throbber
.
`
`Ulllted States Patent [19]
`Ballard
`
`[54] REMOTE IMAGE CAPTURE WITH
`CENTRALIZED PROCESSING AND
`STORAGE
`
`[75] Inventor; Claudio R_ Ballard, Lloyd Harbor,
`NY
`
`[73] Assignee: CSP Holdings, Inc., Lloyd Harbor,
`NY
`
`[21] Appl- No" 08/917,761
`[22] Filed:
`Aug 27’ 1997
`
`6
`[51] Int. Cl. ...................................................... .. H04L 9/00
`[52] US. Cl. .............................................................. .. 380/24
`[58] Field of Search ........................................ .. 380/25, 24
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`US005910988A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,910,988
`Jun. 8, 1999
`
`8/1993 Kern et a1. ............................ .. 235/379
`5,237,158
`5,274,567 12/1993 Kallin et a1.
`. 364/478
`5,283,829
`2/1994 Anderson
`380/24
`5,321,238
`6/1994 Kamata et al.
`. 235/379
`5,321,751
`6/1994 Ray et a1. ............................... .. 380/23
`5,345,090
`9/1994 Hludzinski ............................ .. 250/566
`5,434,928
`7/1995 Wagner et al. .
`. 382/187
`574367970
`7/1995 Ray et a1~
`380/23
`5,444,794
`8/1995 Uhland, Sr. .
`. 382/137
`5,457,747 10/1995 DreXler et al.
`380/24
`5,479,510 12/1995 Olsen et a1. ............................ .. 380/24
`5,506,691
`4/1996 Bednar et a1.
`. 358/402
`5,544,043
`8/1996 Mlkl et al. ............................ .. 364/406
`
`(Ust Continued on next page)
`
`Primary Examiner—Salvatore Cangialosi
`Attorney, Agent, or Firm—McGuire, Woods, Battle &
`Boothe LLP
`
`4,201,978
`
`5/1980 Nally .................................. .. 340/1463
`
`[57]
`
`ABSTRACT
`
`.. 235/379
`__ 364515
`__ 235/379
`382/45
`380/26
`382”
`.. 235/379
`.. 380/26
`382/14O
`_ 382/9
`235/379
`364/478
`379/144
`
`4/1981 Owens et al. ..
`4,264,808
`4/1982 de la Guardia
`473267258
`4,417,136 11/1983 Rushby et a1, _
`4,457,015
`6/1984 Nally et a1.
`4,500,750
`2/1985 Elafldef et a1~
`435233330
`6/1985 Cam """"""" "
`4,555,617 11/1985 Brooks et a1. .
`4,578,530
`3/1986 Zeidler ......... ..
`476027936
`7/1986 Green et aL
`4,680,803
`7/1987 Dilella __________ __
`4,694,147
`9/1987 Amemiya et al.
`4,747,058
`5/1988 H0 ------------------- ~~
`43750201 6/1988 Hodgson et a1‘ '
`4,843,220
`6/1989 Haun ............ ..
`.. 235/380
`.
`4,888,812 12/1989 Dlnan et al. .............................. .. 382/7
`3/1990 Lee 6161. ................................ .. 380/24
`4,912,762
`479267325
`5/1990 Benton et a1_ _
`_ 364/408
`4,960,981 10/1990 Benton e161. ........................ .. 235/379
`5,091,968
`2/1992 Higgins et a1. ......................... .. 382/30
`5,122,950
`6/1992 Benton et al- -
`-- 364/408
`Yoshida ................................. ..
`?séivka ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " 364/408
`
`’
`’
`5,175,682 12/1992 Higashiyama e161. ............... .. 364/408
`5,187,750
`2/1993 Behera ...................................... .. 382/7
`
`C ure ...... ..
`
`..
`
`~
`
`_
`_
`_
`_
`A system for remote data acqu1s1t1on and centrahzed pro
`cessmg and storage 1s drsclosed called the DataTreasuryTM
`System. The DataTreasuryTM System provides comprehen
`sive support for the processing of documents and electronic
`data associated With different applications including sale,
`b .
`b ki
`d
`1
`t
`t.
`Th
`usmess> 2}“ “g an geflera Consumer fans“ mm 6
`system retrreves transactron data at one or more remote
`Locatrons, encrypts the data, transmrts the encrypted data to
`a central location, transforms the data to a usable form,
`performs identi?cation veri?cation using signature data and
`biometric data, generates informative reports from the data
`.
`.
`.
`.
`and transmrts the mformatrve reports to the remote locat1on
`TM
`(5) The Da_taTreaSurY
`System has_ maPY advantageous
`features WhI'Ch'VYOI‘k together to prov1de h1gh performance,
`securlty, rehablhty, fault tolerance and low cost Flrst, the
`network architecture facilitates secure communication
`between the remote location(s) and the central processing
`A dynamic address assignment algorithm performs
`load balancing among the system’s servers for faster per
`f
`d h h
`tl
`t
`. F 11
`tt
`Gimme? an
`lfher ullzalont. m y’ a parllomng
`SC eme lmproves 6 error Cone‘: 10“ Process'
`
`~
`
`~
`
`~
`
`~
`
`-
`
`-
`
`-
`
`5,204,811
`5,220,501
`
`.. 364/406
`4/1993 Bednar et al. .
`6/1993 Lawlor et a1. ........................ .. 364/408
`
`50 Claims, 10 Drawing Sheets
`
`CREDlT
`
`SUFS e
`
`irriam
`
`DAT
`
`3702‘ ‘
`
`$342116
`
`7
`
`MG
`
`,312
`
`52/548258»
`
`NB Mi
`CCMNESSB
`@ ml?iéim
`|$$l MB $3519
`11 511142511
`
`ME 322
`MG
`/"324
`
`WTMWWEEDF
`SC/WNEUCREDFSUPS
`
`m
`
`“5
`
`\'
`1 I
`
`Page 1 of 45
`
`FIS Exhibit 1001
`
`

`
`5,910,988
`Page 2
`
`US. PATENT DOCUMENTS
`5
`_
`d
`55
`, 90,038 12/1996 Pltro a .................................. .. 39 /241
`5,602,933
`2/1997 Blackwell et al.
`.. 382/116
`5,604,640
`2/1997 Zipfetal. .... ..
`.. 359/803
`
`5,657,396
`5,673,333
`5,751,842
`5754 673
`7
`7
`
`8/1997 Rudolph et al. ...................... .. 382/190
`9/1997 Johnston ............................... .. 382/137
`5/1998 Riach et a1‘ ~~~~~~~~~~~~~~~~~~~~~~~~~~ " 382/137
`5/1998 B k t
`1
`382/112
`10° 5 e a' ~~~~~~~~~~~~~~~~~ ~
`
`5,647,017
`
`
`
`Bakhoum ~ ~ ~ ~ ~ ~ ~ 7/1997 Smithies et al_
`
`
`
`~ ~ ~ ~ u 382/119
`
`5,784,503
`
`
`
`Carney .................................. .. 7/1998 Bleecker, III et al. ............... .. 382/306
`
`5,657,389
`
`8/1997 Houvener ________________________________ __ 380/23
`
`5,787,403
`
`7/1998 Randle .................................... .. 705/43
`
`Page 2 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 1 0f 10
`
`5,910,988
`
`200
`\
`DATA TREASURYTM
`ACCESS TERMINAL
`
`400 \ DATA TREASURYTM
`ACCESS COLLECTOR
`
`600
`
`DATA TREASURYTM
`PROCESSING CONCENTRATOR
`
`FIG. 1
`
`Page 3 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 2 0f 10
`
`5,910,988
`
`com
`
`N .Orm
`
`mom \ EZE
`
`vow
`w
`
`58:
`
`c3
`
`NE
`
`Page 4 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 3 0f 10
`
`5,910,988
`
`D.A.T.
`OPEHATOH
`
`370
`
`w
`NOT|FYD.A.T.
`OPERATOROFTROUBLE
`
`CREDIT
`SuPS =
`
`310
`
`4
`
`4 MG
`
`312
`
`OK
`"
`BI
`
`:;
`
`BITMAP IMAGE 0F
`SCANNEDCREDITSLIPS
`
`314
`
`316
`
`0K
`E
`OOMPRESSEO
`Em BITMAP IMAGE 0F
`SCANNEDCHEDITSLIPS
`*
`<7\31a
`320
`ENCHYPTED
`OOMPRESSEO
`BITMAP IMAGE OF
`lEcB'
`SCANNEDCHEDITSLIPS
`y
`<7\322
`
`OK"
`
`NOTIFY D.A.T.
`OPERATOHOFTROUBLE
`
`MG
`
`‘
`
`NOT|FYD.A.T.
`OPERATOHOFTHOUBLE
`“
`d MG
`
`‘
`
`NOTIFYD-A-T'
`OPERATOROFTROUBLE
`
`d
`‘
`
`“
`
`4 MG
`S
`
`324
`
`OK I
`TECB'
`1
`
`TAGGED ENCHYPTED
`COMPRESSED
`BITMAPIMAGEOF
`SCANNEDCREDITSLIPS
`
`326
`
`NOT|FYD.A.T.
`OPEHATOROFTROUBLE
`
`‘
`
`“
`
`1 MG
`
`328
`
`v
`
`NOTIFY
`D.A.C.
`OFTHOUBLE
`
`OK
`
`YES
`
`330
`
`No
`
`FIG. 3A
`
`YES
`
`N0
`
`338
`
`N/G
`
`ELIE
`366
`;
`
`‘P
`362
`346 L
`J
`M
`
`358
`NO L
`‘
`
`YES
`
`5342
`
`354
`
`\
`
`350
`
`334
`
`R
`OK
`'
`g
`
`M
`
`Page 5 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 4 0f 10
`
`5,910,988
`
`/- XEROX DATAGLYPH
`
`OFFICE DEPOT
`2110 BROAD HOLLOW ROAD / 372
`FAHMINGDALE, NY 11735
`/370
`516-844-0444
`194541‘
`3305 1193M?
`374
`2169
`_SA_L.E. ________________ -AAAAAZ _______ “1.642f/
`,_ ........................................... _,
`/—376
`; 75608700053 BUSINESS PLAN PRO
`89.99 ar/
`1 _______ _-M_F_<5-_U_S_T.____$95-_QQ _______________
`
`____________________________________________ _, /”
`
`378
`
`ill;ll;LLLLLEQPFQEELL§§l§§§9§€€lk£sao
`
`F382
`________________ _IQIA_L__________--_--9zA1.__>/
`
`LLAQQQQALTLALUAABLEBL11999999941199lkj/ 386
`E._.EX_F3I_RAIIQN_DAT_E_ _________________ “Qt/98.--?
`/388
`__V_'$A _____________________________ "9741--
`LQHAAQE ___________________________ -AAM/
`
`THANK YOU FOR SHOPPING AND SAVING AT
`OFFICE DEPOT
`
`FIG. 3B
`
`Page 6 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 5 0f 10
`
`5,910,988
`
`wow
`
`
`
`
`
`ENE M525 god @116
`
`m Q
`
`
`
`god $56
`
`$29M
`
`o3
`
`cow
`
`Ezmw Q2
`
`g 3% Q 3%
`
`mow
`
`Page 7 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 6 0f 10
`
`5,910,988
`
`I 526
`
`START
`l / 502
`
`:"7/508
`
`<7/514
`
`/ 520
`
`j 522
`
`524
`
`f 528
`
`— D i N
`E
`
`FIG. 5
`
`Page 8 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 7 0f 10
`
`5,910,988
`
`Ema M55
`
`
`
`23mm M525
`
`
`
`god ?mmé
`
`5
`
`
`
`53mm wSEE m I‘
`
`cow
`
`
`
`Na EH E25 “:5 5% 20520;
`
`N8 % $53;
`
`EOE % VEOEZ
`gm
`
`m :2."
`
`Q8 H gem HH gem
`
`§ 05 / 1
`
`Page 9 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 8 0f 10
`
`5,910,988
`
`700
`
`START
`l
`
`M
`
`M
`
`J’ 726
`
`V
`
`NO
`
`724
`
`728 /
`
`END
`FIG. 7
`
`Page 10 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 9 0f 10
`
`5,910,988
`
`START
`
`802 \
`
`804 k
`
`TECBI
`
`O 0 4|
`8 8 8
`6 8 o
`
`826
`
`4!
`
`"S w EW 2 E. _w 2
`
`\ YES
`820 g
`/
`
`:Q YE§
`
`s24
`
`END
`
`FIG. 8
`
`Page 11 of 45
`
`

`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 10 0f 10
`
`5,910,988
`
`900
`
`START L f 904
`
`902 f
`
`\7
`
`r 906
`
`MG
`
`OK
`
`908
`I
`
`j 91 0
`
`V
`
`912
`
`N/G
`
`OK
`
`914
`
`Page 12 of 45
`
`

`
`1
`REMOTE IMAGE CAPTURE WITH
`CENTRALIZED PROCESSING AND
`STORAGE
`
`FIELD OF THE INVENTION
`
`This invention relates generally to the automated process
`ing of documents and electronic data from different appli
`cations including sale, business, banking and general con
`sumer transactions. More particularly, it pertains to an
`automated system to retrieve transaction data at remote
`locations, to encrypt the data, to transmit the encrypted data
`to a central location, to transform the data to a usable form,
`to generate informative reports from the data and to transmit
`the informative reports to the remote locations.
`
`BACKGROUND
`
`This invention involves the processing of documents and
`electronic data Which are generated, for example, from sale,
`business and banking transactions including credit card
`transactions, smart card transactions, automated teller
`machine (ATM) transactions, consumer purchases, business
`forms, W2 forms, birth certi?cates, deeds and insurance
`documents.
`The enormous number of paper and electronic records
`generated from documents and electronic data from sale,
`business and banking transactions contain valuable infor
`mation. First, these paper and electronic records contain
`information Which can be used to verify the accuracy of the
`records maintained by consumers, merchants and bankers.
`For example, customers use paper receipts of sale and
`banking transactions to verify the information on the peri
`odic statements Which they receive from their bank or credit
`card institution. Merchants use paper receipts to record sale
`transactions for management of customer complaints. Tax
`payers use paper receipts to record tax deductible contribu
`tions for use in their tax return preparation. Employees use
`paper receipts to record business expenses for preparation of
`business expense forms.
`Paper and electronic records also contain information
`Which can be used for market analysis. For example, manu
`facturers and retailers can determine consumer preferences
`in different regions as Well as trends in consumer preferences
`from the information contained in paper and electronic
`records.
`HoWever, the maintenance and processing of paper and
`electronic records presents difficult challenges. First, paper
`receipts and documents could easily be lost, misplaced,
`stolen, damaged or destroyed. Further, the information con
`tained in these paper and electronic records cannot be easily
`processed because it is scattered among individual records.
`For example, the market trend information contained in a
`group of sales records retained by merchants cannot easily
`be determined since this information is scattered among the
`individual records. LikeWise, the tax information contained
`in a group of paper receipts of sales transactions retained by
`consumers cannot easily be processed.
`Previous approaches have been proposed to meet the
`challenges associated With the maintenance and processing
`of paper and electronic records. For example, data archive
`service companies store the information from paper receipts
`and documents acquired from their customers on micro?lm
`or compact disc read only memory (CD-ROM) at a central
`facility. Customers typically deliver the paper receipts and
`documents to the central facility. For sensitive documents
`Which cannot leave the customer site, some data archive
`service companies perform data acquisition and transfer to
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`5,910,988
`
`2
`magnetic tapes at the customer site and deliver the tapes to
`the central facility.
`The approach offered by these data archive service com
`panies have disadvantages. First, the approach is costly and
`has poor performance because it requires an expensive, time
`consuming physical transportation of paper receipts or mag
`netic tapes from the customer site to the central facility.
`Further, the approach is not reliable as information can be
`lost or damaged during physical transportation. The
`approach also has limited capability as it does not process
`electronic records along With the paper receipts Within a
`single system.
`Other approaches have focused on the elimination of
`paper receipts and documents. US. Pat. No. 5,590,038
`discloses a universal electronic transaction card (UET card)
`or smart card Which stores transaction information on a
`memory embedded on the card as a substitute for a paper
`receipt. Similarly, US. Pat. No. 5,479,510 discloses a
`method of electronically transmitting and storing purchaser
`information at the time of purchase Which is read at a later
`time to ensure that the purchased goods or services are
`delivered to the correct person.
`While these approaches avoid the problems associated
`With paper receipts, they have other disadvantages. First,
`these approaches do not offer independent veri?cation of the
`accuracy of the records maintained by consumers, mer
`chants and bankers With a third party recipient of the
`transaction data. For example, if a UET card is lost, stolen,
`damaged or deliberately altered by an unscrupulous holder
`after recording sale or banking transactions, these
`approaches Would not be able to verify the remaining
`records Which are maintained by the other parties to the
`transactions.
`Next, these approaches do not have the ability to process
`both paper and electronic records of transactions Within a
`single, comprehensive system. Accordingly, they do not
`address the task of processing the enormous number of
`paper receipts Which have been generated from sales and
`banking transactions. The absence of the ability to process
`both paper and electronic records of these approaches is a
`signi?cant limitation as paper receipts and documents Will
`continue to be generated for the foreseeable future because
`of concerns over the reliability and security of electronic
`transactions and the familiarity of consumers and merchants
`With paper receipts.
`These approaches also have a security de?ciency as they
`do not offer signature veri?cation Which is typically used on
`credit card purchases to avoid theft and fraud. For example,
`a thief could misappropriate money from a UET card holder
`after obtaining by force, manipulation or theft the user’s
`personal identi?cation number (PIN). Similarly, it is not
`uncommon for criminals to acquire credit cards in victims’
`names and make unlaWful charges after obtaining the vic
`tim’s social security number. This becomes a greater con
`cern as that type of personal information becomes available,
`e.g., on the internet. Also, the signature veri?cation per
`formed manually by merchants for credit card purchases
`frequently misses forged signatures.
`Even if smart cards or UET cards had the ability to store
`signature and other biometric data Within the card for
`veri?cation, the system Would still have disadvantages.
`First, the stored biometric data on the card could be altered
`by a card thief to defeat the security measure. Similarly, the
`biometric data could be corrupted if the card is damaged.
`Finally, the security measure Would be costly at it Would
`require an expensive biometric comparison feature either on
`each card or on equipment at each merchant site.
`
`Page 13 of 45
`
`

`
`5,910,988
`
`3
`Additional biometric veri?cation systems including sig
`nature veri?cation systems have been proposed to address
`the security problem. For example, US. Pat. No. 5,657,393
`discloses a method and apparatus for veri?cation of hand
`Written signatures involving the extraction and comparison
`of signature characteristics including the length and angle of
`select component lines. In addition, US. Pat. No. 5,602,933
`discloses a method and apparatus for the veri?cation of
`remotely acquired data With corresponding data stored at a
`central facility.
`HoWever, none of these veri?cation systems offer general
`support for transaction initiation, remote paper and elec
`tronic data acquisition, data encryption, data
`communication, data archival, data retrieval, data mining,
`manipulation and analytic services. Accordingly, there is a
`need for a single system Which offers comprehensive sup
`port for the tasks involved in the automated processing of
`documents, biometric and electronic data from sale,
`business, banking and general consumer transactions.
`Further, there is a need for a single comprehensive system
`having the reliability, performance, fault tolerance, capacity,
`cost and security to satisfy the requirements of the retail,
`business, banking and general consumer industries.
`SUMMARY OF THE INVENTION
`The invention provides an automated, reliable, high
`performance, fault tolerant, and loW cost system With maxi
`mal security and availability to process electronic and paper
`transactions, and has been named the DataTreasuryTM Sys
`tem.
`It is an object of the present invention to provide a system
`for central management, storage and veri?cation of remotely
`captured electronic and paper transactions from credit cards,
`smart cards, debit cards, documents and receipts involving
`sales, business, banking and general purpose consumer
`applications comprising:
`at least one remote data access subsystem for capturing
`and sending electronic and paper transaction data;
`at least one data collecting subsystem for collecting and
`sending the electronic and paper transaction data com
`prising a ?rst data management subsystem for manag
`ing the collecting and sending of the transaction data;
`at least one central data processing subsystem for
`processing, sending and storing the electronic and
`paper transaction data comprising a second data man
`agement subsystem for managing the processing, send
`ing and storing of the transaction data; and
`at least one communication netWork for the transmission
`of the transaction data Within and betWeen said at least
`one data access subsystem and said at least one data
`processing subsystem.
`The DataTreasuryTM System processes paper and/or elec
`tronic receipts such as credit card receipts, Automated Teller
`Machine (ATM) receipts, business expense receipts and
`sales receipts and automatically generates reports such as
`credit card statements, bank statements, tax reports for tax
`return preparation, market analyses, and the like.
`It is a further object of the DataTreasuryTM System to
`retrieve both paper and electronic transactions at remote
`locations.
`It is a further object of the DataTreasuryTM System to
`employ a scanner and a data entry terminal at a customer site
`to retrieve data from paper transactions and to enable
`additions or modi?cations to the scanned information
`respectively.
`It is a further object of the DataTreasuryTM System to
`provide an input device for retrieving transaction data from
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`4
`the memory of smart cards for independent veri?cation of
`the records maintained by consumers, merchants and bank
`ers to prevent the loss of data from the loss, theft, damage
`or deliberate alteration of the smart card.
`It is a further object of the DataTreasuryTM System to
`retrieve and process transaction data from DataTreasuryTM
`System anonymous smart cards Which are identi?ed by an
`account number and passWord. Since DataTreasuryTM Sys
`tem anonymous smart card transactions can be identi?ed
`Without the customer’s name, a customer can add money to
`the DataTreasuryTM System anonymous smart card and
`make expenditures With the card With the same degree of
`privacy as cash acquisitions and expenditures.
`It is a further object of the DataTreasuryTM System to
`retrieve customer billing data from employee time docu
`ments and to generate customer billing statements from the
`billing data.
`It is a further object of the DataTreasuryTM System to
`initiate electronic transactions including transactions on the
`internet and to provide identi?cation veri?cation by captur
`ing and comparing signature and biometric data.
`It is a further object of the DataTreasuryTM System of the
`invention to process electronic and paper transactions With
`a tiered architecture comprised of DataTreasuryTM System
`Access Terminals (DATs), DataTreasuryTM System Access
`Collectors (DACS) and DataTreasuryTM System Processing
`Concentrators (DPCs).
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other objects and features of the invention Will
`be more clearly understood from the folloWing detailed
`description along With the accompanying draWing ?gures,
`Wherein:
`FIG. 1 is a block diagram shoWing the three major
`operational elements of the invention: the DataTreasuryTM
`System Access Terminal (DAT), the DataTreasuryTM System
`Access Collector (DAC) and the DataTreasuryTM System
`Processing Concentrator (DPC);
`FIG. 2 is a block diagram of the DAT architecture;
`FIG. 3a is a How chart describing image capture by a
`DAT;
`FIG. 3b displays a sample paper receipt Which is pro
`cessed by the DAT;
`FIG. 4 is a block diagram of the DAC architecture;
`FIG. 5 is a How chart describing the polling of the DATs
`by a DAC;
`FIG. 6 is a block diagram of the DPC architecture;
`FIG. 7 is a How chart describing the polling of the DACs
`by the DPC;
`FIG. 8 is a How chart describing the data processing
`performed by the DPC; and
`FIG. 9 is a How chart describing the data retrieval
`performed by the DPC.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`FIG. 1 shoWs the architecture of the DataTreasuryTM
`System 100. The DataTreasuryTM System 100 has three
`operational elements: the DataTreasuryTM System Access
`Terminal (DAT) 200 (the remote data access subsystem), the
`DataTreasuryTM System Access Collector (DAC) 400 (the
`intermediate data collecting subsystem), and the DataTrea
`suryTM System Processing Concentrator (DPC) 600 (the
`central data processing subsystem).
`
`Page 14 of 45
`
`

`
`15
`
`5
`The DataTreasuryTM System 100 architecture consists of
`three tiers. At the bottom tier, the DATs 200 retrieve data
`from the customer sites. At the next tier, the DACs 400 poll
`the DATs 200 to receive data Which accumulates in the DATs
`200. At the top tier, the DPCs 600 poll the DACs 400 to
`receive data Which accumulates in the DACs 400. The DPCs
`600 store the customer’s data in a central location, generate
`informative reports from the data and transmit the informa
`tive reports to the customers at remote locations.
`In the preferred embodiment, the DataTreasuryTM System
`100 complies With the Price Waterhouse SAS70 industry
`standard. Speci?cally, the DataTreasuryTM System 100
`meets the softWare development standard, the system
`deployment standard and the reliability standard speci?ed by
`Price Waterhouse SAS70. By adhering to the Price Water
`house SAS70 standard, the DataTreasuryTM System 100
`provides the security, availability and reliability required by
`mission critical ?nancial applications of banks and stock
`brokerage companies.
`As is knoWn to persons of ordinary skill in the art, the
`DataTreasuryTM System 100 could also use other softWare
`development standard, other system deployment standards
`and other reliability standards as long as adherence to these
`alternative standards provides the security, availability and
`reliability required by mission critical ?nancial applications.
`FIG. 2 shoWs a block diagram of the DAT 200 architec
`ture. DATs 200 are located at customer sites. The DataTrea
`suryTM System 100 customers include merchants, consumers
`and bankers. The DAT s 200 act as the customer contact point
`to the suite of services provided by the DataTreasuryTM
`System 100. In the preferred embodiment, the DAT 200 is
`custom designed around a general purpose thin client Net
`Work Computer (NC) Which runs SUN Microsystem’s
`JAVA/OS operating system. The custom designed DAT 200
`35
`comprises a DAT scanner 202, a DAT modem 204, DAT
`digital storage 206, a DAT controller 210 (Workstation), a
`DAT card interface 212, an optional DAT printer 208 and a
`signature pad 214.
`As is knoWn to persons of ordinary skill in the art, the
`DAT 200 could also be custom designed around a general
`purpose netWork computer running other operating systems
`as long as the chosen operating system provides support for
`multiprocessing, memory management and dynamic linking
`required by the DataTreasuryTM System 100.
`The DAT scanner 202 scans a paper receipt and generates
`a digital bitmap image representation called a Bitmap Image
`(BI) of the receipt. In the preferred embodiment, the DAT
`scanner 202 has the ability to support a full range of image
`resolution values Which are commonly measured in Dots Per
`Inch (DPI). Next, the DAT scanner 202 has the ability to
`perform full duplex imaging. With full duplex imaging, a
`scanner simultaneous captures both the front and back of a
`paper document. The DAT scanner 202 can also support gray
`scale and full color imaging at any bit per pixel depth value.
`The DAT scanner 202 also supports the capture of hand
`Written signatures for identity veri?cation.
`In addition to scanning images and text, the DAT scanner
`202 also scans DataGlyphTM elements, available from Xerox
`Corporation. As is knoWn to persons of ordinary skill in the
`art, the Xerox DataGlyphTM Technology represents digital
`information With machine readable data Which is encoded
`into many, tiny, individual glyph elements. Each glyph
`element consists of a 45 degree diagonal line Which could be
`as short as l/iooth of an inch depending on the resolution of
`the scanning and printing devices. Each glyph element
`represents a binary 0 or 1 depending on Whether it slopes
`
`45
`
`55
`
`65
`
`5,910,988
`
`6
`doWnWard to the left or the right respectively. Accordingly,
`DataGlyphTM elements can represent character strings as
`ASCII or EBCIDIC binary representations. Further, encryp
`tion methods, as knoWn to persons of ordinary skill in the art
`encrypt the data represented by the DataGlyphTM Technol
`ogy.
`The use of glyph technology in the DataTreasuryTM
`System 100 improves the accuracy, cost and performance of
`the system. Xerox DataGlyphTM Technology includes error
`correction codes Which can be referenced to correct scan
`ning errors or to correct damage to the document caused by
`ink spills or ordinary Wear. DataGlyphTM Technology also
`leads to decreased system cost since the system Will require
`less manual intervention for data entry and correction
`because of the improved accuracy associated With DataG
`lyphTM elements. Since DataGlyphTM elements represent a
`large amount of information in a small amount of space, the
`DAT scanner 100 Will require a small amount of time to
`input a large amount of information.
`The DAT card interface 212 and the DAT signature pad
`214 along With the internet and telephone access through the
`DAT modem 204 enable the DataTreasuryTM System 100
`customer to initiate secure sale and banking transactions via
`the internet or telephone With the DAT 200 using a variety
`of cards including debit cards, smart cards and credit cards.
`After selecting a purchase or a banking transaction through
`a standard internet interface, the DataTreasuryTM System
`100 customer inserts or sWipes the debit card, smart card or
`credit card into the DAT card interface 212.
`The DAT card interface 212 retrieves the identi?cation
`information from the card for subsequent transmission to the
`destination of the internet transaction. Further, the DAT
`scanner 202 could capture a hand Written signature from a
`document or the DAT signature pad 214 could capture an
`electronic signature Written on it With a special pen.
`Similarly, these security featurs alloW a credit card recipient
`to activate the card With a DAT 200 located at a merchant
`site. The security features Would detect unauthoriZed use of
`debit cards, credit cards and smart cards resulting from their
`unlaWful interception. Accordingly, the DataTreasuryTM
`System’s 100 security features offer a more secure alterna
`tive for internet and telephone transactions than the typical
`methods Which only require transmission of a card account
`number and expiration date.
`As is knoWn to persons of ordinary skill in the art, the
`DATs 200 could also include additional devices for captur
`ing other biometric data for additional security. These
`devices include facial scans, ?ngerprints, voice prints, iris
`scans, retina scans and hand geometry.
`In addition to initiating sale and banking transactions, the
`DAT card interface 212 also reads sale and banking trans
`actions initiated elseWhere from the memory of smart cards
`to enable subsequent storage and processing by the
`DataTreasuryTM System. If a smart card is lost, stolen,
`damaged or deliberately altered by an unscrupulous holder
`after the DAT card interface 212 reads its transaction data,
`the DataTreasuryTM System 100 can reproduce the transac
`tion data for the customer. Accordingly, the DAT card
`interface 212 provides support for independent veri?cation
`of the records maintained by consumers, merchants and
`bankers to prevent the loss of data from the loss, theft,
`damage or deliberate alteration of the smart card.
`The DAT card interface 212 also supports the initiation
`and retrieval of sale and banking transactions With the
`DataTreasuryTM System anonymous smart cards. In contrast
`to standard debit cards and credit cards, the DataTreasuryTM
`
`Page 15 of 45
`
`

`
`15
`
`35
`
`25
`
`7
`System anonymous smart card does not identify the card’s
`holder by name. Instead, the DataTreasuryTM System anony
`mous smart card requires only an account number and a
`password. Since DataTreasuryTM system anonymous smart
`card transactions can be identi?ed Without the customer’s
`name, a DataTreasuryTM System 100 customer can purchase
`a DataTreasuryTM System anonymous smart card, add
`money to the card, make expenditures With the card and
`monitor the card’s account With the same degree of privacy
`as cash acquisition, expenditure and management.
`The DAT scanner 202, the internet access, the signature
`pad 214 and other biometric data capture devices also
`support the remote capture of survey information and pur
`chase orders. For example, the DAT scanner 202 captures
`surveys appearing on the back of checks at restaurants and
`bars. Similarly, the DAT scanner 202 could capture purchase
`orders from residences, enabling customers to make imme
`diate purchases from their home of goods promoted through
`the mail. Accordingly, home marketing merchant could
`transmit sales in a more cost efficient and reliable manner by
`using the DAT scanner 202 instead of providing envelopes
`With prepaid postage to residences.
`The DAT scanner 202 also captures receipts Which are
`subsequently needed for tax return preparation or tax audits.
`Similarly, the DAT scanner 202 captures sales receipts from
`merchants, providing an off-site secure, reliable repository
`to guard against loss resulting from ?ooding, ?re or other
`circumstances. This feature could also alloW a merchant to
`automatically perform inventory in a reliable and cost
`effective manner.
`The DAT controller 210 performs processing tasks and
`Input/Output (I/O) tasks Which are typically performed by a
`processor. The DAT controller 210 compresses, encrypts and
`tags the BI to form a Tagged Encrypted Compressed Bitmap
`Image (TECBI). The DAT controller 210 also manages the
`Input/Output (I/O). Speci?cally, the DAT controller 210
`manages devices like the DAT scanner 202, the DAT digital
`storage 206, the optional DAT printer 208 and the DAT
`modem 204.
`The DAT digital storage 208 holds data such as the
`TECBI. The DAT modem 204 transmits data from the DAT
`200 to the appropriate DAC 400 as instructed by the DAT
`controller 210. Speci?cally, the DAT modem 204 transmits
`the TECBIs from the DAT digital storage 208 to the appro
`45
`priate DAC 400. In the preferred embodiment, the DAT
`modem 204 is a high speed modem With dial-up connectiv
`ity. The DAT digital storage 208 is suf?ciently large to store
`the input data before transmission to a DAC 400. The DAT
`digital storage 208 can be Random Access Memory (RAM)
`or a hard drive.
`FIG. 3a is a How cha

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket