throbber
Title: SECURING SOCIAL SECURITY NUMBERSWITHPINS
`Inventors: B. Gephart, M. Dobson, and B. Mitchell
`Attorney Docket: 14698.5
`
`FIGURE1
`
`Receive one or more social security numbers
`
`100
`
`130
`
`Store the linked association of the social security
`numbers and personalidentifiers securely
`
`Receive one or more personal identifiers
`
`110
`
`Link the social security numbers to the personal
`identifiers
`
`120
`
`Unified
`
`IPR2020-00321
`EX1009 Page 1
`
`IPR2020-00321
`Unified EX1009 Page 1
`
`

`

`Title: SECURING SOCIAL SECURITY NUMBERSWITHPINS
`Inventors: B. Gephart, M. Dobson, and B. Mitchell
`Attorney Docket: 14698.5
`
`FIGURE 2
`
`Receive one or more social security numbersfor
`verification
`
`200
`
`230
`
`Comparereceived additional information to a
`linked association with social security number
`
`Promptfor additional information
`
`210
`
`220
`
`Send response based on comparison results
`
`IPR2020-00321
`Unified EX1009 Page 2
`
`IPR2020-00321
`Unified EX1009 Page 2
`
`

`

`PATENT APPLICATION
`Docket No.: 14698.5
`
`UNITED STATES PROVISIONAL PATENT APPLICATION
`
`of
`
`Brian R. Gephart
`
`Mike Dobson
`
`and
`
`Brad Mitchell
`
`for
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`IPR2020-00321
`Unified EX1009 Page 3
`
`IPR2020-00321
`Unified EX1009 Page 3
`
`

`

`SECURING SOCIAL SECURITY NUMBERSWITHPINS
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`
`[0001] N/A
`
`BACKGROUND
`
`1.
`
`The Field of the Invention
`
`[0002] Implementations of the present
`
`invention relate to systems for securing
`
`sensitive numbers with on one or more Personal Identification Numbers.
`
`2. Background and Relevant Art
`
`[0003]
`
`As computerized systems have increased in popularity, so have the needs
`
`to secure information used therewith. One way accessto certain types of information
`
`has been secured in the past is through a user providing a social security number as
`
`part of a verification process. Upon providing the social security number, the user
`
`might then be granted access to a wide range of personal information, such as bank
`
`account information, grade information at a college, or the like. Unfortunately, if
`
`another person were to steal the social security number, the thief might be able to
`
`impersonate the user and obtain access to the sensitive personal information. This is
`
`generally because someone presenting a social security numberis not always required
`
`to provide supporting documentation to show ownership of the social security
`
`number. Asa result, people are often reticent to use their social security number for
`
`obtaining accounts and/or for continuing to use them as a verification means even
`
`though they may alwaysbe associated with the social security number.
`
`[0004]
`
`More recently, a numberof states are now forbidding schools from using
`
`social security numbers as a primary identifier. For example, the state of Arizona
`
`prohibits its major universities from use of social security numbers,
`
`the state of
`
`- Page 1 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 4
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 4
`
`

`

`Colorado prohibits requiring their use in public or private post-secondaryinstitutions,
`
`the states of New York and West Virginia prohibit requiring their use in all public
`
`and/or private schools, and the state of Kentucky provides an “opt out” exclusion.
`
`In
`
`addition, the state of Arizona further has a number of rules regarding the electronic
`
`transmission of social security numbers.
`
`[0005]
`
`Furthermore, there are a number of additional laws that limit the usage of
`
`social security numbers. For example,the state of California (along with twelve other
`
`states) is proposing one or more bills that would allow consumers to “freeze” credit
`
`reporting by the bureaus, and further restrict posting and printing of social security
`
`numbers.
`
`In addition, the state of California is also proposing one or more bills that
`
`require customer notification of security breeches. Along these lines, the state of
`
`Colorado is proposing one or more bills designed to prevent government agencies
`
`from incorporating social security numbers into licenses, permits, passes, or the like.
`
`Similarly, the state of Georgia now requires personal data to be destroyed in a wide
`
`range of cases, whether paper or electronic, and institutes a wide range of commercial
`
`penalties for failing to do so.
`
`[0006]
`
`In addition to these legislative efforts, groups such as the Electronic
`
`Privacy
`
`Information Center
`
`(“EPIC”)
`
`have made
`
`a
`
`number of
`
`security
`
`recommendations regarding social security numbers.
`
`In particular,
`
`the EPIC has
`
`proposed limiting the use of social security numbers to those circumstances where use
`
`is explicitly authorized by law. For example, an employer may be permitted to ask an
`
`employee for an SSN for tax-reporting purposes (as long as the SSN remains the
`
`Taxpayer Identification Number), but a health club may not be permitted to ask a
`
`customer for an SSN as a condition of membership.
`
`In addition,
`
`the EPIC has
`
`recommended prohibiting the sale (and display) of social security numbers by
`
`- Page 2 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 5
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 5
`
`

