`Hoffman
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,152,045 B2
`Dec. 19, 2006
`
`US007 152045B2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,564,132 A
`
`2f1971 Baker
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`EP
`
`O581421 A1
`2, 1994
`(Continued)
`OTHER PUBLICATIONS
`Mark Rechtin (Fingerprint Technology for Best ID System, Orange
`County Business Journal, May 14, 1990).*
`(Continued)
`Primary Examiner Andrew J. Fischer
`Assistant Examiner Cristina Owen Sherr
`(74) Attorney, Agent, or Firm Marger Johnson &
`McCollom, P.C.
`
`(57)
`
`ABSTRACT
`
`A tokenless identification system and method for authoriza
`tion of transactions and transmissions. The tokenless system
`and method are principally based on a correlative compari
`Son of a unique biometrics sample, such as a finger print or
`voice recording, gathered directly from the person of an
`unknown user, with an authenticated biometrics sample of
`the same type obtained and stored previously. It can be
`networked to act as a full or partial intermediary between
`other independent computer systems, or may be the sole
`computer systems carrying out all necessary executions. It
`further contemplates the use of a private code that is returned
`to the user after the identification has been complete, authen
`ticating and indicating to the user that the computer system
`was accessed. The identification system and method of
`additionally include emergency notification to permit an
`authorized user to alert authorities an access attempt is
`coerced.
`
`11 Claims, 14 Drawing Sheets
`
`(75)
`(73)
`
`(*) Notice:
`
`(54) TOKENLESS IDENTIFICATION SYSTEM
`FOR AUTHORIZATION OF ELECTRONIC
`TRANSACTIONS AND ELECTRONIC
`TRANSMISSIONS
`Ned Hoffman, Sebastopol, CA (US)
`Inventor:
`Assignee: Indivos Corporation, San Francisco,
`CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 816 days.
`Appl. No.: 10/241,374
`Filed:
`Sep. 10, 2002
`
`(21)
`(22)
`(65)
`
`Prior Publication Data
`US 2003/O 105725 A1
`Jun. 5, 2003
`
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 09/639,948,
`filed on Aug. 17, 2000, which is a continuation-in
`part of application No. 09/398.914, filed on Sep. 16,
`1999, which is a continuation-in-part of application
`No. 09/244,784, filed on Feb. 5, 1999, now Pat. No.
`6,012,039, which is a continuation-in-part of appli
`cation No. 08/705.399, filed on Aug. 29, 1996, now
`Pat. No. 5,870,723, which is a continuation-in-part of
`application No. 08/442,895, filed on May 17, 1995,
`now Pat. No. 5,613,012, which is a continuation-in
`part of application No. 08/345,523, filed on Nov. 28,
`1994, now Pat. No. 5,615,277.
`
`(51)
`
`(52)
`
`(58)
`
`Int. C.
`(2006.01)
`G06F 7/60
`(2006.01)
`G06K 5/00
`U.S. Cl. ............................ 705/43; 705/44; 705/45;
`705/50: 235/379; 235/380: 235/382
`Field of Classification Search ............ 705/43-45,
`705/50: 235/379,380,382
`See application file for complete search history.
`
`| f TELEPHONE
`
`
`
`IPR2022-00602
`Apple EX1035 Page 1
`
`
`
`US 7,152,045 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`6, 1971 Paterson
`3,588.449 A
`7, 1972 Bourke, II et al.
`3,675,616 A
`3,705,384. A 12/1972 Wahlberg
`3,718,908 A
`2f1973 Bloomstein
`3,798,603 A
`3/1974 Walberg
`3,833,885 A
`9, 1974 Gentile et al.
`3,876,864 A
`4, 1975 Clark et al.
`3,896,266 A
`7/1975 Waterbury
`3,914.579 A 10/1975 Shigemori et al.
`3,937,925 A
`2/1976 Boothroyd
`3,943,335 A
`3, 1976 Kinker et al.
`3,970,992 A
`7/1976 Boothroyd et al.
`4,025,758 A
`5, 1977 Hatanaka et al. .............. 221/9
`4,100,370 A
`7, 1978 Suzuki et al.
`4,109,238 A
`8, 1978 Creekmore
`4,187.498 A
`2f1980 Creekmore
`4,205,780 A
`6, 1980 Burns et al.
`4,249,163 A
`2f1981 Maurer et al.
`4.264,808 A
`4, 1981 Owens et al.
`4,317,957 A
`3, 1982 Sendrow
`4.321,672 A
`3/1982 Braun ........................ 364,408
`4,357,597 A 11/1982 Butler
`4,390,968 A
`6/1983 Hennessy ................... 364,900
`4.404,649 A
`9/1983 Nunley et al.
`4,449,189 A
`5, 1984 Feix et al.
`4,461,028 A
`7, 1984 Okubo
`4.484.328 A 11/1984 Schlafly ...................... 370,394
`4,523,330 A
`6, 1985 Cain
`4,580,040 A
`4, 1986 Granzow et al.
`4,617.457 A 10, 1986 Granzow et al.
`4,641.239 A
`2f1987 Takesako
`4,669,487 A 6/1987 Frieling
`4,672,377 A
`6/1987 Murphy et al.
`4.675,815 A
`6, 1987 Kuroki ....................... 364,900
`4,727,243 A
`2f1988 Savar
`4,729, 128 A
`3, 1988 Grimes et al.
`4,734,858 A
`3/1988 Schlafly ....................... 705/26
`4,752,676 A
`6, 1988 Leonard et al.
`4,799,156 A
`1/1989 Shavit ........................ 364/401
`4,810,866 A
`3/1989 Lord, Jr.
`4,821,118 A
`4, 1989 Lafreniere .................. 358/108
`4,837,422 A
`6, 1989 Dethloff et al. ............. 364,408
`4,845,636 A
`7, 1989 Walker
`4,916,435 A
`4, 1990 Fuller
`4,922,419 A
`5, 1990 Ohashi et al.
`4,926,480 A
`5/1990 Chaum ........................ 380.23
`4.947,028 A
`8/1990 Gorog ........................ 235,380
`4,961,142 A 10, 1990 Elliott et al. ................ 364,408
`4,975,969 A 12/1990 Tal
`4,975,978 A 12/1990 Ando et al.
`4,991,008 A
`2f1991 Nama
`4,993,068 A
`2, 1991 Piosenka et al. .............. 380.23
`4,995,086 A
`2/1991 Lilley et al. ................ 382,124
`4,998.279 A
`3/1991 Weiss .......................... 380.23
`5,023,782 A
`6, 1991 Lutz et al.
`5,036,461 A
`7, 1991 Elliott et al. .................. TOS/44
`5,040,226 A
`8, 1991 Elischer et al.
`5,053,607 A 10/1991 Carlson et al.
`5,054,089 A 10, 1991 Uchida et al. ................. 382/4
`5,056,147 A 10/1991 Truner et al.
`5,095,194 A
`3, 1992 Barbanell ................... 235,380
`5,109,427 A
`4/1992 Yang ............................. 382/4
`5,109,428 A
`4, 1992 Igaki et al. .
`... 382.5
`5,144,680 A
`9/1992 Kobayashi .................. 25Of 556
`5,145,102 A
`9/1992 Higuchi et al. ................ 382/4
`5,146,102 A
`9/1992 Higuchi et al. ............. 25Of 556
`5,163,094. A 11/1992 Prokoski et al.
`5,168,520 A 12, 1992 Weiss .......................... 380.23
`5,177,342 A
`1/1993 Adams
`5, 180,901 A
`1/1993 Hiramatsu .................. 235,380
`5, 191,611 A
`3/1993 Lang ........................... 380.25
`
`235,382
`382,124
`382,115
`
`5/1993 Lee ............................. 356/71
`5,210,588 A
`5/1993 USui et al. ..................... 38.2/4
`5,210,797 A
`6/1993 Lawlor et al.
`5,220,501 A
`6/1993 Fishbine et al. ............ 382,127
`5,222,152 A
`6/1993 Eisner ......................... 380, 44
`5,224,164 A
`6/1993 Kuhns et al.
`5,224,173 A
`7, 1993 Matchett et al. ........... 340,552
`5,229,764 A
`7, 1993 Fishbine et al. ............ 382,127
`5,230,025 A
`8, 1993 Deaton et al.
`5,237,620 A
`8/1993 Parrillo ........................ 380.23
`5,239,583 A
`8, 1993 Horie ...
`... 382.f4
`5,241,606 A
`5,251.259 A 10/1993 Mosley ........................ 380.23
`5,265,008 A 1 1/1993 Benton et al.
`5,265,162. A 1 1/1993 Bush et al. ................... 380.24
`5,274.695 A 12, 1993 Green ......................... 379.88
`5,276,314 A
`1/1994 Martino et al. ............. 235,380
`5,280,527 A
`1/1994 Gullman et al. .............. 380.23
`5,291,560 A
`3/1994 Daugman
`5,305,196 A
`4, 1994 Deaton et al.
`5,321,242 A
`6/1994 Heath, Jr. ....
`5,325,442 A
`6/1994 Knapp ..
`5,335,288 A
`8, 1994 Faulkner
`5,341,428 A
`8, 1994 Schatz
`5,343,529 A
`8/1994 Goldfine et al. .............. 380.23
`5,347,580 A
`9, 1994 Molva et al.
`382,115
`5,351,303 A
`9, 1994 Willmore ....
`235,379
`5,354,974. A 10/1994 Eisenberg
`382,117
`5,359,669 A * 10/1994 Shanley et al.
`5,383,113 A
`1/1995 Kight et al. .................. TO5/40
`5,386,103 A
`1/1995 DeBan et al.
`5,386,104 A
`1/1995 Sime .......................... 235,379
`5,408,536 A
`4/1995 Lemelson
`5,412, 190 A
`5/1995 Josephson et al.
`5,412,738 A
`5/1995 Brunelli et al. ............. 382,115
`5.448,471 A
`9, 1995 Deaton et al.
`... 705/50
`5,457,747 A 10, 1995 Drexler et al. ..
`5,465.303 A 1 1/1995 Levison et al. ............. 382,124
`5,469,506 A 1 1/1995 Berson et al.
`5,485,510 A
`1/1996 Colbert .
`5.499,288 A
`3, 1996 Hunt ..........
`5,502,774 A
`3/1996 Bellegarda et al.
`5,506,691 A
`4/1996 Bednar et al.
`5,513,272 A
`4/1996 Bogosian, Jr.
`5,534,682 A
`7/1996 Graef et al.
`5,546,471 A
`8/1996 Merjanian
`5,546.523 A
`8/1996 Gatto ......................... 395,156
`5,550,359 A
`8, 1996 Bennett
`5,557,686 A
`9, 1996 Brown et al.
`5,559,504 A
`9, 1996 ItSumi et al.
`5,561,711 A 10, 1996 Muller ....................... 379,266
`5,566,230 A 10/1996 Cairo
`5,570,465 A 10/1996 Tsakanikas
`5,581,630 A 12/1996 Bonneau, Jr.
`5,592,377 A
`1/1997 Lipkin
`5,594,226 A
`1/1997 Steger
`5,594,806 A
`1, 1997 Colbert
`5,600,114 A
`2/1997 Dunlap et al.
`5,602,933 A
`2f1997 Blackwell et al.
`5,604,802 A
`2/1997 Holloway .................... 380.24
`5,613,012 A
`3/1997 Hoffman et al. ............ 382,115
`5,615,277 A
`3, 1997 Hoffman .....
`382,115
`5,636,282 A
`6/1997 Holmquist ................... 380.25
`5,649,117 A
`7/1997 Landry
`5,650,604 A
`7/1997 Marcous et al.
`5,663,546 A
`9, 1997 Cucinotta et al.
`5,703,344 A 12/1997 Bezy et al.
`5,719,950 A
`2, 1998 Osten et al. ................ 382,115
`5,745,555 A
`4/1998 Mark .......................... 379,95
`5,757,917 A
`5/1998 Rose et al.
`5,764,789 A
`6/1998 Pare, Jr. et al. ............. 382,115
`5,774,663 A
`6/1998 Randle et al.
`5,790,668 A
`8/1998 Tomko ........................ 380.25
`5,793,027 A
`8, 1998 Baik
`
`379,145
`379,266
`
`
`
`IPR2022-00602
`Apple EX1035 Page 2
`
`
`
`US 7,152,045 B2
`Page 3
`
`9, 1998 Pare, Jr. et al. ............. 382,115
`5,802,199 A
`9, 1998 Pare, Jr. et al. ............. 382,115
`5,805,719 A
`9, 1998 Cairo
`5,809, 116 A
`9, 1998 Cairo
`5,815,555 A
`5,826,241 A 10, 1998 Stein et al. ... . . . . . . . . . . . 705/26
`5,826,245 A 10, 1998 Sandberg-Diment - - - - - - - - - TOS/44
`5,832,464 A 11/1998 Houvener et al.
`3. A ''
`E. : al - - - - - - - - - - - - - - - 23.
`5,875,236 A
`2, 1999 Jankowski et al.
`5,892.824. A
`4, 1999 Beatson et al. ............... 380.25
`5,897,625 A
`4/1999 Gustin et al.
`5,930,804 A
`7, 1999 Yu et al. ..................... TO7 104
`5,940,811 A
`8, 1999 Norris
`5,956,154 A
`9, 1999 Cairo
`5,956,700 A
`9/1999 Landry ........................ TOS/40
`5,958,014 A
`9, 1999 Cave
`6,011,858 A *
`1/2000 Stock et al. ............... 340,553
`6,012,039 A
`1/2000 Hoffman et al. .............. TO5/14
`6,016,476 A
`1/2000 Maes et al. .................... 70.5/1
`6,023,688 A
`2, 2000 Ramachandran et al. ..... TOS/44
`6,028,950 A
`2/2000 Merjanian .........
`382,126
`6,029, 195 A
`2/2000 Herz ............................. 707/1
`6,040,783 A
`3/2000 Houvener et al. ..... 340,82531
`6,072,894. A *
`6/2000 Payne ..............
`382,118
`6,081,792 A * 6/2000 Cucinotta et al
`70543
`6,105,006 A
`8/2000 Davis et al. ......
`... TOS/35
`6,105,010 A
`8/2000 Musgrave ...
`... 705/44
`6,119,096 A * 9/2000 Mann et al.
`235,384
`6,119.931 A * 9/2000 Novogrod ...
`235,379
`6,182,076 B1
`1/2001 Yu et al. ........
`... TO7/10
`6,202,151 B1
`3/2001 Musgrave et al.
`713, 186
`6,233,618 B1* 5/2001 Shannon ........
`713, 182
`6,256,737 B1 *
`7/2001 Bianco et al. .
`... 709,229
`6,286,756 B1* 9/2001 Stinson et al. ....
`... 235,379
`6,310,966 B1
`10/2001 Dulude et al. ....
`382,115
`2001/0000045 A1
`3/2001 Yu et al. ........................ 707/9
`8, 2002 Cairo
`2002.0109595 A1
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`EP
`EP
`WO
`WO
`WO
`WO
`WO
`WO
`
`5, 1994
`O5.98469 A2
`3, 1995
`0651357 A1
`2, 1998
`O823701 A2
`O878780 A2 11/1998
`WO95/13591
`5, 1995
`WO 98.15924
`* 9/1997
`98.15924
`4f1998
`WO/98,25227
`6, 1998
`WO 98.35298
`8, 1998
`WO98,50875
`11, 1998
`
`OTHER PUBLICATIONS
`“A Neural Net that Knows Faces'. http://www.byte.com/art/9502/
`sec10/art4.html, Feb. 1995, 1 page.*
`Anderson et al., Security Management, American Society for Indus
`trial Security v.37, n. 11, 17-19 (Nov. 1993).
`Radcliff. When Data Warehouse become Open House, Software
`Management, v.16 n. 11 (Nov. 26, 1996).
`Anonymous, A Credit Union Points a Finger at Biometrics, Bank
`Network News, v.15 n.16 (Jan. 13, 1997).
`Hall, J., Scanning Lets Fingerprints Do Talking, Toronto Star, PA6
`(May 15, 1997).
`Scally, R., CompUSA Tests Fingerprints to Help Secure Transac
`tions, Discount Store News, v.36 n. 10 (May 19, 1997).
`Anonymous, “No Longer On the Fringe? (While the total number
`of rent-to-own stores has dropped slightly in the last two years, there
`are still 7,500 of them)”. Collections & Credit Risk. p. 53+, vol. 1,
`No. 7, Jul 1996.
`
`J.L. Griffin, “Cash Store Finds Blank in Joplin.” Joplin Globe, p. 1E.
`Joplin, MO, Dec. 22, 1996.
`Woods, Bob, “CyberWatch Security with Face Recognition.”
`Newsbytes, Aug. 7, 1996, 1 page.
`“TrueFace Products', http://www.MIROS.COM/Products.html,
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`Judge, Paul, “A Gatekeeper That Takes You at Face Value'. http://
`www.Businessweek.com/1996/36/b3491101.html, Nov. 25, 1996, 1
`page.
`http://www.MIROS.COM/
`System”,
`Access
`"TrueFace
`access system.htm. Wellesley, MA, downloaded Dec. 6, 1996, 1
`page.
`Harry Katzan, Jr., “Distributed Information Systems'. Petrocelli
`Books, 1979, pp. 101-112 and 157-167.
`Ruiz-Mezcua, Belén, et al., “Biometrics verification in a real
`environment,' IEEE 0-7803-5247-5/99.
`Higgins, GRL “Electronic Cash in a Global World.” NatWest
`Development Team, National Westminster Bank PLC, 1996.
`Walsh, Bob, Internet Security: A technical report.” Texas Banking,
`V865 pp. 16-17, May 1997.
`Gale Group, "Biometric Systems Open the Door.” Mechanical
`ing-CIME, Nov. 1990, p. 58
`engineering
`, Nov. 199U, p. 38.
`Yamada, Ken, “ID at touch of a finger.” Computer Reseller News,
`n. 713, pp. 93-95, Dec. 2, 1996.
`Dennis, Sylvia, “LCI Intros SMARTpen Biometric Signature
`Authentication.” Newsbytes News Network, May 24, 1999.
`Holmes et al., A Performance Evaluation of Biometric Identification
`Devices, Sandia National Laboratories, Albuquerque, NM, Jun.
`1991.
`Jeff McKinney, “The Price of Convenience.” Cincinnati Globe, p.
`E1, Cincinnati, OH, Jul. 14, 1996.
`Programmer's Manual for TrueFace.TM. Version 2, Miro, Inc.,
`Wellesley, MA, 1995.
`“TrueFace CyberWatch', advertising brochure, Miros, Inc.,
`Wellesley, MA, date unknown, 2 pages.
`“Let Your Face Be Your Key", http://www.MIROS.COM/,
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`“TrueFace in the News”. http://www.MIROS.COM/In the news.
`html, Wellesley, MA, downloaded Dec. 6, 1996, 2 pages.
`"Facing a new era of data security. http://www.pcweek.com/
`archive/1334/pcwk0051.html, downloaded Dec. 6, 1996, 1 page.
`“Face Recognition for Security Data”, http://www.MIROS.COM/
`CyberWatch.html, Wellesley, MA, downloaded Dec. 6, 1996, 1
`page.
`http://www.MIROS.COM/
`TrueFace',
`“Customizing
`TrueFace engine.html, Wellesley, MA, downloaded Dec. 6, 1996,
`2 pages.
`“The Ultimate in Personal ID'. http://www.MIROS.COM/
`Face apps.html. Wellesley, MA, downloaded Dec. 6, 1996, 3
`pageS.
`“About Miros'. http://www.MIROS.COM/About Miros.htm.
`Wellesley, MA, downloaded Dec. 6, 1996, 1 page.
`“Frequently Asked Questions”. http://www.MIROS.COM/FAQ.
`htm. Wellesley, MA, downloaded Dec. 6, 1996, 3 pages.
`“Service Center', advertising brochure, Mr. Payroll Corporation, Ft.
`Worth, Texas, date unknown, 1 page.
`“AT&T Document Processing ATM(DP-ATM), AT&T Global
`Information Solutions Company, 1994, 4 pages.
`"Check-Control”, advertising brochure by BMC Associates,
`Woodbury, New Jersey, date unknown, lpage.
`Jeff McKinney, “The Price of Convenience'. Cincinnati Enquirer,
`Jul. 1996, p. E1.
`* cited by examiner
`
`IPR2022-00602
`Apple EX1035 Page 3
`
`
`
`U.S. Patent
`
`
`
`Dec. 19, 2006
`
`Sheet 1 of 14
`
`US 7,152,045 B2
`
`IPR2022-00602
`Apple EX1035 Page 4
`
`
`
`U.S. Patent
`U.S. Patent
`
`
`
`Dec. 19, 2006
`
`Sheet 2 of 14
`
`US 7,152,045 B2
`US 7,152,045 B2
`
`
`
`010gpaYyan9
`
`
`
`‘souaguanbas
`
`potag/}dAIUZ
`
`OPNaj0s9Uag
`
`
`
`IVANP20pi/DA
`
`sdnei9Nid
`
`Of
`
`SNid
`
`Cad)
`
`pazoyiny
`
`/ONpIAIpUT
`
`S}OPHO/
`
`LAedbe1S“49.4.9.6.6.4
`Rereaet
`
`PRR
`oe
`
`ju0Yyo/e/y
`
`B}OPIDA
`
`DJOUDSY
`
`
`
`sauly2oWgg;da—yo20gpuouiDW
`
`
`
`
`
`
`
`BJDPIIDA
`
`Janss}
`
`DOUG
`
`Ayuap]
`
`¢Ud
`
`jsanbay
`
`19490
`
`asuodsay
`
`JO420q
`
`AIM
`
`dajnduiog=(|
`QIDMP{OH
`
`
`
`asoqpjog=Reosed
`
`ajnpo
`
`alemyee=
`
`pajnoipaq=[Ra]
`asoqojog
`
`
`
`aUuiyIoW
`
`4ayndusog
`a/0Mp10H
`PHOLiW=[_]
`
`asoqnjog
`pasotdip=Sy
`
`IPR2022-00602
`Apple EX1035 Page 5
`
`IPR2022-00602
`Apple EX1035 Page 5
`
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 3 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 6
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 4 of 14
`
`US 7,152,045 B2
`
`a!Vids
`
`
`
`UOISIAA{OIO}O/q]
`
`Jabpssay
`
`31019U389
`
`6IabossayUo,
`
`/DUILLLID|
`
`
`
`adk,abossayy
`
`
`
`
`
`adX}abossayAayasuodsay
`
`
`
`
`
`AayUonzosund,
`
`
`
`JequinyaouanbesLANGajO1auag
`
`
`
`oueWoIgAIDpuosas
`
`Qu}eWOIgALDI
`
`fayasuodsay
`
`
`
`Atayabossay
`
`Nid
`
`[f4a)siBayy
`
`ZF4018/6a4
`
`junowly
`
`
`
`eBossayjyoXiouz
`
`OVWpuaddy
`
`cf4a)sibey
`
`
`OVW‘ONaouanbas
`
`ajyopdj
`
`_™4aquiny
`aauanbas
`
`
`
`AayUONIDSUDL|
`
`LdXiNg
`
`yD
`
`IPR2022-00602
`Apple EX1035 Page 7
`
`IPR2022-00602
`Apple EX1035 Page 7
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet S of 14
`
`US 7,152,045 B2
`
`3?ossa W
`
`Old
`
`
`
`
`
`øsuodsay
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 8
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 6 of 14
`
`US 7,152,045 B2
`
`PaSsSaIOle
`
`ul010g
`
`Idd
`
`UONdAIIUT
`
`DIG40
`
`HOW
`
`jobulyjoas
`
`
`
`jay¥IDqGasuodsay
`
`WOVN
`
`/OUILLIA|Q}
`
`jndjng
`
`6Did
`
`
`
`}Dssaz0/qGuibasaguanbas
`
`
`
`pupuonddiouzajosauag
`
`
`
`
`
`jndujaijawojg‘ON
`
`Z‘blya2Inag
`
`jsanbay
`
`}9420¢f
`
`}
`
`
`
`ndujfdLnawoig
`
`B2IA9G
`
`
`
`UO}DI{USP}
`
`uondti2aq
`
`busy)
`
`WOVN
`
`WGN
`
`WNS
`
`
`
`Apiog4ajuno)
`
`YOHDISUEP]
`
`
`
`}9790gpsanbay
`
`4oypny
`
`SS9901d
`
`8Old
`
`
`
`
`
`0¢
`
`fayId9NG
`j96‘onaauanbas
`pajogjagBbuisp
`
`hayI04NG
`
`ayOVA
`
`BuisfyJaxIDg
`
`jsanbayjoes
`
`OVA
`
`ZOld
`
`ulD}90
`
`[ouonippy
`
`Dj0g
`
`IPR2022-00602
`Apple EX1035 Page 9
`
`IPR2022-00602
`Apple EX1035 Page 9
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 7 of 14
`
`US 7,152,045 B2
`
`Biometric
`Sample -
`FIC
`
`Mandatory
`Data
`
`Optional
`Data
`
`
`
`
`
`Encryption/Sealing
`Frocess at Biometric
`input Device
`Fig. 7
`
`Decryption/Counter
`Party I.D. Process
`Fig. 8
`
`Store Biometric
`Samples in Proper
`PIC-Bosket
`
`Store Private
`Codes and Other
`Optional Data
`
`Registration
`Complete
`Further Processing
`Fig. 12
`
`CED O
`
`Fig. 10
`
`
`
`
`
`Encryption/
`Sealing
`Process
`Fig. 9
`
`IPR2022-00602
`Apple EX1035 Page 10
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 8 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`Bionnetric
`Sample +
`PIC
`
`Encryption/Sealing
`Process at Bionnetric
`Input Device
`Fig. 7
`
`Decryption/Counter
`Party 1.D. Process
`Fig. 8
`
`
`
`ldentify PIC
`Basket Associated
`with Entered PC
`PGL
`
`Comparison of
`Biometric Samples
`in PIC-basket
`with Entered Bio
`Sample
`IML
`
`Mandatory
`Data
`
`Optional
`Data
`
`C IED O
`
`P Ge i.
`TVoe
`Code
`
`
`
`
`
`CBDO
`
`
`
`Individual
`ldentification
`Complete
`Further Processing
`Fig. 12
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`figlio/
`Process
`Fig. 9
`
`
`
`
`
`Fig. 11
`
`
`
`
`
`IPR2022-00602
`Apple EX1035 Page 11
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 9 of 14
`
`US 7,152,045 B2
`
`juno2oys|
`
`
`
`Aguabsausy‘ON
`
`équno2oy
`
`SAHLOUINYLaly
`
`Aouabsawzfo
`
`UCHONUS
`
`
`
`ANONWLYjosiAvuabsawyij}
`
`
`
`JOsajnduio7yUDg
`
`doyAQuabsiawsz
`
`
`
`aiffoadsyung
`
`SaiNnparosef
`
`UONDUILLP|UOISSES
`
`Bulssa2044
`
`ElDid
`
`fONpIAIpUl
`
`UOlDIYUap
`
`SS9I0Ig
`
`bt“6ty
`
`Ajyuap]
`
`‘ONyunoooy
`
`passazoy/
`
`Idd
`
`UOHNIOXF
`
`days
`
`BOA499
`
`apo?
`
`junosoys|
`
`
`
`Aguaisawuy“ON
`
`equNezap
`
`4auyn
`
`BulssaI0i
`
`gi“61
`
`
`
`
`
`UOISSISdurjoasYO/POUILWI|/uondkiouz
`
`6“bly
`
`
`
`SS920/qbujssa20ld
`
`ctBla
`
`IPR2022-00602
`Apple EX1035 Page 12
`
`IPR2022-00602
`Apple EX1035 Page 12
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Dec. 19
`
`, 2006
`
`Sheet 10 of 14
`
`US 7,152,045 B2
`
`
`(O1DUOUTY{OUsL9}UY
`
`JOSSYQPIAdtef
`
`aspqojDgjessy
`
`‘ONJUNODOY
`
`Aynuep|
`
`aJoulay
`
`juDYyosapy
`
`jassyAynuap}
`
`aq0}juUNOooy
`
`Ppassaloy
`
`
`
`{DIQUDUL}JOUI9}XF
`
`
`
`asoqojogjassy
`
`YIOMJON
`
`SLOla
`
`HqGeq40}
`
`
`
`49]UNODaptA0id
`
`junossyALlog
`
`
`
`4OfUOHDULIOJU]
`
`P24)
`
`4IP190
`
`
`
`spo)uanoziuoyjny
`
`jDucRdp
`
`40SSeIppY789
`
`
`
`J/OfJOMPIAIDU
`
`
`
`JapsQ.jlOW
`
`UONDUIUA{UdISSaS
`
`Burssac0ig
`
`
`joloupulyjDUWsa}U;
`
`JOSSYAPIAQId
`
`
`aspqbjogassy
`
`IPHID/UIAG404
`‘ONjUNO2Iy
`
`
`
`junoaayApnuap|
`
`9q0}'ON
`
`passsooy
`
`
`
`
`
`AyiOg4azUN0QpuDd
`
`yIOMJEN
`
`[OIQUDULYJOUIO]XF
`
`@spqp}ogjessy
`
`
`JOjQjufJUNO
`UOHOINAUAD
`
`upas9/192q
`
`
`
`apo)uoNoziuoYyny
`
`U/D}q0
`
`UOnDUILLA
`
`buissa204¢f
`
`UGISSaS
`
`blOld
`
`IPR2022-00602
`Apple EX1035 Page 13
`
`IPR2022-00602
`Apple EX1035 Page 13
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 11 of 14
`
`US 7,152,045 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ldentity Asset
`Account to be
`Accessed
`
`Reeve
`Account
`No.
`
`Session
`Termination
`Processing
`
`
`
`F.G. f6
`
`
`
`
`
`
`
`identity individual
`Submitting Batch
`Request
`individual identification
`Process Fig. 11
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Walidate individual's
`Authorization to
`Subirrit Bach
`Requests
`
`
`
`Verity individual
`identification,
`Hardware, D. No.
`and Counter Party
`
`
`
`Widate that
`Account No. to be
`Modified is Owned
`by Counter Party
`
`
`
`Proceed with
`Modification of
`Account info.
`
`Session
`Ferrination
`Processing
`
`
`
`FIG 17
`
`IPR2022-00602
`Apple EX1035 Page 14
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 12 of 14
`
`US 7,152,045 B2
`
`‘ON QuauunooG
`
`
`?ueuundoC] paajaoay
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`uapuas AffoN
`
`IPR2022-00602
`Apple EX1035 Page 15
`
`
`
`U.S. Patent
`
`Dec. 19, 2006
`
`Sheet 13 of 14
`
`US 7,152,045 B2
`
`Hedd Portion
`
`7- - -
`
`Document
`Warne
`
`MD5
`Calculation
`
`FIG 2OA
`
`Privot
`
`g:
`
`p
`
`Signature String
`
`FIG 2OB
`
`Head Portior
`
`--
`
`Signature String
`
`FIG 2OC
`
`Priyet E.
`
`Signature String
`
`Status
`
`FIG. 20D
`
`IPR2022-00602
`Apple EX1035 Page 16
`
`
`
`U.S. Patent
`
`Dec. 19,
`2006
`
`Sheet 14 of 14
`
`US 7,152,045 B2
`
`22 '50/-/
`
`
`
`
`
`
`
`GÌ ?un?ou6IS
`
`
`‘ON Quauun 2007
`
`??o/au350
`
`up 0}D3 (O
`
`
`
`p/003), (JSE)
`
`IPR2022-00602
`Apple EX1035 Page 17
`
`
`
`US 7,152,045 B2
`
`1.
`TOKENLESSIDENTIFICATION SYSTEM
`FOR AUTHORIZATION OF ELECTRONIC
`TRANSACTIONS AND ELECTRONIC
`TRANSMISSIONS
`
`RELATED APPLICATION DATA
`
`This application is a continuation-in-part of U.S. patent
`application Ser. No. 09/639,948 filed on Aug. 17, 2000, now
`pending, which is a continuation-in-part of U.S. patent
`application Ser. No. 09/398.914 filed Sep. 16, 1999, now
`pending, which is a continuation-in-part of U.S. patent
`application Ser. No. 09/244,784 filed Feb. 5, 1999, now U.S.
`Pat. No. 6,012,039, which is a continuation-in-part of U.S.
`patent application Ser. No. 08/705.399, filed Aug. 29, 1996,
`now U.S. Pat. No. 5,870,723, which is a continuation-in-part
`of U.S. patent application Ser. No. 08/442,895 filed May 17,
`1995, now U.S. Pat. No. 5,613,012, which is a continuation
`in-part of U.S. patent application Ser. No. 08/345,523, filed
`Nov. 28, 1994, now U.S. Pat. No. 5,615,277, all of which are
`commonly assigned and incorporated herein by reference.
`
`10
`
`15
`
`BACKGROUND OF THE INVENTION
`
`2
`fraud losses skyrocketed. The staggering statistics on fraud
`and cost of preventive steps, has forced the credit card
`companies in particular, to look for other Solutions to the
`problem.
`Fraud losses in the credit card industry stem from many
`different areas due to the highly vulnerable nature of the
`system, but they are mainly due to either lost, stolen, or
`counterfeit cards. Credit cards operate without the use of a
`personal identification code (PIC), therefore a lost credit
`card can be turned into cash if the card falls into the wrong
`hands. While theft of a token constitutes the majority of
`fraud in the system, the use of counterfeit credit cards has
`been on the rise. Counterfeit credit cards are manufactured
`by a more technically Sophisticated criminal by acquiring a
`cardholder's valid account number and then producing a
`counterfeit card using that valid number. The counterfeiter
`encodes the magnetic strip, and embosses the counterfeit
`plastic card with the account number. The card is then
`presented to merchants and charged up to the rightful
`cardholder's account. Another form of loss is by a criminal
`merchant who surreptitiously obtains the cardholder's
`account number. Yet another type of fraud is committed by
`the authorized cardholder when the token is used for making
`purchases and thereafter a claim is made that the token was
`either lost or stolen. It is estimated that losses due to all types
`of fraud exceeds S950 million dollars annually.
`Generally, debit cards are used in conjunction with a
`personal identification code (PIC). Counterfeiting a debit
`card is more difficult as the criminal must acquire not only
`the account number, but also the PIC, and then manufacture
`the card as in the credit card example. However, various
`strategies have been used to obtain PICs from unwary
`cardholders; these range from Trojan horse automated teller
`machines, or ATMs, in shopping malls that dispense cash but
`record the PIC, to merchant point of sale devices that also
`record the PIC, to individuals with binoculars that watch
`cardholders enter PICs at ATMs. The subsequently manu
`factured counterfeit debit cards are then used in various
`ATM machines until the unlucky account is emptied.
`The financial industry is well aware of the trends in fraud
`expense, and is constantly taking steps to improve the
`security of the card. Thus fraud and theft of token have an
`indirect impact on the cost to the system.
`Card blanks are manufactured under very tight security.
`Then they are individualized with the account number,
`expiration date, and are then mailed to the cardholder.
`Manufacturing and distributing the card alone costs the
`industry approximately one billion dollars annually. The
`standard card costs the financial industry S2 for each, but
`only S0.30 of this S2 is associated with actual manufacturing
`COSt.
`Over the last ten years, the industry has altered the tokens
`because of counterfeiting fraud, without any fundamental
`changes in the use of the credit transaction system. The
`remedy has been mostly administrative changes such as
`having customers call the issuer to activate their card. Other
`changes include addition of a hologram, a picture ID, or an
`improved signature area. These type of changes in particular,
`are an indication that the systems susceptibility to fraud is
`due to lack of true identification of the individual. It is
`estimated that this could double the manufacturing cost to
`two billion dollars annually.
`In the near future, the banking industry expects to move
`to an even more expensive card, called a “smart card'. Smart
`cards contain as much computing power as did some of the
`first home computers. Current cost projections for a first
`generation Smart card is estimated at approximately $3.50,
`
`The use of tokens and credit cards in today's financial
`world is pervasive. A token would be any inanimate object
`which coffers a capability to the individual presenting the
`object. Remote access of every financial account is through
`the use of tokens or plastic cards. Whether buying groceries
`with debit cards or consumer goods with credit cards, at the
`heart of that transaction is a money transfer enabled by a
`token, which acts to identify an individual and the financial
`account he is accessing.
`The reason for the migration from metal coins to plastic
`cards is simple and straightforward: access to money in this
`money transfer system is vastly safer and more convenient
`for both merchants and consumers than handling large
`quantities of coins and notes.
`Unfortunately, current technology in combination with
`this convenient token-based money transfer system results in
`a system that is prone to theft and fraud.
`As verification of user identity is based solely on data
`placed on the token, which can be easily reproduced and
`transferred between individuals, such security must rely on
`both the diligence and the luck of the authorized user and
`merchant in maintaining this information as proprietary.
`However, by their very nature, tokens do not have a very
`strong connection with the individual. Identification of the
`rightful owner of the token through the token is tenuous at
`best. This is easily demonstrated by the fact that individuals
`other than the rightful owners of the tokens have been using
`these tokens to defraud merchants and other consumer goods
`Suppliers.
`The mammoth expansion of the consumer credit industry
`during the 1980s brought with it large profits for issuers, and
`newfound convenience for consumers. However, as con
`Sumer credit became easier for consumers to acquire, it also
`became a target for criminals. Much as the mobility of the
`automobile led to a rash of bank robberies in the late 1920's
`and early 1930s, so too did the ubiquity of consumer credit
`lead to vastly increased opportunities for criminals.
`Initially, the banking industry was willing to accept a
`certain amount of loss due to fraud, passing the cost on to the
`consumer. However, as criminals became more organized,
`more technically adept, and as credit retail stations began to
`be manned by people who were more and more poorly
`trained in credit card security matters, the rate of increase of
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`IPR2022-00602
`Apple EX1035 Page 18
`
`
`
`3
`not including distribution costs, which is significantly higher
`than the S0.30 plastic card blank.
`This significant increase in cost has forced the industry to
`look for new ways of using the power in the Smart card in
`addition to simple transaction authorization. It is envisioned
`that in addition to storing credit and debit account numbers,
`Smart cards may also store phone numbers, frequent flyer
`miles, coupons obtained from stores, a transaction history,
`electronic cash usable at tollbooths and on public transit
`systems, as well as the customer's name, vital statistics, and
`perhaps even medical records. Clearly, the financial industry
`trend is to further establish use of tokens.
`The side effect of increasing the capabilities of the smart
`card is centralization of functions. The flip side of increased
`functionality is increased vulnerability. Given the number of
`functions that the smart card will be performing, the loss or
`damage of this monster card will be excruciatingly incon
`venient for the cardholder. Being without such a card will
`financially incapacitate the cardholder until it is replaced.
`Additionally, losing a card full of electronic cash will also
`result in a real financial loss as well. Furthermore, ability of
`counterfeiters to one day copy a Smartcard is not addressed.
`Unfortunately, because of the projected concentration of
`functions onto the Smart card, the cardholder is left more
`Vulnerable to the loss or destruction of the card itself. Thus,
`after spending vast Sums of money, the resulting system will
`be more secure, but threatens to levy heavier and heavier
`penalties for destruction or loss of this card on the consumer.
`The financial industry recognizes the security issues asso
`ciated with Smartcards, and efforts are currently underway to
`30
`make each plastic card difficult to counterfeit. Billions of
`dollars will be spent in the next five years in attempts to
`make plastic ever more secure. To date, the consumer
`financial transaction industry has had a simple equation to
`balance: in order to reduce fraud, the cost of the card must
`increase.
`In addition to and associated with the pervasiveness of
`electronic financial transactions, there is now the widespread
`use of electronic facsimiles, electronic mail messages and
`similar electronic communications. Similar to the problem
`of lack of proper identification of individuals for financial
`transactions is the problem of lack of proper identification of
`individuals for electronic transmissions. The ease and speed
`of electronic communication, and its low cost compared to
`conventional mail, has made it a method of choice for
`communication between individuals and businesses alike.
`This type of communication has expanded greatly and is
`expected to continue to expand. However, millions of elec
`tronic messages such as facsimiles and electronic mail (or
`“E-mail or “email’) messages are sent without knowing
`whether they arrive at their true destination or whether a
`certain individual actually sent or received that electronic
`message. Furthermore, there is no way to verify the identify
`the individual who sent or who received an electronic
`message.
`Recently, various attempts have been made to overcome
`problems inherent in the token and code security system.
`One major focus has been to encrypt, variab