`
`10
`
`20
`
`22
`
`26
`
`RAM
`
`ROM
`
`18
`
`A
`
`v
`
`y
`
`User
`Interface
`
`USR
`Software
`
`CPU
`
`•s-
`
`2-
`
`Comm.
`Port
`
`«&•
`
`<£•
`
`Wide
`-S" Area
`Network
`
`16
`
`A
`
`v
`
`14
`
`24
`
`Universal Secure
`Registry
`
`Person No. 1
`
`Person No. 2
`
`Person No. n
`
`30
`
`JO
`
`30
`
`FIG. 1
`
`0001
`
`VISA - EXHIBIT 1004
`
`
`
`10
`
`Computer Computer Computer
`Module
`Module
`Module
`
`USR System
`
`Computer Computer Computer
`Module
`Module
`Module
`
`27
`
`A
`
`v
`
`28
`
`27
`
`Interface ^
`Center
`
`•3H
`
`Wide Area Network
`
`N-
`
`^
`
`Interface
`Center
`
`Interface
`Center
`
`27
`
`Interface
`Center
`
`Interface
`Center
`
`Interface
`Center
`
`27
`
`27
`
`27
`
`FIG. 2
`
`0002
`
`
`
`FIG. 3
`
`46
`
`44
`
`42
`
`40
`
`No. 1
`Person
`
`Information
`
`Tax
`
`Information
`
`Address
`
`Information
`Application
`
`Job
`
`Information
`
`Available
`Publicly
`
`Information
`
`Medical
`
`Financial
`and Other
`Credit Card
`
`Information
`
`Information
`
`Access
`
`Information
`Validation
`
`38
`
`36
`
`34
`
`32
`
`30
`
`0003
`
`
`
`Public
`Information
`Computer
`Module
`
`Medical
`Information
`Computer
`Module
`
`Financial
`Information
`Computer
`Module
`
`USR System
`
`Address
`Job
`Information Application
`Computer Computer
`Module
`Module
`
`Tax
`Information
`Computer
`Module
`
`A
`
`V
`
`Public
`Information^
`Interface
`Centers
`
`•sH
`
`Wide Area Network
`
`ks-
`
`-s>
`
`Tax
`Information
`Interface
`Centers
`
`Medical
`Information
`Interface
`Centers
`
`Job Application
`Information
`Interface
`Centers
`
`Financial
`Information
`Interface
`Centers
`
`Address
`Information
`Interface
`Centers
`
`FIG. 4
`
`0004
`
`
`
`Train the Database
`
`Validate Person's
`Identification
`
`500
`
`M
`
`Does
`Person Have Rights to
`Enter Data
`
`502
`
`No
`
`Yes
`
`\ i
`
`Enable Person to Enter
`Basic Personal Data
`
`-51
`
`504
`
`v
`
`Does
`Person Have Right to
`Enter Additional Data
`
`506
`
`No
`
`Yes
`
`508
`
`v
`
`Enable Person to Enter
`Advanced Personal Data
`
`\ i
`
`Enable Person to Specify Access
`to Advanced Personal Data
`
`510
`
`•s-
`
`\ l
`
`Q Return
`FIG. 5
`
`512
`
`0005
`
`
`
`600
`
`Enable Access to
`Basic Personal Data
`
`602
`
`1
`Is
`Additional Information
`Requested
`
`No
`
`Yes
`
`v
`
`604
`
`Does Requestor
`Have Rights to Access
`Type of Requested
`Data ?
`Yes
`
`No
`
`^Hs Persons-
`Participating in
`^Transaction^
`
`Yes
`
`y
`Validate Person's
`Identity
`
`Enable Person to
`Change Access
`Rights to Data
`
`606
`
`610
`
`\ i
`
`v
`Cause USR to Enable
`Access to Type of
`Requested Data
`
`Return J
`
`Does Requestor
`Have Rights to Access
`Type of Requested^
`^3 to
`Yes
`
`FIG: 6
`
`608
`
`No
`
`612
`
`614
`
`616
`
`No
`
`-=5»-
`
`0006
`
`
`
`700
`
`702
`
`704
`
`706
`
`708
`
`710
`
`712
`
`User Initiates Purchase
`
`v
`User Enters Secret Code
`in Secure ID
`
`M
`Merchant Transmits to Credit
`Card Company
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`y
`Credit Card Company
`Sends Code to USR
`
`y
`USR Determines if Code is Valid, and if
`Valid Accesses User's Credit Card
`Information and Transmits Credit Card
`Number to Credit Card Company
`
`y
`Credit Card Company Checks
`Credit Worthiness and Declines
`Card or Debits User's Account and
`Transfers $ to Merchant's Account
`
`y
`CCC Notifies Merchant of
`Result of Transaction
`
`FIG. 7
`
`0007
`
`
`
`800
`
`802
`
`804
`
`806
`
`808
`
`s r o
`
`812
`
`814
`
`User Initiates Purchase
`
`\ t
`User Enters Secret Code
`in Secure ID
`
`v
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`x
`USR Determines if Code is Valid
`
`1
`USR Accesses User's Credit Card
`Information and Transmits to CCC
`(1) Credit Card Number
`(2) Store Number
`(3) Amount of Purchase
`
`\ r
`
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`v
`CCC Notifies USR of
`Result of Transaction
`
`v
`USR Notifies Merchant of
`Result of Transaction
`
`FIG. 8
`
`0008
`
`
`
`900
`
`902
`
`904
`
`906
`
`908
`
`910
`
`912
`
`914
`
`User Initiates Purchase and
`Writes Check to Merchant
`
`w
`User Enters Secret Code
`in Secure ID
`
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`USR Determines if Code is Valid
`
`USR Accesses User's Bank
`Information and Transmits to Bank
`(1) Bank Account Number
`(2) Store Number
`(3) Amount of Purchase
`
`Bank Checks Account Balance
`to Verify Availability of Funds
`
`M
`Bank Notifies USR of
`Result of Verification
`
`USR Notifies Merchant of
`Result of Verification
`
`FIG. 9
`
`0009
`
`
`
`User Initiates Anonymous Purchase
`by Entering Secret Code in Secure
`ID and Transmitting Result to
`On—Line Merchant
`
`\ l
`Merchant Transmits to USR
`(1) Code from Secure ID
`(2) Store Number
`(3) Amount of Purchase
`
`v
`USR Determines if Code is Valid
`
`\ t
`USR Accesses User's Credit Card
`Information and Transmits to CCC:
`1) Credit Card Number
`2^ Store Number
`3; Amount of Purchase
`
`i
`CCC Checks Credit Worthiness and
`Declines Card or Debits User's Account
`and Transfers $ to Merchant's Account
`
`M
`CCC Notifies USR
`of Result of Transaction
`
`1000
`
`1002
`
`1004
`
`1006
`
`1008
`
`1010
`
`1014
`
`-X-
`
`If Credit Declined,
`USR Notifies Merchant
`
`1012
`
`1016
`
`V
`If Credit Accepted, USR
`Accesses Address Code
`and Provides Merchant
`with Address Code
`
`1
`Merchant Labels Package
`with Address Code and Ships
`
`FIG: 10
`
`0010
`
`
`
`User Provides Address
`Code on Public Area
`
`1
`User Provides Address Information
`in Address Area of USR
`
`1
`Person Places Public Code
`on Parcel to be Mailed
`
`v
`Post Office Accesses USR
`to Retrieve Address Information
`
`1100
`
`1102
`
`1104
`
`1106
`
`1108
`
`v
`Post Office Delivers Parcel to
`Address in Address Area of USR
`
`1110
`
`1
`Post Office Prints Bar Code
`on Parcel to Automate
`Delivery of Parcel to Address
`in Address Area of USR
`
`FIG. 11
`
`User Provides Telephone
`Code on Public Area
`
`v
`User Provides Telephone Information
`in Telephone Area of USR
`
`JL
`Person Dials USR Phone Number and
`Enters Telephone Code for User
`
`v
`USR Connects Person to Telephone
`Number Without Providing User
`Person with Telephone Number
`
`FIG. 12
`
`1200
`
`1202
`
`1204
`
`1206
`
`0011
`
`
`
`1408
`
`1406
`
`1404
`
`FIG. 14
`
`FIG: 13
`
`Information and Police Record Information
`
`USR Accesses User's Photograph
`
`Warrants for Arrest and Criminal History
`(3) Police Records, Such as Outstanding
`(2) Picture of Secure ID Holder
`(1) Verification of Identity
`
`and Transmits to Policeman
`
`v
`
`(2) Picture of Secure ID Holder
`(1) Verification of Identity
`
`Information and Transmits to Validator
`
`USR Accesses User's Photograph
`
`v
`
`USR Determines if Code is Valid
`
`USR Determines if Code is Valid
`
`M
`
`Policeman Transmits to USR
`
`Code from Secure ID
`
`v
`
`v
`
`Validator Transmits to USR
`
`Code from Secure ID
`
`v
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`/-1402
`
`M
`
`Identification to Policeman
`User Attempts to Prove
`
`1400
`
`\i
`
`Identification to Validator
`User Attempts to Prove
`
`1308
`
`1306
`
`1304
`
`1302
`
`1300
`
`0012
`
`
`
`1608
`
`1606
`
`1604
`
`FIG: 16
`
`FIG. 15
`
`Information to User or Completes
`Information and Transmits Available
`USR Accesses User's Application
`
`an Application on Behalf of the User
`
`v
`
`Available to Party According to
`USR Accesses User's Information
`
`Available Information to Party
`Party Code and Transmits
`
`\i
`
`USR Determines if User Code is Valid
`
`USR Determines if Code is Valid
`
`V
`
`M
`
`Secure ID and Application Code
`User Transmits to USR Code from
`
`V
`
`from Secure ID and Party Code
`Party Transmits to USR Code
`
`v
`
`User Enters Secret Code in Secure ID
`
`User Enters Secret Code in Secure ID
`
`^1602
`
`v
`
`a Job, Credit or Apartment
`User Desires to Apply for
`
`1600
`
`y
`
`Identification to Party
`User Desires to Provide
`
`1508
`
`1506
`
`1504
`
`1502
`
`1500
`
`0013
`
`
`
`10
`
`USR System
`
`Lap Top
`Computer
`
`Electronic
`Device
`
`Automobile
`
`FIG. 17
`
`0014
`
`
`
`Attorney Docket No. W0537-700620
`
`UNIVERSAL SECURE REGISTRY
`
`RELATED APPLICATIONS
`35 U.S.C. U.S. Application Serial § 120
`
`
`This application claims
`the benefit
`under
`
`
`
`5 No. 09/810,703, filed on March
`16,
`2001
`and
`
`issued as Patent No. 7,237,117, on June
`which is herein incorporated by
`reference
`in
`its
`entirety.
`
`of
`26,
`
`BACKGROUND OF
`
`INVENTION
`
`Field of Invention
`apparatus
`and
`a method
`to
`relates
`This invention generally
`particularly,
`more
`individuals
`and,
`disseminating information
`regarding
`and other entities seeking
`of
`individuals
`for authenticating identity or verifying
`the
`identity
`access to certain privileges and
`for
`selectively
`granting
`
`privileges providing other
`and
`services in response
`to such
`identifications/verifications.
`
`for
`
`securely
`a
`
`to
`
`specialized
`
`desire
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809184.1
`
`Discussion of Related Art
`in
`various entities, including individuals,
`
`regarding
`Dissemination of information
`requiring
`a non-centralized
`fashion,
`often
`society is conventionally done
`in
`the information. This specialized knowledge
`knowledge of a likely storage
`location
`to
`access
`
`may not be available when the information is needed,
`thus effectively
`preventing distribution
`of the information when required. For example, a doctor
`in
`an emergency
`room
`may
`access to a patient's medical history
`in
`
`determining a course of treatment. If the person is not
`carrying a complete medical
`record, which is
`
`typically the situation, the medical
`records may
`not be available to the doctor. Even if these medical
`records are available electronically,
`for
`example via a computer accessible
`in
`the
`person's
`regular
`doctor's
`the person is unconscious or
`otherwise
`incapacitated
`effectively be unavailable
`if
`restrictions on access
`to
`the doctor's
`records
`cannot
`
`otherwise The retrieval of be
`
`required medical records can
`be
`further
`complicated
`by
`the
`fact
`sites/systems which are not linked. For example, the
`located at a number of different
`the
`
`patient's primary care physician may not have records from a
`specialist
`treating
`and none of these physicians may have
`dental
`
`records. Similar problems arise
`in other
`
`or
`
`office,
`if
`overcome.
`that
`
`patient,
`
`0015
`
`
`
`otherwise
`and/or
`scattered
`
`
`within and verification of a a society
`persons
`extremely
`
`important For example, for
`
`typically dictate
`extension
`of
`to
`
`a area, or the granting of restricted
`
`
`environments where relevant data may be
`Identification of a person
`from
`other
`person as being who he
`says he
`is
`are
`determination/verification of a person's identity will
`granting access to information, allowing
`entry
`numerous other privileges.
`of forms identification. For example, a typical person
`
`
`Most people carry multiple
`
`may carry an identification card issued by a federal, state, or
`local
`governmental
`identification card
`issued by a
`university
`or
`place
`of
`employment,
`that serve to identify
`the person
`
`of holder as a a credit card account, one
`
`
`
`or more cards
`that serve to identify
`the person
`as holder
`of
`
`a medical information cards bank account,
`
`
`identifying the person as
`a member
`of,
`for
`example,
`a
`health
`person holding an insurance policy
`from
`a specified insurance company,
`keys
`that
`identify
`
`the person as owner of an automobile, house, etc., and numerous other
`identification
`cards
`that may be used for
`specialized
`purposes,
`such
`as
`
`identifying member of a the
`
`health club, a library, or
`a professional
`organization.
`person
`the
`society,
`To enable the person
`to
`function
`effectively in
`one or more of these
`identification
`devices
`
`
`if them with they wish to undertake an associated
`
`activity. For example, a person
`is not
`allowed
`to
`drive
`a
`car
`or
`govemmentally
`issued driver's
`
`license. Likewise, although cash may be
`used
`to
`goods and/or services,
`the person will
`
`typically not be able to purchase goods
`and/or
`with a credit card
`
`
`is if the person not physically carrying
`the credit
`
`card. Similarly, most
`hospitals and other medical
`facilities will
`
`require of insurance before rendering medical proof
`
`attention. Carrying these multifarious
`identification
`devices
`can
`become
`onerous.
`
`of 25 Additionally, if one or more the identification devices
`
`is
`lost,
`stolen
`or
`forgotten,
`inconvenient, making
`it difficult
`to obtain
`goods
`or
`services requiring
`the
`identification.
`verified
`least
`individual may wish to be identified or
`
`the
`There are also times when
`purchase
`goods
`without providing personal
`information. For example, a person may wish
`information
`for
`and/or services without publicly providing
`his/her
`credit
`card
`credit card information be may be
`stolen
`and
`
`fraudulently. used Likewise, the person may
`
`
`difficult
`
`many
`credit,
`
`an
`
`entity,
`one
`
`bank
`
`maintenance
`
`person
`
`must
`
`purchase alcohol
`purchase
`services
`
`it
`
`missing
`
`5
`
`10
`
`15
`
`20
`
`30
`
`809 i 84.1
`
`at
`to
`
`0016
`
`
`
`to
`
`address
`at
`
`that
`
`this
`
`a
`
`locate
`known,
`database.
`other
`where
`for
`
`individual
`
`on
`
`if
`an
`information
`
`database.
`
`a
`
`an
`delivered
`be
`to
`goods
`order
`wish to purchase goods or
`require
`identification
`devices
`address to the vendor. Unfortunately, conventional
`complete
`a
`transaction.
`some personal information be
`transmitted
`to
`There are other related problems. For example, when there
`is a
`need
`to
`person or other entity where only
`limited
`biographical
`data
`is
`since relevant information
`is
`seldom
`available
`from
`
`a Another potential single
`
`problem is the forwarding of mail, packages, telephone calls/messages,
`e-mails
`and
`items where a party is
`in
`a
`
`
`where situation they are changing
`location
`frequently
`and/or
`the person does not want
`such
`information
`to
`be
`generally
`available
`
`reasons. A simple, yet secure, way of dealing with such
`issues does
`not currently
`exist.
`Another potential problem is
`filling
`in
`forms,
`particularly
`for
`an
`frequently has to complete
`the
`same
`or form. Such forms can for example similar
`
`
`be medical
`forms when visiting a doctor or
`entering
`hospital,
`a
`immigration
`forms
`etc. It would be desirable
`if such forms
`country, employment
`forms,
`college
`entry
`forms,
`better
`could be completed once
`and be
`
`available for future use, and it would be
`
`even the
`from
`information for each
`such
`form
`could
`be
`automatically
`drawn
`complete the form. There is also a frequent
`update
`requirement
`to
`periodically
`if such
`a form, for example financial information
`for
`a
`line
`
`of credit. It would be desirable
`general
`updates could be automatically performed
`from
`data
`in
`a
`Still another potential problem
`is
`that
`a
`
`may person be forced to make requests on
`
`
`database, for example financial requests, under duress. It would be desirable
`
`if the person
`could easily and undetectably
`signal
`such
`duress
`when
`making
`protect the individual.
`system be able
`to act appropriately
`to
`assist
`and
`Systems capable of effectively
`
`performing all of these functions do not currently
`
`the
`
`request
`
`exist.
`
`INVENTION
`SUMMARY OF
`that
`There is thus a need for
`an
`identification
`system
`enable
`will
`used
`identified or verified ("identification"
`sometimes
`being
`to
`hereinafter
`of any personal
`identified or verified) and/or
`authenticated
`without
`necessitating
`the
`provision
`information. Likewise, there
`is a need
`for
`an
`identification system
`that
`will
`
`a
`
`mean
`
`enable
`
`809 i 84.1
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0017
`
`
`
`to be identified universally without
`identification.
`information
`embodiment,
`in one
`relates,
`Accordingly, this invention
`selectively provide
`to
`and/or
`used
`may be used as a universal
`identification system
`to
`users. authorized Transactions to and from
`
`
`financial or other
`information
`about
`a
`person
`key/private
`key
`security
`the database may take place using
`public
`a
`transaction
`information
`during
`the system and the system
`itself
`to
`encrypt
`Additionally, the private key/public
`key
`security
`system
`may
`be
`used
`users to
`to
`validate their identity and/or sign instructions
`being
`sent
`a
`universal
`system of the type to which this
`invention
`
`relates. For example, in one embodiment,
`a
`card such as the SecurlD card from RSI Security,
`Inc. may be
`
`provided the user's
`with
`private key and the USR system's
`public
`key
`to
`enable
`the
`sent to the USR system and
`to decrypt messages from
`
`the USR system 10.
`situations,
`in many
`
`used This USR system or database may be to identify the person
`
`and thus may take the place of multiple conventional
`
`of forms identification. Additionally,
`
`the USR system may enable
`the user's
`identity
`to
`be
`confirmed
`any identifying information
`about
`the
`person
`to
`the
`entity requiring
`This can
`be advantageous where
`the person
`suspects
`that
`providing
`identifying
`subject the identifying
`information
`to
`usurpation.
`forms new transactions. For
`
`
`of
`Enabling anonymous
`identification facilitates multiple
`identified
`person
`example, enabling anonymous
`identification
`enables
`the
`the
`other
`or receive e-mails from other
`persons without
`providing
`are
`to be accomplished even where
`there
`number or e-mail address, and will
`permit
`this
`will
`frequent changes
`in
`the person's
`location. Similarly, enabling anonymous
`
`identification
`items
`enable the person
`to receive mail,
`other
`delivered
`parcels
`and
`other
`of
`the recipient's address
`information
`to
`
`the By restricting access sender.
`
`to particular
`classes
`persons/entities, the person can
`effectively
`prevent
`receipt
`of junk
`mail,
`mail, telemarketing calls
`and
`the like.
`anonymous
`In a financial context, providing
`person to purchase goods and/or
`services
`from
`merchant information, such as
`the
`person's
`
`TM
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`- 4 -
`
`requiring
`
`the
`
`person
`
`to
`
`carry
`
`multiple
`
`to
`
`an
`
`system
`the
`to
`secure
`
`smart
`
`card
`
`or
`identification.
`information
`
`to
`person
`
`other
`
`of identification a person enables the
`
`
`
`a without ever transmitting merchant
`
`to
`credit
`card
`number,
`
`the
`or even
`
`0018
`
`
`
`or
`subsequent
`in
`used
`and
`usurped
`that could be intercepted and/or
`be
`identification may
`transactions or
`for other undesired purposes. Enabling anonymous
`
`particularly advantageous
`in
`an unsecured
`
`
`
`as such environment, the Internet, where it has
`been found to be relatively
`trivial
`to
`intercept such credit
`card
`information.
`In a medical context,
`the USR
`system,
`in
`addition
`to
`enabling
`medical treatment
`to identify
`
`themselves, may be configured to provide
`insurance
`data,
`medical history data,
`and other
`appropriate
`medical
`information
`to
`an authorized recipient. The USR system may
`that medical provider has been established
`as
`also contain links
`to other databases
`containing
`portions
`of the
`patient's
`example x-rays, MRI pictures, dental
`records,
`glasses,
`prescriptions,
`etc.
`
`Access to the USR system may be by smart card, such
`
`as a SecurlD card, or any
`be
`other secure access device. The technology enabling
`the USR
`system
`may
`ID
`embodied as a separate
`identification
`device
`such
`as
`a
`smart
`watch, computer, personal
`into another electronic device, such
`a
`cell
`phone,
`pager,
`wrist
`as
`digital assistant such as a Palm
`Pilot™, key
`fob,
`or
`other
`commonly
`device. The identity of the user possessing
`the
`identifying
`
`device at the point may
`
`of use via any combination of a memorized
`
`PIN number or code, biometric
`identification
`such as a fingerprint, voice print,
`signature,
`iris
`or
`facial
`scan,
`method of identifying the person possessing
`
`the device. If desired, the identifying device
`
`
`may also be provided with a picture of the person authorized to use the device
`to enhance
`security.
`identification For
`
`other
`numerous
`for
`useful
`The USR system may be
`a phone card,
`
`example, the USR anonymous
`
`identification serve as a library card, may
`a
`parking
`health club card, a professional
`association membership card,
`of a
`host
`access to one's
`home, office,
`car,
`etc.
`or
`any
`one
`identification/verification and/or
`access
`functions. Additionally, equipment code
`information
`may be stored in
`the USR system
`and
`distributed
`
`user's under the and at the user's
`
`discretion, to maintain personal
`property
`or
`
`public an operative state. property
`
`in
`
`physically
`card,
`
`available
`verified
`
`DNA
`
`be
`
`or
`
`a
`
`purposes.
`
`access
`of
`
`similar
`
`control
`
`additional
`
`a
`
`person
`
`medical
`
`medical
`
`a
`
`TM
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`0019
`
`
`
`BRIEF DESCRIPTION OF DRAWINGS
`appended the The above
`
`in
`This invention is pointed out with
`particularity
`
`and further advantages of this
`
`
`invention may be better understood by referring to the
`following description when
`taken
`in
`conjunction
`with
`the
`
`accompanying The
`accompanying drawings are
`not
`
`intended to be drawn to scale. In the drawings, each
`a
`figures
`identical or nearly identical
`component
`that
`is
`illustrated in
`various
`like numeral. For purposes of clarity, not
`every
`
`
`may component be labeled in every
`thawing.
`In the drawings:
`Fig. 1 is a functional block diagram
`the universal secure registry
`("USR"),
`embodiment of the invention;
`Fig. 2 is a functional block diagram
`environment including
`the computer
`system
`Fig. 3 is a functional block diagram
`database of Fig. 1;
`Fig. 4 is a functional block diagram
`environment including
`the computer
`system
`Fig. 5 is a flow chart
`illustrating
`steps
`database;
`Fig. 6 is a flow chart
`database;
`purchasing
`for
`protocol
`first
`illustrating
`Fig. 7 is a flow chart
`information
`to
`card
`credit
`transmitting
`via the USR database without
`for
`purchasing
`protocol
`second
`a
`illustrating
`Fig. 8 is a flow chart
`card
`information
`credit
`transmitting
`25 merchant via the USR database without
`
`a for purchasing goods from protocol
`
`a merchant
`via
`Fig. 9 is a flow chart
`illustrating
`the USR database by validating
`the user's
`check;
`Fig. 10 is a flow chart
`illustrating
`protocol
`a
`merchant via the USR database without
`transmitting
`30 merchant, and enabling
`the on-line merchant
`to
`
`
`
`embodiment networked
`
`first
`of a
`of Fig. 1;
`
`
`of entry of an a database forming
`
`
`
`the USR
`
`of a
`
`of a
`
`- 6
`
`-
`
`claims.
`
`drawings.
`
`is
`
`of a
`including
`
`computer
`a
`
`system configured
`USR
`database,
`
`implement
`to
`according
`
`
`
`embodiment networked
`
`second
`of a
`of Fig.
`1;
`in
`a
`process
`
`of inputting
`
`data
`
`illustrating
`
`steps
`
`in
`
`a
`
`process
`
`of retrieving
`
`data
`
`a
`
`goods
`the
`
`goods
`
`from
`
`a
`
`for
`credit
`ship
`
`purchasing
`card
`goods
`
`the
`
`goods
`information
`to
`
`5
`
`10
`
`15
`
`20
`
`809 i 84.1
`
`0020
`
`
`
`illustrating
`
`a
`
`
`
`
`
`for protocol shipping goods to a virtual address
`
`Fig. 11 is a flow chart
`via the USR database;
`Fig. 12 is a flow chart
`via the USR database;
`Fig. 13 is a flow chart
`database;
`Fig. 14 is a flow chart
`via the USR database;
`protocol
`a
`illustrating
`Fig. 15 is a flow chart
`authorized recipient of the
`
`information via the USR database;
`for
`Fig. 16 is a flow chart
`illustrating
`a
`protocol
`and
`
`an authorized recipient of the information via
`the USR database;
`Fig. 17 is a functional block
`diagram
`of an
`embodiment
`in the USR system to activate or keep active property
`secured
`through
`
`illustrating
`
`a
`
`protocol
`
`for
`
`telephoning
`
`illustrating
`
`a
`
`protocol
`
`for
`
`identifying
`
`illustrating
`
`a
`
`protocol
`
`for
`
`identifying
`
`for
`
`providing
`
`providing
`
`a
`
`virtual
`
`a
`
`a
`
`person
`
`person
`
`information
`
`application
`
`configured
`the
`
`to
`USR
`
`use
`system.
`
`DETAILED DESCRIPTION
`of
`to construction and the the details
`
`limited
`in
`its
`application
`
`
`This invention is not
`or
`set
`forth
`in
`the
`following
`description
`arrangement of components
`drawings. The invention is capable
`of other
`
`
`of and embodiments being practiced or of being
`
`carried out in various ways. Also, the phraseology and terminology used herein
`is
`for
`the
`purpose of description and
`should
`not
`
`be as limiting. The use of "including," regarded
`
`"comprising," or "having," "containing", "involving", and variations thereof herein, is
`meant to encompass
`the
`items
`listed
`thereafter
`and
`
`equivalents as well as additional thereof
`items.
`
`
`
`illustrated in
`
`computer
`as a
`formed
`is
`system
`information
`In one embodiment, an
`universal
`a
`provide
`to
`configured
`on a computer or group of computers
`autonomously
`
`run (without the
`configured
`to
`this
`instance, may
`system. The computer, in
`be
`approval
`intervention of a human operator),
`or
`may
`require
`intervention
`or
`The invention is not limited
`to
`the
`disclosed
`subset, or particular classes
`of
`transactions.
`embodiments, and may
`take
`on many
`different
`forms
`depending
`on
`requirements of the information system,
`the
`type
`of
`information
`being
`exchanged, the
`
`
`the
`and
`
`program
`secure
`
`809 i 84.1
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0021
`
`
`
`g
`
`this to invention,
`
`
`those
`described
`solely
`the
`described
`
`employed. An information system according
`type of computer equipment
`
`may optionally, but need not necessarily, perform functions additional
`to
`herein, and the invention
`is not
`
`limited to a computer system performing
`functions.
`computer for implementing a USR system 10
`
`a
`1,
`in Fig.
`In the embodiment shown
`
`
`a
`system according to the
`invention
`
`includes at least one main unit 12
`connected
`to
`network, such as the
`Internet,
`via
`a
`
`port communications The main unit 12 may 14.
`
`
`include
`one or more processors
`(CPU 16)
`running
`USR
`software
`18
`configured
`USR system functionality discussed
`in
`greater
`below. detail The CPU 16 may be
`
`
`connected
`to a memory system
`including
`one
`or more memory
`devices,
`such
`memory system RAM 20, a
`read
`
`only memory ROM 22, and one or more system
`
`databases
`24. In the illustrated embodiment,
`the database
`24
`contains
`a
`universal
`database. The invention is not limited
`to
`this
`particular
`
`storing of manner the USR database.
`
`
`
`
`Rather, the USR database may be included in any aspect of the memory system, such as
`in
`15 RAM 20, ROM 22 or
`disc
`and may also
`be
`separately
`stored
`servers.
`general
`a
`The computer system may be
`programmable using a computer
`programming
`language, such as a scripting
`language
`or
`20 may also be specially programmed,
`special
`integrated circuit (ASIC) or
`a hybrid
`system
`programmed general purpose
`components.
`a
`typically
`processor
`the
`In a general purpose computer
`system,
`from
`available
`processor
`series
`available microprocessor, such
`as Pentium
`an
`called
`program
`a
`similar commercially available device. Such a microprocessor executes
`98,
`95,
`operating system, such
`as UNIX, Linux, Windows
`NT, Windows
`execution
`other commercially available
`operating
`system,
`which
`controls
`the
`accounting,
`control,
`computer programs and provides
`scheduling,
`debugging,
`input/output
`compilation, storage assignment,
`data
`management,
`memory
`management,
`communication
`control and related services,
`
`and many other functions. The processor and operating
`system
`
`system
`computer
`purpose
`C, C++,
`as
`such
`language,
`The computer system
`even
`assembly
`language.
`purpose
`hardware,
`an
`application
`including
`both special
`purpose
`
`wide
`
`to
`
`as
`
`a
`
`secure
`
`on
`
`one
`
`which is
`Java,
`
`is
`
`components
`
`commercially
`Intel,
`
`5
`
`10
`
`25
`
`30
`
`809 i 84.1
`
`0022
`
`
`
`- 9 -
`
`for which
`
`application
`
`programs
`
`in
`
`high-level
`
`programming
`
`Object
`from
`
`an
`
`as
`omitted,
`in
`a
`the
`not
`is
`
`fashion
`
`to
`
`may
`
`include
`
`or
`
`defines a computer platform
`languages are written.
`object-
`of database, including a relational database,
`
`any kind
`The database 24 may be
`
`other Example relational databases database.
`
`database,
`or
`oriented database, unstructured
`include Oracle 81
`
`from Oracle Corporation of Redwood City, California; Informix Dynamic
`Server from Informix Software,
`
`Inc. of Menlo Park, California; DB2
`from
`International
`Business Machines of Armonk, New York; and Access from Microsoft Corporation
`of
`Redmond, Washington. An example object-oriented database
`is ObjectStore
`from
`is
`Design of Burlington, Massachusetts. An example of an unstructured
`database
`Notes
`the Lotus Corporation, of Cambridge, Massachusetts. A database also may be
`constructed
`using a flat file system,
`for
`example
`by using
`files
`with
`character-delimited
`early versions of dBASE, now known as Visual dBASE
`from
`Inprise
`Corp.
`of
`Scotts
`California, formerly Borland
`International
`Corp.
`to
`connected
`be
`or
`The main unit 12 may optionally
`include
`to
`to enable
`an operator
`containing, for example, one
`
`input or more and output devices
`
`
`
`10. interface with the USR system Illustrative input devices include
`a
`keyboard,
`keypad,
`track ball, mouse, pen and
`tablet,
`
`
`device, communication and data input devices such
`as voice
`and other audio and video capture
`
`devices. Illustrative output devices
`include
`cathode
`ray
`output
`tube (CRT) displays,
`liquid crystal
`displays
`(LCD)
`and
`other
`video
`disk
`communication devices
`such as modems, storage
`devices
`such
`a
`which
`video output devices. Optionally, the user
`interface
`26 may be
`in
`operator may communicate with
`the USR
`system
`10
`networked
`communication port 14. It should be understood
`that
`the
`invention
`limited
`particular manner of interfacing
`an operator
`with USR system. the
`
`
`
`
`
`It also should be understood
`that
`the
`invention
`is to a particular computer not limited
`
`platform, particular processor, or
`particular
`
`language. high-level programming Additionally,
`the computer system may be
`a multiprocessor
`computer
`
`system multiple
`or
`each
`computers connected over
`a
`computer
`
`network. It further should be understood
`that
`module or step shown
`in
`the
`accompanying
`figures
`and
`the
`substeps
`remaining figures may correspond
`to
`separate
`
`of modules a computer program, or may be
`
`separate computer programs. Such modules may be operable
`on
`separate
`computers. The
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`809 i 84.1
`
`0023
`
`
`
`- 1 0 -
`
`system
`
`or
`
`transmitted
`
`firmware,
`herein, either
`program product,
`device
`
`computer-readable
`
`programming
`
`plurality
`formed
`and
`
`the
`public
`system
`and
`
`data produced by these components may be stored in a memory
`between computer systems.
`or
`software, hardware,
`in
`implemented
`Such a system may be
`disclosed
`combination thereof. The various elements of the information
`system
`computer
`individually or in combination, may be
`implemented
`as
`a
`storage
`USR software 18,
`tangibly embodied
`in
`a machine-readable
`
`the computer processor 16. Various steps of the process may be performed by the computer
`processor 16 executing
`the
`program
`18
`tangibly
`embodied
`on
`a
`to
`perform functions by operating
`on
`input
`and
`
`generating output. Computer programming
`languages suitable for
`implementing such
`a
`system
`include
`procedural
`languages, object-oriented programming
`languages,
`and
`
`combinations the two.
`of
`a
`As shown in Fig. 2, the computer system 10 may be
`connected
`to
`interface centers 27 over
`a wide
`area
`
`network The wide area network 28 may be 28.
`
`from a plurality of dedicated connections between
`the
`interface
`centers
`27
`a
`system 10, or may take place,
`in whole
`or
`in
`part,
`
`over the Internet.
`27
`Communication between
`the
`interface
`centers
`the
`computer
`and
`ftp,
`according to any protocol,
`such
`as
`TCP/IP,
`XML,
`or
`OFX,
`level of interaction between the interface centers 27 and
`the
`
`
`10. system To enhance
`computer
`accessible
`security, especially where communication
`takes
`place
`a
`publicly
`over
`of
`such as the Internet, communications
`facilitating
`or
`to
`transmission
`relating
`using
`10
`the USR database 24 or
`the computer
`system
`be
`encrypted
`may
`algorithm, such as PGP, DBS, or
`other
`conventional
`symmetric
`or
`asymmetric
`algorithm.
`database
`USR
`10 or
`the USR system
`In one embodiment,
`accessing
`entity
`other
`a user
`or
`authenticate its identity
`to
`user's
`the
`on
`appropriate code which may be
`displayed
`card or its equivalent, or other
`code
`
`generator, for example a single use
`employed by the user. A comparison by the user or
`the
`code
`number and an expected number
`can
`validate,
`to
`the
`generator, that communication
`is with
`the
`
`database an imposter. and
`
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`*09184.1
`
`TM
`
`may
`
`be
`24
`system
`the
`card,
`smart
`be