`

`government agencies, since it may be inconsistent with Section 7 of the Privacy Act
`
`to allow the federal government to disseminate social security numbers in the first
`
`place.
`
`[0007]
`
`Furthermore, EPIC has
`
`recommended preventing companies
`
`from
`
`compelling consumers to disclose their social security numbers as a condition of
`
`service or sale, unless there is a statutory basis for the request. EPIC has also
`
`recommended penalizing the fraudulent use of another person’s social security
`
`number, but not the use of an social security number that is not associated with an
`
`actual individual. This could permit, for example, a person to provide a number such
`
`as "123-00-6789" where there is no intent to commit fraud. The PIC has further
`
`encouraged the developmentof alternative, less intrusive means of identification.
`
`[0008]
`
`A numberof these legislative efforts and recommendations are based on a
`
`number of well-known existing privacy problems. Recently, for example, a number
`
`of large institutions have been sued for potential data loss affecting hundreds of
`
`thousands of people due to putative privacy breaches. To fight such liabilities, a
`
`number of companies are beginning to force the customer to waive rights to sue if
`
`they lose customer data. This is, perhaps, not surprising since organizations recognize
`
`the wide potential of liability for even one person to recover from identity theft, much
`
`less hundreds of thousands of people. For example, some organizations estimate that
`
`it can take the average person potentially tens to hundreds of hours and hundreds of
`
`dollars to repair the mess caused by an instance of identity theft. Under current
`
`federal and state laws,
`
`individuals may nevertheless have little recourse to seek
`
`damagesfor their losses.
`
`[0009]
`
`Besides the mere fact
`
`that social security number usage can pose
`
`significant privacy loss risks, there are many ways in which social security numbers
`
`- Page 3 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 6
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 6
`
`

`

`can be intercepted. For example, an outside hacker may gain access to a computer
`
`and access social security data. Similarly, unauthorized employees or contractors
`
`might be able to access such information through internal database usage and access.
`
`Similarly, printed materials and reports within an organization often contain social
`
`security information.
`
`Still further, backup data from a computer system often
`
`contains social security data if it was contained on the computer being backed up. Yet
`
`still further, social security data access may be obtained simply through accidental
`
`outside access, such as a view of computer screen through a window, overhearing a
`
`conversation with bankingteller, and so forth.
`
`[0010]
`
`Accordingly, there are a numberof difficulties associated with securing
`
`private information associated with traditional social security number usage.
`
`- Page 4 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 7
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 7
`
`

`

`BRIEF SUMMARY
`
`[0011]
`
`Implementations of the present invention provide systems, methods, and
`
`computer program products configured to pair a traditional personal identification
`
`number (“PIN”), or other personal
`
`identifier, with a social security number for
`
`verifying that an individual is the ownerof a social security number. In particular, the
`
`ownerof the social security number can link a PIN,or other identifier, to their social
`
`security numberin a data storage system.
`
`If the ownerof a social security numberis
`
`required to verify their identity, the institution requiring the identity verification can
`
`request that the individual submit their PIN, or other personal information, in order to
`
`verify that it is paired with the social security number. If the PIN matches the social
`
`security number/PIN pairing in the data storage system, the institution can be notified
`
`that the identity of the individual is valid, and/or that the individual indeed ownsthe
`
`social security number(s).
`
`[0012]
`
`Accordingly, at least one implementation of the present invention relates
`
`generally to a computer system and/or data storage system for storing social security
`
`numberpairing with one or more personal identifiers, such as a traditional plural digit
`
`PIN.
`
`In general, paired data can include a PIN, a password, an answerto a question,
`
`biometric data, and/or a digital photo. For example, the computerized system(s) can
`
`set up a social security number/PIN pairing with the social security number, and
`
`values associated with addresses, birthdays, and so forth. The computer system can
`
`then receive a request to authorize data access based on a social security number, and
`
`can then request additional paired information. The user can then supply the PIN (or
`
`other identifiers) through any one or more electronic interfaces, including internet and
`
`telephone voice interfaces to thus prove ownership of the social security number.
`
`- Page 5 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 8
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 8
`
`

`

`[0013]
`
`In addition, at least one implementation of the present invention relates to
`
`a method or system for linking the social security number and personal identifiers.
`
`The method involves any one or more acts for receiving submitted personal data and
`
`social security information.
`
`In addition, the method can involve verifying through
`
`one or more database checks that the social security number and provided personal
`
`identification information are both valid and appropriately linked together.
`
`Furthermore, the method can then involve providing a corresponding response, such
`
`as that the access is approved or not approved,or that further information may need to
`
`be provided.
`
`[0014]
`
`This Summary is provided to introduce a selection of concepts in a
`
`simplified form that are further described below in the Detailed Description. This
`
`Summary is not intended to identify key features or essential features of the claimed
`
`subject matter, nor is it intended to be used as an aid in determining the scope of the
`
`claimed subject matter.
`
`[0015]
`
`Additional features and advantages of the invention will be set forth in the
`
`description which follows, and in part will be obvious from the description, or may be
`
`learned by the practice of the invention. The features and advantages of the invention
`
`may be realized and obtained by means of the instruments and combinations
`
`particularly pointed out in the appended claims. These and other features of the
`
`present invention will become more fully apparent from the following description and
`
`appended claims, or may be learned by the practice of the invention as set forth
`
`hereinafter.
`
`- Page 6 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 9
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 9
`
`

`

`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0016]
`
`In order to describe the manner in which the above-recited and other
`
`advantages and features of the invention can be obtained, a more particular
`
`description of the invention briefly described above will be rendered by reference to
`
`specific embodiments thereof which are illustrated in the appended drawings.
`
`Understanding that these drawings depict only typical embodiments of the invention
`
`and are not therefore to be consideredto be limiting of its scope, the invention will be
`
`described and explained with additional specificity and detail through the use of the
`
`accompanying drawings in which:
`
`[0017]
`
`Figure 1
`
`illustrates an overview flowchart
`
`in accordance with an
`
`implementation of the present invention for receiving and storing a linked association
`
`between social security numbers and personal identifiers; and
`
`[0018]
`
`Figure 2 illustrates an overview flowchart
`
`in accordance with an
`
`implementation of the present invention for verifying ownership of a social security
`
`number through comparison of additionally received information with a linked
`
`association for the social security number.
`
`- Page 7 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 10
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 10
`
`

`

`DETAILED DESCRIPTION
`
`[0019]
`
`Implementations of the present invention extend to systems, methods, and
`
`computer program products configured to pair a traditional personal identification
`
`number (“PIN”), or other personal
`
`identifier, with a social security number for
`
`verifying that an individual is the ownerof a social security number. In particular, the
`
`ownerof the social security number can link a PIN,or other identifier, to their social
`
`security numberin a data storage system.
`
`If the ownerof a social security numberis
`
`required to verify their identity, the institution requiring the identity verification can
`
`request that the individual submit their PIN, or other personal information, in order to
`
`verify that it is paired with the social security number. If the PIN matches the social
`
`security number/PIN pairing in the data storage system, the institution can be notified
`
`that the identity of the individual is valid, and/or that the individual indeed ownsthe
`
`social security number(s).
`
`[0020]
`
`As will be appreciated more fully herein, implementations of the present
`
`invention include a number of components and mechanisms for securely storing as
`
`well as verifying social security number associations.
`
`In one implementation, for
`
`example, a computer system (e.g., a data storage system) is configured generally for
`
`storing social security number pairing with PIN or other personal data. For example,
`
`the flowchart of Figure 1 indicates that the computer system can perform a step 100 of
`
`at least receiving one or more social security numbers. These social security numbers
`
`can be provided through any electronic or manual transmission means. The computer
`
`system is thus configured at least to store the social security number.
`
`[0021]
`
`The computer system can also be configured to store a linked association
`
`of the social security number with data that is at least intended to be paired with a
`
`PIN. One will appreciate, of course, that this may or may not be the same computer
`
`- Page 8 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 11
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 11
`
`

`

`system, for added security benefits. or example, Figure 1 also shows that the
`
`method performed at the computer system can comprise a step for receiving one or
`
`more personalidentifiers.
`
`[0022]
`
`Generally, these identifiers will be paired with a particular social security
`
`number, and can include (but are not limited to) a traditional PIN (e.g., a series of
`
`numbers), and a password (e.g., any series of alpha-numeric characters).
`
`This
`
`personal data can further include a challenge/response mechanism, such as an answer
`
`to question, where the individual provides the answer to a question. The personal data
`
`can still further include various biometric data, such as any one or more of a finger
`
`print, an iris/retinal scan, a DNA sample, or the like. The personal data to be
`
`associated with a social security numbercanyetstill further include a digital photo.
`
`[0023]
`
`The computer system can then store a linked association between the
`
`social security number and the personal data. For example, Figure 1 showsthat the
`
`method can include a step 120 for linking the social security numbers to the personal
`
`identifiers numbers.
`
`In some cases, for example, the computer system maystore this
`
`information in a relational database for which access is limited to a small numberof
`
`administrative personnel.
`
`In other cases, the computer system may store the social
`
`security number in one database with initial account information, and relate that
`
`database information to another computer system on a local network that stores
`
`associated personal biometric data. For example, the method of Figure 1 further
`
`includes a step 130 for storing the linked association of the social security numbers
`
`and the personal identifiers securely.
`
`In particular, one will appreciate upon reading
`
`the disclosure herein that verification of the social security number will require
`
`providing the linked association data (e.g., biometric data).
`
`- Page 9 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 12
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 12
`
`

`

`[0024]
`
`In some cases, the computer system (or another computer system) can also
`
`be configured to set up initial verifications for the social security number.
`
`For
`
`example, the computer system can be configured to receive initial verification, which
`
`includes, of course, the social security number, and can also include butis not limited
`
`to such information as a date of birth, a current or prior address, a current or prior
`
`employer address, or the like. For example, the computer system can be a bank
`
`teller’s personal computer that is linked to a mainframe. The mainframe can thus
`
`receive the social security information and basic date of birth information and so on.
`
`This information is then stored in the mainframe pursuant to receiving additional
`
`personal identification information for a linked association.
`
`[0025]
`
`One will appreciate that an individual can initially verify their identity and
`
`submit the PIN (or other personal data) through any one or more of a network
`
`interface, and an Interactive Voice Response (“IVR”) and/or Voice Response Unit
`
`(“VRU”).
`
`For example, an individual can verify their identity at
`
`the financial
`
`institution where trying to set up the account via in-person (or a local network
`
`interface). The individual can also verify their identity by submitting their personal
`
`data (PIN, biometric information) through a call center enabled with VRU/IVR for
`
`PIN or other personal data.
`
`[0026]
`
`In addition to the foregoing, implementations of the present invention can
`
`include one or more methods for securely granting access to an account by requiring
`
`verification of ownership of a social security number. As shown in Figure 2, for
`
`example, one method can include a step 200 of receiving one or more social security
`
`numbersfor verification. For example, a user submits their social security number as
`
`a means to obtain certain sensitive account information.
`
`In addition, Figure 2 shows
`
`that
`
`the method can include a step 210 for prompting the user for additional
`
`- Page 10 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 13
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 13
`
`

`

`information (this may be a separate step or part of the same step as with step 200). In
`
`such a case, the user might then submit a PIN or other biometric information.
`
`[0027]
`
`ASpreviously mentioned, one will appreciate that the user can submitthis
`
`information through any appropriate transmission means, potentially secured through
`
`any appropriate secure transmission protocols (e.g., on networks — HTTPS, SSL, TSL,
`
`etc.)
`
`In particular, the individual may submit the social security and/or personal
`
`identification information through any one or more of a wide area network website,
`
`IVR/VRUinterface, in-person or through a local area network website.
`
`[0028]
`
`Upon receipt of this information from the user and/or the account granting
`
`institution,
`
`the computer system can then verify ownership of the social security
`
`number. Thus, for example, Figure 2 shows that the method can include a step 220
`
`for comparing received additional information to a linked association with the social
`
`security number.
`
`In particular, the computer system can identify if the social security
`
`number is one that is stored or accessible to the computer system in some way, and
`
`then identify that the social security numberis linked to a particular association with
`
`personal
`
`identification information.
`
`If so linked,
`
`the computer system can then
`
`identify if such personal information was provided, and if so, whether it matches what
`
`is stored internally.
`
`[0029]
`
`The computer system can then provide a corresponding response to the
`
`user. For example, Figure 2 shows that the method can further include a step 230 for
`
`sending a response based on the comparison results. This can generally include the
`
`computer system responding over the same communication means used to transmit
`
`the social security numberand personalidentification information in the first instance.
`
`Of course, other return transmission means may be appropriate, including any wired,
`
`wireless, or hard copy communication means.
`
`- Page 11 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 14
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 14
`
`

`

`[0030]
`
`In general, the response provided by the computer system can include any
`
`one or more of information that there is a match, no match, or that the verification
`
`cannot be made with the current information (i.e., more information may be needed to
`
`complete the comparison).
`
`[0031]
`
`The embodiments of the present invention may comprise a special purpose
`
`or general-purpose computer including various computer hardware, as discussed in
`
`greater detail below. Embodiments within the scope of the present invention also
`
`include computer-readable media for carrying or having computer-executable
`
`instructions or data structures stored thereon. Such computer-readable media can be
`
`any available media that can be accessed by a general purpose or special purpose
`
`computer.
`
`[0032]
`
`By way of example, and not limitation, such computer-readable media can
`
`comprise RAM, ROM, EEPROM, CD-ROMorother optical disk storage, magnetic
`
`disk storage or other magnetic storage devices, or any other medium which can be
`
`used to carry or store desired program code meansin the form of computer-executable
`
`instructions or data structures and which can be accessed by a general purpose or
`
`special purpose computer. When information is transferred or provided over a
`
`network or another communications connection (either hardwired, wireless, or a
`
`combination of hardwired or wireless) to a computer, the computer properly views the
`
`connection as a computer-readable medium. Thus, any such connection is properly
`
`termed a computer-readable medium. Combinations of the above should also be
`
`included within the scope of computer-readable media.
`
`[0033]
`
`Computer-executable instructions comprise, for example, instructions and
`
`data which cause a general purpose computer, special purpose computer, or special
`
`purpose processing device to perform a certain function or group of functions.
`
`- Page 12 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 15
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 15
`
`

`

`Although the subject matter has been described in language specific to structural
`
`features and/or methodological acts, it is to be understood that the subject matter
`
`defined in the appended claims is not necessarily limited to the specific features or
`
`acts described above. Rather,
`
`the specific features and acts described above are
`
`disclosed as example forms of implementing the claims.
`
`[0034]
`
`The present invention may be embodied in other specific forms without
`
`departing from its spirit or essential characteristics. The described embodiments are
`
`to be considered in all respects only as illustrative and notrestrictive. The scope of
`
`the invention is,
`
`therefore,
`
`indicated by the appended claims rather than by the
`
`foregoing description. All changes which come within the meaning and range of
`
`equivalency of the claims are to be embraced within their scope.
`
`- Page 13 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 16
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 16
`
`

`

`Weclaim:
`
`CLAIMS
`
`1.
`
`In a computerized environmentin which a social security numberis used as
`
`a meansto verify a person’s identity in order to set up one or more accounts, one
`
`or more computer program products having computer-executable instructions
`
`stored thereon that, when executed, cause one or more processors to perform a
`
`method of securely storing the social security number in with a linked association
`
`to additional personal identification information, comprising the actsof:
`
`receiving one or more social security numbers;
`
`receiving one or more personalidentifiers;
`
`linking the one or more social security numbers to the one or more
`
`personal identifiers through one or more corresponding linked associations;
`
`and
`
`storing the one or more linked associations of the one or more social
`
`security numbers and the one or more personal identifiers securely, such that
`
`ownership of
`
`the one or more social security numbers
`
`is proven by
`
`presentation of the one or more personal identifiers.
`
`- Page 14 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 17
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 17
`
`

`

`2.
`
`In a computerized environmentin which a social security numberis used as
`
`a meansto set up one or more accounts, one or more computer program products
`
`having computer-executable instructions stored thereon that, when executed, cause
`
`one or more processors to perform a method of verifying ownership of the social
`
`security number based on the receipt and comparison of additional personal
`
`identification information, comprising the actsof:
`
`receiving one or more social security numbers for verification to open
`
`and/or access one or more accounts from one or more users;
`
`prompting the one or more users for additional personal information
`
`corresponding to the presented one or more social security numbers;
`
`comparing the received additional information to one or more linked
`
`associations for the received one or more social security numbers; and
`
`sending one or more responses to the one or more users based on a
`
`comparison of the received additional
`
`information to any results of the
`
`comparison.
`
`- Page 15 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 18
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 18
`
`

`

`ABSTRACT
`
`Implementations of the present invention include systems and methods for
`
`pairing a traditional personal identification number, or other personalidentifier, with a
`
`social security number pursuant at least in part to verifying that an individual is the
`
`owner of a social security number.
`
`In particular, the owner of the social security
`
`number can link a PIN, or other identifier, to their social security numberin a data
`
`storage system.
`
`If the owner of a social security number is required to verify their
`
`identity, the institution requiring the identity verification can request from the user
`
`and submit the person’s PIN, or other personal information, to a third-party granting
`
`system, in order to verify that it is paired with the social security number.
`
`If the PIN
`
`matches the social security number/PIN pairing in the data storage system,
`
`the
`
`institution can be notified that the individual is verified, and/or indeed ownsthe social
`
`security number.
`
`KJBO0000006900V001.doc
`
`- Page 16 -
`
`Docket No. 14698.5
`IPR2020-00321
`Unified EX1009 Page 19
`
`WORKMANNYDEGGERAPROFESSIONAL
`
`CORPORATION
`
`
`
`ATTORNEYSATLAW1000EAGLEGATETOWER60EAST
`
`SOUTHTEMPLE
`
`
`
`
`
`
`
`SALTLAKECITY,UTAH84111
`
`
`
`
`
`IPR2020-00321
`Unified EX1009 Page 19
`
`

`

`Filing Date:
`
`Title of Invention:
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`Electronic Patent Application Fee Transmittal
`
`
`
`Provisional Filing Fees
`
`aminrc|com]rn |
`
`Basic Filing:
`
`Miscellaneous-Filing:
`
`Patent-Appeals-and-Interference:
`
`Post-Allowance-and-Post-lssuance:
`
`Extension-of-Time:
`
`IPR2020-00321
`Unified EX1009 Page 20
`
`IPR2020-00321
`Unified EX1009 Page 20
`
`

`

`men|rTae] |
`
`Miscellaneous: Total in USD ($)
`
`IPR2020-00321
`Unified EX1009 Page 21
`
`IPR2020-00321
`Unified EX1009 Page 21
`
`

`

`Electronic AcknowledgementReceipt
`
`Application Number:
`
`60747381
`
`Confirmation Number:
`
`8042
`
`
`
`Title of Invention:
`
`SECURING SOCIAL SECURITY NUMBERS WITH PINS
`
`rwin
`
`a e
`
`e
`
`Paymentinformation:
`
`
`
`File Listing:
`
`
`
`Document
`
`as
`
`
`
`Number Pocument Peseription|FileName|_ Size( ve non _AA
`Unified EX1009 Page 22
`
`.
`Fil
`
`.
`
`Bytes
`
`Pages
`
`Uv U=UU
`
`IPR2020-00321
`Unified EX1009 Page 22
`
`

`

`|a -
`
`on.pdf
`
`pep ee _
`ee
`
`in due course.
`
`Warnings:
`
`Information:
`
`Warnings:
`
`Information:
`
`Warnings:
`
`Information:
`
`Multipart Description
`
`Fee Worksheet (PTO-875)
`
`fee-info.pdf
`
`8115
`
`Total Files Size (in bytes);
`
`111579
`
`This AcknowledgementReceipt evidencesreceipt on the noted date by the USPTOofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable.
`It serves as evidenceof receipt
`similar to a Post Card, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`If a new application is being filed and the application includes the necessary componentsfora filing date (see
`37 CFR 1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date
`shown on this AcknowledgementReceipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`If a timely submission to enter the national stage of an international application is compliant with the conditions
`of 35 U.S.C. 371 and other applicable requirements a Form PCT/DO/E0O/903 indicating acceptance of the
`application as a national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt,
`
`IPR2020-00321
`Unified EX1009 Page 23
`
`IPR2020-00321
`Unified EX1009 Page 23
`
`

`

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Page 1 of 2
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address: COMMISSIONER FOR PATENTS
`P.O. Box 1450
`Alexandria, Vuginia 22313-1450
`www.uspto.gov
`
`60/747,381
`
`05/16/2006
`
`Brian R. Gephart
`
`14698.5
`
`22913
`WORKMAN NYDEGGER
`(F/K/A WORKMAN NYDEGGER& SEELEY)
`60 EAST SOUTH TEMPLE
`1000 EAGLE GATE TOWER
`SALT LAKE CITY, UT 84111
`
`CONFIRMATION NO. 8042
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket