throbber
12
`
`10
`
`20
`
`22
`
`26
`
`RAM
`
`ROM
`
`18
`
`A
`
`v
`
`y
`
`User
`Interface
`
`USR
`Software
`
`CPU
`
`•s-
`
`2-
`
`Comm.
`Port
`
`«&•
`
`<£•
`
`Wide
`-S" Area
`Network
`
`16
`
`A
`
`v
`
`14
`
`24
`
`Universal Secure
`Registry
`
`Person No. 1
`
`Person No. 2
`
`Person No. n
`
`30
`
`JO
`
`30
`
`FIG. 1
`
`0001
`
`VISA - EXHIBIT 1004
`
`

`

`10
`
`Computer Computer Computer
`Module
`Module
`Module
`
`USR System
`
`Computer Computer Computer
`Module
`Module
`Module
`
`27
`
`A
`
`v
`
`28
`
`27
`
`Interface ^
`Center
`
`•3H
`
`Wide Area Network
`
`N-
`
`^
`
`Interface
`Center
`
`Interface
`Center
`
`27
`
`Interface
`Center
`
`Interface
`Center
`
`Interface
`Center
`
`27
`
`27
`
`27
`
`FIG. 2
`
`0002
`
`

`

`FIG. 3
`
`46
`
`44
`
`42
`
`40
`
`No. 1
`Person
`
`Information
`
`Tax
`
`Information
`
`Address
`
`Information
`Application
`
`Job
`
`Information
`
`Available
`Publicly
`
`Information
`
`Medical
`
`Financial
`and Other
`Credit Card
`
`Information
`
`Information
`
`Access
`
`Information
`Validation
`
`38
`
`36
`
`34
`
`32
`
`30
`
`0003
`
`

`

`Public
`Information
`Computer
`Module
`
`Medical
`Information
`Computer
`Module
`
`Financial
`Information
`Computer
`Module
`
`USR System
`
`Address
`Job
`Information Application
`Computer Computer
`Module
`Module
`
`Tax
`Information
`Computer
`Module
`
`A
`
`V
`
`Public
`Information^
`Interface
`Centers
`
`•sH
`
`Wide Area Network
`
`ks-
`
`-s>
`
`Tax
`Information
`Interface
`Centers
`
`Medical
`Information
`Interface
`Centers
`
`Job Application
`Information
`Interface
`Centers
`
`Financial
`Information
`Interface
`Centers
`
`Address
`Information
`Interface
`Centers
`
`FIG. 4
`
`0004
`
`

`

`Train the Database
`
`Validate Person's
`Identification
`
`500
`
`M
`
`Does
`Person Have Rights to
`Enter Data
`
`502
`
`No
`
`Yes
`
`\ i
`
`Enable Person to Enter
`Basic Personal Data
`
`-51
`
`504
`
`v
`
`Does
`Person Have Right to
`Enter Additional Data
`
`506
`
`No
`
`Yes
`
`508
`
`v
`
`Enable Person to Enter
`Advanced Personal Data
`
`\ i
`
`Enable Person to Specify Access
`to Advanced Personal Data
`
`510
`
`•s-
`
`\ l
`
`Q Return
`FIG. 5
`
`512
`
`0005
`
`

`

`600
`
`Enable Access to
`Basic Personal Data
`
`602
`
`1
`Is
`Additional Information
`Requested
`
`No
`
`Yes
`
`v
`
`604
`
`Does Requestor
`Have Rights to Access
`Type of Requested
`Data ?
`Yes
`
`No
`
`^Hs Persons-
`Participating in
`^Transaction^
`
`Yes
`
`y
`Validate Person's
`Identity
`
`Enable Person to
`Change Access
`Rights to Data
`
`606
`
`610
`
`\ i
`
`v
`Cause USR to Enable
`Access to Type of
`Requested Data
`
`Return J
`
`Does Requestor
`Have Rights to Access
`Type of Requested^
`^3 to
`Yes
`
`FIG: 6
`
`608
`
`No
`
`612
`
`614
`
`616
`
`No
`
`-=5»-
`
`0006
`
`

`

`700
`
`702
`
`704
`
`706
`
`708
`
`710
`
`712
`
`User Initiates Purchase
`
`v
`User Enters Secret Code
`in Secure ID
`
`M
`Merchant Transmits to Credit
`Card Company
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`y
`Credit Card Company
`Sends Code to USR
`
`y
`USR Determines if Code is Valid, and if
`Valid Accesses User's Credit Card
`Information and Transmits Credit Card
`Number to Credit Card Company
`
`y
`Credit Card Company Checks
`Credit Worthiness and Declines
`Card or Debits User's Account and
`Transfers $ to Merchant's Account
`
`y
`CCC Notifies Merchant of
`Result of Transaction
`
`FIG. 7
`
`0007
`
`

`

`800
`
`802
`
`804
`
`806
`
`808
`
`s r o
`
`812
`
`814
`
`User Initiates Purchase
`
`\ t
`User Enters Secret Code
`in Secure ID
`
`v
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`x
`USR Determines if Code is Valid
`
`1
`USR Accesses User's Credit Card
`Information and Transmits to CCC
`(1) Credit Card Number
`(2) Store Number
`(3) Amount of Purchase
`
`\ r
`
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`v
`CCC Notifies USR of
`Result of Transaction
`
`v
`USR Notifies Merchant of
`Result of Transaction
`
`FIG. 8
`
`0008
`
`

`

`900
`
`902
`
`904
`
`906
`
`908
`
`910
`
`912
`
`914
`
`User Initiates Purchase and
`Writes Check to Merchant
`
`w
`User Enters Secret Code
`in Secure ID
`
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`USR Determines if Code is Valid
`
`USR Accesses User's Bank
`Information and Transmits to Bank
`(1) Bank Account Number
`(2) Store Number
`(3) Amount of Purchase
`
`Bank Checks Account Balance
`to Verify Availability of Funds
`
`M
`Bank Notifies USR of
`Result of Verification
`
`USR Notifies Merchant of
`Result of Verification
`
`FIG. 9
`
`0009
`
`

`

`User Initiates Anonymous Purchase
`by Entering Secret Code in Secure
`ID and Transmitting Result to
`On—Line Merchant
`
`\ l
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`v
`USR Determines if Code is Valid
`
`\ t
`USR Accesses User's Credit Card
`Information and Transmits to CCC:
`1) Credit Card Number
`2^ Store Number
`3; Amount of Purchase
`
`i
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`M
`CCC Notifies USR
`of Result of Transaction
`
`1000
`
`1002
`
`1004
`
`1006
`
`1008
`
`1010
`
`1014
`
`-X-
`
`If Credit Declined,
`USR Notifies Merchant
`
`1012
`
`1016
`
`V
`If Credit Accepted, USR
`Accesses Address Code
`and Provides Merchant
`with Address Code
`
`1
`Merchant Labels Package
`with Address Code and Ships
`
`FIG: 10
`
`0010
`
`

`

`User Provides Address
`Code on Public Area
`
`1
`User Provides Address Information
`in Address Area of USR
`
`1
`Person Places Public Code
`on Parcel to be Mailed
`
`v
`Post Office Accesses USR
`to Retrieve Address Information
`
`1100
`
`1102
`
`1104
`
`1106
`
`1108
`
`v
`Post Office Delivers Parcel to
`Address in Address Area of USR
`
`1110
`
`1
`Post Office Prints Bar Code
`on Parcel to Automate
`Delivery of Parcel to Address
`in Address Area of USR
`
`FIG. 11
`
`User Provides Telephone
`Code on Public Area
`
`v
`User Provides Telephone Information
`in Telephone Area of USR
`
`JL
`Person Dials USR Phone Number and
`Enters Telephone Code for User
`
`v
`USR Connects Person to Telephone
`Number Without Providing User
`Person with Telephone Number
`
`FIG. 12
`
`1200
`
`1202
`
`1204
`
`1206
`
`0011
`
`

`

`1408
`
`1406
`
`1404
`
`FIG. 14
`
`FIG: 13
`
`Information and Police Record Information
`
`USR Accesses User's Photograph
`
`Warrants for Arrest and Criminal History
`(3) Police Records, Such as Outstanding
`(2) Picture of Secure ID Holder
`(1) Verification of Identity
`
`and Transmits to Policeman
`
`v
`
`(2) Picture of Secure ID Holder
`(1) Verification of Identity
`
`Information and Transmits to Validator
`
`USR Accesses User's Photograph
`
`v
`
`USR Determines if Code is Valid
`
`USR Determines if Code is Valid
`
`M
`
`Policeman Transmits to USR
`
`Code from Secure ID
`
`v
`
`v
`
`Validator Transmits to USR
`
`Code from Secure ID
`
`v
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`/-1402
`
`M
`
`Identification to Policeman
`User Attempts to Prove
`
`1400
`
`\i
`
`Identification to Validator
`User Attempts to Prove
`
`1308
`
`1306
`
`1304
`
`1302
`
`1300
`
`0012
`
`

`

`1608
`
`1606
`
`1604
`
`FIG: 16
`
`FIG. 15
`
`Information to User or Completes
`Information and Transmits Available
`USR Accesses User's Application
`
`an Application on Behalf of the User
`
`v
`
`Available to Party According to
`USR Accesses User's Information
`
`Available Information to Party
`Party Code and Transmits
`
`\i
`
`USR Determines if User Code is Valid
`
`USR Determines if Code is Valid
`
`V
`
`M
`
`Secure ID and Application Code
`User Transmits to USR Code from
`
`V
`
`from Secure ID and Party Code
`Party Transmits to USR Code
`
`v
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`^1602
`
`v
`
`a Job, Credit or Apartment
`User Desires to Apply for
`
`1600
`
`y
`
`Identification to Party
`User Desires to Provide
`
`1508
`
`1506
`
`1504
`
`1502
`
`1500
`
`0013
`
`

`

`10
`
`USR System
`
`Lap Top
`Computer
`
`Electronic
`Device
`
`Automobile
`
`FIG. 17
`
`0014
`
`

`

`Attorney Docket No. W0537-700620
`
`UNIVERSAL SECURE REGISTRY
`
`RELATED APPLICATIONS
`35 U.S.C. U.S. Application Serial § 120
`
`
`This application claims
`the benefit
`under
`
`
`
`5 No. 09/810,703, filed on March
`16,
`2001
`and
`
`issued as Patent No. 7,237,117, on June
`which is herein incorporated by
`reference
`in
`its
`entirety.
`
`of
`26,
`
`BACKGROUND OF
`
`INVENTION
`
`Field of Invention
`apparatus
`and
`a method
`to
`relates
`This invention generally
`particularly,
`more
`individuals
`and,
`disseminating information
`regarding
`and other entities seeking
`of
`individuals
`for authenticating identity or verifying
`the
`identity
`access to certain privileges and
`for
`selectively
`granting
`
`privileges providing other
`and
`services in response
`to such
`identifications/verifications.
`
`for
`
`securely
`a
`
`to
`
`specialized
`
`desire
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809184.1
`
`Discussion of Related Art
`in
`various entities, including individuals,
`
`regarding
`Dissemination of information
`requiring
`a non-centralized
`fashion,
`often
`society is conventionally done
`in
`the information. This specialized knowledge
`knowledge of a likely storage
`location
`to
`access
`
`may not be available when the information is needed,
`thus effectively
`preventing distribution
`of the information when required. For example, a doctor
`in
`an emergency
`room
`may
`access to a patient's medical history
`in
`
`determining a course of treatment. If the person is not
`carrying a complete medical
`record, which is
`
`typically the situation, the medical
`records may
`not be available to the doctor. Even if these medical
`records are available electronically,
`for
`example via a computer accessible
`in
`the
`person's
`regular
`doctor's
`the person is unconscious or
`otherwise
`incapacitated
`effectively be unavailable
`if
`restrictions on access
`to
`the doctor's
`records
`cannot
`
`otherwise The retrieval of be
`
`required medical records can
`be
`further
`complicated
`by
`the
`fact
`sites/systems which are not linked. For example, the
`located at a number of different
`the
`
`patient's primary care physician may not have records from a
`specialist
`treating
`and none of these physicians may have
`dental
`
`records. Similar problems arise
`in other
`
`or
`
`office,
`if
`overcome.
`that
`
`patient,
`
`0015
`
`

`

`otherwise
`and/or
`scattered
`
`
`within and verification of a a society
`persons
`extremely
`
`important For example, for
`
`typically dictate
`extension
`of
`to
`
`a area, or the granting of restricted
`
`
`environments where relevant data may be
`Identification of a person
`from
`other
`person as being who he
`says he
`is
`are
`determination/verification of a person's identity will
`granting access to information, allowing
`entry
`numerous other privileges.
`of forms identification. For example, a typical person
`
`
`Most people carry multiple
`
`may carry an identification card issued by a federal, state, or
`local
`governmental
`identification card
`issued by a
`university
`or
`place
`of
`employment,
`that serve to identify
`the person
`
`of holder as a a credit card account, one
`
`
`
`or more cards
`that serve to identify
`the person
`as holder
`of
`
`a medical information cards bank account,
`
`
`identifying the person as
`a member
`of,
`for
`example,
`a
`health
`person holding an insurance policy
`from
`a specified insurance company,
`keys
`that
`identify
`
`the person as owner of an automobile, house, etc., and numerous other
`identification
`cards
`that may be used for
`specialized
`purposes,
`such
`as
`
`identifying member of a the
`
`health club, a library, or
`a professional
`organization.
`person
`the
`society,
`To enable the person
`to
`function
`effectively in
`one or more of these
`identification
`devices
`
`
`if them with they wish to undertake an associated
`
`activity. For example, a person
`is not
`allowed
`to
`drive
`a
`car
`or
`govemmentally
`issued driver's
`
`license. Likewise, although cash may be
`used
`to
`goods and/or services,
`the person will
`
`typically not be able to purchase goods
`and/or
`with a credit card
`
`
`is if the person not physically carrying
`the credit
`
`card. Similarly, most
`hospitals and other medical
`facilities will
`
`require of insurance before rendering medical proof
`
`attention. Carrying these multifarious
`identification
`devices
`can
`become
`onerous.
`
`of 25 Additionally, if one or more the identification devices
`
`is
`lost,
`stolen
`or
`forgotten,
`inconvenient, making
`it difficult
`to obtain
`goods
`or
`services requiring
`the
`identification.
`verified
`least
`individual may wish to be identified or
`
`the
`There are also times when
`purchase
`goods
`without providing personal
`information. For example, a person may wish
`information
`for
`and/or services without publicly providing
`his/her
`credit
`card
`credit card information be may be
`stolen
`and
`
`fraudulently. used Likewise, the person may
`
`
`difficult
`
`many
`credit,
`
`an
`
`entity,
`one
`
`bank
`
`maintenance
`
`person
`
`must
`
`purchase alcohol
`purchase
`services
`
`it
`
`missing
`
`5
`
`10
`
`15
`
`20
`
`30
`
`809 i 84.1
`
`at
`to
`
`0016
`
`

`

`to
`
`address
`at
`
`that
`
`this
`
`a
`
`locate
`known,
`database.
`other
`where
`for
`
`individual
`
`on
`
`if
`an
`information
`
`database.
`
`a
`
`an
`delivered
`be
`to
`goods
`order
`wish to purchase goods or
`require
`identification
`devices
`address to the vendor. Unfortunately, conventional
`complete
`a
`transaction.
`some personal information be
`transmitted
`to
`There are other related problems. For example, when there
`is a
`need
`to
`person or other entity where only
`limited
`biographical
`data
`is
`since relevant information
`is
`seldom
`available
`from
`
`a Another potential single
`
`problem is the forwarding of mail, packages, telephone calls/messages,
`e-mails
`and
`items where a party is
`in
`a
`
`
`where situation they are changing
`location
`frequently
`and/or
`the person does not want
`such
`information
`to
`be
`generally
`available
`
`reasons. A simple, yet secure, way of dealing with such
`issues does
`not currently
`exist.
`Another potential problem is
`filling
`in
`forms,
`particularly
`for
`an
`frequently has to complete
`the
`same
`or form. Such forms can for example similar
`
`
`be medical
`forms when visiting a doctor or
`entering
`hospital,
`a
`immigration
`forms
`etc. It would be desirable
`if such forms
`country, employment
`forms,
`college
`entry
`forms,
`better
`could be completed once
`and be
`
`available for future use, and it would be
`
`even the
`from
`information for each
`such
`form
`could
`be
`automatically
`drawn
`complete the form. There is also a frequent
`update
`requirement
`to
`periodically
`if such
`a form, for example financial information
`for
`a
`line
`
`of credit. It would be desirable
`general
`updates could be automatically performed
`from
`data
`in
`a
`Still another potential problem
`is
`that
`a
`
`may person be forced to make requests on
`
`
`database, for example financial requests, under duress. It would be desirable
`
`if the person
`could easily and undetectably
`signal
`such
`duress
`when
`making
`protect the individual.
`system be able
`to act appropriately
`to
`assist
`and
`Systems capable of effectively
`
`performing all of these functions do not currently
`
`the
`
`request
`
`exist.
`
`INVENTION
`SUMMARY OF
`that
`There is thus a need for
`an
`identification
`system
`enable
`will
`used
`identified or verified ("identification"
`sometimes
`being
`to
`hereinafter
`of any personal
`identified or verified) and/or
`authenticated
`without
`necessitating
`the
`provision
`information. Likewise, there
`is a need
`for
`an
`identification system
`that
`will
`
`a
`
`mean
`
`enable
`
`809 i 84.1
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0017
`
`

`

`to be identified universally without
`identification.
`information
`embodiment,
`in one
`relates,
`Accordingly, this invention
`selectively provide
`to
`and/or
`used
`may be used as a universal
`identification system
`to
`users. authorized Transactions to and from
`
`
`financial or other
`information
`about
`a
`person
`key/private
`key
`security
`the database may take place using
`public
`a
`transaction
`information
`during
`the system and the system
`itself
`to
`encrypt
`Additionally, the private key/public
`key
`security
`system
`may
`be
`used
`users to
`to
`validate their identity and/or sign instructions
`being
`sent
`a
`universal
`system of the type to which this
`invention
`
`relates. For example, in one embodiment,
`a
`card such as the SecurlD card from RSI Security,
`Inc. may be
`
`provided the user's
`with
`private key and the USR system's
`public
`key
`to
`enable
`the
`sent to the USR system and
`to decrypt messages from
`
`the USR system 10.
`situations,
`in many
`
`used This USR system or database may be to identify the person
`
`and thus may take the place of multiple conventional
`
`of forms identification. Additionally,
`
`the USR system may enable
`the user's
`identity
`to
`be
`confirmed
`any identifying information
`about
`the
`person
`to
`the
`entity requiring
`This can
`be advantageous where
`the person
`suspects
`that
`providing
`identifying
`subject the identifying
`information
`to
`usurpation.
`forms new transactions. For
`
`
`of
`Enabling anonymous
`identification facilitates multiple
`identified
`person
`example, enabling anonymous
`identification
`enables
`the
`the
`other
`or receive e-mails from other
`persons without
`providing
`are
`to be accomplished even where
`there
`number or e-mail address, and will
`permit
`this
`will
`frequent changes
`in
`the person's
`location. Similarly, enabling anonymous
`
`identification
`items
`enable the person
`to receive mail,
`other
`delivered
`parcels
`and
`other
`of
`the recipient's address
`information
`to
`
`the By restricting access sender.
`
`to particular
`classes
`persons/entities, the person can
`effectively
`prevent
`receipt
`of junk
`mail,
`mail, telemarketing calls
`and
`the like.
`anonymous
`In a financial context, providing
`person to purchase goods and/or
`services
`from
`merchant information, such as
`the
`person's
`
`TM
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`- 4 -
`
`requiring
`
`the
`
`person
`
`to
`
`carry
`
`multiple
`
`to
`
`an
`
`system
`the
`to
`secure
`
`smart
`
`card
`
`or
`identification.
`information
`
`to
`person
`
`other
`
`of identification a person enables the
`
`
`
`a without ever transmitting merchant
`
`to
`credit
`card
`number,
`
`the
`or even
`
`0018
`
`

`

`or
`subsequent
`in
`used
`and
`usurped
`that could be intercepted and/or
`be
`identification may
`transactions or
`for other undesired purposes. Enabling anonymous
`
`particularly advantageous
`in
`an unsecured
`
`
`
`as such environment, the Internet, where it has
`been found to be relatively
`trivial
`to
`intercept such credit
`card
`information.
`In a medical context,
`the USR
`system,
`in
`addition
`to
`enabling
`medical treatment
`to identify
`
`themselves, may be configured to provide
`insurance
`data,
`medical history data,
`and other
`appropriate
`medical
`information
`to
`an authorized recipient. The USR system may
`that medical provider has been established
`as
`also contain links
`to other databases
`containing
`portions
`of the
`patient's
`example x-rays, MRI pictures, dental
`records,
`glasses,
`prescriptions,
`etc.
`
`Access to the USR system may be by smart card, such
`
`as a SecurlD card, or any
`be
`other secure access device. The technology enabling
`the USR
`system
`may
`ID
`embodied as a separate
`identification
`device
`such
`as
`a
`smart
`watch, computer, personal
`into another electronic device, such
`a
`cell
`phone,
`pager,
`wrist
`as
`digital assistant such as a Palm
`Pilot™, key
`fob,
`or
`other
`commonly
`device. The identity of the user possessing
`the
`identifying
`
`device at the point may
`
`of use via any combination of a memorized
`
`PIN number or code, biometric
`identification
`such as a fingerprint, voice print,
`signature,
`iris
`or
`facial
`scan,
`method of identifying the person possessing
`
`the device. If desired, the identifying device
`
`
`may also be provided with a picture of the person authorized to use the device
`to enhance
`security.
`identification For
`
`other
`numerous
`for
`useful
`The USR system may be
`a phone card,
`
`example, the USR anonymous
`
`identification serve as a library card, may
`a
`parking
`health club card, a professional
`association membership card,
`of a
`host
`access to one's
`home, office,
`car,
`etc.
`or
`any
`one
`identification/verification and/or
`access
`functions. Additionally, equipment code
`information
`may be stored in
`the USR system
`and
`distributed
`
`user's under the and at the user's
`
`discretion, to maintain personal
`property
`or
`
`public an operative state. property
`
`in
`
`physically
`card,
`
`available
`verified
`
`DNA
`
`be
`
`or
`
`a
`
`purposes.
`
`access
`of
`
`similar
`
`control
`
`additional
`
`a
`
`person
`
`medical
`
`medical
`
`a
`
`TM
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`0019
`
`

`

`BRIEF DESCRIPTION OF DRAWINGS
`appended the The above
`
`in
`This invention is pointed out with
`particularity
`
`and further advantages of this
`
`
`invention may be better understood by referring to the
`following description when
`taken
`in
`conjunction
`with
`the
`
`accompanying The
`accompanying drawings are
`not
`
`intended to be drawn to scale. In the drawings, each
`a
`figures
`identical or nearly identical
`component
`that
`is
`illustrated in
`various
`like numeral. For purposes of clarity, not
`every
`
`
`may component be labeled in every
`thawing.
`In the drawings:
`Fig. 1 is a functional block diagram
`the universal secure registry
`("USR"),
`embodiment of the invention;
`Fig. 2 is a functional block diagram
`environment including
`the computer
`system
`Fig. 3 is a functional block diagram
`database of Fig. 1;
`Fig. 4 is a functional block diagram
`environment including
`the computer
`system
`Fig. 5 is a flow chart
`illustrating
`steps
`database;
`Fig. 6 is a flow chart
`database;
`purchasing
`for
`protocol
`first
`illustrating
`Fig. 7 is a flow chart
`information
`to
`card
`credit
`transmitting
`via the USR database without
`for
`purchasing
`protocol
`second
`a
`illustrating
`Fig. 8 is a flow chart
`card
`information
`credit
`transmitting
`25 merchant via the USR database without
`
`a for purchasing goods from protocol
`
`a merchant
`via
`Fig. 9 is a flow chart
`illustrating
`the USR database by validating
`the user's
`check;
`Fig. 10 is a flow chart
`illustrating
`protocol
`a
`merchant via the USR database without
`transmitting
`30 merchant, and enabling
`the on-line merchant
`to
`
`
`
`embodiment networked
`
`first
`of a
`of Fig. 1;
`
`
`of entry of an a database forming
`
`
`
`the USR
`
`of a
`
`of a
`
`- 6
`
`-
`
`claims.
`
`drawings.
`
`is
`
`of a
`including
`
`computer
`a
`
`system configured
`USR
`database,
`
`implement
`to
`according
`
`
`
`embodiment networked
`
`second
`of a
`of Fig.
`1;
`in
`a
`process
`
`of inputting
`
`data
`
`illustrating
`
`steps
`
`in
`
`a
`
`process
`
`of retrieving
`
`data
`
`a
`
`goods
`the
`
`goods
`
`from
`
`a
`
`for
`credit
`ship
`
`purchasing
`card
`goods
`
`the
`
`goods
`information
`to
`
`5
`
`10
`
`15
`
`20
`
`809 i 84.1
`
`0020
`
`

`

`illustrating
`
`a
`
`
`
`
`
`for protocol shipping goods to a virtual address
`
`Fig. 11 is a flow chart
`via the USR database;
`Fig. 12 is a flow chart
`via the USR database;
`Fig. 13 is a flow chart
`database;
`Fig. 14 is a flow chart
`via the USR database;
`protocol
`a
`illustrating
`Fig. 15 is a flow chart
`authorized recipient of the
`
`information via the USR database;
`for
`Fig. 16 is a flow chart
`illustrating
`a
`protocol
`and
`
`an authorized recipient of the information via
`the USR database;
`Fig. 17 is a functional block
`diagram
`of an
`embodiment
`in the USR system to activate or keep active property
`secured
`through
`
`illustrating
`
`a
`
`protocol
`
`for
`
`telephoning
`
`illustrating
`
`a
`
`protocol
`
`for
`
`identifying
`
`illustrating
`
`a
`
`protocol
`
`for
`
`identifying
`
`for
`
`providing
`
`providing
`
`a
`
`virtual
`
`a
`
`a
`
`person
`
`person
`
`information
`
`application
`
`configured
`the
`
`to
`USR
`
`use
`system.
`
`DETAILED DESCRIPTION
`of
`to construction and the the details
`
`limited
`in
`its
`application
`
`
`This invention is not
`or
`set
`forth
`in
`the
`following
`description
`arrangement of components
`drawings. The invention is capable
`of other
`
`
`of and embodiments being practiced or of being
`
`carried out in various ways. Also, the phraseology and terminology used herein
`is
`for
`the
`purpose of description and
`should
`not
`
`be as limiting. The use of "including," regarded
`
`"comprising," or "having," "containing", "involving", and variations thereof herein, is
`meant to encompass
`the
`items
`listed
`thereafter
`and
`
`equivalents as well as additional thereof
`items.
`
`
`
`illustrated in
`
`computer
`as a
`formed
`is
`system
`information
`In one embodiment, an
`universal
`a
`provide
`to
`configured
`on a computer or group of computers
`autonomously
`
`run (without the
`configured
`to
`this
`instance, may
`system. The computer, in
`be
`approval
`intervention of a human operator),
`or
`may
`require
`intervention
`or
`The invention is not limited
`to
`the
`disclosed
`subset, or particular classes
`of
`transactions.
`embodiments, and may
`take
`on many
`different
`forms
`depending
`on
`requirements of the information system,
`the
`type
`of
`information
`being
`exchanged, the
`
`
`the
`and
`
`program
`secure
`
`809 i 84.1
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0021
`
`

`

`g
`
`this to invention,
`
`
`those
`described
`solely
`the
`described
`
`employed. An information system according
`type of computer equipment
`
`may optionally, but need not necessarily, perform functions additional
`to
`herein, and the invention
`is not
`
`limited to a computer system performing
`functions.
`computer for implementing a USR system 10
`
`a
`1,
`in Fig.
`In the embodiment shown
`
`
`a
`system according to the
`invention
`
`includes at least one main unit 12
`connected
`to
`network, such as the
`Internet,
`via
`a
`
`port communications The main unit 12 may 14.
`
`
`include
`one or more processors
`(CPU 16)
`running
`USR
`software
`18
`configured
`USR system functionality discussed
`in
`greater
`below. detail The CPU 16 may be
`
`
`connected
`to a memory system
`including
`one
`or more memory
`devices,
`such
`memory system RAM 20, a
`read
`
`only memory ROM 22, and one or more system
`
`databases
`24. In the illustrated embodiment,
`the database
`24
`contains
`a
`universal
`database. The invention is not limited
`to
`this
`particular
`
`storing of manner the USR database.
`
`
`
`
`Rather, the USR database may be included in any aspect of the memory system, such as
`in
`15 RAM 20, ROM 22 or
`disc
`and may also
`be
`separately
`stored
`servers.
`general
`a
`The computer system may be
`programmable using a computer
`programming
`language, such as a scripting
`language
`or
`20 may also be specially programmed,
`special
`integrated circuit (ASIC) or
`a hybrid
`system
`programmed general purpose
`components.
`a
`typically
`processor
`the
`In a general purpose computer
`system,
`from
`available
`processor
`series
`available microprocessor, such
`as Pentium
`an
`called
`program
`a
`similar commercially available device. Such a microprocessor executes
`98,
`95,
`operating system, such
`as UNIX, Linux, Windows
`NT, Windows
`execution
`other commercially available
`operating
`system,
`which
`controls
`the
`accounting,
`control,
`computer programs and provides
`scheduling,
`debugging,
`input/output
`compilation, storage assignment,
`data
`management,
`memory
`management,
`communication
`control and related services,
`
`and many other functions. The processor and operating
`system
`
`system
`computer
`purpose
`C, C++,
`as
`such
`language,
`The computer system
`even
`assembly
`language.
`purpose
`hardware,
`an
`application
`including
`both special
`purpose
`
`wide
`
`to
`
`as
`
`a
`
`secure
`
`on
`
`one
`
`which is
`Java,
`
`is
`
`components
`
`commercially
`Intel,
`
`5
`
`10
`
`25
`
`30
`
`809 i 84.1
`
`0022
`
`

`

`- 9 -
`
`for which
`
`application
`
`programs
`
`in
`
`high-level
`
`programming
`
`Object
`from
`
`an
`
`as
`omitted,
`in
`a
`the
`not
`is
`
`fashion
`
`to
`
`may
`
`include
`
`or
`
`defines a computer platform
`languages are written.
`object-
`of database, including a relational database,
`
`any kind
`The database 24 may be
`
`other Example relational databases database.
`
`database,
`or
`oriented database, unstructured
`include Oracle 81
`
`from Oracle Corporation of Redwood City, California; Informix Dynamic
`Server from Informix Software,
`
`Inc. of Menlo Park, California; DB2
`from
`International
`Business Machines of Armonk, New York; and Access from Microsoft Corporation
`of
`Redmond, Washington. An example object-oriented database
`is ObjectStore
`from
`is
`Design of Burlington, Massachusetts. An example of an unstructured
`database
`Notes
`the Lotus Corporation, of Cambridge, Massachusetts. A database also may be
`constructed
`using a flat file system,
`for
`example
`by using
`files
`with
`character-delimited
`early versions of dBASE, now known as Visual dBASE
`from
`Inprise
`Corp.
`of
`Scotts
`California, formerly Borland
`International
`Corp.
`to
`connected
`be
`or
`The main unit 12 may optionally
`include
`to
`to enable
`an operator
`containing, for example, one
`
`input or more and output devices
`
`
`
`10. interface with the USR system Illustrative input devices include
`a
`keyboard,
`keypad,
`track ball, mouse, pen and
`tablet,
`
`
`device, communication and data input devices such
`as voice
`and other audio and video capture
`
`devices. Illustrative output devices
`include
`cathode
`ray
`output
`tube (CRT) displays,
`liquid crystal
`displays
`(LCD)
`and
`other
`video
`disk
`communication devices
`such as modems, storage
`devices
`such
`a
`which
`video output devices. Optionally, the user
`interface
`26 may be
`in
`operator may communicate with
`the USR
`system
`10
`networked
`communication port 14. It should be understood
`that
`the
`invention
`limited
`particular manner of interfacing
`an operator
`with USR system. the
`
`
`
`
`
`It also should be understood
`that
`the
`invention
`is to a particular computer not limited
`
`platform, particular processor, or
`particular
`
`language. high-level programming Additionally,
`the computer system may be
`a multiprocessor
`computer
`
`system multiple
`or
`each
`computers connected over
`a
`computer
`
`network. It further should be understood
`that
`module or step shown
`in
`the
`accompanying
`figures
`and
`the
`substeps
`remaining figures may correspond
`to
`separate
`
`of modules a computer program, or may be
`
`separate computer programs. Such modules may be operable
`on
`separate
`computers. The
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`0023
`
`

`

`- 1 0 -
`
`system
`
`or
`
`transmitted
`
`firmware,
`herein, either
`program product,
`device
`
`computer-readable
`
`programming
`
`plurality
`formed
`and
`
`the
`public
`system
`and
`
`data produced by these components may be stored in a memory
`between computer systems.
`or
`software, hardware,
`in
`implemented
`Such a system may be
`disclosed
`combination thereof. The various elements of the information
`system
`computer
`individually or in combination, may be
`implemented
`as
`a
`storage
`USR software 18,
`tangibly embodied
`in
`a machine-readable
`
`the computer processor 16. Various steps of the process may be performed by the computer
`processor 16 executing
`the
`program
`18
`tangibly
`embodied
`on
`a
`to
`perform functions by operating
`on
`input
`and
`
`generating output. Computer programming
`languages suitable for
`implementing such
`a
`system
`include
`procedural
`languages, object-oriented programming
`languages,
`and
`
`combinations the two.
`of
`a
`As shown in Fig. 2, the computer system 10 may be
`connected
`to
`interface centers 27 over
`a wide
`area
`
`network The wide area network 28 may be 28.
`
`from a plurality of dedicated connections between
`the
`interface
`centers
`27
`a
`system 10, or may take place,
`in whole
`or
`in
`part,
`
`over the Internet.
`27
`Communication between
`the
`interface
`centers
`the
`computer
`and
`ftp,
`according to any protocol,
`such
`as
`TCP/IP,
`XML,
`or
`OFX,
`level of interaction between the interface centers 27 and
`the
`
`
`10. system To enhance
`computer
`accessible
`security, especially where communication
`takes
`place
`a
`publicly
`over
`of
`such as the Internet, communications
`facilitating
`or
`to
`transmission
`relating
`using
`10
`the USR database 24 or
`the computer
`system
`be
`encrypted
`may
`algorithm, such as PGP, DBS, or
`other
`conventional
`symmetric
`or
`asymmetric
`algorithm.
`database
`USR
`10 or
`the USR system
`In one embodiment,
`accessing
`entity
`other
`a user
`or
`authenticate its identity
`to
`user's
`the
`on
`appropriate code which may be
`displayed
`card or its equivalent, or other
`code
`
`generator, for example a single use
`employed by the user. A comparison by the user or
`the
`code
`number and an expected number
`can
`validate,
`to
`the
`generator, that communication
`is with
`the
`
`database an imposter. and
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`*09184.1
`
`TM
`
`may
`
`be
`24
`system
`the
`card,
`smart
`be

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket