throbber
'
`
`llllllllllllll|||lllll||||||||||l||||ll|l|lllll|||||lllllllllllllllllllllll
`USOOS615277A
`
`United States Patent
`
`[19]
`
`[11] Patent Number:
`
`5,615,277
`
`
`Hoffman
`[45] Date of Patent:
`Mar. 25, 1997
`
`[54] TOKENLESS SECURITY SYSTEM FOR
`AUTHORIZING ACCESS TO A SECURED
`COMPUTER SYSTEM
`
`[76]
`
`Inventor: Ned Hoffman, 2529A College Ave.,
`Berkeley, Calif. 94704
`
`[21]
`
`Appl. No.: 345,523
`
`[22]
`
`Filed:
`
`Nov. 28, 1994
`
`[51]
`[52]
`[58]
`
`[56]
`
`Int. Cl.6 ....................................................... G06K 9/00
`US. Cl.
`................................................. 382/115; 902/3
`Field of Search ......................... 340/825.34, 825.33,
`340/825.31; 382/115, 116, 117, 118, 119,
`124, 128; 902/1, 2, 3, 4, 5,6, 8, 9, 10,
`12, 13, 22, 23, 24, 25, 26, 27, 31, 32, 33,
`34, 35, 37; 235/375, 376, 379, 380, 381,
`382, 382.5, 383, 384, 385, 386
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`............................ 364/408
`4,961,142 10/1990 Elliott et a1.
`
`7/1991 Elliott et a1. .................... 364/408
`5,036,461
`7/1993 Matchett et a1. ................... 340/825.34
`5,229,764
`
`Prima'y Examiner—JOSE L- (301180
`Assistant Examiner—Bijan Tadayon
`Attorney, Agent, or Firm—Ali Kamarei
`[57]
`ABSTRACT
`
`A tokenless security system and method for preventing
`unauthorized access to one or more secured computer sys-
`tems is shown. The security system and method are princi-
`pally based on a correlative comparison of a unique bio-
`metric sample, such as a finger print or voice recording,
`gathered directly from the person of an unknown user with
`an authenticated unique biometric sample of the same type
`obtained from each authorized user. The security system and
`method may be integrated with and dedicated to a single
`computer system, or may be configured as a non—dedicated,
`stand-alone entity capable of and intended to perform secu-
`rity functions simultaneously for more than one computer
`system. Further, the stand alone configuration can be net-
`worked to act as a full or partial intermediary between a
`secured computer system and its authorized users, or may be
`interactive solely with and act as a consultant to the com-
`puter systems. The security system and method further
`contemplate the use of personal codes to confirm identifi—
`cations determined from biometric comparisons, and the use
`of one or more variants in the personal identification code
`for alerting authorities in the event of coerced access.
`
`113 Claims, 3 Drawing Sheets
`
`Secured Terminal
`
`Sensor Means
`
`
`P/C Input Means
`
`
`/n terconnecting Means
`
`
`
`
`
`
`
`
`
`
`Computer System
`
`
`
`Memory Means for '
`Strong Biometrics
`and PICS
`
`
`Comparison Means
`
`
`
`Evaluation Means
`
`
`
`Stored Biometrics
`
`
`
`
`Police or
`
`
`Designated
`Not/tying Means
`Authorities
`
`
`
`Stored P/Cs
`
`|PR2018-00067
`
`Unified EX1011 Page 1
`
`IPR2018-00067
`Unified EX1011 Page 1
`
`

`

`US. Patent
`
`Mar. 25, 1997
`
`Sheet 1 of 3
`
`5,615,277
`
`.68me
`
`b£ut®me
`
`mmfitofizi
`
`«GEbmgogwm
`
`atom:mE§BZ
`
`n.GE
`
`moEmEQm$6.6
`
`
`
`atom:cotoggm
`
`
`
`mpEmEoE39cm,
`
`
`
`moi.26
`
`8*menu:boEmS
`
`
`mace::omtoquo
`
`
`
`Eflmx‘msyquoo
`
`|PR2018—OOO67
`
`Unified EX1011 Page 2
`
`)
`
`
`
`mtg:mSEmEoEfiS
`
`
`
`$8:330%
`
`
`
`atom:.SQS91
`
`
`
`\DSEkabkaUQW
`
`IPR2018-00067
`Unified EX1011 Page 2
`
`
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Mar. 25, 1997
`
`Sheet 2 ofv3
`
`5,615,277
`
`Gather Biometric Sample
`
`Gather Personal Code
`
`Transmit
`
`to Computer
`
`Stored Ple
`
`Compare Gathered
`Biometric and PIC
`With the Previous/y Stored
`Biometrics and Ple
`
`Stored Biometrics
`
`Evaluate Comparisons
`'
`to Produce 0
`
`Correlation Factor
`
`Does
`
`
`
`
`
`
`
`Correlation
`
`Factor Indicate
`
`
`a Match
`
`
`N0
`
`Failed ID
`
`Yes Reduced Access
`to System
`
`Notify
`Authorities
`
`Successful ID
`To Coerced User
`
`Does
`
`
`
`PIC Variant
`
`
`
`
`
`
`Indicate Coerced
`
`
`
`Access
`?
`
`
`No
`
`Complete Access
`to System
`
`Successful ID
`
`FIG. 2
`
`|PR2018—00067
`
`Unified EX1011 Page 3
`
`IPR2018-00067
`Unified EX1011 Page 3
`
`

`

`US. Patent
`
`Mar. 25, 1997
`
`Sheet 3 of 3
`
`5,615,277
`
`
`
`meow:55.83583E
`
`
`
`Bxgum:Em3mt.Eoumt
`
`gt96€35on
`
`mbgoumm
`
`
`
`moEmEoEbEBm
`
`
`
`moibmgowm
`
`.6extol
`
`938$me
`
`mmttofiav‘
`
`:8:8582
`
`
`
`m..@E
`
`
`
`torSQEQv‘830mm,
`
`
`
`mmmou<80:me
`
`«28.6%«55¢
`:otoéqu‘
`
`
`
`589mm.3.53:8
`
`|PR2018—OOO67
`
`Unified EX1011 Page 4
`
`$0.6quQR.otu
`
`
`
`menu:tohcsgm
`
`
`gommmooimungKmtméobQ\<%935.89%\Equ
`
`
`
`
`358ng838%
`
`
`
`Emwmxmbtaumm.
`
`bum2E
`
`
`
`uEmEoE.Sx
`
`
`
`
`
`mtg:boEm:mtg::OMtDQEob
`
`IPR2018-00067
`Unified EX1011 Page 4
`
`
`
`
`
`
`
`
`

`

`1
`TOKENLESS SECURITY SYSTEM FOR
`AUTHORIZING ACCESS TO A SECURED
`COMPUTER SYSTEM
`
`FIELD OF THE INVENTION
`
`The invention relates generally to security systems
`designed to control access to restricted areas, and more
`specifically to security systems for controlling individual
`access to secured computer systems.
`
`BACKGROUND OF THE INVENTION
`
`The rapid, efiicient and secure transaction of financial and
`other services is becoming critical to the competitiveness of
`individual businesses and national economies. In the past,
`financial transactions were necessarily slow and cumber-
`some, generally requiring an individual to verify his identity
`by meeting with a representative of the financial institution
`responsible for executing the transaction. Although incon-
`venient and somewhat inflexible, such systems were useful
`in reducing transaction fraud because they predicated veri-
`fication of the individual’s identity based on certain unique
`biometric data, such as one’s signature, physical appearance,
`voice character, etc, in addition to the individual’s personal
`knowledge of his financial account numbers and secret
`codes.
`
`With the advent of computerized financial networks, the
`problem of transaction fraud has become keenly acute,
`facing not only private business, but local, state and federal
`governments as well. In order to cut costs and increase the
`flexibility of making financial transactions, many financial
`institutions have greatly reduced staff and oflice hours in
`favor of automated teller machines (“ATM”s), which pro-
`vide the consumer with round the clock access to his various
`accounts and allow the consumer to make financial trans-
`actions without visiting a bank. More recently, retail estab-
`lishments have taken advantage of the existence of such
`computerized banking services by installing apparatus
`capable of reading a consumer’s ATM card and making a
`direct debit from the consumer’s account at the point of
`purchase. Unfortunately,
`the use of ATMs and similar
`devices has greatly increased transaction fraud because in
`such systems verification of a user’s identity is not predic—
`tated on unique biometric data. Rather, all that is required for
`verification is the presentation of a token, such as a credit
`card or ATM, and the entry of the personal identification
`number (“PIN”) encoded in a magnetic strip on the token. It
`is estimated that billions of dollars are lost annually through
`transaction fraud. Ultimately, these costs are passed back to
`the consumer in the form of higher prices for goods and
`services, and in the form of higher taxes.
`Today, a considerable proportion of financial transactions,
`stock trading, commodity trading, business purchases and
`billings are transacted electronically. In these systems, the
`necessary data for identifying and locating the user’s
`accounts are magnetically recorded on a token that user must
`insert into the ATM or similar device to initiate access to his
`accounts. The token is further provided with a personal
`identification number (“PIN”), which ideally is known only
`to the user and the financial
`institution controlling the
`account. Although the combination of an account number
`and PIN will be unique to the user, the ability to possess and
`communicate such data will not be unique to the user.
`Rather, existing security systems of computer networks will
`recognize anyone capable of entering the appropriate
`account and PIN as the authorized user of those accounts.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,615,277
`
`2
`
`Further, in most instances, access will be dependant upon the
`physical presentation of the appropriate token. Known secu-
`rity systems for limiting access to secured computer systems
`require that authorized user to possess and present a unique
`(but reproducible) token, such as a credit card or ATM card,
`and require the user to know and present a personal identi-
`fication code, which is generally numeric in character.
`Unfortunately, this almost universal system of access to
`secured systems has very serious flaws. First, access can be
`gained by anyone possessing the appropriate token and
`knowledge of the PIN linked to the token and ultimately to
`the user’s account. The rapid increases in ATM crime and
`counterfeit credit card scares are testament to this point.
`Although token and code security systems do reduce the risk
`of unauthorized access, such security systems are neverthe-
`less significantly susceptible to fraud. Because verification
`of user identity is based solely on data that can be easily
`reproduced and transferred between individuals, as opposed
`to data that is unique to and irreproducible from the user,
`such security systems must rely on both the diligence and the
`luck of the authorized user in maintaining this information
`as proprietary. The significant increase in ATM crime and
`counterfeit credit card seams are testament to the weak-
`nesses of these systems, as are the plaintiff cries of the head
`of household who unwisely tendered both token and code to
`a less than thrifty friend or family member.
`In addition to the significant ongoing risk of fraud, token
`and code security systems are frequently cumbersome for
`consumers to use. First,
`the consumer must physically
`possess the token in order to initiate access to the desired
`account. This inconvenience is greatly compounded by the
`fact
`that consumer often maintains a variety of active
`financial accounts, each issuing its own unique token and
`code. This requires the consumer not only to carry numerous
`tokens, but to remember each specific code for each specific
`token. Of course, a proliferation of tokens decreases the
`ability of the consumer to maintain the high degree of
`proprietary control upon which the token and code system
`relies.
`
`Recently, various workers have attempted to overcome
`problems inherent in the token and code security system.
`One major focus has been to encrypt, variabilize or other-
`wise modify the PIN code to make it more difiicult for an
`unauthorized user to carry out more than one transaction,
`largely by focusing on manipulation of the PIN access code
`to make such code more fraud resistant. A variety of
`approaches have been suggested, such introducing an algo-
`rithm that varies the PIN in a predictable way known only
`to the user, thereby requiring a different PIN code for each
`subsequent accessing of an account. For example, the PIN
`code can be varied and made specific to the calendar day or
`date of the access attempt.
`In yet another approach, a
`time-variable element
`is introduced to generate a non-
`predictable PIN code that is revealed only to an authorized
`user at the time of access. Although more resistant to fraud
`that systems incorporating non-variable codes, such an
`approach is not virtually fraud-proof because it still relies on
`data that is not uniquely and irreproducibly personal to the
`authorized user. Further, such systems further inconvenience
`consumers that already have trouble remembering constant
`codes, much less variable ones. Examples of
`these
`approaches are disclosed in U.S. Pat. Nos. 4,837,422 to
`Dethloff et al.; U.S. Pat. No. 4,998,279 to Weiss; U.S. Pat.
`No. 5,168,520 to Weiss; U.S. Pat. No. 5,251,259 to Mosley;
`U.S. Pat. No. 5,239,538 to Parrillo; U.S. Pat. No. 5,276,314
`to Martino et al.; and U.S. Pat. No. 5,343,529 to Goldfine et
`31. all of which are incorporated herein by reference.
`
`|PR2018-00067
`
`Unified EX1011 Page 5
`
`IPR2018-00067
`Unified EX1011 Page 5
`
`

`

`5,615,277
`
`3
`More recently, some workers turned their attention from
`the use PIN codes to the use of unique biometric data as the
`basis of identity verification, and ultimately computer
`access. In this approach, an authenticated biocharacteristic is
`voluntarily recorded from a user of known identity and
`stored for future reference.
`In every subsequent access
`attempt, the user is required to enter physically the requested
`biocharacteristic, which is then compared to the authenti—
`cated biocharacteristic to determine if the two match in order
`to verify user identity. Because the biocharacteristic is
`uniquely personal to the user and because the act of physi—
`cally entering the biocharacteristic is virtually irreproduc-
`ible, a match is putative of actual identity, thereby decreas—
`ing the risk of fraud. Various biocharacteristics have been
`suggested, such as finger prints, hand prints, voice prints,
`retinal images, handwriting samples and the like. However,
`because the biocharacteristic is generally stored in electronic
`(and thus reproducible) form on a token and because the
`comparison and verification process is not isolated from the
`hardware and software directly used by the individual
`attempting access, a significant risk of fraudulent access still
`exists. Examples of this approach to system security are
`described in U.S. Pat. Nos. 4,821,118 to Lafreniere; U.S.
`Pat. No. 4,993,068 to Piosenka et al.; U.S. Pat. No. 4,995,
`086 to Lilley et al.; U.S. Pat. No. 5,054,089 to Uchida et al.;
`U.S. Pat. No. 5,095,194 to Barbanell; U.S. Pat. No. 5,109,
`427 to Yang; U.S. Pat. No. 5,109,428 to Igaki eta1.; U.S. Pat.
`No. 5,144,680 to Kobayashi et al.; U.S. Pat. No. 5,146,102
`to Higuchi eta1.; U.S. Pat. No. 5,180,901 to Hiramatsu; U.S.
`Pat. No. 5,210,588 to Lee; U.S. Pat. No. 5,210,797 to Usui
`et al.; U.S. Pat. No. 5,222,152 to Fishbine et al.; U.S. Pat.
`No. 5,230,025 to Fishbine et al.; U.S. Pat. No. 5,241,606 to
`Horie; U.S. Pat. No. 5,265,162 to Bush et al.; U.S. Pat. No.
`5,321,242 to Heath, Jr; U.S. Pat. No. 5,325,442 to Knapp;
`U.S. Pat. No. 5,351,303 to Willmore, all of which are
`incorporated herein by reference.
`As will be appreciated from the foregoing discussion, a
`dynamic but unavoidable tension arising in attempting to
`design a security system that is highly fraud resistant, but
`nevertheless easy and convenient for the consumer to use.
`Unfortunately, none of
`the above-disclosed proposed
`improvements to the token and code system adequately
`address, much less attempt to balance, this tension. Such
`systems generally store the authenticated biocharacteristic in
`electronic form directly on the token that can easily be
`copied. Further, such systems do not adequately isolate the
`identity verification process from tampering by someone
`attempting to gain unauthorized access.
`An example of token-based security system which relies
`on a biocharacteristic of a user can be found in U.S. Pat. No.
`5,280,527 to Gullman et al. In Gullman’s system, the user
`must carry and present a credit card sized token (referred to
`as a biometric security apparatus) containing a microchip in
`which is recorded characteristics of the authorized user’s
`voice. In order to initiate the access procedure, the user must
`insert the token into a terminal such as an ATM, and then
`speak into the terminal to provide a biocharacteristic input
`for comparison with an authenticated input stored in the
`microchip of the presented token. The process of identity
`verification is generally not isolated from potential tamper—
`ing by one attempting unauthorized access. If a match is
`found, the remote terminal may then signal the host com-
`puter that access should be permitted, or may prompt the
`user for an additional code, such as a PIN (also stored on the
`token), before sending the necessary verification signal to
`the host computer.
`-
`Although Gullman’s reliance of comparison of stored and
`input biocharacteristics potentially reduces the risk of unau-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`4O
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`thorized access as compared to numeric codes, Gullman’s
`use of the token as the repository for the authenticating data
`combined with Gullman’s failure to isolate the identity
`verification process from the possibility of tampering greatly
`diminishes any improvement to fraud resistance resulting
`from the replacement of a numeric code with a biocharac-
`teristic. Further, the system remains somewhat cumbersome
`and inconvenient to use because it too requires the presen—
`tation of a token in order to initiate an access request.
`Thus, it will be appreciated that there has long been a need
`for a computer access security system that is both highly
`fraud-resistant and that is convenient and eflicient for the
`user to operate.
`There is also a need for a security system that is capable
`of verifying a user’s personal identity, based upon an irre—
`producible biocharacteristic that is unique and physically
`personal to an authorized user, as opposed to verifying an
`individual’s possession of physical objects and information
`that can be transferred freely between different individuals.
`Such a biocharacteristic must be easily and non-intrusively
`obtained; must be easy and cost—effective to store and
`analyze; and must not unduly invade the user’s privacy
`rights.
`A further need in computer access security system design
`is user convenience. It is highly desirable for a consumer to
`able to access the system spontaneously, particularly when
`unexpected needs arise, with a minimum of eifort. In par-
`ticular, there is a need for a security system greatly reduces
`or eliminates the need to memorize numerous or cumber—
`
`some codes, and that eliminates the need the need to possess,
`carry, present a proprietary object in order to initiate an
`access request.
`Such systems must be simple to operate, accurate and
`reliable. There is also a need for a computer security access
`system that can allow a user to access all accounts and
`procure all services authorized to the user, such as access
`and carry out
`transactions in and between all financial
`accounts, make point of purchase payments, receive various
`services, etc.
`
`There is further a great need for a computer security
`access system that affords an authorized user the ability to
`alert authorities that a third party is coercing the user to
`request access without the third party being aware that an
`alert has been undertaken. There is also a need for such a
`system that is nevertheless able to effect, unknown to the
`coercing third party, temporary restrictions on the types and
`amounts of transactions that can be undertaken once access
`is granted.
`Finally, the security system must be affordable and flex—
`ible enough to be operatively compatible with existing
`networks having a variety of transaction devices and system
`configurations.
`
`SUMMARY OF THE INVENTION
`
`It is an object of the invention therefore to provide a
`computer access security system that eliminates the need for
`a user to possess and present a physical object, such as a
`token, in order to initiate a system access request.
`It is another object of the invention to provide a computer
`access security system that is capable of verifying a user’s
`identity, as opposed to verifying possession of proprietary
`objects and information.
`It is yet another object of the invention to verify user
`identity based upon one or more unique and irreproducible
`characteristics physically personal to the user.
`
`|PR2018-00067
`
`Unified EX1011 Page 6
`
`IPR2018-00067
`Unified EX1011 Page 6
`
`

`

`5
`
`6
`
`5,615,277
`
`Yet another object of the invention is to provide a system
`of secured access that is convenient and easy use.
`Still another object of the invention is to provide a system
`of secured access to a computer system that
`is highly
`resistant to fraudulent access attempts by non-authorized
`users.
`
`Yet another object of the invention is to provide a com-
`puter access security system that enables a user to notify
`authorities that a particular access request is being coerced
`by a third party without giving notice to the third party of the
`notification.
`
`There is also a need for a computer access security system
`that automatically restricts a user’s transactional capabilities
`on the computer system according a desired configuration
`provided by the user indicates that a particular access
`request has been coerced or is otherwise involuntary.
`The invention meets these and other objects by providing
`tokenless system and method for verifying the identity of
`user requesting access to a secured computer network,
`eliminating the need to present an object in order to initiate
`and carry out an access request.
`The invention also meets these objects by providing a
`significantly improved system and method for determination
`of the identity of a user based on the user’s direct input of
`unique, irreproducible biometric data, as opposed to less
`reliable existing systems that determine the identity of a user
`based upon the presentation of a correct combination of
`token and one or more codes and the assumption that the
`individual presenting the token and codes is the individual
`authorized to possess them.
`Further, these objects are met by providing a security
`system and method in which certain programs and data
`within the computer access verification system are isolated
`from and inaccessable to the user, at least until the access
`requested has been granted. According to the invention,
`actual verification of user identity is isolated from possible
`tampering by the user requesting access. More importantly,
`all stored authenticated biometric data used in the verifica-
`
`tion process is also isolated from access by the user until the
`user’s identity has been verified,
`thereby preventing the
`counterfeiting and reuse of the authenticated data to gain
`fraudulent access.
`
`According to one embodiment of the invention, the secu—
`rity system is incorporated as a subroutine or program within
`the host computer system that the user desires to access. In
`this embodiment, the system comprises a means for gath-
`ering and recording one or more desired types of biometric
`data directly from the person of the individual requesting
`computer access; a memory means for recording, storing and
`retrieving authenticated biometric data of users authorized
`for access to the secured computer system; comparison
`means for comparing the input biometric data with authen-
`ticated biometric data of authorized users and verifying user
`identity based upon the comparison; and transmission means
`for transmitting the input biometric data to the comparison
`means.
`
`In operation, the user enters biometric data directly from
`his person, such as by pressing a finger or thumb print onto
`a sensor pad. This input data is then transmitted to another
`part of the system that is operatively isolated from the user.
`Here the input biometric data collected from the user is
`compared to authenticated biometric data collected from
`each individual authorized to obtain access to the secured
`computer system. If the input biometric data matches the
`authenticated biometric data, the identity of the user request-
`ing access will be verified and the host system directed to
`provide access.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`According to another embodiment of the invention, the
`security system operates as a stand alone entity. The system
`may be positioned in series between the user and secured
`computer network, thereby acting as an interface, or it may
`be positioned in parallel with the user relative to the secured
`computer system.
`It will be appreciated that in the former system, the user
`tenders an access request directly to the security system of
`the invention, which ideally is operationally interactive with
`numerous independent secured computer systems. The secu-
`rity system would therefore maintain authenticated biomet-
`ric data samples for all authorized users of each secured
`computer system that
`it serviced. These data would be
`cross-referenced by each authorized user. Thus, after iden-
`tity verification was completed, the security system would
`provide to the user a listing of systems that he is authorized
`to access, and prompt the user to select the desired network.
`The security system would then forward the access request
`along with its identity verification to the selected secured
`computer system, ultimately connecting the user to the
`requested secure computer system.
`In the later system, a user tenders an access request
`directly to the secured computer system that he wishes to
`use. Generally, it is contemplated that the request would be
`made at a terminal specifically dedicated to the desired
`computer system. Upon receipt of the input biometric data
`from the user, the secured computer network would forward
`said data to the security system of the invention, where a
`verification of the user’s identity would be determined from
`comparison with authenticated biometric data from autho-
`rized users of the secured computer system. The result of the
`comparison would then be returned to the secured computer
`network and access granted if the identity of the user
`requesting access was determined to be the same as one of
`the authorized users of the secured computer system.
`In addition to the comparison of input and pre-recorded
`biocharacteristics, the invention further contemplates the use
`of one or more confirmation codes to be known to and
`entered by the user requesting access after entry of the
`biometric data discussed above. A determination of identity
`could then proceed in a single or multi-step fashion. The
`software of the system may be configured to combine the
`input biometric data with the one or more codes requested,
`and thereby generate a single profile for comparison against
`pre-recorded profiles of authorized users. Alternatively, the
`system may verify identity in a linear, stepawise fashion,
`making a first determination of identity based upon similar—
`lity of biometric data, thereafter confirming this deterrnina—
`tion by prompting the user to enter a code, which the security
`system would then compare to the code assigned to identity
`determined in the first step.
`According to a further embodiment of the invention, a
`means is provided for alerting predesignated authorities
`during an access attempt that the user has been coerced to
`request access by a third party. In such an embodiment, an
`authorized user would have a number of codes, one of which
`would be recognized by the security system as the standard
`access code, and the remainder of which would be recog—
`nized as emergency codes. The comparison means of the
`security system of the invention would be configured to
`accept and recognize more than one code per authorized
`user, and to activate the emergency alert means whenever
`the code entered by the user matched an emergency code. At
`the same time, the determination of an authorized identity
`for the user would result in the user being afforded access to
`the requested secured computer system, thereby preventing
`the coercing third party from knowing that an emergency
`
`|PR2018—OOO67
`
`Unified EX1011 Page 7
`
`IPR2018-00067
`Unified EX1011 Page 7
`
`

`

`5,615,277
`
`7
`notification had been entered by the user. Ideally, the emer—
`gency code would be entered as a part of or simultaneously
`with the user’s secret code.
`
`According to another embodiment of the invention, an
`access limiting means is contemplated for use where access
`has been coerced by a third party. As discussed above, the
`invention includes an emergency alert means. The well-
`being of the user requesting access might be jeopardized if
`the coercing party discovered that the user was attempting to
`notify authorities. Thus, it is critical that the access proce—
`dure continue uninterruptedly and that access be granted to
`an authorized user so that the coercing party believes that
`everything is proceeding normally. However,
`it will be
`appreciated that the coercing party’s full and unfettered
`access to the secured computer system may cause the
`authorized user serious harm as well, particularly if access
`permits the coercing party access to make transactions from
`the authorized user’s financial accounts. Thus, according to
`the invention, the security system is provided with means for
`limiting access when the request
`for access has been
`coerced. In such instances, the security system would not
`only forward verification of identity to the secured computer
`system to be accessed, but also a request for limited access.
`The secured computer system would thereafter grant access,
`but with limitations that would be transparent to the coercive
`party. For example, if the authorized user had more than one
`checking account, under coerced access mode, only the
`account with the least money would be accessed. Altema—
`tively, the system could be configured to prohibit transac-
`tions above a particular monetary threshold. In such a case,
`the secured computer system would also generate temporary
`dummy accounts to reflect only enough money or credit to
`transact a particular transaction. Further, the secured com-
`puter may be configured to display that a particular trans-
`action has taken place, but then abort the transaction, such
`as charging an item to a line of credit or wire transferring
`funds to another account. The system may also generate and
`appropriate malfunction screen indicating that the type of
`transaction selected is not presently available due to
`mechanical or some other plausible failure. As with the
`emergency notification means, however, it is imperative that
`any access limitation that is imposed be transparent to the
`coercing party.
`The present invention is clearly advantageous over the
`prior art in a number of ways. First, it is extremely easy and
`efficient for the user, particularly where the user is accessing
`financial accounts, because it eliminates the need to carry
`and present a unique token in order to access one’s accounts.
`The present
`invention eliminates all
`the inconveniences
`associated with carrying,
`safeguarding and locating a
`desired token. And because each token is often specific to a
`particular computer system that further requires remember-
`ing a secret code assigned to the particular token,
`the
`elimination of tokens reduces the amount of memorization
`and diligence required increasingly of consumers, who are
`see everything from banking transactions and long distance
`telephone calling to point of purchase debits being con-
`ducted electronically using tokens and secret codes. Rather,
`in a single, seamless,
`tokenless, and optionally codeless
`transaction, the consumer, by mere entry of a biocharacter-
`istic such as a fingerprint and the selection of a desired
`account, can conduct virtually any commercial exchange
`transaction, from withdrawing cash from a bank account to
`paying the babysitter, from making a telephone call to Fiji to
`paying local property taxes.
`The invention is clearly advantageous from a convenience
`standpoint to retailers and financial institutions by making
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`4o
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`
`purchases and other financial transactions less cumbersome
`and more spontaneous. The paper work of financial trans-
`actions is significantly reduced as compared to current
`systems, such as credit card purchase wherein separate
`receipts are generated for use by the credit card company, the
`merchant and the consumer. Such electronic transactions
`also save merchants and banks considerable time and
`
`expense by greatly reducing operational costs. Because the
`system of the invention is designed to provide a consumer
`with simultaneous direct access to all of his financial
`accounts, the need for transactions involving money, checks,
`commercial paper and the like will be greatly reduced,
`thereby reducing the cost of equipment and staff required to
`collect and account for such transactions. Further, the manu-
`facturing and distributing costs of issuing and reissuing
`credit cards, ATM cards, calling cards and the like will be
`eliminated, thereby providing further economic savings to
`merchants and banks. In fact, the system of the invention
`will
`likely encourage consumer spending since all of a
`consumer’s electronic financial resources will be available at
`the mere input of his fingerprint or other biocharacteristic.
`The invention is markedly advantageous and superior to
`existing systems in being highly fraud resistant. As dis-
`cussed above, present security systems are inherently unre—
`liable because they base determination of a user’ s identity on
`the physical presentation of a unique object and unique
`information that is intended to be and by the security system
`presumed to be within the proprietary possession of the
`authorized user. Unfortunately, both the unique token and
`information can be transferred to another, through loss, theft
`or by voluntary action of the authorized user. Thus, unless
`the loss or unintended transfer of these

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket