`Inventors: B. Gephart, M. Dobson, and B. Mitchell
`Attorney Docket: 14698.5
`
`FIGURE1
`
`Receive one or more social security numbers
`
`100
`
`130
`
`Store the linked association of the social security
`numbers and personalidentifiers securely
`
`Receive one or more personal identifiers
`
`110
`
`Link the social security numbers to the personal
`identifiers
`
`120
`
`Unified
`
`IPR2020-00321
`EX1009 Page 1
`
`IPR2020-00321
`Unified EX1009 Page 1
`
`
`
`Title: SECURING SOCIAL SECURITY NUMBERSWITHPINS
`Inventors: B. Gephart, M. Dobson, and B. Mitchell
`Attorney Docket: 14698.5
`
`FIGURE 2
`
`Receive one or more social security numbersfor
`verification
`
`200
`
`230
`
`Comparereceived additional information to a
`linked association with social security number
`
`Promptfor additional information
`
`210
`
`220
`
`Send response based on comparison results
`
`IPR2020-00321
`Unified EX1009 Page 2
`
`IPR2020-00321
`Unified EX1009 Page 2
`
`
`
`PATENT APPLICATION
`Docket No.: 14698.5
`
`UNITED STATES PROVISIONAL PATENT APPLICATION
`
`of
`
`Brian R. Gephart
`
`Mike Dobson
`
`and
`
`Brad Mitchell
`
`for
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`IPR2020-00321
`Unified EX1009 Page 3
`
`IPR2020-00321
`Unified EX1009 Page 3
`
`
`
`SECURING SOCIAL SECURITY NUMBERSWITHPINS
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`
`[0001] N/A
`
`BACKGROUND
`
`1.
`
`The Field of the Invention
`
`[0002] Implementations of the present
`
`invention relate to systems for securing
`
`sensitive numbers with on one or more Personal Identification Numbers.
`
`2. Background and Relevant Art
`
`[0003]
`
`As computerized systems have increased in popularity, so have the needs
`
`to secure information used therewith. One way accessto certain types of information
`
`has been secured in the past is through a user providing a social security number as
`
`part of a verification process. Upon providing the social security number, the user
`
`might then be granted access to a wide range of personal information, such as bank
`
`account information, grade information at a college, or the like. Unfortunately, if
`
`another person were to steal the social security number, the thief might be able to
`
`impersonate the user and obtain access to the sensitive personal information. This is
`
`generally because someone presenting a social security numberis not always required
`
`to provide supporting documentation to show ownership of the social security
`
`number. Asa result, people are often reticent to use their social security number for
`
`obtaining accounts and/or for continuing to use them as a verification means even
`
`though they may alwaysbe associated with the social security number.
`
`[0004]
`
`More recently, a numberof states are now forbidding schools from using
`
`social security numbers as a primary identifier. For example, the state of Arizona
`
`prohibits its major universities from use of social security numbers,
`
`the state of
`
`- Page 1 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 4
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 4
`
`
`
`Colorado prohibits requiring their use in public or private post-secondaryinstitutions,
`
`the states of New York and West Virginia prohibit requiring their use in all public
`
`and/or private schools, and the state of Kentucky provides an “opt out” exclusion.
`
`In
`
`addition, the state of Arizona further has a number of rules regarding the electronic
`
`transmission of social security numbers.
`
`[0005]
`
`Furthermore, there are a number of additional laws that limit the usage of
`
`social security numbers. For example,the state of California (along with twelve other
`
`states) is proposing one or more bills that would allow consumers to “freeze” credit
`
`reporting by the bureaus, and further restrict posting and printing of social security
`
`numbers.
`
`In addition, the state of California is also proposing one or more bills that
`
`require customer notification of security breeches. Along these lines, the state of
`
`Colorado is proposing one or more bills designed to prevent government agencies
`
`from incorporating social security numbers into licenses, permits, passes, or the like.
`
`Similarly, the state of Georgia now requires personal data to be destroyed in a wide
`
`range of cases, whether paper or electronic, and institutes a wide range of commercial
`
`penalties for failing to do so.
`
`[0006]
`
`In addition to these legislative efforts, groups such as the Electronic
`
`Privacy
`
`Information Center
`
`(“EPIC”)
`
`have made
`
`a
`
`number of
`
`security
`
`recommendations regarding social security numbers.
`
`In particular,
`
`the EPIC has
`
`proposed limiting the use of social security numbers to those circumstances where use
`
`is explicitly authorized by law. For example, an employer may be permitted to ask an
`
`employee for an SSN for tax-reporting purposes (as long as the SSN remains the
`
`Taxpayer Identification Number), but a health club may not be permitted to ask a
`
`customer for an SSN as a condition of membership.
`
`In addition,
`
`the EPIC has
`
`recommended prohibiting the sale (and display) of social security numbers by
`
`- Page 2 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 5
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 5
`
`
`
`government agencies, since it may be inconsistent with Section 7 of the Privacy Act
`
`to allow the federal government to disseminate social security numbers in the first
`
`place.
`
`[0007]
`
`Furthermore, EPIC has
`
`recommended preventing companies
`
`from
`
`compelling consumers to disclose their social security numbers as a condition of
`
`service or sale, unless there is a statutory basis for the request. EPIC has also
`
`recommended penalizing the fraudulent use of another person’s social security
`
`number, but not the use of an social security number that is not associated with an
`
`actual individual. This could permit, for example, a person to provide a number such
`
`as "123-00-6789" where there is no intent to commit fraud. The PIC has further
`
`encouraged the developmentof alternative, less intrusive means of identification.
`
`[0008]
`
`A numberof these legislative efforts and recommendations are based on a
`
`number of well-known existing privacy problems. Recently, for example, a number
`
`of large institutions have been sued for potential data loss affecting hundreds of
`
`thousands of people due to putative privacy breaches. To fight such liabilities, a
`
`number of companies are beginning to force the customer to waive rights to sue if
`
`they lose customer data. This is, perhaps, not surprising since organizations recognize
`
`the wide potential of liability for even one person to recover from identity theft, much
`
`less hundreds of thousands of people. For example, some organizations estimate that
`
`it can take the average person potentially tens to hundreds of hours and hundreds of
`
`dollars to repair the mess caused by an instance of identity theft. Under current
`
`federal and state laws,
`
`individuals may nevertheless have little recourse to seek
`
`damagesfor their losses.
`
`[0009]
`
`Besides the mere fact
`
`that social security number usage can pose
`
`significant privacy loss risks, there are many ways in which social security numbers
`
`- Page 3 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 6
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 6
`
`
`
`can be intercepted. For example, an outside hacker may gain access to a computer
`
`and access social security data. Similarly, unauthorized employees or contractors
`
`might be able to access such information through internal database usage and access.
`
`Similarly, printed materials and reports within an organization often contain social
`
`security information.
`
`Still further, backup data from a computer system often
`
`contains social security data if it was contained on the computer being backed up. Yet
`
`still further, social security data access may be obtained simply through accidental
`
`outside access, such as a view of computer screen through a window, overhearing a
`
`conversation with bankingteller, and so forth.
`
`[0010]
`
`Accordingly, there are a numberof difficulties associated with securing
`
`private information associated with traditional social security number usage.
`
`- Page 4 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 7
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 7
`
`
`
`BRIEF SUMMARY
`
`[0011]
`
`Implementations of the present invention provide systems, methods, and
`
`computer program products configured to pair a traditional personal identification
`
`number (“PIN”), or other personal
`
`identifier, with a social security number for
`
`verifying that an individual is the ownerof a social security number. In particular, the
`
`ownerof the social security number can link a PIN,or other identifier, to their social
`
`security numberin a data storage system.
`
`If the ownerof a social security numberis
`
`required to verify their identity, the institution requiring the identity verification can
`
`request that the individual submit their PIN, or other personal information, in order to
`
`verify that it is paired with the social security number. If the PIN matches the social
`
`security number/PIN pairing in the data storage system, the institution can be notified
`
`that the identity of the individual is valid, and/or that the individual indeed ownsthe
`
`social security number(s).
`
`[0012]
`
`Accordingly, at least one implementation of the present invention relates
`
`generally to a computer system and/or data storage system for storing social security
`
`numberpairing with one or more personal identifiers, such as a traditional plural digit
`
`PIN.
`
`In general, paired data can include a PIN, a password, an answerto a question,
`
`biometric data, and/or a digital photo. For example, the computerized system(s) can
`
`set up a social security number/PIN pairing with the social security number, and
`
`values associated with addresses, birthdays, and so forth. The computer system can
`
`then receive a request to authorize data access based on a social security number, and
`
`can then request additional paired information. The user can then supply the PIN (or
`
`other identifiers) through any one or more electronic interfaces, including internet and
`
`telephone voice interfaces to thus prove ownership of the social security number.
`
`- Page 5 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 8
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 8
`
`
`
`[0013]
`
`In addition, at least one implementation of the present invention relates to
`
`a method or system for linking the social security number and personal identifiers.
`
`The method involves any one or more acts for receiving submitted personal data and
`
`social security information.
`
`In addition, the method can involve verifying through
`
`one or more database checks that the social security number and provided personal
`
`identification information are both valid and appropriately linked together.
`
`Furthermore, the method can then involve providing a corresponding response, such
`
`as that the access is approved or not approved,or that further information may need to
`
`be provided.
`
`[0014]
`
`This Summary is provided to introduce a selection of concepts in a
`
`simplified form that are further described below in the Detailed Description. This
`
`Summary is not intended to identify key features or essential features of the claimed
`
`subject matter, nor is it intended to be used as an aid in determining the scope of the
`
`claimed subject matter.
`
`[0015]
`
`Additional features and advantages of the invention will be set forth in the
`
`description which follows, and in part will be obvious from the description, or may be
`
`learned by the practice of the invention. The features and advantages of the invention
`
`may be realized and obtained by means of the instruments and combinations
`
`particularly pointed out in the appended claims. These and other features of the
`
`present invention will become more fully apparent from the following description and
`
`appended claims, or may be learned by the practice of the invention as set forth
`
`hereinafter.
`
`- Page 6 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 9
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 9
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0016]
`
`In order to describe the manner in which the above-recited and other
`
`advantages and features of the invention can be obtained, a more particular
`
`description of the invention briefly described above will be rendered by reference to
`
`specific embodiments thereof which are illustrated in the appended drawings.
`
`Understanding that these drawings depict only typical embodiments of the invention
`
`and are not therefore to be consideredto be limiting of its scope, the invention will be
`
`described and explained with additional specificity and detail through the use of the
`
`accompanying drawings in which:
`
`[0017]
`
`Figure 1
`
`illustrates an overview flowchart
`
`in accordance with an
`
`implementation of the present invention for receiving and storing a linked association
`
`between social security numbers and personal identifiers; and
`
`[0018]
`
`Figure 2 illustrates an overview flowchart
`
`in accordance with an
`
`implementation of the present invention for verifying ownership of a social security
`
`number through comparison of additionally received information with a linked
`
`association for the social security number.
`
`- Page 7 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 10
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 10
`
`
`
`DETAILED DESCRIPTION
`
`[0019]
`
`Implementations of the present invention extend to systems, methods, and
`
`computer program products configured to pair a traditional personal identification
`
`number (“PIN”), or other personal
`
`identifier, with a social security number for
`
`verifying that an individual is the ownerof a social security number. In particular, the
`
`ownerof the social security number can link a PIN,or other identifier, to their social
`
`security numberin a data storage system.
`
`If the ownerof a social security numberis
`
`required to verify their identity, the institution requiring the identity verification can
`
`request that the individual submit their PIN, or other personal information, in order to
`
`verify that it is paired with the social security number. If the PIN matches the social
`
`security number/PIN pairing in the data storage system, the institution can be notified
`
`that the identity of the individual is valid, and/or that the individual indeed ownsthe
`
`social security number(s).
`
`[0020]
`
`As will be appreciated more fully herein, implementations of the present
`
`invention include a number of components and mechanisms for securely storing as
`
`well as verifying social security number associations.
`
`In one implementation, for
`
`example, a computer system (e.g., a data storage system) is configured generally for
`
`storing social security number pairing with PIN or other personal data. For example,
`
`the flowchart of Figure 1 indicates that the computer system can perform a step 100 of
`
`at least receiving one or more social security numbers. These social security numbers
`
`can be provided through any electronic or manual transmission means. The computer
`
`system is thus configured at least to store the social security number.
`
`[0021]
`
`The computer system can also be configured to store a linked association
`
`of the social security number with data that is at least intended to be paired with a
`
`PIN. One will appreciate, of course, that this may or may not be the same computer
`
`- Page 8 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 11
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 11
`
`
`
`system, for added security benefits. or example, Figure 1 also shows that the
`
`method performed at the computer system can comprise a step for receiving one or
`
`more personalidentifiers.
`
`[0022]
`
`Generally, these identifiers will be paired with a particular social security
`
`number, and can include (but are not limited to) a traditional PIN (e.g., a series of
`
`numbers), and a password (e.g., any series of alpha-numeric characters).
`
`This
`
`personal data can further include a challenge/response mechanism, such as an answer
`
`to question, where the individual provides the answer to a question. The personal data
`
`can still further include various biometric data, such as any one or more of a finger
`
`print, an iris/retinal scan, a DNA sample, or the like. The personal data to be
`
`associated with a social security numbercanyetstill further include a digital photo.
`
`[0023]
`
`The computer system can then store a linked association between the
`
`social security number and the personal data. For example, Figure 1 showsthat the
`
`method can include a step 120 for linking the social security numbers to the personal
`
`identifiers numbers.
`
`In some cases, for example, the computer system maystore this
`
`information in a relational database for which access is limited to a small numberof
`
`administrative personnel.
`
`In other cases, the computer system may store the social
`
`security number in one database with initial account information, and relate that
`
`database information to another computer system on a local network that stores
`
`associated personal biometric data. For example, the method of Figure 1 further
`
`includes a step 130 for storing the linked association of the social security numbers
`
`and the personal identifiers securely.
`
`In particular, one will appreciate upon reading
`
`the disclosure herein that verification of the social security number will require
`
`providing the linked association data (e.g., biometric data).
`
`- Page 9 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 12
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 12
`
`
`
`[0024]
`
`In some cases, the computer system (or another computer system) can also
`
`be configured to set up initial verifications for the social security number.
`
`For
`
`example, the computer system can be configured to receive initial verification, which
`
`includes, of course, the social security number, and can also include butis not limited
`
`to such information as a date of birth, a current or prior address, a current or prior
`
`employer address, or the like. For example, the computer system can be a bank
`
`teller’s personal computer that is linked to a mainframe. The mainframe can thus
`
`receive the social security information and basic date of birth information and so on.
`
`This information is then stored in the mainframe pursuant to receiving additional
`
`personal identification information for a linked association.
`
`[0025]
`
`One will appreciate that an individual can initially verify their identity and
`
`submit the PIN (or other personal data) through any one or more of a network
`
`interface, and an Interactive Voice Response (“IVR”) and/or Voice Response Unit
`
`(“VRU”).
`
`For example, an individual can verify their identity at
`
`the financial
`
`institution where trying to set up the account via in-person (or a local network
`
`interface). The individual can also verify their identity by submitting their personal
`
`data (PIN, biometric information) through a call center enabled with VRU/IVR for
`
`PIN or other personal data.
`
`[0026]
`
`In addition to the foregoing, implementations of the present invention can
`
`include one or more methods for securely granting access to an account by requiring
`
`verification of ownership of a social security number. As shown in Figure 2, for
`
`example, one method can include a step 200 of receiving one or more social security
`
`numbersfor verification. For example, a user submits their social security number as
`
`a means to obtain certain sensitive account information.
`
`In addition, Figure 2 shows
`
`that
`
`the method can include a step 210 for prompting the user for additional
`
`- Page 10 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 13
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 13
`
`
`
`information (this may be a separate step or part of the same step as with step 200). In
`
`such a case, the user might then submit a PIN or other biometric information.
`
`[0027]
`
`ASpreviously mentioned, one will appreciate that the user can submitthis
`
`information through any appropriate transmission means, potentially secured through
`
`any appropriate secure transmission protocols (e.g., on networks — HTTPS, SSL, TSL,
`
`etc.)
`
`In particular, the individual may submit the social security and/or personal
`
`identification information through any one or more of a wide area network website,
`
`IVR/VRUinterface, in-person or through a local area network website.
`
`[0028]
`
`Upon receipt of this information from the user and/or the account granting
`
`institution,
`
`the computer system can then verify ownership of the social security
`
`number. Thus, for example, Figure 2 shows that the method can include a step 220
`
`for comparing received additional information to a linked association with the social
`
`security number.
`
`In particular, the computer system can identify if the social security
`
`number is one that is stored or accessible to the computer system in some way, and
`
`then identify that the social security numberis linked to a particular association with
`
`personal
`
`identification information.
`
`If so linked,
`
`the computer system can then
`
`identify if such personal information was provided, and if so, whether it matches what
`
`is stored internally.
`
`[0029]
`
`The computer system can then provide a corresponding response to the
`
`user. For example, Figure 2 shows that the method can further include a step 230 for
`
`sending a response based on the comparison results. This can generally include the
`
`computer system responding over the same communication means used to transmit
`
`the social security numberand personalidentification information in the first instance.
`
`Of course, other return transmission means may be appropriate, including any wired,
`
`wireless, or hard copy communication means.
`
`- Page 11 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 14
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 14
`
`
`
`[0030]
`
`In general, the response provided by the computer system can include any
`
`one or more of information that there is a match, no match, or that the verification
`
`cannot be made with the current information (i.e., more information may be needed to
`
`complete the comparison).
`
`[0031]
`
`The embodiments of the present invention may comprise a special purpose
`
`or general-purpose computer including various computer hardware, as discussed in
`
`greater detail below. Embodiments within the scope of the present invention also
`
`include computer-readable media for carrying or having computer-executable
`
`instructions or data structures stored thereon. Such computer-readable media can be
`
`any available media that can be accessed by a general purpose or special purpose
`
`computer.
`
`[0032]
`
`By way of example, and not limitation, such computer-readable media can
`
`comprise RAM, ROM, EEPROM, CD-ROMorother optical disk storage, magnetic
`
`disk storage or other magnetic storage devices, or any other medium which can be
`
`used to carry or store desired program code meansin the form of computer-executable
`
`instructions or data structures and which can be accessed by a general purpose or
`
`special purpose computer. When information is transferred or provided over a
`
`network or another communications connection (either hardwired, wireless, or a
`
`combination of hardwired or wireless) to a computer, the computer properly views the
`
`connection as a computer-readable medium. Thus, any such connection is properly
`
`termed a computer-readable medium. Combinations of the above should also be
`
`included within the scope of computer-readable media.
`
`[0033]
`
`Computer-executable instructions comprise, for example, instructions and
`
`data which cause a general purpose computer, special purpose computer, or special
`
`purpose processing device to perform a certain function or group of functions.
`
`- Page 12 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 15
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 15
`
`
`
`Although the subject matter has been described in language specific to structural
`
`features and/or methodological acts, it is to be understood that the subject matter
`
`defined in the appended claims is not necessarily limited to the specific features or
`
`acts described above. Rather,
`
`the specific features and acts described above are
`
`disclosed as example forms of implementing the claims.
`
`[0034]
`
`The present invention may be embodied in other specific forms without
`
`departing from its spirit or essential characteristics. The described embodiments are
`
`to be considered in all respects only as illustrative and notrestrictive. The scope of
`
`the invention is,
`
`therefore,
`
`indicated by the appended claims rather than by the
`
`foregoing description. All changes which come within the meaning and range of
`
`equivalency of the claims are to be embraced within their scope.
`
`- Page 13 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 16
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 16
`
`
`
`Weclaim:
`
`CLAIMS
`
`1.
`
`In a computerized environmentin which a social security numberis used as
`
`a meansto verify a person’s identity in order to set up one or more accounts, one
`
`or more computer program products having computer-executable instructions
`
`stored thereon that, when executed, cause one or more processors to perform a
`
`method of securely storing the social security number in with a linked association
`
`to additional personal identification information, comprising the actsof:
`
`receiving one or more social security numbers;
`
`receiving one or more personalidentifiers;
`
`linking the one or more social security numbers to the one or more
`
`personal identifiers through one or more corresponding linked associations;
`
`and
`
`storing the one or more linked associations of the one or more social
`
`security numbers and the one or more personal identifiers securely, such that
`
`ownership of
`
`the one or more social security numbers
`
`is proven by
`
`presentation of the one or more personal identifiers.
`
`- Page 14 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 17
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 17
`
`
`
`2.
`
`In a computerized environmentin which a social security numberis used as
`
`a meansto set up one or more accounts, one or more computer program products
`
`having computer-executable instructions stored thereon that, when executed, cause
`
`one or more processors to perform a method of verifying ownership of the social
`
`security number based on the receipt and comparison of additional personal
`
`identification information, comprising the actsof:
`
`receiving one or more social security numbers for verification to open
`
`and/or access one or more accounts from one or more users;
`
`prompting the one or more users for additional personal information
`
`corresponding to the presented one or more social security numbers;
`
`comparing the received additional information to one or more linked
`
`associations for the received one or more social security numbers; and
`
`sending one or more responses to the one or more users based on a
`
`comparison of the received additional
`
`information to any results of the
`
`comparison.
`
`- Page 15 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 18
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 18
`
`
`
`ABSTRACT
`
`Implementations of the present invention include systems and methods for
`
`pairing a traditional personal identification number, or other personalidentifier, with a
`
`social security number pursuant at least in part to verifying that an individual is the
`
`owner of a social security number.
`
`In particular, the owner of the social security
`
`number can link a PIN, or other identifier, to their social security numberin a data
`
`storage system.
`
`If the owner of a social security number is required to verify their
`
`identity, the institution requiring the identity verification can request from the user
`
`and submit the person’s PIN, or other personal information, to a third-party granting
`
`system, in order to verify that it is paired with the social security number.
`
`If the PIN
`
`matches the social security number/PIN pairing in the data storage system,
`
`the
`
`institution can be notified that the individual is verified, and/or indeed ownsthe social
`
`security number.
`
`KJBO0000006900V001.doc
`
`- Page 16 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 19
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 19
`
`
`
`Filing Date:
`
`Title of Invention:
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`Electronic Patent Application Fee Transmittal
`
`
`
`Provisional Filing Fees
`
`aminrc|com]rn |
`
`Basic Filing:
`
`Miscellaneous-Filing:
`
`Patent-Appeals-and-Interference:
`
`Post-Allowance-and-Post-lssuance:
`
`Extension-of-Time:
`
`IPR2020-00321
`Unified EX1009 Page 20
`
`IPR2020-00321
`Unified EX1009 Page 20
`
`
`
`men|rTae] |
`
`Miscellaneous: Total in USD ($)
`
`IPR2020-00321
`Unified EX1009 Page 21
`
`IPR2020-00321
`Unified EX1009 Page 21
`
`
`
`Electronic AcknowledgementReceipt
`
`Application Number:
`
`60747381
`
`Confirmation Number:
`
`8042
`
`
`
`Title of Invention:
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`rwin
`
`a e
`
`e
`
`Paymentinformation:
`
`
`
`File Listing:
`
`
`
`Document
`
`as
`
`
`
`Number Pocument Peseription|FileName|_ Size( ve non _AA
`Unified EX1009 Page 22
`
`.
`Fil
`
`.
`
`Bytes
`
`Pages
`
`Uv U=UU
`
`IPR2020-00321
`Unified EX1009 Page 22
`
`
`
`|a -
`
`on.pdf
`
`pep ee _
`ee
`
`in due course.
`
`Warnings:
`
`Information:
`
`Warnings:
`
`Information:
`
`Warnings:
`
`Information:
`
`Multipart Description
`
`Fee Worksheet (PTO-875)
`
`fee-info.pdf
`
`8115
`
`Total Files Size (in bytes);
`
`111579
`
`This AcknowledgementReceipt evidencesreceipt on the noted date by the USPTOofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable.
`It serves as evidenceof receipt
`similar to a Post Card, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`If a new application is being filed and the application includes the necessary componentsfora filing date (see
`37 CFR 1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date
`shown on this AcknowledgementReceipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`If a timely submission to enter the national stage of an international application is compliant with the conditions
`of 35 U.S.C. 371 and other applicable requirements a Form PCT/DO/E0O/903 indicating acceptance of the
`application as a national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt,
`
`IPR2020-00321
`Unified EX1009 Page 23
`
`IPR2020-00321
`Unified EX1009 Page 23
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Page 1 of 2
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Vuginia 22313-1450
`www.uspto.gov
`
`60/747,381
`
`05/16/2006
`
`Brian R. Gephart
`
`14698.5
`
`22913
`WORKMAN NYDEGGER
`(F/K/A WORKMAN NYDEGGER& SEELEY)
`60 EAST SOUTH TEMPLE
`1000 EAGLE GATE TOWER
`SALT LAKE CITY, UT 84111
`
`CONFIRMATION NO. 8042
`



