throbber
(12) United States Patent
`Hoffman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,152,045 B2
`Dec. 19, 2006
`
`US007 152045B2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,564,132 A
`
`2f1971 Baker
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`O581421 A1
`2, 1994
`(Continued)
`OTHER PUBLICATIONS
`Mark Rechtin (Fingerprint Technology for Best ID System, Orange
`County Business Journal, May 14, 1990).*
`(Continued)
`Primary Examiner Andrew J. Fischer
`Assistant Examiner Cristina Owen Sherr
`(74) Attorney, Agent, or Firm Marger Johnson &
`McCollom, P.C.
`
`(57)
`
`ABSTRACT
`
`A tokenless identification system and method for authoriza
`tion of transactions and transmissions. The tokenless system
`and method are principally based on a correlative compari
`Son of a unique biometrics sample, such as a finger print or
`voice recording, gathered directly from the person of an
`unknown user, with an authenticated biometrics sample of
`the same type obtained and stored previously. It can be
`networked to act as a full or partial intermediary between
`other independent computer systems, or may be the sole
`computer systems carrying out all necessary executions. It
`further contemplates the use of a private code that is returned
`to the user after the identification has been complete, authen
`ticating and indicating to the user that the computer system
`was accessed. The identification system and method of
`additionally include emergency notification to permit an
`authorized user to alert authorities an access attempt is
`coerced.
`
`11 Claims, 14 Drawing Sheets
`
`(75)
`(73)
`
`(*) Notice:
`
`(54) TOKENLESS IDENTIFICATION SYSTEM
`FOR AUTHORIZATION OF ELECTRONIC
`TRANSACTIONS AND ELECTRONIC
`TRANSMISSIONS
`Ned Hoffman, Sebastopol, CA (US)
`Inventor:
`Assignee: Indivos Corporation, San Francisco,
`CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 816 days.
`Appl. No.: 10/241,374
`Filed:
`Sep. 10, 2002
`
`(21)
`(22)
`(65)
`
`Prior Publication Data
`US 2003/O 105725 A1
`Jun. 5, 2003
`
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 09/639,948,
`filed on Aug. 17, 2000, which is a continuation-in
`part of application No. 09/398.914, filed on Sep. 16,
`1999, which is a continuation-in-part of application
`No. 09/244,784, filed on Feb. 5, 1999, now Pat. No.
`6,012,039, which is a continuation-in-part of appli
`cation No. 08/705.399, filed on Aug. 29, 1996, now
`Pat. No. 5,870,723, which is a continuation-in-part of
`application No. 08/442,895, filed on May 17, 1995,
`now Pat. No. 5,613,012, which is a continuation-in
`part of application No. 08/345,523, filed on Nov. 28,
`1994, now Pat. No. 5,615,277.
`
`(51)
`
`(52)
`
`(58)
`
`Int. C.
`(2006.01)
`G06F 7/60
`(2006.01)
`G06K 5/00
`U.S. Cl. ............................ 705/43; 705/44; 705/45;
`705/50: 235/379; 235/380: 235/382
`Field of Classification Search ............ 705/43-45,
`705/50: 235/379,380,382
`See application file for complete search history.
`
`| f TELEPHONE
`
`
`
`IPR2022-00602
`Apple EX1035 Page 1
`
`

`

`US 7,152,045 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`6, 1971 Paterson
`3,588.449 A
`7, 1972 Bourke, II et al.
`3,675,616 A
`3,705,384. A 12/1972 Wahlberg
`3,718,908 A
`2f1973 Bloomstein
`3,798,603 A
`3/1974 Walberg
`3,833,885 A
`9, 1974 Gentile et al.
`3,876,864 A
`4, 1975 Clark et al.
`3,896,266 A
`7/1975 Waterbury
`3,914.579 A 10/1975 Shigemori et al.
`3,937,925 A
`2/1976 Boothroyd
`3,943,335 A
`3, 1976 Kinker et al.
`3,970,992 A
`7/1976 Boothroyd et al.
`4,025,758 A
`5, 1977 Hatanaka et al. .............. 221/9
`4,100,370 A
`7, 1978 Suzuki et al.
`4,109,238 A
`8, 1978 Creekmore
`4,187.498 A
`2f1980 Creekmore
`4,205,780 A
`6, 1980 Burns et al.
`4,249,163 A
`2f1981 Maurer et al.
`4.264,808 A
`4, 1981 Owens et al.
`4,317,957 A
`3, 1982 Sendrow
`4.321,672 A
`3/1982 Braun ........................ 364,408
`4,357,597 A 11/1982 Butler
`4,390,968 A
`6/1983 Hennessy ................... 364,900
`4.404,649 A
`9/1983 Nunley et al.
`4,449,189 A
`5, 1984 Feix et al.
`4,461,028 A
`7, 1984 Okubo
`4.484.328 A 11/1984 Schlafly ...................... 370,394
`4,523,330 A
`6, 1985 Cain
`4,580,040 A
`4, 1986 Granzow et al.
`4,617.457 A 10, 1986 Granzow et al.
`4,641.239 A
`2f1987 Takesako
`4,669,487 A 6/1987 Frieling
`4,672,377 A
`6/1987 Murphy et al.
`4.675,815 A
`6, 1987 Kuroki ....................... 364,900
`4,727,243 A
`2f1988 Savar
`4,729, 128 A
`3, 1988 Grimes et al.
`4,734,858 A
`3/1988 Schlafly ....................... 705/26
`4,752,676 A
`6, 1988 Leonard et al.
`4,799,156 A
`1/1989 Shavit ........................ 364/401
`4,810,866 A
`3/1989 Lord, Jr.
`4,821,118 A
`4, 1989 Lafreniere .................. 358/108
`4,837,422 A
`6, 1989 Dethloff et al. ............. 364,408
`4,845,636 A
`7, 1989 Walker
`4,916,435 A
`4, 1990 Fuller
`4,922,419 A
`5, 1990 Ohashi et al.
`4,926,480 A
`5/1990 Chaum ........................ 380.23
`4.947,028 A
`8/1990 Gorog ........................ 235,380
`4,961,142 A 10, 1990 Elliott et al. ................ 364,408
`4,975,969 A 12/1990 Tal
`4,975,978 A 12/1990 Ando et al.
`4,991,008 A
`2f1991 Nama
`4,993,068 A
`2, 1991 Piosenka et al. .............. 380.23
`4,995,086 A
`2/1991 Lilley et al. ................ 382,124
`4,998.279 A
`3/1991 Weiss .......................... 380.23
`5,023,782 A
`6, 1991 Lutz et al.
`5,036,461 A
`7, 1991 Elliott et al. .................. TOS/44
`5,040,226 A
`8, 1991 Elischer et al.
`5,053,607 A 10/1991 Carlson et al.
`5,054,089 A 10, 1991 Uchida et al. ................. 382/4
`5,056,147 A 10/1991 Truner et al.
`5,095,194 A
`3, 1992 Barbanell ................... 235,380
`5,109,427 A
`4/1992 Yang ............................. 382/4
`5,109,428 A
`4, 1992 Igaki et al. .
`... 382.5
`5,144,680 A
`9/1992 Kobayashi .................. 25Of 556
`5,145,102 A
`9/1992 Higuchi et al. ................ 382/4
`5,146,102 A
`9/1992 Higuchi et al. ............. 25Of 556
`5,163,094. A 11/1992 Prokoski et al.
`5,168,520 A 12, 1992 Weiss .......................... 380.23
`5,177,342 A
`1/1993 Adams
`5, 180,901 A
`1/1993 Hiramatsu .................. 235,380
`5, 191,611 A
`3/1993 Lang ........................... 380.25
`
`235,382
`382,124
`382,115
`
`5/1993 Lee ............................. 356/71
`5,210,588 A
`5/1993 USui et al. ..................... 38.2/4
`5,210,797 A
`6/1993 Lawlor et al.
`5,220,501 A
`6/1993 Fishbine et al. ............ 382,127
`5,222,152 A
`6/1993 Eisner ......................... 380, 44
`5,224,164 A
`6/1993 Kuhns et al.
`5,224,173 A
`7, 1993 Matchett et al. ........... 340,552
`5,229,764 A
`7, 1993 Fishbine et al. ............ 382,127
`5,230,025 A
`8, 1993 Deaton et al.
`5,237,620 A
`8/1993 Parrillo ........................ 380.23
`5,239,583 A
`8, 1993 Horie ...
`... 382.f4
`5,241,606 A
`5,251.259 A 10/1993 Mosley ........................ 380.23
`5,265,008 A 1 1/1993 Benton et al.
`5,265,162. A 1 1/1993 Bush et al. ................... 380.24
`5,274.695 A 12, 1993 Green ......................... 379.88
`5,276,314 A
`1/1994 Martino et al. ............. 235,380
`5,280,527 A
`1/1994 Gullman et al. .............. 380.23
`5,291,560 A
`3/1994 Daugman
`5,305,196 A
`4, 1994 Deaton et al.
`5,321,242 A
`6/1994 Heath, Jr. ....
`5,325,442 A
`6/1994 Knapp ..
`5,335,288 A
`8, 1994 Faulkner
`5,341,428 A
`8, 1994 Schatz
`5,343,529 A
`8/1994 Goldfine et al. .............. 380.23
`5,347,580 A
`9, 1994 Molva et al.
`382,115
`5,351,303 A
`9, 1994 Willmore ....
`235,379
`5,354,974. A 10/1994 Eisenberg
`382,117
`5,359,669 A * 10/1994 Shanley et al.
`5,383,113 A
`1/1995 Kight et al. .................. TO5/40
`5,386,103 A
`1/1995 DeBan et al.
`5,386,104 A
`1/1995 Sime .......................... 235,379
`5,408,536 A
`4/1995 Lemelson
`5,412, 190 A
`5/1995 Josephson et al.
`5,412,738 A
`5/1995 Brunelli et al. ............. 382,115
`5.448,471 A
`9, 1995 Deaton et al.
`... 705/50
`5,457,747 A 10, 1995 Drexler et al. ..
`5,465.303 A 1 1/1995 Levison et al. ............. 382,124
`5,469,506 A 1 1/1995 Berson et al.
`5,485,510 A
`1/1996 Colbert .
`5.499,288 A
`3, 1996 Hunt ..........
`5,502,774 A
`3/1996 Bellegarda et al.
`5,506,691 A
`4/1996 Bednar et al.
`5,513,272 A
`4/1996 Bogosian, Jr.
`5,534,682 A
`7/1996 Graef et al.
`5,546,471 A
`8/1996 Merjanian
`5,546.523 A
`8/1996 Gatto ......................... 395,156
`5,550,359 A
`8, 1996 Bennett
`5,557,686 A
`9, 1996 Brown et al.
`5,559,504 A
`9, 1996 ItSumi et al.
`5,561,711 A 10, 1996 Muller ....................... 379,266
`5,566,230 A 10/1996 Cairo
`5,570,465 A 10/1996 Tsakanikas
`5,581,630 A 12/1996 Bonneau, Jr.
`5,592,377 A
`1/1997 Lipkin
`5,594,226 A
`1/1997 Steger
`5,594,806 A
`1, 1997 Colbert
`5,600,114 A
`2/1997 Dunlap et al.
`5,602,933 A
`2f1997 Blackwell et al.
`5,604,802 A
`2/1997 Holloway .................... 380.24
`5,613,012 A
`3/1997 Hoffman et al. ............ 382,115
`5,615,277 A
`3, 1997 Hoffman .....
`382,115
`5,636,282 A
`6/1997 Holmquist ................... 380.25
`5,649,117 A
`7/1997 Landry
`5,650,604 A
`7/1997 Marcous et al.
`5,663,546 A
`9, 1997 Cucinotta et al.
`5,703,344 A 12/1997 Bezy et al.
`5,719,950 A
`2, 1998 Osten et al. ................ 382,115
`5,745,555 A
`4/1998 Mark .......................... 379,95
`5,757,917 A
`5/1998 Rose et al.
`5,764,789 A
`6/1998 Pare, Jr. et al. ............. 382,115
`5,774,663 A
`6/1998 Randle et al.
`5,790,668 A
`8/1998 Tomko ........................ 380.25
`5,793,027 A
`8, 1998 Baik
`
`379,145
`379,266
`
`
`
`IPR2022-00602
`Apple EX1035 Page 2
`
`

`

`US 7,152,045 B2
`Page 3
`
`9, 1998 Pare, Jr. et al. ............. 382,115
`5,802,199 A
`9, 1998 Pare, Jr. et al. ............. 382,115
`5,805,719 A
`9, 1998 Cairo
`5,809, 116 A
`9, 1998 Cairo
`5,815,555 A
`5,826,241 A 10, 1998 Stein et al. ... . . . . . . . . . . . 705/26
`5,826,245 A 10, 1998 Sandberg-Diment - - - - - - - - - TOS/44
`5,832,464 A 11/1998 Houvener et al.
`3. A ''
`E. : al - - - - - - - - - - - - - - - 23.
`5,875,236 A
`2, 1999 Jankowski et al.
`5,892.824. A
`4, 1999 Beatson et al. ............... 380.25
`5,897,625 A
`4/1999 Gustin et al.
`5,930,804 A
`7, 1999 Yu et al. ..................... TO7 104
`5,940,811 A
`8, 1999 Norris
`5,956,154 A
`9, 1999 Cairo
`5,956,700 A
`9/1999 Landry ........................ TOS/40
`5,958,014 A
`9, 1999 Cave
`6,011,858 A *
`1/2000 Stock et al. ............... 340,553
`6,012,039 A
`1/2000 Hoffman et al. .............. TO5/14
`6,016,476 A
`1/2000 Maes et al. .................... 70.5/1
`6,023,688 A
`2, 2000 Ramachandran et al. ..... TOS/44
`6,028,950 A
`2/2000 Merjanian .........
`382,126
`6,029, 195 A
`2/2000 Herz ............................. 707/1
`6,040,783 A
`3/2000 Houvener et al. ..... 340,82531
`6,072,894. A *
`6/2000 Payne ..............
`382,118
`6,081,792 A * 6/2000 Cucinotta et al
`70543
`6,105,006 A
`8/2000 Davis et al. ......
`... TOS/35
`6,105,010 A
`8/2000 Musgrave ...
`... 705/44
`6,119,096 A * 9/2000 Mann et al.
`235,384
`6,119.931 A * 9/2000 Novogrod ...
`235,379
`6,182,076 B1
`1/2001 Yu et al. ........
`... TO7/10
`6,202,151 B1
`3/2001 Musgrave et al.
`713, 186
`6,233,618 B1* 5/2001 Shannon ........
`713, 182
`6,256,737 B1 *
`7/2001 Bianco et al. .
`... 709,229
`6,286,756 B1* 9/2001 Stinson et al. ....
`... 235,379
`6,310,966 B1
`10/2001 Dulude et al. ....
`382,115
`2001/0000045 A1
`3/2001 Yu et al. ........................ 707/9
`8, 2002 Cairo
`2002.0109595 A1
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`EP
`WO
`WO
`WO
`WO
`WO
`WO
`
`5, 1994
`O5.98469 A2
`3, 1995
`0651357 A1
`2, 1998
`O823701 A2
`O878780 A2 11/1998
`WO95/13591
`5, 1995
`WO 98.15924
`* 9/1997
`98.15924
`4f1998
`WO/98,25227
`6, 1998
`WO 98.35298
`8, 1998
`WO98,50875
`11, 1998
`
`OTHER PUBLICATIONS
`“A Neural Net that Knows Faces'. http://www.byte.com/art/9502/
`sec10/art4.html, Feb. 1995, 1 page.*
`Anderson et al., Security Management, American Society for Indus
`trial Security v.37, n. 11, 17-19 (Nov. 1993).
`Radcliff. When Data Warehouse become Open House, Software
`Management, v.16 n. 11 (Nov. 26, 1996).
`Anonymous, A Credit Union Points a Finger at Biometrics, Bank
`Network News, v.15 n.16 (Jan. 13, 1997).
`Hall, J., Scanning Lets Fingerprints Do Talking, Toronto Star, PA6
`(May 15, 1997).
`Scally, R., CompUSA Tests Fingerprints to Help Secure Transac
`tions, Discount Store News, v.36 n. 10 (May 19, 1997).
`Anonymous, “No Longer On the Fringe? (While the total number
`of rent-to-own stores has dropped slightly in the last two years, there
`are still 7,500 of them)”. Collections & Credit Risk. p. 53+, vol. 1,
`No. 7, Jul 1996.
`
`J.L. Griffin, “Cash Store Finds Blank in Joplin.” Joplin Globe, p. 1E.
`Joplin, MO, Dec. 22, 1996.
`Woods, Bob, “CyberWatch Security with Face Recognition.”
`Newsbytes, Aug. 7, 1996, 1 page.
`“TrueFace Products', http://www.MIROS.COM/Products.html,
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`Judge, Paul, “A Gatekeeper That Takes You at Face Value'. http://
`www.Businessweek.com/1996/36/b3491101.html, Nov. 25, 1996, 1
`page.
`http://www.MIROS.COM/
`System”,
`Access
`"TrueFace
`access system.htm. Wellesley, MA, downloaded Dec. 6, 1996, 1
`page.
`Harry Katzan, Jr., “Distributed Information Systems'. Petrocelli
`Books, 1979, pp. 101-112 and 157-167.
`Ruiz-Mezcua, Belén, et al., “Biometrics verification in a real
`environment,' IEEE 0-7803-5247-5/99.
`Higgins, GRL “Electronic Cash in a Global World.” NatWest
`Development Team, National Westminster Bank PLC, 1996.
`Walsh, Bob, Internet Security: A technical report.” Texas Banking,
`V865 pp. 16-17, May 1997.
`Gale Group, "Biometric Systems Open the Door.” Mechanical
`ing-CIME, Nov. 1990, p. 58
`engineering
`, Nov. 199U, p. 38.
`Yamada, Ken, “ID at touch of a finger.” Computer Reseller News,
`n. 713, pp. 93-95, Dec. 2, 1996.
`Dennis, Sylvia, “LCI Intros SMARTpen Biometric Signature
`Authentication.” Newsbytes News Network, May 24, 1999.
`Holmes et al., A Performance Evaluation of Biometric Identification
`Devices, Sandia National Laboratories, Albuquerque, NM, Jun.
`1991.
`Jeff McKinney, “The Price of Convenience.” Cincinnati Globe, p.
`E1, Cincinnati, OH, Jul. 14, 1996.
`Programmer's Manual for TrueFace.TM. Version 2, Miro, Inc.,
`Wellesley, MA, 1995.
`“TrueFace CyberWatch', advertising brochure, Miros, Inc.,
`Wellesley, MA, date unknown, 2 pages.
`“Let Your Face Be Your Key", http://www.MIROS.COM/,
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`“TrueFace in the News”. http://www.MIROS.COM/In the news.
`html, Wellesley, MA, downloaded Dec. 6, 1996, 2 pages.
`"Facing a new era of data security. http://www.pcweek.com/
`archive/1334/pcwk0051.html, downloaded Dec. 6, 1996, 1 page.
`“Face Recognition for Security Data”, http://www.MIROS.COM/
`CyberWatch.html, Wellesley, MA, downloaded Dec. 6, 1996, 1
`page.
`http://www.MIROS.COM/
`TrueFace',
`“Customizing
`TrueFace engine.html, Wellesley, MA, downloaded Dec. 6, 1996,
`2 pages.
`“The Ultimate in Personal ID'. http://www.MIROS.COM/
`Face apps.html. Wellesley, MA, downloaded Dec. 6, 1996, 3
`pageS.
`“About Miros'. http://www.MIROS.COM/About Miros.htm.
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`“Frequently Asked Questions”. http://www.MIROS.COM/FAQ.
`htm. Wellesley, MA, downloaded Dec. 6, 1996, 3 pages.
`“Service Center', advertising brochure, Mr. Payroll Corporation, Ft.
`Worth, Texas, date unknown, 1 page.
`“AT&T Document Processing ATM(DP-ATM), AT&T Global
`Information Solutions Company, 1994, 4 pages.
`"Check-Control”, advertising brochure by BMC Associates,
`Woodbury, New Jersey, date unknown, lpage.
`Jeff McKinney, “The Price of Convenience'. Cincinnati Enquirer,
`Jul. 1996, p. E1.
`* cited by examiner
`
`IPR2022-00602
`Apple EX1035 Page 3
`
`

`

`U.S. Patent
`
`
`
`Dec. 19, 2006
`
`Sheet 1 of 14
`
`US 7,152,045 B2
`
`IPR2022-00602
`Apple EX1035 Page 4
`
`

`

`U.S. Patent
`U.S. Patent
`
`
`
`Dec. 19, 2006
`
`Sheet 2 of 14
`
`US 7,152,045 B2
`US 7,152,045 B2
`
`
`
`010gpaYyan9
`
`
`
`‘souaguanbas
`
`potag/}dAIUZ
`
`OPNaj0s9Uag
`
`
`
`IVANP20pi/DA
`
`sdnei9Nid
`
`Of
`
`SNid
`
`Cad)
`
`pazoyiny
`
`/ONpIAIpUT
`
`S}OPHO/
`
`LAedbe1S“49.4.9.6.6.4
`Rereaet
`
`PRR
`oe
`
`ju0Yyo/e/y
`
`B}OPIDA
`
`DJOUDSY
`
`
`
`sauly2oWgg;da—yo20gpuouiDW
`
`
`
`
`
`
`
`BJDPIIDA
`
`Janss}
`
`DOUG
`
`Ayuap]
`
`¢Ud
`
`jsanbay
`
`19490
`
`asuodsay
`
`JO420q
`
`AIM
`
`dajnduiog=(|
`QIDMP{OH
`
`
`
`asoqpjog=Reosed
`
`ajnpo
`
`alemyee=
`
`pajnoipaq=[Ra]
`asoqojog
`
`
`
`aUuiyIoW
`
`4ayndusog
`a/0Mp10H
`PHOLiW=[_]
`
`asoqnjog
`pasotdip=Sy
`
`IPR2022-00602
`Apple EX1035 Page 5
`
`IPR2022-00602
`Apple EX1035 Page 5
`
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 3 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 6
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 4 of 14
`
`US 7,152,045 B2
`
`a!Vids
`
`
`
`UOISIAA{OIO}O/q]
`
`Jabpssay
`
`31019U389
`
`6IabossayUo,
`
`/DUILLLID|
`
`
`
`adk,abossayy
`
`
`
`
`
`adX}abossayAayasuodsay
`
`
`
`
`
`AayUonzosund,
`
`
`
`JequinyaouanbesLANGajO1auag
`
`
`
`oueWoIgAIDpuosas
`
`Qu}eWOIgALDI
`
`fayasuodsay
`
`
`
`Atayabossay
`
`Nid
`
`[f4a)siBayy
`
`ZF4018/6a4
`
`junowly
`
`
`
`eBossayjyoXiouz
`
`OVWpuaddy
`
`cf4a)sibey
`
`
`OVW‘ONaouanbas
`
`ajyopdj
`
`_™4aquiny
`aauanbas
`
`
`
`AayUONIDSUDL|
`
`LdXiNg
`
`yD
`
`IPR2022-00602
`Apple EX1035 Page 7
`
`IPR2022-00602
`Apple EX1035 Page 7
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet S of 14
`
`US 7,152,045 B2
`
`3?ossa W
`
`Old
`
`
`
`
`
`øsuodsay
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 8
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 6 of 14
`
`US 7,152,045 B2
`
`PaSsSaIOle
`
`ul010g
`
`Idd
`
`UONdAIIUT
`
`DIG40
`
`HOW
`
`jobulyjoas
`
`
`
`jay¥IDqGasuodsay
`
`WOVN
`
`/OUILLIA|Q}
`
`jndjng
`
`6Did
`
`
`
`}Dssaz0/qGuibasaguanbas
`
`
`
`pupuonddiouzajosauag
`
`
`
`
`
`jndujaijawojg‘ON
`
`Z‘blya2Inag
`
`jsanbay
`
`}9420¢f
`
`}
`
`
`
`ndujfdLnawoig
`
`B2IA9G
`
`
`
`UO}DI{USP}
`
`uondti2aq
`
`busy)
`
`WOVN
`
`WGN
`
`WNS
`
`
`
`Apiog4ajuno)
`
`YOHDISUEP]
`
`
`
`}9790gpsanbay
`
`4oypny
`
`SS9901d
`
`8Old
`
`
`
`
`
`0¢
`
`fayId9NG
`j96‘onaauanbas
`pajogjagBbuisp
`
`hayI04NG
`
`ayOVA
`
`BuisfyJaxIDg
`
`jsanbayjoes
`
`OVA
`
`ZOld
`
`ulD}90
`
`[ouonippy
`
`Dj0g
`
`IPR2022-00602
`Apple EX1035 Page 9
`
`IPR2022-00602
`Apple EX1035 Page 9
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 7 of 14
`
`US 7,152,045 B2
`
`Biometric
`Sample -
`FIC
`
`Mandatory
`Data
`
`Optional
`Data
`
`
`
`
`
`Encryption/Sealing
`Frocess at Biometric
`input Device
`Fig. 7
`
`Decryption/Counter
`Party I.D. Process
`Fig. 8
`
`Store Biometric
`Samples in Proper
`PIC-Bosket
`
`Store Private
`Codes and Other
`Optional Data
`
`Registration
`Complete
`Further Processing
`Fig. 12
`
`CED O
`
`Fig. 10
`
`
`
`
`
`Encryption/
`Sealing
`Process
`Fig. 9
`
`IPR2022-00602
`Apple EX1035 Page 10
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 8 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`Bionnetric
`Sample +
`PIC
`
`Encryption/Sealing
`Process at Bionnetric
`Input Device
`Fig. 7
`
`Decryption/Counter
`Party 1.D. Process
`Fig. 8
`
`
`
`ldentify PIC
`Basket Associated
`with Entered PC
`PGL
`
`Comparison of
`Biometric Samples
`in PIC-basket
`with Entered Bio
`Sample
`IML
`
`Mandatory
`Data
`
`Optional
`Data
`
`C IED O
`
`P Ge i.
`TVoe
`Code
`
`
`
`
`
`CBDO
`
`
`
`Individual
`ldentification
`Complete
`Further Processing
`Fig. 12
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`figlio/
`Process
`Fig. 9
`
`
`
`
`
`Fig. 11
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 11
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 9 of 14
`
`US 7,152,045 B2
`
`juno2oys|
`
`
`
`Aguabsausy‘ON
`
`équno2oy
`
`SAHLOUINYLaly
`
`Aouabsawzfo
`
`UCHONUS
`
`
`
`ANONWLYjosiAvuabsawyij}
`
`
`
`JOsajnduio7yUDg
`
`doyAQuabsiawsz
`
`
`
`aiffoadsyung
`
`SaiNnparosef
`
`UONDUILLP|UOISSES
`
`Bulssa2044
`
`ElDid
`
`fONpIAIpUl
`
`UOlDIYUap
`
`SS9I0Ig
`
`bt“6ty
`
`Ajyuap]
`
`‘ONyunoooy
`
`passazoy/
`
`Idd
`
`UOHNIOXF
`
`days
`
`BOA499
`
`apo?
`
`junosoys|
`
`
`
`Aguaisawuy“ON
`
`equNezap
`
`4auyn
`
`BulssaI0i
`
`gi“61
`
`
`
`
`
`UOISSISdurjoasYO/POUILWI|/uondkiouz
`
`6“bly
`
`
`
`SS920/qbujssa20ld
`
`ctBla
`
`IPR2022-00602
`Apple EX1035 Page 12
`
`IPR2022-00602
`Apple EX1035 Page 12
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Dec. 19
`
`, 2006
`
`Sheet 10 of 14
`
`US 7,152,045 B2
`
`
`(O1DUOUTY{OUsL9}UY
`
`JOSSYQPIAdtef
`
`aspqojDgjessy
`
`‘ONJUNODOY
`
`Aynuep|
`
`aJoulay
`
`juDYyosapy
`
`jassyAynuap}
`
`aq0}juUNOooy
`
`Ppassaloy
`
`
`
`{DIQUDUL}JOUI9}XF
`
`
`
`asoqojogjassy
`
`YIOMJON
`
`SLOla
`
`HqGeq40}
`
`
`
`49]UNODaptA0id
`
`junossyALlog
`
`
`
`4OfUOHDULIOJU]
`
`P24)
`
`4IP190
`
`
`
`spo)uanoziuoyjny
`
`jDucRdp
`
`40SSeIppY789
`
`
`
`J/OfJOMPIAIDU
`
`
`
`JapsQ.jlOW
`
`UONDUIUA{UdISSaS
`
`Burssac0ig
`
`
`joloupulyjDUWsa}U;
`
`JOSSYAPIAQId
`
`
`aspqbjogassy
`
`IPHID/UIAG404
`‘ONjUNO2Iy
`
`
`
`junoaayApnuap|
`
`9q0}'ON
`
`passsooy
`
`
`
`
`
`AyiOg4azUN0QpuDd
`
`yIOMJEN
`
`[OIQUDULYJOUIO]XF
`
`@spqp}ogjessy
`
`
`JOjQjufJUNO
`UOHOINAUAD
`
`upas9/192q
`
`
`
`apo)uoNoziuoYyny
`
`U/D}q0
`
`UOnDUILLA
`
`buissa204¢f
`
`UGISSaS
`
`blOld
`
`IPR2022-00602
`Apple EX1035 Page 13
`
`IPR2022-00602
`Apple EX1035 Page 13
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 11 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ldentity Asset
`Account to be
`Accessed
`
`Reeve
`Account
`No.
`
`Session
`Termination
`Processing
`
`
`
`F.G. f6
`
`
`
`
`
`
`
`identity individual
`Submitting Batch
`Request
`individual identification
`Process Fig. 11
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Walidate individual's
`Authorization to
`Subirrit Bach
`Requests
`
`
`
`Verity individual
`identification,
`Hardware, D. No.
`and Counter Party
`
`
`
`Widate that
`Account No. to be
`Modified is Owned
`by Counter Party
`
`
`
`Proceed with
`Modification of
`Account info.
`
`Session
`Ferrination
`Processing
`
`
`
`FIG 17
`
`IPR2022-00602
`Apple EX1035 Page 14
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 12 of 14
`
`US 7,152,045 B2
`
`‘ON QuauunooG
`
`
`?ueuundoC] paajaoay
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`uapuas AffoN
`
`IPR2022-00602
`Apple EX1035 Page 15
`
`

`

`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 13 of 14
`
`US 7,152,045 B2
`
`Hedd Portion
`
`7- - -
`
`Document
`Warne
`
`MD5
`Calculation
`
`FIG 2OA
`
`Privot
`
`g:
`
`p
`
`Signature String
`
`FIG 2OB
`
`Head Portior
`
`--
`
`Signature String
`
`FIG 2OC
`
`Priyet E.
`
`Signature String
`
`Status
`
`FIG. 20D
`
`IPR2022-00602
`Apple EX1035 Page 16
`
`

`

`U.S. Patent
`
`Dec. 19,
`2006
`
`Sheet 14 of 14
`
`US 7,152,045 B2
`
`22 '50/-/
`
`
`
`
`
`
`
`GÌ ?un?ou6IS
`
`
`‘ON Quauun 2007
`
`??o/au350
`
`up 0}D3 (O
`
`
`
`p/003), (JSE)
`
`IPR2022-00602
`Apple EX1035 Page 17
`
`

`

`US 7,152,045 B2
`
`1.
`TOKENLESSIDENTIFICATION SYSTEM
`FOR AUTHORIZATION OF ELECTRONIC
`TRANSACTIONS AND ELECTRONIC
`TRANSMISSIONS
`
`RELATED APPLICATION DATA
`
`This application is a continuation-in-part of U.S. patent
`application Ser. No. 09/639,948 filed on Aug. 17, 2000, now
`pending, which is a continuation-in-part of U.S. patent
`application Ser. No. 09/398.914 filed Sep. 16, 1999, now
`pending, which is a continuation-in-part of U.S. patent
`application Ser. No. 09/244,784 filed Feb. 5, 1999, now U.S.
`Pat. No. 6,012,039, which is a continuation-in-part of U.S.
`patent application Ser. No. 08/705.399, filed Aug. 29, 1996,
`now U.S. Pat. No. 5,870,723, which is a continuation-in-part
`of U.S. patent application Ser. No. 08/442,895 filed May 17,
`1995, now U.S. Pat. No. 5,613,012, which is a continuation
`in-part of U.S. patent application Ser. No. 08/345,523, filed
`Nov. 28, 1994, now U.S. Pat. No. 5,615,277, all of which are
`commonly assigned and incorporated herein by reference.
`
`10
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`fraud losses skyrocketed. The staggering statistics on fraud
`and cost of preventive steps, has forced the credit card
`companies in particular, to look for other Solutions to the
`problem.
`Fraud losses in the credit card industry stem from many
`different areas due to the highly vulnerable nature of the
`system, but they are mainly due to either lost, stolen, or
`counterfeit cards. Credit cards operate without the use of a
`personal identification code (PIC), therefore a lost credit
`card can be turned into cash if the card falls into the wrong
`hands. While theft of a token constitutes the majority of
`fraud in the system, the use of counterfeit credit cards has
`been on the rise. Counterfeit credit cards are manufactured
`by a more technically Sophisticated criminal by acquiring a
`cardholder's valid account number and then producing a
`counterfeit card using that valid number. The counterfeiter
`encodes the magnetic strip, and embosses the counterfeit
`plastic card with the account number. The card is then
`presented to merchants and charged up to the rightful
`cardholder's account. Another form of loss is by a criminal
`merchant who surreptitiously obtains the cardholder's
`account number. Yet another type of fraud is committed by
`the authorized cardholder when the token is used for making
`purchases and thereafter a claim is made that the token was
`either lost or stolen. It is estimated that losses due to all types
`of fraud exceeds S950 million dollars annually.
`Generally, debit cards are used in conjunction with a
`personal identification code (PIC). Counterfeiting a debit
`card is more difficult as the criminal must acquire not only
`the account number, but also the PIC, and then manufacture
`the card as in the credit card example. However, various
`strategies have been used to obtain PICs from unwary
`cardholders; these range from Trojan horse automated teller
`machines, or ATMs, in shopping malls that dispense cash but
`record the PIC, to merchant point of sale devices that also
`record the PIC, to individuals with binoculars that watch
`cardholders enter PICs at ATMs. The subsequently manu
`factured counterfeit debit cards are then used in various
`ATM machines until the unlucky account is emptied.
`The financial industry is well aware of the trends in fraud
`expense, and is constantly taking steps to improve the
`security of the card. Thus fraud and theft of token have an
`indirect impact on the cost to the system.
`Card blanks are manufactured under very tight security.
`Then they are individualized with the account number,
`expiration date, and are then mailed to the cardholder.
`Manufacturing and distributing the card alone costs the
`industry approximately one billion dollars annually. The
`standard card costs the financial industry S2 for each, but
`only S0.30 of this S2 is associated with actual manufacturing
`COSt.
`Over the last ten years, the industry has altered the tokens
`because of counterfeiting fraud, without any fundamental
`changes in the use of the credit transaction system. The
`remedy has been mostly administrative changes such as
`having customers call the issuer to activate their card. Other
`changes include addition of a hologram, a picture ID, or an
`improved signature area. These type of changes in particular,
`are an indication that the systems susceptibility to fraud is
`due to lack of true identification of the individual. It is
`estimated that this could double the manufacturing cost to
`two billion dollars annually.
`In the near future, the banking industry expects to move
`to an even more expensive card, called a “smart card'. Smart
`cards contain as much computing power as did some of the
`first home computers. Current cost projections for a first
`generation Smart card is estimated at approximately $3.50,
`
`The use of tokens and credit cards in today's financial
`world is pervasive. A token would be any inanimate object
`which coffers a capability to the individual presenting the
`object. Remote access of every financial account is through
`the use of tokens or plastic cards. Whether buying groceries
`with debit cards or consumer goods with credit cards, at the
`heart of that transaction is a money transfer enabled by a
`token, which acts to identify an individual and the financial
`account he is accessing.
`The reason for the migration from metal coins to plastic
`cards is simple and straightforward: access to money in this
`money transfer system is vastly safer and more convenient
`for both merchants and consumers than handling large
`quantities of coins and notes.
`Unfortunately, current technology in combination with
`this convenient token-based money transfer system results in
`a system that is prone to theft and fraud.
`As verification of user identity is based solely on data
`placed on the token, which can be easily reproduced and
`transferred between individuals, such security must rely on
`both the diligence and the luck of the authorized user and
`merchant in maintaining this information as proprietary.
`However, by their very nature, tokens do not have a very
`strong connection with the individual. Identification of the
`rightful owner of the token through the token is tenuous at
`best. This is easily demonstrated by the fact that individuals
`other than the rightful owners of the tokens have been using
`these tokens to defraud merchants and other consumer goods
`Suppliers.
`The mammoth expansion of the consumer credit industry
`during the 1980s brought with it large profits for issuers, and
`newfound convenience for consumers. However, as con
`Sumer credit became easier for consumers to acquire, it also
`became a target for criminals. Much as the mobility of the
`automobile led to a rash of bank robberies in the late 1920's
`and early 1930s, so too did the ubiquity of consumer credit
`lead to vastly increased opportunities for criminals.
`Initially, the banking industry was willing to accept a
`certain amount of loss due to fraud, passing the cost on to the
`consumer. However, as criminals became more organized,
`more technically adept, and as credit retail stations began to
`be manned by people who were more and more poorly
`trained in credit card security matters, the rate of increase of
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`IPR2022-00602
`Apple EX1035 Page 18
`
`

`

`3
`not including distribution costs, which is significantly higher
`than the S0.30 plastic card blank.
`This significant increase in cost has forced the industry to
`look for new ways of using the power in the Smart card in
`addition to simple transaction authorization. It is envisioned
`that in addition to storing credit and debit account numbers,
`Smart cards may also store phone numbers, frequent flyer
`miles, coupons obtained from stores, a transaction history,
`electronic cash usable at tollbooths and on public transit
`systems, as well as the customer's name, vital statistics, and
`perhaps even medical records. Clearly, the financial industry
`trend is to further establish use of tokens.
`The side effect of increasing the capabilities of the smart
`card is centralization of functions. The flip side of increased
`functionality is increased vulnerability. Given the number of
`functions that the smart card will be performing, the loss or
`damage of this monster card will be excruciatingly incon
`venient for the cardholder. Being without such a card will
`financially incapacitate the cardholder until it is replaced.
`Additionally, losing a card full of electronic cash will also
`result in a real financial loss as well. Furthermore, ability of
`counterfeiters to one day copy a Smartcard is not addressed.
`Unfortunately, because of the projected concentration of
`functions onto the Smart card, the cardholder is left more
`Vulnerable to the loss or destruction of the card itself. Thus,
`after spending vast Sums of money, the resulting system will
`be more secure, but threatens to levy heavier and heavier
`penalties for destruction or loss of this card on the consumer.
`The financial industry recognizes the security issues asso
`ciated with Smartcards, and efforts are currently underway to
`30
`make each plastic card difficult to counterfeit. Billions of
`dollars will be spent in the next five years in attempts to
`make plastic ever more secure. To date, the consumer
`financial transaction industry has had a simple equation to
`balance: in order to reduce fraud, the cost of the card must
`increase.
`In addition to and associated with the pervasiveness of
`electronic financial transactions, there is now the widespread
`use of electronic facsimiles, electronic mail messages and
`similar electronic communications. Similar to the problem
`of lack of proper identification of individuals for financial
`transactions is the problem of lack of proper identification of
`individuals for electronic transmissions. The ease and speed
`of electronic communication, and its low cost compared to
`conventional mail, has made it a method of choice for
`communication between individuals and businesses alike.
`This type of communication has expanded greatly and is
`expected to continue to expand. However, millions of elec
`tronic messages such as facsimiles and electronic mail (or
`“E-mail or “email’) messages are sent without knowing
`whether they arrive at their true destination or whether a
`certain individual actually sent or received that electronic
`message. Furthermore, there is no way to verify the identify
`the individual who sent or who received an electronic
`message.
`Recently, various attempts have been made to overcome
`problems inherent in the token and code security system.
`One major focus has been to encrypt, variab

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket