throbber
(12) United States Patent
`Chaganti et al.
`
`(54) ONLINE REPOSITORY FOR PERSONAL
`INFORMATION
`
`(*) Notice:
`
`7
`
`(75) Inventors: Naren Chaganti, McLean, VA (US);
`Sitapathi Rao Chaganti, McLean, VA
`(US); Damayanti Chaganti, McLean,
`VA (US)
`ti
`C
`P
`Soft
`(73) Assi
`signee: Pennar Solware uorporation,
`Alexandria, VA (US)
`Subject to any disclaimer, the term of this
`p lSh G. adjusted under 35
`a --
`y
`yS.
`(21) Appl. No.: 09/478,796
`(22) Filed:
`Jan. 7, 2000
`(51) Int. Cl." .......................... H04L 9/32; G06F 15/177
`(52) U.S. Cl. ....................... 713/166; 13,657,319.
`713/201; 707/9; 709/225
`(58) Field of Search ................................. 713/165-167,
`713/170, 200-202; 70'''',".
`Ref
`Cited s as
`s
`CS
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`7/1983 Stambler
`RE31,302 E
`9/1990 Smith ............................ 707/9
`4.956,769 A
`5,144,557 A * 9/1992 Wang et al. ...
`... 707/9
`5,241,466 A * 8/1993 Perry et al. .................... 705/1
`5,267,314. A 11/1993 Stambler
`5,276,901. A * 1/1994 Howell et al. ................. 707/9
`5,428,778 A 6/1995 Brookes
`5,524,073. A 6/1996 Stambler
`5,555,303 A 9/1996 Stambler
`5,621,727 A
`4/1997 Vaudreuil .................... 370/60
`5,644,711 A * 7/1997 Murphy ...................... 713/201
`5,646,998. A
`7/1997 Stambler
`5,710,578 A * 1/1998 Beauregard et al. ........ 345/429
`5,793,302 A
`8/1998 Stambler
`5.936,541. A 8/1999 Stambler
`5.974,148 A 10/1999 Stambler
`6,005,939 A * 12/1999 Fortenberry et al. .......... 705/76
`
`USOO6845448B1
`(10) Patent No.:
`US 6,845,448 B1
`(45) Date of Patent:
`Jan. 18, 2005
`
`s
`
`s
`
`s
`
`s
`
`s
`
`6/2000 Rozen et al. ............... 707/9 X
`6,073,106 A
`6,148,342 A 11/2000 Ho ...................
`... 709/225
`6,321,334 B1
`11/2001 Jerger et al. ................ 713/200
`OTHER PUBLICATIONS
`Moozakis, Chuck “Internet Printing Takes Hold' dated Sep.
`29, 1998, online article, Retrieved from the Internet on Aug.
`10, 2000, URL:http://www.internetwork.com/news0998/
`news092998-1.htm.
`Rolf Blom, Mats Näslund, and Goran Selander, Object
`stily and Personal Information Management, Apr. 27,
`Kelso, “Final Report on the National Integration Resource
`Center Task Force- The Lisle Report,” Apr. 19, 1999,
`retrieved on Sep. 14, 2000 from http://www.ojp.usdoj.gob/
`integratedjustice/hsle-fn.h
`Integrated uStice/hSle-in.htm.
`Kendall, et al., “Privacy Impact ASSessment for Justice
`Information Systems,” Working Paper, Draft, Jul. 5, 2000
`retrieved on Sep. 14, 2000 from http://www.ojp.usdoj.gov/
`integratediustice/piajis.htm, pp. 30–31.
`Gardner, “Office of Justice Programs, Integrated Justice
`Privacy Initiative,” Apr. 12, 2000, retrieved on Sep. 14, 2000
`from http://www.ojp.usdoj.gov/integratediustice/bp3.htm.
`(List continued on next page.)
`Primary Examiner Justin T. Darrow
`(57)
`ABSTRACT
`Method and System for gathering, Storing personal informa
`tion on a Server computer and releasing Such information to
`authorized requesters. Several types of information are
`Stored for release to different entities with appropriate autho
`rization. Any modifications or updates are automatically
`notified to any authorized requesters. The requester option
`ally provides information about to whom and where to
`notify changes or updates. Such change or update notifica
`tion is made by Sending a notification to an electronic
`mailbox. A frequent unauthorized requester of information is
`tagged as "junk' requester, to whom no further information
`will be released.
`
`3 Claims, 4 Drawing Sheets
`
`
`
`DATABASE INTERFACEMODULEEXECUTES
`AQUERYMADEBYTHEREQUESTOR
`STATSTICALORREPORTING FUNCTIONS
`AREOPTIONAYEXECUTED
`
`222
`
`RETREYED INFORMATIONSSENTSECURELY
`TRANSMITTED TOTHEREQUESTORREQUESTOR h-224
`SCHARGEDAFEE
`
`USERCHANGES ARENOTIFIED TO ANY
`ENTITESDESIGNATED BY THE USER
`
`ANAUDITTRAL OFALACCESSESS
`MANTANEDANDRECORDEON
`THEDATAEASE
`
`226
`
`228
`
`Instacart, Ex. 1044
`
`1
`
`

