`
`Ulllted States Patent [19]
`Ballard
`
`[54] REMOTE IMAGE CAPTURE WITH
`CENTRALIZED PROCESSING AND
`STORAGE
`
`[75] Inventor; Claudio R_ Ballard, Lloyd Harbor,
`NY
`
`[73] Assignee: CSP Holdings, Inc., Lloyd Harbor,
`NY
`
`[21] Appl- No" 08/917,761
`[22] Filed:
`Aug 27’ 1997
`
`6
`[51] Int. Cl. ...................................................... .. H04L 9/00
`[52] US. Cl. .............................................................. .. 380/24
`[58] Field of Search ........................................ .. 380/25, 24
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`US005910988A
`[11] Patent Number:
`[45] Date of Patent:
`
`5,910,988
`Jun. 8, 1999
`
`8/1993 Kern et a1. ............................ .. 235/379
`5,237,158
`5,274,567 12/1993 Kallin et a1.
`. 364/478
`5,283,829
`2/1994 Anderson
`380/24
`5,321,238
`6/1994 Kamata et al.
`. 235/379
`5,321,751
`6/1994 Ray et a1. ............................... .. 380/23
`5,345,090
`9/1994 Hludzinski ............................ .. 250/566
`5,434,928
`7/1995 Wagner et al. .
`. 382/187
`574367970
`7/1995 Ray et a1~
`380/23
`5,444,794
`8/1995 Uhland, Sr. .
`. 382/137
`5,457,747 10/1995 DreXler et al.
`380/24
`5,479,510 12/1995 Olsen et a1. ............................ .. 380/24
`5,506,691
`4/1996 Bednar et a1.
`. 358/402
`5,544,043
`8/1996 Mlkl et al. ............................ .. 364/406
`
`(Ust Continued on next page)
`
`Primary Examiner—Salvatore Cangialosi
`Attorney, Agent, or Firm—McGuire, Woods, Battle &
`Boothe LLP
`
`4,201,978
`
`5/1980 Nally .................................. .. 340/1463
`
`[57]
`
`ABSTRACT
`
`.. 235/379
`__ 364515
`__ 235/379
`382/45
`380/26
`382”
`.. 235/379
`.. 380/26
`382/14O
`_ 382/9
`235/379
`364/478
`379/144
`
`4/1981 Owens et al. ..
`4,264,808
`4/1982 de la Guardia
`473267258
`4,417,136 11/1983 Rushby et a1, _
`4,457,015
`6/1984 Nally et a1.
`4,500,750
`2/1985 Elafldef et a1~
`435233330
`6/1985 Cam """"""" "
`4,555,617 11/1985 Brooks et a1. .
`4,578,530
`3/1986 Zeidler ......... ..
`476027936
`7/1986 Green et aL
`4,680,803
`7/1987 Dilella __________ __
`4,694,147
`9/1987 Amemiya et al.
`4,747,058
`5/1988 H0 ------------------- ~~
`43750201 6/1988 Hodgson et a1‘ '
`4,843,220
`6/1989 Haun ............ ..
`.. 235/380
`.
`4,888,812 12/1989 Dlnan et al. .............................. .. 382/7
`3/1990 Lee 6161. ................................ .. 380/24
`4,912,762
`479267325
`5/1990 Benton et a1_ _
`_ 364/408
`4,960,981 10/1990 Benton e161. ........................ .. 235/379
`5,091,968
`2/1992 Higgins et a1. ......................... .. 382/30
`5,122,950
`6/1992 Benton et al- -
`-- 364/408
`Yoshida ................................. ..
`?séivka ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " 364/408
`
`’
`’
`5,175,682 12/1992 Higashiyama e161. ............... .. 364/408
`5,187,750
`2/1993 Behera ...................................... .. 382/7
`
`C ure ...... ..
`
`..
`
`~
`
`_
`_
`_
`_
`A system for remote data acqu1s1t1on and centrahzed pro
`cessmg and storage 1s drsclosed called the DataTreasuryTM
`System. The DataTreasuryTM System provides comprehen
`sive support for the processing of documents and electronic
`data associated With different applications including sale,
`b .
`b ki
`d
`1
`t
`t.
`Th
`usmess> 2}“ “g an geflera Consumer fans“ mm 6
`system retrreves transactron data at one or more remote
`Locatrons, encrypts the data, transmrts the encrypted data to
`a central location, transforms the data to a usable form,
`performs identi?cation veri?cation using signature data and
`biometric data, generates informative reports from the data
`.
`.
`.
`.
`and transmrts the mformatrve reports to the remote locat1on
`TM
`(5) The Da_taTreaSurY
`System has_ maPY advantageous
`features WhI'Ch'VYOI‘k together to prov1de h1gh performance,
`securlty, rehablhty, fault tolerance and low cost Flrst, the
`network architecture facilitates secure communication
`between the remote location(s) and the central processing
`A dynamic address assignment algorithm performs
`load balancing among the system’s servers for faster per
`f
`d h h
`tl
`t
`. F 11
`tt
`Gimme? an
`lfher ullzalont. m y’ a parllomng
`SC eme lmproves 6 error Cone‘: 10“ Process'
`
`~
`
`~
`
`~
`
`~
`
`-
`
`-
`
`-
`
`5,204,811
`5,220,501
`
`.. 364/406
`4/1993 Bednar et al. .
`6/1993 Lawlor et a1. ........................ .. 364/408
`
`50 Claims, 10 Drawing Sheets
`
`CREDlT
`
`SUFS e
`
`irriam
`
`DAT
`
`3702‘ ‘
`
`$342116
`
`7
`
`MG
`
`,312
`
`52/548258»
`
`NB Mi
`CCMNESSB
`@ ml?iéim
`|$$l MB $3519
`11 511142511
`
`ME 322
`MG
`/"324
`
`WTMWWEEDF
`SC/WNEUCREDFSUPS
`
`m
`
`“5
`
`\'
`1 I
`
`Page 1 of 45
`
`FIS Exhibit 1001
`
`
`
`5,910,988
`Page 2
`
`US. PATENT DOCUMENTS
`5
`_
`d
`55
`, 90,038 12/1996 Pltro a .................................. .. 39 /241
`5,602,933
`2/1997 Blackwell et al.
`.. 382/116
`5,604,640
`2/1997 Zipfetal. .... ..
`.. 359/803
`
`5,657,396
`5,673,333
`5,751,842
`5754 673
`7
`7
`
`8/1997 Rudolph et al. ...................... .. 382/190
`9/1997 Johnston ............................... .. 382/137
`5/1998 Riach et a1‘ ~~~~~~~~~~~~~~~~~~~~~~~~~~ " 382/137
`5/1998 B k t
`1
`382/112
`10° 5 e a' ~~~~~~~~~~~~~~~~~ ~
`
`5,647,017
`
`
`
`Bakhoum ~ ~ ~ ~ ~ ~ ~ 7/1997 Smithies et al_
`
`
`
`~ ~ ~ ~ u 382/119
`
`5,784,503
`
`
`
`Carney .................................. .. 7/1998 Bleecker, III et al. ............... .. 382/306
`
`5,657,389
`
`8/1997 Houvener ________________________________ __ 380/23
`
`5,787,403
`
`7/1998 Randle .................................... .. 705/43
`
`Page 2 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 1 0f 10
`
`5,910,988
`
`200
`\
`DATA TREASURYTM
`ACCESS TERMINAL
`
`400 \ DATA TREASURYTM
`ACCESS COLLECTOR
`
`600
`
`DATA TREASURYTM
`PROCESSING CONCENTRATOR
`
`FIG. 1
`
`Page 3 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 2 0f 10
`
`5,910,988
`
`com
`
`N .Orm
`
`mom \ EZE
`
`vow
`w
`
`58:
`
`c3
`
`NE
`
`Page 4 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 3 0f 10
`
`5,910,988
`
`D.A.T.
`OPEHATOH
`
`370
`
`w
`NOT|FYD.A.T.
`OPERATOROFTROUBLE
`
`CREDIT
`SuPS =
`
`310
`
`4
`
`4 MG
`
`312
`
`OK
`"
`BI
`
`:;
`
`BITMAP IMAGE 0F
`SCANNEDCREDITSLIPS
`
`314
`
`316
`
`0K
`E
`OOMPRESSEO
`Em BITMAP IMAGE 0F
`SCANNEDCHEDITSLIPS
`*
`<7\31a
`320
`ENCHYPTED
`OOMPRESSEO
`BITMAP IMAGE OF
`lEcB'
`SCANNEDCHEDITSLIPS
`y
`<7\322
`
`OK"
`
`NOTIFY D.A.T.
`OPERATOHOFTROUBLE
`
`MG
`
`‘
`
`NOT|FYD.A.T.
`OPERATOHOFTHOUBLE
`“
`d MG
`
`‘
`
`NOTIFYD-A-T'
`OPERATOROFTROUBLE
`
`d
`‘
`
`“
`
`4 MG
`S
`
`324
`
`OK I
`TECB'
`1
`
`TAGGED ENCHYPTED
`COMPRESSED
`BITMAPIMAGEOF
`SCANNEDCREDITSLIPS
`
`326
`
`NOT|FYD.A.T.
`OPEHATOROFTROUBLE
`
`‘
`
`“
`
`1 MG
`
`328
`
`v
`
`NOTIFY
`D.A.C.
`OFTHOUBLE
`
`OK
`
`YES
`
`330
`
`No
`
`FIG. 3A
`
`YES
`
`N0
`
`338
`
`N/G
`
`ELIE
`366
`;
`
`‘P
`362
`346 L
`J
`M
`
`358
`NO L
`‘
`
`YES
`
`5342
`
`354
`
`\
`
`350
`
`334
`
`R
`OK
`'
`g
`
`M
`
`Page 5 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 4 0f 10
`
`5,910,988
`
`/- XEROX DATAGLYPH
`
`OFFICE DEPOT
`2110 BROAD HOLLOW ROAD / 372
`FAHMINGDALE, NY 11735
`/370
`516-844-0444
`194541‘
`3305 1193M?
`374
`2169
`_SA_L.E. ________________ -AAAAAZ _______ “1.642f/
`,_ ........................................... _,
`/—376
`; 75608700053 BUSINESS PLAN PRO
`89.99 ar/
`1 _______ _-M_F_<5-_U_S_T.____$95-_QQ _______________
`
`____________________________________________ _, /”
`
`378
`
`ill;ll;LLLLLEQPFQEELL§§l§§§9§€€lk£sao
`
`F382
`________________ _IQIA_L__________--_--9zA1.__>/
`
`LLAQQQQALTLALUAABLEBL11999999941199lkj/ 386
`E._.EX_F3I_RAIIQN_DAT_E_ _________________ “Qt/98.--?
`/388
`__V_'$A _____________________________ "9741--
`LQHAAQE ___________________________ -AAM/
`
`THANK YOU FOR SHOPPING AND SAVING AT
`OFFICE DEPOT
`
`FIG. 3B
`
`Page 6 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 5 0f 10
`
`5,910,988
`
`wow
`
`
`
`
`
`ENE M525 god @116
`
`m Q
`
`
`
`god $56
`
`$29M
`
`o3
`
`cow
`
`Ezmw Q2
`
`g 3% Q 3%
`
`mow
`
`Page 7 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 6 0f 10
`
`5,910,988
`
`I 526
`
`START
`l / 502
`
`:"7/508
`
`<7/514
`
`/ 520
`
`j 522
`
`524
`
`f 528
`
`— D i N
`E
`
`FIG. 5
`
`Page 8 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 7 0f 10
`
`5,910,988
`
`Ema M55
`
`
`
`23mm M525
`
`
`
`god ?mmé
`
`5
`
`
`
`53mm wSEE m I‘
`
`cow
`
`
`
`Na EH E25 “:5 5% 20520;
`
`N8 % $53;
`
`EOE % VEOEZ
`gm
`
`m :2."
`
`Q8 H gem HH gem
`
`§ 05 / 1
`
`Page 9 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 8 0f 10
`
`5,910,988
`
`700
`
`START
`l
`
`M
`
`M
`
`J’ 726
`
`V
`
`NO
`
`724
`
`728 /
`
`END
`FIG. 7
`
`Page 10 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 9 0f 10
`
`5,910,988
`
`START
`
`802 \
`
`804 k
`
`TECBI
`
`O 0 4|
`8 8 8
`6 8 o
`
`826
`
`4!
`
`"S w EW 2 E. _w 2
`
`\ YES
`820 g
`/
`
`:Q YE§
`
`s24
`
`END
`
`FIG. 8
`
`Page 11 of 45
`
`
`
`U.S. Patent
`
`Jun. 8, 1999
`
`Sheet 10 0f 10
`
`5,910,988
`
`900
`
`START L f 904
`
`902 f
`
`\7
`
`r 906
`
`MG
`
`OK
`
`908
`I
`
`j 91 0
`
`V
`
`912
`
`N/G
`
`OK
`
`914
`
`Page 12 of 45
`
`
`
`1
`REMOTE IMAGE CAPTURE WITH
`CENTRALIZED PROCESSING AND
`STORAGE
`
`FIELD OF THE INVENTION
`
`This invention relates generally to the automated process
`ing of documents and electronic data from different appli
`cations including sale, business, banking and general con
`sumer transactions. More particularly, it pertains to an
`automated system to retrieve transaction data at remote
`locations, to encrypt the data, to transmit the encrypted data
`to a central location, to transform the data to a usable form,
`to generate informative reports from the data and to transmit
`the informative reports to the remote locations.
`
`BACKGROUND
`
`This invention involves the processing of documents and
`electronic data Which are generated, for example, from sale,
`business and banking transactions including credit card
`transactions, smart card transactions, automated teller
`machine (ATM) transactions, consumer purchases, business
`forms, W2 forms, birth certi?cates, deeds and insurance
`documents.
`The enormous number of paper and electronic records
`generated from documents and electronic data from sale,
`business and banking transactions contain valuable infor
`mation. First, these paper and electronic records contain
`information Which can be used to verify the accuracy of the
`records maintained by consumers, merchants and bankers.
`For example, customers use paper receipts of sale and
`banking transactions to verify the information on the peri
`odic statements Which they receive from their bank or credit
`card institution. Merchants use paper receipts to record sale
`transactions for management of customer complaints. Tax
`payers use paper receipts to record tax deductible contribu
`tions for use in their tax return preparation. Employees use
`paper receipts to record business expenses for preparation of
`business expense forms.
`Paper and electronic records also contain information
`Which can be used for market analysis. For example, manu
`facturers and retailers can determine consumer preferences
`in different regions as Well as trends in consumer preferences
`from the information contained in paper and electronic
`records.
`HoWever, the maintenance and processing of paper and
`electronic records presents difficult challenges. First, paper
`receipts and documents could easily be lost, misplaced,
`stolen, damaged or destroyed. Further, the information con
`tained in these paper and electronic records cannot be easily
`processed because it is scattered among individual records.
`For example, the market trend information contained in a
`group of sales records retained by merchants cannot easily
`be determined since this information is scattered among the
`individual records. LikeWise, the tax information contained
`in a group of paper receipts of sales transactions retained by
`consumers cannot easily be processed.
`Previous approaches have been proposed to meet the
`challenges associated With the maintenance and processing
`of paper and electronic records. For example, data archive
`service companies store the information from paper receipts
`and documents acquired from their customers on micro?lm
`or compact disc read only memory (CD-ROM) at a central
`facility. Customers typically deliver the paper receipts and
`documents to the central facility. For sensitive documents
`Which cannot leave the customer site, some data archive
`service companies perform data acquisition and transfer to
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`5,910,988
`
`2
`magnetic tapes at the customer site and deliver the tapes to
`the central facility.
`The approach offered by these data archive service com
`panies have disadvantages. First, the approach is costly and
`has poor performance because it requires an expensive, time
`consuming physical transportation of paper receipts or mag
`netic tapes from the customer site to the central facility.
`Further, the approach is not reliable as information can be
`lost or damaged during physical transportation. The
`approach also has limited capability as it does not process
`electronic records along With the paper receipts Within a
`single system.
`Other approaches have focused on the elimination of
`paper receipts and documents. US. Pat. No. 5,590,038
`discloses a universal electronic transaction card (UET card)
`or smart card Which stores transaction information on a
`memory embedded on the card as a substitute for a paper
`receipt. Similarly, US. Pat. No. 5,479,510 discloses a
`method of electronically transmitting and storing purchaser
`information at the time of purchase Which is read at a later
`time to ensure that the purchased goods or services are
`delivered to the correct person.
`While these approaches avoid the problems associated
`With paper receipts, they have other disadvantages. First,
`these approaches do not offer independent veri?cation of the
`accuracy of the records maintained by consumers, mer
`chants and bankers With a third party recipient of the
`transaction data. For example, if a UET card is lost, stolen,
`damaged or deliberately altered by an unscrupulous holder
`after recording sale or banking transactions, these
`approaches Would not be able to verify the remaining
`records Which are maintained by the other parties to the
`transactions.
`Next, these approaches do not have the ability to process
`both paper and electronic records of transactions Within a
`single, comprehensive system. Accordingly, they do not
`address the task of processing the enormous number of
`paper receipts Which have been generated from sales and
`banking transactions. The absence of the ability to process
`both paper and electronic records of these approaches is a
`signi?cant limitation as paper receipts and documents Will
`continue to be generated for the foreseeable future because
`of concerns over the reliability and security of electronic
`transactions and the familiarity of consumers and merchants
`With paper receipts.
`These approaches also have a security de?ciency as they
`do not offer signature veri?cation Which is typically used on
`credit card purchases to avoid theft and fraud. For example,
`a thief could misappropriate money from a UET card holder
`after obtaining by force, manipulation or theft the user’s
`personal identi?cation number (PIN). Similarly, it is not
`uncommon for criminals to acquire credit cards in victims’
`names and make unlaWful charges after obtaining the vic
`tim’s social security number. This becomes a greater con
`cern as that type of personal information becomes available,
`e.g., on the internet. Also, the signature veri?cation per
`formed manually by merchants for credit card purchases
`frequently misses forged signatures.
`Even if smart cards or UET cards had the ability to store
`signature and other biometric data Within the card for
`veri?cation, the system Would still have disadvantages.
`First, the stored biometric data on the card could be altered
`by a card thief to defeat the security measure. Similarly, the
`biometric data could be corrupted if the card is damaged.
`Finally, the security measure Would be costly at it Would
`require an expensive biometric comparison feature either on
`each card or on equipment at each merchant site.
`
`Page 13 of 45
`
`
`
`5,910,988
`
`3
`Additional biometric veri?cation systems including sig
`nature veri?cation systems have been proposed to address
`the security problem. For example, US. Pat. No. 5,657,393
`discloses a method and apparatus for veri?cation of hand
`Written signatures involving the extraction and comparison
`of signature characteristics including the length and angle of
`select component lines. In addition, US. Pat. No. 5,602,933
`discloses a method and apparatus for the veri?cation of
`remotely acquired data With corresponding data stored at a
`central facility.
`HoWever, none of these veri?cation systems offer general
`support for transaction initiation, remote paper and elec
`tronic data acquisition, data encryption, data
`communication, data archival, data retrieval, data mining,
`manipulation and analytic services. Accordingly, there is a
`need for a single system Which offers comprehensive sup
`port for the tasks involved in the automated processing of
`documents, biometric and electronic data from sale,
`business, banking and general consumer transactions.
`Further, there is a need for a single comprehensive system
`having the reliability, performance, fault tolerance, capacity,
`cost and security to satisfy the requirements of the retail,
`business, banking and general consumer industries.
`SUMMARY OF THE INVENTION
`The invention provides an automated, reliable, high
`performance, fault tolerant, and loW cost system With maxi
`mal security and availability to process electronic and paper
`transactions, and has been named the DataTreasuryTM Sys
`tem.
`It is an object of the present invention to provide a system
`for central management, storage and veri?cation of remotely
`captured electronic and paper transactions from credit cards,
`smart cards, debit cards, documents and receipts involving
`sales, business, banking and general purpose consumer
`applications comprising:
`at least one remote data access subsystem for capturing
`and sending electronic and paper transaction data;
`at least one data collecting subsystem for collecting and
`sending the electronic and paper transaction data com
`prising a ?rst data management subsystem for manag
`ing the collecting and sending of the transaction data;
`at least one central data processing subsystem for
`processing, sending and storing the electronic and
`paper transaction data comprising a second data man
`agement subsystem for managing the processing, send
`ing and storing of the transaction data; and
`at least one communication netWork for the transmission
`of the transaction data Within and betWeen said at least
`one data access subsystem and said at least one data
`processing subsystem.
`The DataTreasuryTM System processes paper and/or elec
`tronic receipts such as credit card receipts, Automated Teller
`Machine (ATM) receipts, business expense receipts and
`sales receipts and automatically generates reports such as
`credit card statements, bank statements, tax reports for tax
`return preparation, market analyses, and the like.
`It is a further object of the DataTreasuryTM System to
`retrieve both paper and electronic transactions at remote
`locations.
`It is a further object of the DataTreasuryTM System to
`employ a scanner and a data entry terminal at a customer site
`to retrieve data from paper transactions and to enable
`additions or modi?cations to the scanned information
`respectively.
`It is a further object of the DataTreasuryTM System to
`provide an input device for retrieving transaction data from
`
`10
`
`15
`
`25
`
`35
`
`45
`
`55
`
`65
`
`4
`the memory of smart cards for independent veri?cation of
`the records maintained by consumers, merchants and bank
`ers to prevent the loss of data from the loss, theft, damage
`or deliberate alteration of the smart card.
`It is a further object of the DataTreasuryTM System to
`retrieve and process transaction data from DataTreasuryTM
`System anonymous smart cards Which are identi?ed by an
`account number and passWord. Since DataTreasuryTM Sys
`tem anonymous smart card transactions can be identi?ed
`Without the customer’s name, a customer can add money to
`the DataTreasuryTM System anonymous smart card and
`make expenditures With the card With the same degree of
`privacy as cash acquisitions and expenditures.
`It is a further object of the DataTreasuryTM System to
`retrieve customer billing data from employee time docu
`ments and to generate customer billing statements from the
`billing data.
`It is a further object of the DataTreasuryTM System to
`initiate electronic transactions including transactions on the
`internet and to provide identi?cation veri?cation by captur
`ing and comparing signature and biometric data.
`It is a further object of the DataTreasuryTM System of the
`invention to process electronic and paper transactions With
`a tiered architecture comprised of DataTreasuryTM System
`Access Terminals (DATs), DataTreasuryTM System Access
`Collectors (DACS) and DataTreasuryTM System Processing
`Concentrators (DPCs).
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other objects and features of the invention Will
`be more clearly understood from the folloWing detailed
`description along With the accompanying draWing ?gures,
`Wherein:
`FIG. 1 is a block diagram shoWing the three major
`operational elements of the invention: the DataTreasuryTM
`System Access Terminal (DAT), the DataTreasuryTM System
`Access Collector (DAC) and the DataTreasuryTM System
`Processing Concentrator (DPC);
`FIG. 2 is a block diagram of the DAT architecture;
`FIG. 3a is a How chart describing image capture by a
`DAT;
`FIG. 3b displays a sample paper receipt Which is pro
`cessed by the DAT;
`FIG. 4 is a block diagram of the DAC architecture;
`FIG. 5 is a How chart describing the polling of the DATs
`by a DAC;
`FIG. 6 is a block diagram of the DPC architecture;
`FIG. 7 is a How chart describing the polling of the DACs
`by the DPC;
`FIG. 8 is a How chart describing the data processing
`performed by the DPC; and
`FIG. 9 is a How chart describing the data retrieval
`performed by the DPC.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`FIG. 1 shoWs the architecture of the DataTreasuryTM
`System 100. The DataTreasuryTM System 100 has three
`operational elements: the DataTreasuryTM System Access
`Terminal (DAT) 200 (the remote data access subsystem), the
`DataTreasuryTM System Access Collector (DAC) 400 (the
`intermediate data collecting subsystem), and the DataTrea
`suryTM System Processing Concentrator (DPC) 600 (the
`central data processing subsystem).
`
`Page 14 of 45
`
`
`
`15
`
`5
`The DataTreasuryTM System 100 architecture consists of
`three tiers. At the bottom tier, the DATs 200 retrieve data
`from the customer sites. At the next tier, the DACs 400 poll
`the DATs 200 to receive data Which accumulates in the DATs
`200. At the top tier, the DPCs 600 poll the DACs 400 to
`receive data Which accumulates in the DACs 400. The DPCs
`600 store the customer’s data in a central location, generate
`informative reports from the data and transmit the informa
`tive reports to the customers at remote locations.
`In the preferred embodiment, the DataTreasuryTM System
`100 complies With the Price Waterhouse SAS70 industry
`standard. Speci?cally, the DataTreasuryTM System 100
`meets the softWare development standard, the system
`deployment standard and the reliability standard speci?ed by
`Price Waterhouse SAS70. By adhering to the Price Water
`house SAS70 standard, the DataTreasuryTM System 100
`provides the security, availability and reliability required by
`mission critical ?nancial applications of banks and stock
`brokerage companies.
`As is knoWn to persons of ordinary skill in the art, the
`DataTreasuryTM System 100 could also use other softWare
`development standard, other system deployment standards
`and other reliability standards as long as adherence to these
`alternative standards provides the security, availability and
`reliability required by mission critical ?nancial applications.
`FIG. 2 shoWs a block diagram of the DAT 200 architec
`ture. DATs 200 are located at customer sites. The DataTrea
`suryTM System 100 customers include merchants, consumers
`and bankers. The DAT s 200 act as the customer contact point
`to the suite of services provided by the DataTreasuryTM
`System 100. In the preferred embodiment, the DAT 200 is
`custom designed around a general purpose thin client Net
`Work Computer (NC) Which runs SUN Microsystem’s
`JAVA/OS operating system. The custom designed DAT 200
`35
`comprises a DAT scanner 202, a DAT modem 204, DAT
`digital storage 206, a DAT controller 210 (Workstation), a
`DAT card interface 212, an optional DAT printer 208 and a
`signature pad 214.
`As is knoWn to persons of ordinary skill in the art, the
`DAT 200 could also be custom designed around a general
`purpose netWork computer running other operating systems
`as long as the chosen operating system provides support for
`multiprocessing, memory management and dynamic linking
`required by the DataTreasuryTM System 100.
`The DAT scanner 202 scans a paper receipt and generates
`a digital bitmap image representation called a Bitmap Image
`(BI) of the receipt. In the preferred embodiment, the DAT
`scanner 202 has the ability to support a full range of image
`resolution values Which are commonly measured in Dots Per
`Inch (DPI). Next, the DAT scanner 202 has the ability to
`perform full duplex imaging. With full duplex imaging, a
`scanner simultaneous captures both the front and back of a
`paper document. The DAT scanner 202 can also support gray
`scale and full color imaging at any bit per pixel depth value.
`The DAT scanner 202 also supports the capture of hand
`Written signatures for identity veri?cation.
`In addition to scanning images and text, the DAT scanner
`202 also scans DataGlyphTM elements, available from Xerox
`Corporation. As is knoWn to persons of ordinary skill in the
`art, the Xerox DataGlyphTM Technology represents digital
`information With machine readable data Which is encoded
`into many, tiny, individual glyph elements. Each glyph
`element consists of a 45 degree diagonal line Which could be
`as short as l/iooth of an inch depending on the resolution of
`the scanning and printing devices. Each glyph element
`represents a binary 0 or 1 depending on Whether it slopes
`
`45
`
`55
`
`65
`
`5,910,988
`
`6
`doWnWard to the left or the right respectively. Accordingly,
`DataGlyphTM elements can represent character strings as
`ASCII or EBCIDIC binary representations. Further, encryp
`tion methods, as knoWn to persons of ordinary skill in the art
`encrypt the data represented by the DataGlyphTM Technol
`ogy.
`The use of glyph technology in the DataTreasuryTM
`System 100 improves the accuracy, cost and performance of
`the system. Xerox DataGlyphTM Technology includes error
`correction codes Which can be referenced to correct scan
`ning errors or to correct damage to the document caused by
`ink spills or ordinary Wear. DataGlyphTM Technology also
`leads to decreased system cost since the system Will require
`less manual intervention for data entry and correction
`because of the improved accuracy associated With DataG
`lyphTM elements. Since DataGlyphTM elements represent a
`large amount of information in a small amount of space, the
`DAT scanner 100 Will require a small amount of time to
`input a large amount of information.
`The DAT card interface 212 and the DAT signature pad
`214 along With the internet and telephone access through the
`DAT modem 204 enable the DataTreasuryTM System 100
`customer to initiate secure sale and banking transactions via
`the internet or telephone With the DAT 200 using a variety
`of cards including debit cards, smart cards and credit cards.
`After selecting a purchase or a banking transaction through
`a standard internet interface, the DataTreasuryTM System
`100 customer inserts or sWipes the debit card, smart card or
`credit card into the DAT card interface 212.
`The DAT card interface 212 retrieves the identi?cation
`information from the card for subsequent transmission to the
`destination of the internet transaction. Further, the DAT
`scanner 202 could capture a hand Written signature from a
`document or the DAT signature pad 214 could capture an
`electronic signature Written on it With a special pen.
`Similarly, these security featurs alloW a credit card recipient
`to activate the card With a DAT 200 located at a merchant
`site. The security features Would detect unauthoriZed use of
`debit cards, credit cards and smart cards resulting from their
`unlaWful interception. Accordingly, the DataTreasuryTM
`System’s 100 security features offer a more secure alterna
`tive for internet and telephone transactions than the typical
`methods Which only require transmission of a card account
`number and expiration date.
`As is knoWn to persons of ordinary skill in the art, the
`DATs 200 could also include additional devices for captur
`ing other biometric data for additional security. These
`devices include facial scans, ?ngerprints, voice prints, iris
`scans, retina scans and hand geometry.
`In addition to initiating sale and banking transactions, the
`DAT card interface 212 also reads sale and banking trans
`actions initiated elseWhere from the memory of smart cards
`to enable subsequent storage and processing by the
`DataTreasuryTM System. If a smart card is lost, stolen,
`damaged or deliberately altered by an unscrupulous holder
`after the DAT card interface 212 reads its transaction data,
`the DataTreasuryTM System 100 can reproduce the transac
`tion data for the customer. Accordingly, the DAT card
`interface 212 provides support for independent veri?cation
`of the records maintained by consumers, merchants and
`bankers to prevent the loss of data from the loss, theft,
`damage or deliberate alteration of the smart card.
`The DAT card interface 212 also supports the initiation
`and retrieval of sale and banking transactions With the
`DataTreasuryTM System anonymous smart cards. In contrast
`to standard debit cards and credit cards, the DataTreasuryTM
`
`Page 15 of 45
`
`
`
`15
`
`35
`
`25
`
`7
`System anonymous smart card does not identify the card’s
`holder by name. Instead, the DataTreasuryTM System anony
`mous smart card requires only an account number and a
`password. Since DataTreasuryTM system anonymous smart
`card transactions can be identi?ed Without the customer’s
`name, a DataTreasuryTM System 100 customer can purchase
`a DataTreasuryTM System anonymous smart card, add
`money to the card, make expenditures With the card and
`monitor the card’s account With the same degree of privacy
`as cash acquisition, expenditure and management.
`The DAT scanner 202, the internet access, the signature
`pad 214 and other biometric data capture devices also
`support the remote capture of survey information and pur
`chase orders. For example, the DAT scanner 202 captures
`surveys appearing on the back of checks at restaurants and
`bars. Similarly, the DAT scanner 202 could capture purchase
`orders from residences, enabling customers to make imme
`diate purchases from their home of goods promoted through
`the mail. Accordingly, home marketing merchant could
`transmit sales in a more cost efficient and reliable manner by
`using the DAT scanner 202 instead of providing envelopes
`With prepaid postage to residences.
`The DAT scanner 202 also captures receipts Which are
`subsequently needed for tax return preparation or tax audits.
`Similarly, the DAT scanner 202 captures sales receipts from
`merchants, providing an off-site secure, reliable repository
`to guard against loss resulting from ?ooding, ?re or other
`circumstances. This feature could also alloW a merchant to
`automatically perform inventory in a reliable and cost
`effective manner.
`The DAT controller 210 performs processing tasks and
`Input/Output (I/O) tasks Which are typically performed by a
`processor. The DAT controller 210 compresses, encrypts and
`tags the BI to form a Tagged Encrypted Compressed Bitmap
`Image (TECBI). The DAT controller 210 also manages the
`Input/Output (I/O). Speci?cally, the DAT controller 210
`manages devices like the DAT scanner 202, the DAT digital
`storage 206, the optional DAT printer 208 and the DAT
`modem 204.
`The DAT digital storage 208 holds data such as the
`TECBI. The DAT modem 204 transmits data from the DAT
`200 to the appropriate DAC 400 as instructed by the DAT
`controller 210. Speci?cally, the DAT modem 204 transmits
`the TECBIs from the DAT digital storage 208 to the appro
`45
`priate DAC 400. In the preferred embodiment, the DAT
`modem 204 is a high speed modem With dial-up connectiv
`ity. The DAT digital storage 208 is suf?ciently large to store
`the input data before transmission to a DAC 400. The DAT
`digital storage 208 can be Random Access Memory (RAM)
`or a hard drive.
`FIG. 3a is a How cha