`
`._____-10
`
`20
`
`22
`
`26\
`
`RAM
`
`ROM
`
`18
`
`User
`Interface
`
`USR
`Software
`
`CPU
`
`Comm.
`Port
`
`Wide
`Area
`Network
`
`Universal Secure
`Registry
`
`14 /
`
`24
`
`30
`
`Person No. 1
`
`\J
`
`30
`
`I
`
`Person No. 2
`
`•
`•
`•
`
`Person No. n
`
`30
`
`FIG. 1
`
`USR Exhibit 2105, page 1
`
`
`
`____.-- 10
`
`Computer
`Module
`
`Computer
`Module
`
`Computer
`Module
`
`USR System
`
`Computer
`Module
`
`Computer
`Module
`
`Computer
`Module
`
`27
`
`Interface
`Center
`
`Interface
`Center
`
`27 ----'
`
`Wide Area Network
`
`Interface
`Center
`
`Interface
`Center
`
`28
`
`7 27
`
`Interface
`Center
`
`Interface
`Center
`
`27
`
`27 ---'
`
`----- 27
`
`FIG. 2
`
`USR Exhibit 2105, page 2
`
`
`
`32
`
`34
`
`36
`
`38
`
`I
`
`
`
`I
`
`/
`
`Validation
`Information
`
`Access
`Information
`
`/
`
`Publicly
`Available
`Information
`
`I
`
`Address
`Information
`
`Credit Card
`and Other
`Financial
`Information
`
`Medical
`Information
`
`Job
`Application
`Information
`
`Tax
`Information
`
`30
`
`Person
`No. 1
`
`40
`
`42
`
`44
`
`46
`
`FIG. 3
`
`USR Exhibit 2105, page 3
`
`
`
`Public
`Information
`Computer
`Module
`
`Medical
`Information
`Computer
`Module
`
`Financial
`Information
`Computer
`Module
`
`USR System
`
`Address
`Information
`Computer
`Module
`
`Job
`Application
`Computer
`Module
`
`Tax
`Information
`Computer
`Module
`
`Tax
`Information
`....
`Interface
`Centers
`
`Job Application
`Information
`Interface
`Centers
`
`Public
`Information<
`Interface
`Centers
`
`Medical
`Information
`Interface
`Centers
`
`Wide Area Network
`
`Financial
`Information
`Interface
`Centers
`
`Address
`Information
`Interface
`Centers
`
`FIG. 4
`
`USR Exhibit 2105, page 4
`
`
`
`Train the Database
`
`Validate Person's
`Identification
`
`500
`
`502
`
`No
`
`Does
`Person Have Rights to
`Enter Data
`?
`
`Enable Person to Enter
`Basic Personal Data
`
`Does
`Person Have Right to
`Enter Additional Data
`?
`
`Yes
`
`508
`
`Enable Person to Enter
`Advanced Personal Data
`
`510
`
`Enable Person to Specify Access
`to Advanced Personal Data
`
`V
`Return
`
`FIG. 5
`
`512
`
`USR Exhibit 2105, page 5
`
`
`
`Enable Access to
`Basic Personal Data
`
`600
`
`602
`
`Is
`Additional Information
`Requested
`9
`
`No
`
`Does Requestor
`Have Rights to Access
`Type of Requested
`Data ?
`
`Is Person
`Participating in
`Transaction
`9
`
`Validate Person's
`Identity
`
`Enable Person to
`Change Access
`Rights to Data
`
`Does Requestor
`Have Rights to Access
`Type of Requested
`Data ?
`
`FIG. 6
`
`606
`
`Cause USR to Enable
`Access to Type of
`Requested Data
`
`610
`
`Return
`
`USR Exhibit 2105, page 6
`
`
`
`700
`
`702
`
`704
`
`706
`
`708
`
`710
`
`712
`
`User Initiates Purchase
`
`User Enters Secret Code
`in Secure ID
`
`Merchant Transmits to Credit
`Card Company
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`Credit Card Company
`Sends Code to USR
`
`USR Determines if Code is Valid, and if
`Valid Accesses User's Credit Card
`Information and Transmits Credit Card
`Number to Credit Card Company
`
`v
`Credit Card Company Checks
`Credit Worthiness and Declines
`Card or Debits User's Account and
`Transfers $ to Merchant's Account
`
`'I
`CCC Notifies Merchant of
`Result of Transaction
`
`FIG. 7
`
`USR Exhibit 2105, page 7
`
`
`
`800
`
`802
`
`804
`
`806
`
`808
`
`810
`
`812
`
`814
`
`User Initiates Purchase
`
`V
`User Enters Secret Code
`in Secure ID
`
`V
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`USR Determines if Code is Valid
`
`USR Accesses User's Credit Card
`Information and Transmits to CCC
`(1) Credit Card Number
`(2) Store Number
`(3) Amount of Purchase
`
`\
`
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`CCC Notifies USR of
`Result of Transaction
`
`I
`
`USR Notifies Merchant of
`Result of Transaction
`
`FIG. 8
`
`USR Exhibit 2105, page 8
`
`
`
`900
`
`902
`
`904
`
`906
`
`908
`
`910
`
`912
`
`914
`
`User Initiates Purchase and
`Writes Check to Merchant
`
`V
`User Enters Secret Code
`in Secure ID
`
`Merchant Transmits to USR
`
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`USR Determines if Code is Valid
`
`V
`USR Accesses User's Bank
`Information and Transmits to Bank
`(1) Bank Account Number
`(2) Store Number
`(3) Amount of Purchase
`
`V
`
`Bank Checks Account Balance
`to Verify Availability of Funds
`
`V
`Bank Notifies USR of
`Result of Verification
`
`USR Notifies Merchant of
`Result of Verification
`
`FIG. 9
`
`USR Exhibit 2105, page 9
`
`
`
`User Initiates Anonymous Purchase
`by Entering Secret Code in Secure
`ID and Transmitting Result to
`On—Line Merchant
`
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`USR Determines if Code is Valid
`
`r
`USR Accesses User's Credit Card
`Information and Transmits to CCC:
`1) Credit Card Number
`2) Store Number
`3) Amount of Purchase
`
`v
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`CCC Notifies USR
`of Result of Transaction
`
`1000
`
`1002
`
`,. ___----1004
`
`1006
`
`1008
`
`1010
`
`/----
`
`7
`
`,1014
`
`If Credit Declined,
`USR Notifies Merchant
`
`1016
`
`If Credit Accepted, USR
`Accesses Address Code
`and Provides Merchant
`with Address Code
`
`Merchant Labels Package
`with Address Code and Ships
`
`FIG. 10
`
`USR Exhibit 2105, page 10
`
`
`
`User Provides Address
`Code on Public Area
`
`User Provides Address Information
`in Address Area of USR
`
`v
`Person Places Public Code
`on Parcel to be Mailed
`
`Post Office Accesses USR
`to Retrieve Address Information
`
`1100
`
`1102
`
`1104
`
`1106
`
`1108 --,.,
`
`V
`Post Office Delivers Parcel to
`Address in Address Area of USR
`
`V
`Post Office Prints Bar Code
`on Parcel to Automate
`Delivery of Parcel to Address
`in Address Area of USR
`
`FIG. 11
`
`User Provides Telephone
`Code on Public Area
`
`User Provides Telephone Information
`in Telephone Area of USR
`
`V
`Person Dials USR Phone Number and
`Enters Telephone Code for User
`
`USR Connects Person to Telephone
`Number Without Providing User
`Person with Telephone Number
`
`FIG. 12
`
`1200
`
`1202
`
`1204
`
`1206
`
`USR Exhibit 2105, page 11
`
`
`
`User Attempts to Prove
`Identification to Validator
`
`User Attempts to Prove
`Identification to Policeman
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`V
`
`Validator Transmits to USR
`Code from Secure ID
`
`\I
`
`Policeman Transmits to USR
`Code from Secure ID
`
`V
`
`USR Determines if Code is Valid
`
`USR Determines if Code is Valid
`
`1300
`
`1302
`
`1304
`
`1306
`
`\
`
`\
`
`\
`
`1308
`
`\
`
`USR Accesses User's Photograph
`Information and Transmits to Validator
`(1) Verification of Identity
`(2) Picture of Secure ID Holder
`
`V
`USR Accesses User's Photograph
`Information and Police Record Information
`and Transmits to Policeman
`(1) Verification of Identity
`(2) Picture of Secure ID Holder
`(3) Police Records, Such as Outstanding
`Warrants for Arrest and Criminal History
`
`1400
`
`1402
`
`1404
`
`1406
`
`1408
`
`FIG. 13
`
`FIG. 14
`
`USR Exhibit 2105, page 12
`
`
`
`1500
`
`1502
`
`1504
`
`1506
`
`\
`
`\
`
`\
`
`1508
`
`User Desires to Provide
`Identification to Party
`
`User Desires to Apply for
`a Job, Credit or Apartment
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`v
`
`V
`Party Transmits to USR Code
`from Secure ID and Party Code
`
`V
`User Transmits to USR Code from
`Secure ID and Application Code
`
`USR Determines if Code is Valid
`
`USR Determines if User Code is Valid
`
`V
`
`USR Accesses User's Information
`Available to Party According to
`Party Code and Transmits
`Available Information to Party
`
`,
`
`USR Accesses User's Application
`Information and Transmits Available
`Information to User or Completes
`an Application on Behalf of the User
`
`FIG. 15
`
`FIG. 16
`
`1600
`
`1602
`
`1604
`
`1606
`
`1608
`
`USR Exhibit 2105, page 13
`
`
`
`Lap Top
`Computer
`
`Electronic
`Device
`
`Automobile
`
`FIG. 17
`
`USR Exhibit 2105, page 14
`
`
`
`1
`
`Attorney Docket No. W0537-700620
`
`UNIVERSAL SECURE REGISTRY
`
`RELATED APPLICATIONS
`
`This application claims the benefit under 35 U.S.C. § 120 of U.S. Application Serial
`
`5 No. 09/810,703, filed on March 16, 2001 and issued on June 26, 200 as Patent No. 7,237,117,
`
`which is herein incorporated by reference in its entirety.
`
`1.
`
`Field of Invention
`
`BACKGROUND OF INVENTION
`
`10
`
`This invention generally relates to a method and apparatus for securely storing and
`
`disseminating information regarding individuals and, more particularly, to a computer system
`
`for authenticating identity or verifying the identity of individuals and other entities seeking
`
`access to certain privileges and for selectively granting privileges and providing other
`
`services in response to such identifications/verifications.
`
`15
`
`2.
`
`Discussion of Related Art
`
`Dissemination of information regarding various entities, including individuals, in
`
`society is conventionally done in a non-centralized fashion, often requiring specialized
`
`knowledge of a likely storage location to access the information. This specialized knowledge
`
`20 may not be available when the information is needed, thus effectively preventing distribution
`
`of the information when required. For example, a doctor in an emergency room may desire
`
`access to a patient's medical history in determining a course of treatment. If the person is not
`
`carrying a complete medical record, which is typically the situation, the medical records may
`
`not be available to the doctor. Even if these medical records are available electronically, for
`
`25
`
`example via a computer accessible in the person's regular doctor's office, the records may
`
`effectively be unavailable if the person is unconscious or otherwise incapacitated or if
`
`restrictions on access to the doctor's records cannot otherwise be overcome. The retrieval of
`
`required medical records can be further complicated by the fact that such records can be
`
`located at a number of different sites/systems which are not linked. For example, the
`
`30
`
`patient's primary care physician may not have records from a specialist treating the patient,
`
`and none of these physicians may have dental records. Similar problems arise in other
`
`809184.1
`
`USR Exhibit 2105, page 15
`
`
`
`- 2 -
`
`environments where relevant data may be scattered and/or otherwise difficult to access.
`
`Identification of a person from other persons within a society and verification of a
`
`person as being who he says he is are extremely important for many reasons. For example,
`
`determination/verification of a person's identity will typically dictate extension of credit,
`
`5
`
`granting access to information, allowing entry to a restricted area, or the granting of
`
`numerous other privileges.
`
`Most people carry multiple forms of identification. For example, a typical person
`
`may carry an identification card issued by a federal, state, or local governmental entity, an
`
`identification card issued by a university or place of employment, one or more credit cards
`
`10
`
`that serve to identify the person as a holder of a credit card account, one or more bank cards
`
`that serve to identify the person as holder of a bank account, medical information cards
`
`identifying the person as a member of, for example, a health maintenance organization or as a
`
`person holding an insurance policy from a specified insurance company, keys that identify
`
`the person as owner of an automobile, house, etc., and numerous other identification cards
`
`15
`
`that may be used for specialized purposes, such as identifying the person as a member of a
`
`health club, a library, or a professional organization.
`
`To enable the person to function effectively in society, the person must typically have
`
`one or more of these identification devices with them if they wish to undertake an associated
`
`activity. For example, a person is not allowed to drive a car or purchase alcohol without a
`
`20
`
`governmentally issued driver's license. Likewise, although cash may be used to purchase
`
`goods and/or services, the person will typically not be able to purchase goods and/or services
`
`with a credit card if the person is not physically carrying the credit card. Similarly, most
`
`hospitals and other medical facilities will require proof of insurance before rendering medical
`
`attention. Carrying these multifarious identification devices can become onerous.
`
`25 Additionally, if one or more of the identification devices is lost, stolen or forgotten, it can be
`
`inconvenient, making it difficult to obtain goods or services requiring the missing
`
`identification.
`
`There are also times when the individual may wish to be identified or at least verified
`
`without providing personal information. For example, a person may wish to purchase goods
`
`30
`
`and/or services without publicly providing his/her credit card information for fear that the
`
`credit card information be may be stolen and used fraudulently. Likewise, the person may
`
`809184.1
`
`USR Exhibit 2105, page 16
`
`
`
`- 3 -
`
`wish to purchase goods or order goods to be delivered to an address without revealing the
`
`address to the vendor. Unfortunately, conventional identification devices require that at least
`
`some personal information be transmitted to complete a transaction.
`
`There are other related problems. For example, when there is a need to locate a
`
`5
`
`person or other entity where only limited biographical data is known, this can be difficult
`
`since relevant information is seldom available from a single database. Another potential
`
`problem is the forwarding of mail, packages, telephone calls/messages, e-mails and other
`
`items where a party is in a situation where they are changing location frequently and/or where
`
`the person does not want such information to be generally available for security or other
`
`10
`
`reasons. A simple, yet secure, way of dealing with such issues does not currently exist.
`
`Another potential problem is filling in forms, particularly for an individual who
`
`frequently has to complete the same or similar form. Such forms can for example be medical
`
`forms when visiting a doctor or entering a hospital, immigration forms on entering the
`
`country, employment forms, college entry forms, etc. It would be desirable if such forms
`
`15
`
`could be completed once and be available for future use, and it would be even better if the
`
`information for each such form could be automatically drawn from an existing database to
`
`complete the form. There is also a frequent requirement to periodically update information in
`
`a form, for example financial information for a line of credit. It would be desirable if such
`
`updates could be automatically performed from data in a general database.
`
`20
`
`Still another potential problem is that a person may be forced to make requests on a
`
`database, for example financial requests, under duress. It would be desirable if the person
`
`could easily and undetectably signal such duress when making the request and the receiving
`
`system be able to act appropriately to assist and protect the individual.
`
`Systems capable of effectively performing all of these functions do not currently exist.
`
`25
`
`SUMMARY OF INVENTION
`
`There is thus a need for an identification system that will enable a person to be
`
`identified or verified ("identification" sometimes being used hereinafter to mean either
`
`identified or verified) and/or authenticated without necessitating the provision of any personal
`
`30
`
`information. Likewise, there is a need for an identification system that will enable a person
`
`809184.1
`
`USR Exhibit 2105, page 17
`
`
`
`- 4 -
`
`to be identified universally without requiring the person to carry multiple forms of
`
`identification.
`
`Accordingly, this invention relates, in one embodiment, to an information system that
`
`may be used as a universal identification system and/or used to selectively provide personal,
`
`5
`
`financial or other information about a person to authorized users. Transactions to and from
`
`the database may take place using a public key/private key security system to enable users of
`
`the system and the system itself to encrypt transaction information during the transactions.
`
`Additionally, the private key/public key security system may be used to allow users to
`
`validate their identity and/or sign instructions being sent to a universal secure registry (USR)
`
`10
`
`system of the type to which this invention relates. For example, in one embodiment, a smart
`
`card such as the SecurID TM card from RSI Security, Inc. may be provided with the user's
`
`private key and the USR system's public key to enable the card to encrypt messages being
`
`sent to the USR system and to decrypt messages from the USR system 10.
`
`This USR system or database may be used to identify the person in many situations,
`
`15
`
`and thus may take the place of multiple conventional forms of identification. Additionally,
`
`the USR system may enable the user's identity to be confirmed or verified without providing
`
`any identifying information about the person to the entity requiring identification. This can
`
`be advantageous where the person suspects that providing identifying information may
`
`subject the identifying information to usurpation.
`
`20
`
`Enabling anonymous identification facilitates multiple new forms of transactions. For
`
`example, enabling anonymous identification enables the identified person to be telephoned by
`
`or receive e-mails from other persons without providing the other person with a telephone
`
`number or e-mail address, and will permit this to be accomplished even where there are
`
`frequent changes in the person's location. Similarly, enabling anonymous identification will
`
`25
`
`enable the person to receive mail, other delivered parcels and other items without providing
`
`the recipient's address information to the sender. By restricting access to particular classes of
`
`persons/entities, the person can effectively prevent receipt of junk mail, other unsolicited
`
`mail, telemarketing calls and the like.
`
`In a financial context, providing anonymous identification of a person enables the
`
`30
`
`person to purchase goods and/or services from a merchant without ever transmitting to the
`
`merchant information, such as the person's credit card number, or even the person's name,
`
`809184.1
`
`USR Exhibit 2105, page 18
`
`
`
`- 5 -
`
`that could be intercepted and/or usurped and used in subsequent or additional unauthorized
`
`transactions or for other undesired purposes. Enabling anonymous identification may be
`
`particularly advantageous in an unsecured environment, such as the Internet, where it has
`
`been found to be relatively trivial to intercept such credit card information.
`
`5
`
`In a medical context, the USR system, in addition to enabling a person seeking
`
`medical treatment to identify themselves, may be configured to provide insurance data,
`
`medical history data, and other appropriate medical information to a medical provider, once
`
`that medical provider has been established as an authorized recipient. The USR system may
`
`also contain links to other databases containing portions of the patient's medical records, for
`
`10
`
`example x-rays, MRI pictures, dental records, glasses, prescriptions, etc.
`
`Access to the USR system may be by smart card, such as a SecurIDTM card, or any
`
`other secure access device. The technology enabling the USR system may be physically
`
`embodied as a separate identification device such as a smart ID card, or may be incorporated
`
`into another electronic device, such as a cell phone, pager, wrist watch, computer, personal
`
`15
`
`digital assistant such as a Palm PilotTM, key fob, or other commonly available electronic
`
`device. The identity of the user possessing the identifying device may be verified at the point
`
`of use via any combination of a memorized PIN number or code, biometric identification
`
`such as a fingerprint, voice print, signature, iris or facial scan, or DNA analysis, or any other
`
`method of identifying the person possessing the device. If desired, the identifying device
`
`20 may also be provided with a picture of the person authorized to use the device to enhance
`
`security.
`
`The USR system may be useful for numerous other identification purposes. For
`
`example, the USR anonymous identification may serve as a library card, a phone card, a
`
`health club card, a professional association membership card, a parking access card, a key for
`
`25
`
`access to one's home, office, car, etc. or any one of a host of similar
`
`identification/verification and/or access functions. Additionally, equipment code information
`
`may be stored in the USR system and distributed under the user's control and at the user's
`
`discretion, to maintain personal property or public property in an operative state.
`
`30
`
`809184.1
`
`USR Exhibit 2105, page 19
`
`
`
`- 6 -
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`This invention is pointed out with particularity in the appended claims. The above
`
`and further advantages of this invention may be better understood by referring to the
`
`following description when taken in conjunction with the accompanying drawings. The
`
`5
`
`accompanying drawings are not intended to be drawn to scale. In the drawings, each
`
`identical or nearly identical component that is illustrated in various figures is represented by a
`
`like numeral. For purposes of clarity, not every component may be labeled in every thawing.
`
`In the drawings:
`
`Fig. 1 is a functional block diagram of a computer system configured to implement
`
`10
`
`the universal secure registry ("USR"), including a USR database, according to one
`
`embodiment of the invention;
`
`Fig. 2 is a functional block diagram of a first embodiment of a networked
`
`environment including the computer system of Fig. 1;
`
`Fig. 3 is a functional block diagram of an entry of a database forming the USR
`
`15
`
`database of Fig. 1;
`
`Fig. 4 is a functional block diagram of a second embodiment of a networked
`
`environment including the computer system of Fig. 1;
`
`Fig. 5 is a flow chart illustrating steps in a process of inputting data into the USR
`
`database;
`
`20
`
`Fig. 6 is a flow chart illustrating steps in a process of retrieving data from the USR
`
`database;
`
`Fig. 7 is a flow chart illustrating a first protocol for purchasing goods from a merchant
`
`via the USR database without transmitting credit card information to the merchant;
`
`Fig. 8 is a flow chart illustrating a second protocol for purchasing goods from a
`
`25 merchant via the USR database without transmitting credit card information to the merchant;
`
`Fig. 9 is a flow chart illustrating a protocol for purchasing goods from a merchant via
`
`the USR database by validating the user's check;
`
`Fig. 10 is a flow chart illustrating a protocol for purchasing goods from an on-line
`
`merchant via the USR database without transmitting credit card information to the on-line
`
`30 merchant, and enabling the on-line merchant to ship the goods to a virtual address;
`
`809184.1
`
`USR Exhibit 2105, page 20
`
`
`
`- 7 -
`
`Fig. 11 is a flow chart illustrating a protocol for shipping goods to a virtual address
`
`via the USR database;
`
`Fig. 12 is a flow chart illustrating a protocol for telephoning a virtual phone number
`
`via the USR database;
`
`5
`
`Fig. 13 is a flow chart illustrating a protocol for identifying a person via the USR
`
`database;
`
`Fig. 14 is a flow chart illustrating a protocol for identifying a person to a policeman
`
`via the USR database;
`
`Fig. 15 is a flow chart illustrating a protocol for providing information to an
`
`10
`
`authorized recipient of the information via the USR database;
`
`Fig. 16 is a flow chart illustrating a protocol for providing application information to
`
`an authorized recipient of the information via the USR database; and
`
`Fig. 17 is a functional block diagram of an embodiment configured to use information
`
`in the USR system to activate or keep active property secured through the USR system.
`
`15
`
`DETAILED DESCRIPTION
`
`This invention is not limited in its application to the details of construction and the
`
`arrangement of components set forth in the following description or illustrated in the
`
`drawings. The invention is capable of other embodiments and of being practiced or of being
`
`20
`
`carried out in various ways. Also, the phraseology and terminology used herein is for the
`
`purpose of description and should not be regarded as limiting. The use of "including,"
`
`"comprising," or "having," "containing", "involving", and variations thereof herein, is
`
`meant to encompass the items listed thereafter and equivalents thereof as well as additional
`
`items.
`
`25
`
`In one embodiment, an information system is formed as a computer program running
`
`on a computer or group of computers configured to provide a universal secure registry (USR)
`
`system. The computer, in this instance, may be configured to run autonomously (without the
`
`intervention of a human operator), or may require intervention or approval for all, a selected
`
`subset, or particular classes of transactions. The invention is not limited to the disclosed
`
`30
`
`embodiments, and may take on many different forms depending on the particular
`
`requirements of the information system, the type of information being exchanged, and the
`
`809184.1
`
`USR Exhibit 2105, page 21
`
`
`
`- 8 -
`
`type of computer equipment employed. An information system according to this invention,
`
`may optionally, but need not necessarily, perform functions additional to those described
`
`herein, and the invention is not limited to a computer system performing solely the described
`
`functions.
`
`5
`
`In the embodiment shown in Fig. 1, a computer system 10 for implementing a USR
`
`system according to the invention includes at least one main unit 12 connected to a wide area
`
`network, such as the Internet, via a communications port 14. The main unit 12 may include
`
`one or more processors (CPU 16) running USR software 18 configured to implement the
`
`USR system functionality discussed in greater detail below. The CPU 16 may be connected
`
`10
`
`to a memory system including one or more memory devices, such as a random access
`
`memory system RAM 20, a read only memory system ROM 22, and one or more databases
`
`24. In the illustrated embodiment, the database 24 contains a universal secure registry
`
`database. The invention is not limited to this particular manner of storing the USR database.
`
`Rather, the USR database may be included in any aspect of the memory system, such as in
`
`15 RAM 20, ROM 22 or disc and may also be separately stored on one or more dedicated data
`
`servers.
`
`The computer system may be a general purpose computer system which is
`
`programmable using a computer programming language, such as C, C++, Java, or other
`
`language, such as a scripting language or even assembly language. The computer system
`
`20 may also be specially programmed, special purpose hardware, an application specific
`
`integrated circuit (ASIC) or a hybrid system including both special purpose components and
`
`programmed general purpose components.
`
`In a general purpose computer system, the processor is typically a commercially
`
`available microprocessor, such as Pentium series processor available from Intel, or other
`
`25
`
`similar commercially available device. Such a microprocessor executes a program called an
`
`operating system, such as UNIX, Linux, Windows NT, Windows 95, 98, or 2000, or any
`
`other commercially available operating system, which controls the execution of other
`
`computer programs and provides scheduling, debugging, input/output control, accounting,
`
`compilation, storage assignment, data management, memory management, communication
`
`30
`
`control and related services, and many other functions. The processor and operating system
`
`809184.1
`
`USR Exhibit 2105, page 22
`
`
`
`- 9 -
`
`defines a computer platform for which application programs in high-level programming
`
`languages are written.
`
`The database 24 may be any kind of database, including a relational database, object-
`
`oriented database, unstructured database, or other database. Example relational databases
`
`5
`
`include Oracle 81 from Oracle Corporation of Redwood City, California; Informix Dynamic
`
`Server from Informix Software, Inc. of Menlo Park, California; DB2 from International
`
`Business Machines of Armonk, New York; and Access from Microsoft Corporation of
`
`Redmond, Washington. An example object-oriented database is ObjectStore from Object
`
`Design of Burlington, Massachusetts. An example of an unstructured database is Notes from
`
`10
`
`the Lotus Corporation, of Cambridge, Massachusetts. A database also may be constructed
`
`using a flat file system, for example by using files with character-delimited fields, such as in
`
`early versions of dBASE, now known as Visual dBASE from Inprise Corp. of Scotts Valley,
`
`California, formerly Borland International Corp.
`
`The main unit 12 may optionally include or be connected to an user interface 26
`
`15
`
`containing, for example, one or more input and output devices to enable an operator to
`
`interface with the USR system 10. Illustrative input devices include a keyboard, keypad,
`
`track ball, mouse, pen and tablet, communication device, and data input devices such as voice
`
`and other audio and video capture devices. Illustrative output devices include cathode ray
`
`tube (CRT) displays, liquid crystal displays (LCD) and other video output devices, printers,
`
`20
`
`communication devices such as modems, storage devices such as a disk or tape, and audio or
`
`video output devices. Optionally, the user interface 26 may be omitted, in which case the
`
`operator may communicate with the USR system 10 in a networked fashion via the
`
`communication port 14. It should be understood that the invention is not limited to any
`
`particular manner of interfacing an operator with the USR system.
`
`25
`
`It also should be understood that the invention is not limited to a particular computer
`
`platform, particular processor, or particular high-level programming language. Additionally,
`
`the computer system may be a multiprocessor computer system or may include multiple
`
`computers connected over a computer network. It further should be understood that each
`
`module or step shown in the accompanying figures and the substeps or subparts shown in the
`
`30
`
`remaining figures may correspond to separate modules of a computer program, or may be
`
`separate computer programs. Such modules may be operable on separate computers. The
`
`809184.1
`
`USR Exhibit 2105, page 23
`
`
`
`- 10 -
`
`data produced by these components may be stored in a memory system or transmitted
`
`between computer systems.
`
`Such a system may be implemented in software, hardware, or firmware, or any
`
`combination thereof. The various elements of the information system disclosed herein, either
`
`5
`
`individually or in combination, may be implemented as a computer program product, such as
`
`USR software 18, tangibly embodied in a machine-readable storage device for execution by
`
`the computer processor 16. Various steps of the process may be performed by the computer
`
`processor 16 executing the program 18 tangibly embodied on a computer-readable medium to
`
`perform functions by operating on input and generating output. Computer programming
`
`10
`
`languages suitable for implementing such a system include procedural programming
`
`languages, object-oriented programming languages, and combinations of the two.
`
`As shown in Fig. 2, the computer system 10 may be connected to a plurality of
`
`interface centers 27 over a wide area network 28. The wide area network 28 may be formed
`
`from a plurality of dedicated connections between the interface centers 27 and the computer
`
`15
`
`system 10, or may take place, in whole or in part, over a public network such as the Internet.
`
`Communication between the interface centers 27 and the computer system 10 may take place
`
`according to any protocol, such as TCP/IP, ftp, OFX, or XML, and may include any desired
`
`level of interaction between the interface centers 27 and the computer system 10. To enhance
`
`security, especially where communication takes place over a publicly accessible network
`
`20
`
`such as the Internet, communications facilitating or relating to transmission of data from/to
`
`the USR database 24 or the computer system 10 may be encrypted using an encryption
`
`algorithm, such as PGP, DES, or other conventional symmetric or asymmetric encryption
`
`algorithm.
`
`In one embodiment, the USR system 10 or USR database 24 may be able to
`
`25
`
`authenticate its identity to a user or other entity accessing the system by providing an
`appropriate code which may be displayed on the user's smart card, for example a SecurIDTM
`
`card or its equivalent, or other code generator