`

`US 6,845.448 B1
`Page 2
`
`OTHER PUBLICATIONS
`
`Cavoukian, et al., “Privacy Design Principles for an Inte
`grated Justice System,” Working Paper, Apr. 5, 2000,
`retrieved on Sep. 14, 2000 from http://www.ojp.usdoj.gov/
`integratediustice/pdpapril.htm.
`J. Michael Murphy, “Privacy Protection-A New Begin
`ning?” 21st International Conference on Privacy and Per
`sonal Data Protection, Sep. 13-14, 1999, retrieved on Sep.
`14, 2000 from http://www.pco.org.hk/conproceed.html.
`Ann Cavoukian, “Privacy and Biometrics,” 21st Interna
`tional Conference on Privacy and Personal Data Protection,
`Sep. 13–14, 1999, retrieved on Sep. 14, 2000 from http://
`www.pco.org.hk/conproceed.html.
`Lorrie Faith Cranor, “Agents of Choice: Tools That Facili
`tate Notice and Choice About Web Site Data Practices,” 21st
`International Conference on Privacy and Personal Data
`Protection, Sep. 13–14, 1999, retrieved on Sep. 14, 2000
`from http://www.pco.org.hk/conproceed.html.
`Austin Hill, “The Privacy Risks of Public Key Infrastruc
`tures, 21st International Conference on Privacy and Personal
`Data Protection”, Sep. 13-14, 1999, retrieved on Sep. 14,
`2000 from http://www.pco.org.hk/conproceed.html.
`Armgard Von Reden, Data Protection Activities in the
`Private Sector, 21st International Conference on Privacy and
`Personal Data Protection, Sep. 13-14, 1999, retrieved on
`Sep. 14, 2000 from http://www.pco.org.hk/conproceed.html.
`Nigel Waters, “Re-Thinking Information Privacy-AThird
`Way in Data Protection?”, 21st International Conference on
`Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`Hansjuergen Garstka, “The International Working Group on
`Data Protection in Telecommunications: Common Positions
`Adopted on Selected Emerging Global Issues,” 21st Inter
`national Conference on Privacy and Personal Data Protec
`tion, Sep. 13-14, 1999, retrieved on Sep. 14, 2000 from
`http://www.pco.org.hk/conproceed.html.
`Deborah Hurley, “A Whole World in One Glance: Privacy as
`a Key Enabler of Individual Participation in Democratic
`Governance”, 21st International Conference on Privacy and
`Personal Data Protection, Sep. 13-14, 1999, retrieved on
`Sep. 14, 2000 from http://www.pco.org.hk/conproceed.html.
`Robert Gellman, “Public Registers and Privacy: Conflicts
`with Other Values and Interests,” 21st International Confer
`ence on Privacy and Personal Data Protection, Sep. 13-14,
`1999, retrieved on Sep. 14, 2000 from http://www.pco
`.org.hk/conproceed.html.
`Blair Stewart, “Five Strategies for Addressing Public Reg
`ister Privacy Problems,” 21st International Conference on
`Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`David Banisar, “Privacy and Data Protection Around the
`World,” 21st International Conference on Privacy and Per
`sonal Data Protection, Sep. 13-14, 1999, retrieved on Sep.
`14, 2000 from http://www.pco.org.hk/conproceed.html.
`Alfred Bullesbach, “Data Protection and Privacy at a Global
