device, communicating the
`
`validation information from the second device to the secure system, and receiving at the
`
`second device additional information from the secure system. In a further embodiment, the
`
`additional information assists the second device in either enabling or preventing the occurrence
`
`20
`
`of the event. In various embodiments, the event that is enabled or prevented may be a
`
`transaction (e.g., a financial transaction), access control (e.g., physical or electronic access) or
`
`other action that is either enabled or prevented.
`
`In still another aspect, a user device is configured to allow a user to select any one of a
`
`plurality of accounts associated with the user to employ in a financial transaction. In one
`
`25
`
`embodiment, the user device includes a biometric sensor configured to receive a biometric
`
`input provided by the user, a user interface configured to receive a user input including secret
`
`information known to the user and identifying information concerning an account selected by
`
`the user from the plurality of accounts. In a further embodiment, the user device includes a
`
`communication link configured to communicate with a secure registry, and a processor
`
`30
`
`coupled to the biometric sensor to receive information concerning the biometric input, the user
`
`interface, and the communication link According to one embodiment, the processor is
`
`1155585.2
`
`USR Exhibit 2010, page 9
`
`
`
`- 10 -
`
`configured to generate a non-predictable value and to generate encrypted authentication
`
`information from the non-predictable value, the identifying information, and at least one of the
`
`information concerning the biometric input and the secret information, and to communicate the
`
`encrypted authentication information via the communication link to the secure registry.
`
`5
`
`In accordance with another aspect, a method of generating authentication information
`
`includes acts of authenticating an identity of a user to a device based on at least one of
`
`biometric data received by the device from the user and secret information known to the user
`
`and provided to the device. The method can also include the generation of a non-predictable
`
`value with the device. The method can further include acts of receiving identifying
`
`to
`
`information from the user concerning a selected one of a plurality of user accounts and
`
`generating encrypted authentication information from the non-predictable value, the
`
`identifying information, and at least one of the biometric data and the secret information. In a
`
`further embodiment, the device can generate encrypted authentication information from each
`
`of the non-predictable value, the biometric data, the secret information, and the identifying
`
`15
`
`information.
`
`According to a still further aspect, a method of controlling access to a plurality of
`
`accounts is provided where the method includes acts of generating, with a device, encrypted
`
`authentication information from a non-predictable value generated by the device, identifying
`
`information concerning an account selected by a user of the device from among a plurality of
`
`20
`
`accounts associated with the user, and at least one of a biometric of the user received by the
`
`device and secret information provided to the device by the user, communicating the encrypted
`
`authentication information from the device to a secure registry via a point-of-sale (POS) device
`
`to authenticate or not authenticate the device with the secure registry, authorizing the POS
`
`device to initiate a financial transaction involving a transfer of funds to or from the account
`
`25
`
`selected by the user when the encrypted authentication information is successfully
`
`authenticated, and denying the POS device from initiation of the financial transaction
`
`involving a transfer of funds to or from the account selected by the user when the encrypted
`
`authentication information is not successfully authenticated.
`
`1155585.2
`
`USR Exhibit 2010, page 10
`
`
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`This invention is pointed out with particularity in the appended claims. The above and
`
`further advantages of this invention may be better understood by referring to the following
`
`description when taken in conjunction with the accompanying drawings. The accompanying
`
`5
`
`drawings are not intended to be drawn to scale. In the drawings, each identical or nearly
`
`identical component that is illustrated in various figures is represented by a like numeral. For
`
`purposes of clarity, not every component may be labeled in every thawing. In the drawings:
`
`FIG. 1 is a functional block diagram of a computer system configured to implement the
`
`universal secure registry ("USR"), including a USR database, according to one embodiment of
`
`10
`
`the invention;
`
`FIG. 2 is a functional block diagram of a first embodiment of a networked environment
`
`including the computer system of FIG. 1;
`
`FIG. 3 is a functional block diagram of an entry of a database forming the USR
`
`database of FIG. 1;
`
`15
`
`FIG. 4 is a functional block diagram of a second embodiment of a networked
`
`environment including the computer system of FIG. 1;
`
`FIG. 5 is a flow chart illustrating steps in a process of inputting data into the USR
`
`database;
`
`FIG. 6 is a flow chart illustrating steps in a process of retrieving data from the USR
`
`20
`
`database;
`
`FIG. 7 is a flow chart illustrating a first protocol for purchasing goods from a merchant
`
`via the USR database without transmitting credit card information to the merchant;
`
`FIG. 8 is a flow chart illustrating a second protocol for purchasing goods from a
`
`merchant via the USR database without transmitting credit card information to the merchant;
`
`25
`
`FIG. 9 is a flow chart illustrating a protocol for purchasing goods from a merchant via
`
`the USR database by validating the user's check;
`
`FIG. 10 is a flow chart illustrating a protocol for purchasing goods from an on-line
`
`merchant via the USR database without transmitting credit card information to the on-line
`
`merchant, and enabling the on-line merchant to ship the goods to a virtual address;
`
`30
`
`FIG. 11 is a flow chart illustrating a protocol for shipping goods to a virtual address via
`
`the USR database;
`
`1155585.2
`
`USR Exhibit 2010, page 11
`
`
`
`- 12 -
`
`FIG. 12 is a flow chart illustrating a protocol for telephoning a virtual phone number
`
`via the USR database;
`
`FIG. 13 is a flow chart illustrating a protocol for identifying a person via the USR
`
`database;
`
`5
`
`FIG. 14 is a flow chart illustrating a protocol for identifying a person to a policeman via
`
`the USR database;
`
`FIG. 15 is a flow chart illustrating a protocol for providing information to an authorized
`
`recipient of the information via the USR database;
`
`FIG. 16 is a flow chart illustrating a protocol for providing application information to
`
`to
`
`an authorized recipient of the information via the USR database;
`
`FIG. 17 is a functional block diagram of an embodiment configured to use information
`
`in the USR system to activate or keep active property secured through the USR system; and
`
`FIG. 18A is a functional block diagram of an embodiment configured to use the USR
`
`system to control access to a secure computer network;
`
`15
`
`FIG. 18B is a functional block diagram of another embodiment configured to use the
`
`USR system to control access to a secure computer network;
`
`FIG. 19 is a flow diagram of a process for controlling access to a secure computer
`
`network with the USR system in accordance with an embodiment of the invention;
`
`FIG. 20 is a flow diagram of a process for controlling access to a secure computer
`
`20
`
`network with the USR system in accordance with another embodiment of the invention;
`
`FIG. 21 illustrates an embodiment of a system for validating the identity of an
`
`individual;
`
`FIGS. 22A and 22B illustrate one embodiment of a process for validating the identity
`
`of an individual;
`
`25
`
`FIG. 23 illustrates one embodiment of various fields included within a first wireless
`
`signal and a second wireless signal as transmitted by the system of FIG. 21;
`
`FIG. 24 illustrates one embodiment of a process for verifying or authenticating the
`
`identity of a first user of a first wireless transmission device;
`
`FIG. 25 illustrates another embodiment of a process for authenticating the identity of a
`
`30
`
`first user of a wireless transmission device;
`
`1155585.2
`
`USR Exhibit 2010, page 12
`
`
`
`- 13 -
`
`FIG. 26 illustrates still another embodiment of a process for authenticating the identity
`
`of a first user of a wireless transmission device; and
`
`FIG. 27 illustrates one embodiment of a data structure that can be used by any wireless
`
`device of the system of FIG. 21;
`
`5
`
`FIG. 28 illustrates a system in accordance with one embodiment of the invention;
`
`FIG. 29 illustrates a process in accordance with an embodiment of the invention;
`
`FIGS. 30A-30D illustrate a converter device in accordance with one embodiment of the
`
`invention; and
`
`FIG. 31 illustrates a further embodiment of a system that employs the USR system.
`
`10
`
`DETAILED DESCRIPTION
`
`This invention is not limited in its application to the details of construction and the
`
`arrangement of components set forth in the following description or illustrated in the drawings.
`
`The invention is capable of other embodiments and of being practiced or of being carried out in
`
`15
`
`various ways. Also, the phraseology and terminology used herein is for the purpose of
`
`description and should not be regarded as limiting. The use of "including," "comprising," or
`
`"having," "containing", "involving", and vari