`Enterprise,” 21st International Conference on Privacy and
`Personal Data Protection, Sep. 13-14, 1999, retrieved on
`Sep. 14, 2000 from http://www.pco.org.hk/conproceed.html.
`
`Anne Carblanc, “Activities of the OECD-1997–2000–
`Global Privacy Protection Builds Trust in Electronic Com
`merce Global Networks', 21st International Conference on
`Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`Philip E. Agre, “Imagining Surveillance: Notes on 1984 and
`Enemy of the State,” 21st International Conference on
`Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`Roger Clarke, “Person-Location and Person-Tracking:
`Technologies, Risks and Policy Implications,” 21st Interna
`tional Conference on Privacy and Personal Data Protection,
`Sep. 13–14, 1999, retrieved on Sep. 14, 2000 from http://
`www.pco.org.hk/conproceed.html.
`Simon Davies, “Big Brother at the Box Office-Electronic
`Visual Surveillance and the Big Screen,” 21st International
`Conference on Privacy and Personal Data Protection, Sep.
`13–14, 1999, retrieved on Sep. 14, 2000 from http://www.
`pco.org.hk/conproceed.html.
`Paul, F. Kendall, “Gathering, Analysis and Sharing of Crimi
`nal Justice Information by Justice Agenices: The Need for
`Principles of Responsible Use,” 21st International Confer
`ence on Privacy and Personal Data Protection, Sep. 13-14,
`1999, retrieved on Sep. 14, 2000 from http://www.pco.
`org.hk/conproceed.html.
`Souheil El Zein, “Reconciling Data Protection Regulations
`with the Requirements of Judicial and Police Co-operation,”
`21st International Conference on Privacy and Personal Data
`Protection, Sep. 13–14, 1999, retrieved on Sep. 14, 2000
`from http://www.pco.org.hk/conproceed.html.
`Bart De Schutter, International Police Co-operation and
`Privacy Protection, 21st International Conference on Pri
`vacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`David H. Flaherty, “Balancing Open Government and Pri
`vacy Protection,” 21st International Conference on Privacy
`and Personal Data Protection, Sep. 13-14, 1999, rerieved on
`Sep. 14, 2000 from http://www.pco.org.hk/conproceed.html.
`Michel Gentot, "Access to Information and Protection of
`Personal Data,” 21st International Conference on Privacy
`and Personal Data Protection, Sep. 13-14, 1999, retrieved
`on Sep. 14, 2000 from http://www.pco.org.hk/conproc
`eed.html.
`Bruno Baeriswyl and Peter Heinzmann, “Privacy Audits
`with External Experts-Cooperation or Attack?", 21st Inter
`national Conference on Privacy and Personal Data Protec
`tion, Sep. 13-14, 1999, retrieved on Sep. 14, 2000 from
`http://www.pco.org.hk/conproceed.html.
`Stephen Wolley, “Data Security and Privacy Audits Adding
`Value to the Organisation,” 21st-International Conference
`on Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`David Flaherty, “How to Do a Privacy and Freedom of
`Information Act Site Visit,” 21st International Conference
`on Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`
`2
`
`

`

`US 6,845.448 B1
`Page 3
`
`Jane Elizabeth Kirtley, “Privacy and the News Media-A
`Question of Trust, or of Control,” 21st International Con
`ference on Privacy and Personal Data Protection, Sep.
`13–14, 1999, retrieved on Sep. 14, 2000 from http://www.
`pco.org.hk/conproceed.html.
`Raymond Wacks, “Privacy Reconceived: Personal Informa
`tion and Free Speech,” 21st International Conference on
`Privacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`Pamela W.S. Chan, “Consumer Rights and Electronic Com
`merce,” 21st International Conference on Privacy and Per
`sonal Data Protection, Sep. 13-14, 1999, retrieved on Sep.
`14, 2000 from http://www.pco.org.hk/conproceed.html.
`Alan Westin, “Consumers, E-Commerce, and Privacy: US,
`UK and Germany,” 21st International Conference on Pri
`vacy and Personal Data Protection, Sep. 13-14, 1999,
`retrieved on Sep. 14, 2000 from http://www.pco.org.hk/
`conproceed.html.
`
`Jon Bing, “Data Protection, Jurisdiction and the Choice of
`Law,” 21st International Conference on Privacy and Per
`sonal Data Protection, Sep. 13-14, 1999, retrieved on Sep.
`14, 2000 from http://www.pco.org.hk/conproceed.html.
`Graham Greenleaf, “IP, Phone-Home ECMS, C-tech, and
`Protecting Privacy Against Surveillance by Digital Works,”
`21st International Conference on Privacy and Personal Data
`Protection, Sep. 13–14, 1999, retrieved on Sep. 14, 2000
`from http://www.pco.org.hk/conproceed.html.
`Privacy Commissioner's Office-What's New, retrieved on
`Sep. 14, 2000 from http://www.pco.org.hk/old press.html,
`pp. 1-3.
`Naren Chaganti, “Integrating Electronic Message Handling
`Systems with Databases: A Security Perspective', Masters
`Thesis, May 1992, The University of Texas at Arlington,
`Arlington, TX.
`
`* cited by examiner
`
`3
`
`

`

`U.S. Patent
`
`Jan. 18, 2005
`
`Sheet 1 of 4
`
`US 6,845,448 B1
`
`USER
`COMPUTER
`
`104
`
`108
`
`
`
`C d
`DATABASE
`
`
`
`REQUESTER
`
`
`
`REQUESTER
`COMPUTER
`
`
`
`
`
`
`
`
`
`
`
`
`
`OO
`
`N
`
`SERVER COMPUTER
`SECURITYMODULE
`20
`DATABASE INTERFACE
`MODULE
`|STATSTCSMODULE
`
`130
`40
`
`O
`
`ce
`PROGRAMS
`O7
`
`6
`REPORT GENERATION
`18 MODULE
`OTHERMODULESOPERATING
`SYSTEM.COMMUNICATIONLAYERS
`
`50
`
`Aig. 1
`
`4
`
`

`

`U.S. Patent
`
`Jan. 18, 2005
`
`Sheet 2 of 4
`
`US 6,845,448 B1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`INTIALIZATIONBYA
`PERSONAL INFORMATION
`REPOSITORY SERVICE PROVIDER
`|PIRSP)
`
`200
`
`AUSERACCESSES THE PRSP
`WEBSITE PRSPSERVERCOMPUTER
`ESTABLISHES ASECURECONNECTION
`WITH THE USERS COMPUTER
`
`
`
`USERESTABLISHES ANACCOUNT
`WITH THESERVER COMPUTER
`
`204
`
`USERISASSIGNED ANACCOUNT
`NUMBER WHICH ISSTORED BY
`THESERVER COMPUTERN
`THEDATABASE
`
`USERACCESSISRECORDED IN
`THEDATABASEFOR AUDITTRAL
`
`208
`
`USERENTERS PERSONAL INFORMATION
`AND OPTIONALLYELECTSAPAYMENT
`PAN
`
`fig. 2a
`
`5
`
`

`

`U.S. Patent
`
`Jan. 18, 2005
`
`Sheet 3 of 4
`
`US 6,845,448 B1
`
`
`
`DATABASENTERFACEMODULEEXECUTES
`A QUERYMADEBYTHEREQUESTOR
`STATISTICALORREPORTING FUNCTIONS
`AREOPTIONALLY EXECUTED
`
`RETRIEVED INFORMATIONSSENTSECURELY
`TRANSMITTED TO THEREQUESTOR REQUESTOR
`SCHARGEDAFEE
`
`USERCHANGES ARENOTIFIED TO ANY
`ENTITIES DESIGNATED BY THE USER
`
`ANAUDITTRAL OFALLACCESSESS
`MANTAINED ANDRECORDED IN
`THEDATAEASE
`
`Aig. 2b
`
`222
`
`224
`
`226
`
`228
`
`6
`
`

`

`U.S. Patent
`
`Jan. 18, 2005
`
`Sheet 4 of 4
`
`US 6,845,448 B1
`
`
`
`ACCOUNTSETUP
`
`? 800
`
`SUBMT
`
`30
`
`Fig. 3
`
`7
`
`

`

`1
`ONLINE REPOSITORY FOR PERSONAL
`INFORMATION
`
`US 6,845,448 B1
`
`FIELD OF THE INVENTION
`This invention is related in general to electronic informa
`tion repositories, and in particular, to a System and method
`for gathering, Storing and disbursing personal information to
`authorized entities via a communication network.
`
`25
`
`BACKGROUND
`Entities that do businesses on the Internet frequently
`request visitors to their sites to fill out forms with demo
`graphic and other information. Web sites such as the New
`15
`York Times web site that provide free access to news, sites
`such as the Adobe Corporation web site that provide free
`downloadable Software, Sites that provide free magazine
`Subscriptions, Sites that provide free or paid Services Such as
`a free e-mail account, free Internet access, and Similar
`others, ask a user to fill out a form that includes a user name,
`contact information, and the like. In Some cases the forms
`are So lengthy that repeated requests for Such information
`cause an annoyance to a user, who would rather get the
`information or download the Software than take the time to
`fill out a lengthy form. The providers of these forms,
`however, would like to have as much information about the
`user as possible, So that they could obtain a profile of the
`type of perSons that are interested in their products or
`services. It would be useful to both the user and the provider
`if the user can Store all his information at a single location
`and authorize the release of Such information to any person
`or entity.
`Some other examples of entities that request Such per
`Sonal information include credit Verification agencies acting
`on behalf of lenders, utility companies, landlords and the
`like, and information gathering entities Such as health insur
`ance companies, doctors/dentists offices, consumer or
`product Surveys, and magazine Subscriptions.
`40
`With the ubiquity of the public computer networks, com
`monly known as the Internet or the web, a new way of
`disseminating personal information has become possible.
`The meteoric rise of the Internet has enabled it to become a
`key application development platform. Notwithstanding the
`availability of these information networks, there is currently
`no method whereby a user can enter and Store his personal
`information at a single location and Selectively authorize it
`to be distributed to a number of entities. Therefore, there is
`a need for Such as System and method.
`Additionally, there is no method whereby the user can
`update or make changes to the personal information Stored
`at the Single location-whether it is a Single Server computer
`or a collection of Server computers comprising a distributed
`System-and cause the changes to be distributed to all
`perSons or entities that need to be notified. Accordingly,
`there is a need for Such a System and method.
`Further, there is a need for a System, which allows a
`classification of information according to a Security or other
`hierarchical class structure, and provide the classified infor
`mation to only those entities that have a need to know or are
`authorized by a person who owns the information.
`Moreover, there is a need for blocking unauthorized acceSS
`to Such personal information, while allowing access by
`authorized perSons with ease.
`Old methods of collecting and disbursing personal credit
`information required credit reporting agencies to gather and
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`disburse information about individuals and companies, and
`to disburse this information to entities that request Such
`information. In general, Such disbursement is performed
`after an individual authorizes the release of Such informa
`tion. While these companies gather credit information from
`Several Sources, they often provide incomplete or inaccurate
`information that is not verified by the user until a later date.
`Additionally, routine form-filling, designating personal pref
`erences Such as the user's likes and dislikes, providing
`finger-print, retina Scan, DNA sequences and other biometric
`information for later use, or responding to a Survey or a
`health questionnaire is not performed by these credit report
`ing agencies. These problems with the existing methods can
`be alleviated by the presented invention as described in the
`following.
`
`SUMMARY
`The present invention is directed toward a method and
`System for gathering, Storing personal information on a
`Server computer and releasing Such information to autho
`rized requesters. Several types of information are Stored for
`release to different entities with appropriate authorization.
`In one aspect, the present invention is directed toward a
`method of for automatically disbursing personal information
`belonging to a user to a requester that is authorized by the
`user by transmitting Said personal information from a Server
`computer operated by a Service provider, Said Server com
`puter coupled to a database, the method comprising the Steps
`of establishing an account for the user with the Server
`computer; assigning an identifier to the user, entering per
`Sonal information belonging to the user, Said personal infor
`mation comprising at least one of a plurality of information
`objects, assigning at least one of a plurality of Security levels
`to each information object, Storing in the database the user
`identifier, the information object and the security level
`assigned to the information object, receiving a request
`message from the requester, Said request message compris
`ing at least the user identifier; retrieving from the database
`the information object pertaining to the user identifier;
`Securely transmitting the information object to the requester.
`In a further aspect, the invention comprises the Steps of
`presenting an authorization by the requester; and Verifying
`the requester's authorization.
`Further, any modifications, updates, or changes are auto
`matically notified to any authorized requesters. The
`requester optionally provides information about to whom
`and where to notify changes, Such as address changes. Such
`change notification can be made by Sending a notification to
`an electronic mail box. In a preferred embodiment, a fre
`quent unauthorized requester of information can be tagged
`as “junk” requester, to whom no further information will be
`released.
`BRIEF DESCRIPTION OF THE DRAWINGS
`These and other objects, features and advantages of the
`present invention will be more readily understood in the
`following detailed description of the preferred embodiments
`and the appended claims with a reference to the drawings,
`where like numbers indicate like parts in the Several views
`shown, and in which:
`FIG. 1 depicts an architecture comprising a server com
`puter 100, a user computer 104 and a requester computer
`106 communicatively coupled to a communication network
`102;
`FIG. 2 is a flow chart of steps included in a preferred
`FIG. 3 is an illustrative web page for a user enrollment.
`embodiment; and
`
`8
`
`

`

`3
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`Referring to FIG. 1, a server computer 100 configured in
`accordance with the principles of the present invention is
`communicatively coupled to a communication network 102
`Such as the Internet. Also coupled to the communication
`network 102 are user 103 operating a user computer 104 and
`a requester 105 operating a requester computer 106.
`The server computer 100 illustratively comprises a micro
`processor Such as a Compaq(R) Alpha" microprocessor, a
`disk drive, a memory Such as a Semiconductor memory, and
`runs an operating system such as Windows-NTTM or Linux.
`The server computer 100 is additionally equipped with a
`data communications device Such as a 3-COMTM network
`card to connect to the to network 102. In general, the
`connection to the network 102 can be established via an
`Internet Service Provider (ISP) or a direct connection. In a
`preferred embodiment, the server computer 100 is connected
`to the network 102 via a high-speed connection Such as
`Digital Subscriber Line.
`The server computer 100 is configured to function as a
`Web Server. The Web Server is typically general-purpose
`computer Such as the Server computer running Software to
`interface with the Internet using Sockets. Commercial Sup
`pliers such as Netscape(R) Corporation of Sunnyvale, Calif.
`make available Such web server Software. Additionally, Such
`Web Server Software can also be downloaded and configured
`free of charge from Some Sources Such as Apache.
`Additional programs Such as Common Gateway Interface
`(CGI) programs 107 reside on the server computer. The CGI
`programs 106 provide for communication and interaction
`between a user computer 104 and the server computer 100
`via the network 102. These CGI programs 107, coupled with
`data communications Software programs, are configured to
`receive packets of messages from computers connected to
`the network 102, decipher the information in the packets,
`and act according to instructions provided in the packets
`within the constraints imposed by an administrator manag
`ing the server computer 100.
`In addition to performing the tasks of receiving and
`Sending packets of data from and to the computers con
`nected to the Internet, the CGI programs 107 are configured
`to perform other tasks Such as communicate with a database
`108 coupled to the server computer 100, and extract or store
`information in the database 108 according to the software
`instructions provided within the server computer 100 or in
`the packets received from the network 102. Persons skilled
`in the art can program these CGI programs 107 using
`programming tools and languages Such as C, C++, the JavaE)
`programming language, Perl and shell Scripts.
`In an embodiment of the invention, the database 108
`comprises a relational database management System,
`preferably, but not necessarily, with Software code to enable
`Java Database Connectivity. Examples of Such products
`include those marketed by the Oracle Corporation of
`Sunnyvale, Calif. It should additionally be noted that in an
`alternative embodiment the database 108 is not needed, or it
`could comprise Software programs executing on the Server
`computer 100.
`The server computer 100 is configured to receive request
`messages from the user computer 104 over the internet in the
`HyperText Transfer Protocol (HFTP), File Transfer Protocol
`(FrP) or any similar protocol used to transfer data, Video,
`Voice or a combination of these media. After analyzing the
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,845,448 B1
`
`4
`request messages, the Server computer 100 is configured to
`transmit in response messages that include “web pages” that
`are programmed in HyperText Markup Language (HTML)
`or a similar language.
`Embedded in these web pages are components Such as
`documents, Scripts, objects, and frames that are configured
`to display colorful graphical images on a display device
`coupled to the user computer 104. Persons skilled in the art
`know how to make web pages using programming lan
`guages or tools such as HTML, ColdFusionTM, Java(R), Java
`ScripTM, Active Server PagesTM, Dynamic HTML, the vari
`ous markup languages Such as Extensible Markup Language
`(XML), and similar others.
`The user computer 104 is equipped with suitable devices
`and programs to connect to the network 102. In alternative
`embodiments, the user computer 104 is other device capable
`of establishing a communication in conjunction with other
`Similar or dissimilar devices over a communication network
`such as the network 102. Examples of other commercially
`available digital interactive devices that are contemplated to
`function in place of the user computer 104 include a
`telephone, a WebTVTM device marketed by Microsoft Cor
`poration of Redmond, Wash.; a Palm Pilot'TM device mar
`keted by 3-COM Corporation of Santa Clara, Calif., or other
`Similar device; the device used in conjunction with the
`Wireless WebTM service from the Sprint Corporation of
`Westwood, Kans.; or a Wireless Access Protocol (WAP)-
`enabled device such as the device marketed by GDMotion
`.com used in conjunction with Wireless Internet service
`provided by companies Such as Phone.com and Supported by
`protocols such as Wireless Markup Language, Mobile Phone
`Markup Language. Such compatible wireless handset
`devices are manufactured by Nokia, Motorola, EricSSon, and
`other companies.
`In one embodiment, the user computer 104 is a digital
`interactive device Such as a personal computer comprising a
`processor Similar to a Pentium-IIIE microprocessor, a dis
`play device Such as a flat panel display or a CRT, a memory
`Such as Semiconductor memory, a Storage device Such as a
`disk drive, an input device Such as a keyboard, and a
`pointing device Such as a mouse. In other embodiments,
`there could be provided a microphone or other Speech input
`device and a voice or Speech recognizer coupled to the user
`computer 104, whereupon a user 103 could provide input to
`the user computer 104 using spoken word commands.
`Currently, Several commercial products are available
`either hardware or Software or a combination of both-that
`uS could be configured to perform Speech or Voice recogni
`tion of Spoken words to perform Several navigational func
`tions with respect to the web. An example is the product
`Dragon Dictate TM marketed by Dragon Systems, Inc. of
`Newton, Mass. In the following, the word “selection”
`includes clicking a mouse or other pointing device coupled
`to the user computer 104 at least once; typing at least one
`character on a keyboard; allowing for a timer to expire;
`Speaking at least one voice command into a microphone
`coupled to the user computer 104; or touching at least one
`area on a touch-Sensitive Screen and other equivalent meth
`ods.
`In the embodiments described below, a user 103 can
`navigate the network 102 using either a graphical or a
`text-based navigational Software. Additionally, in a pre
`ferred embodiment, the user computer 104 is configured to
`navigate the network 102 via a browser such as Internet
`ExplorerTM marketed by Microsoft Corporation of
`Redmond, Wash. OperaTM, available at is a browser config
`ured to enable viewing XML documents. Other browsers
`
`9
`
`

`

`S
`Such as virtual reality browsers can be used to obtain a
`three-dimensional experience of the network 102. An
`example of a text-based browser can be found in the
`Software program Lynx, which is available free of charge.
`The requester computer 106 comprises a processor Such
`as a Pentium(E) microprocessor, a memory Such as Semicon
`ductor memory, a storage device Such as a hard drive, and
`optionally, a display device such as a CRT or an LCD
`display, a communications interface device Such as a net
`work card to enable connection to the network 102 either
`directly or via a Service Provider. In alternative
`embodiments, the requester computer 106 could be a Java TM
`Chip bled terminal device Such as a printer directly coupled
`to the Internet using a protocol Such as the Internet Printing
`Protocol, so that information objects could be directly down
`loaded and printed on the printer upon transmission by the
`server computer 100. Preferably, in such cases, thesis
`equipped in the requester computer 106 additional Software
`Such as handshake protocol Software to ensure a safe deliv
`ery of information objects.
`In a preferred embodiment, the invention described herein
`is implemented principally on the server computer 100 and
`the user 103 interacts with the server computer 100 via a
`browser program executing on the user computer 104.
`Similarly, the requester 105 also interacts with the server
`computer 100 via the requester computer 106.
`I. Gathering, Updating and Storing Personal
`Information
`Referring to FIG. 2, the steps included in a preferred
`embodiment of the invented System are described. During an
`initialization step (step 200), in a preferred embodiment, a
`Personal Information Repository Service Provider (PIRSP)
`operates the server computer 100. In alternative
`embodiments, there is no Service provider Such as the
`PIRSP; and there are other methods of providing such
`Service, Such as establishing a personal web site for each
`user 103, Said personal web site comprising information that
`can be accessed only by an authorized requester 105 in a
`Secure manner; establishing a personal database coupled
`either directly to the Internet or accessible via the Internet or
`other communication network, or retrieving information
`Stored elsewhere manually or in an automatic fashion.
`Preferably, the PIRSP makes it known to a user 103 that
`it provides a trusted information repository Service. In
`preferred and alternative embodiments, the PIRSP
`45
`announces that its Services are available free, or for a fee,
`and in the latter case, the fee is calculated based on a per
`transaction basis, or on a Subscription basis, either from
`users that Store information or from entities that request Such
`information. Other embodiments comprise direct or Vicari
`ous payment methods for utilizing the Services provided by
`the PIRSP. These payment methods include an agreement
`between the PIRSP and the user 103 to generate additional
`or alternative sources of revenue for the PIRSP via
`advertisements, referrals, introductions, chain marketing
`methods and the like.
`In this application, any piece of information, however
`Small in granularity or however agglomerated, is referred to
`as an “information object.” Information objects can be
`implemented in an object-oriented manner; for example,
`each tuple or a field could be implemented as an object, a
`data Structure or in any other manner known to perSons
`skilled in the art.
`Configuring the Database
`In a preferred embodiment, the database 108 is a distrib
`uted database comprising several components (not shown)
`
`25
`
`35
`
`40
`
`50
`
`55
`
`60
`
`65
`
`US 6,845,448 B1
`
`15
`
`6
`Such as transaction manager, concurrency controller,
`memory manager, or a query optimizer. The database 108 is
`distributed over a large geographical area at Several nodes,
`preferably by partitioning the tables and/or the tuples in each
`node according to the needs of either the requesters or of the
`users. The tables or the tuples can be partitioned either
`Vertically or horizontally to enable fast and easy local
`access. In alternative embodiments, the database 108 is
`located at a single place.
`In the following, a relational database model comprising
`Sets of tuples, meta-data definitions for the tuples, and for
`other parts of the database organizational Schema are
`described. It should be noted, however, that while a rela
`tional database model is described in the preferred
`embodiment, in alternative embodiments other methods of
`data definition, which are known to perSons skilled in the art,
`are used. Preferably, the database 108 is configured to
`compri

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket