InvestorsHub Logo
Followers 33
Posts 1344
Boards Moderated 0
Alias Born 01/30/2016

Re: AZresident post# 192027

Monday, 11/20/2017 3:43:24 PM

Monday, November 20, 2017 3:43:24 PM

Post# of 235061
LOL, go ahead, start naming them...

Here's a VISUAL PROCESS Diagram (the actual documentation included in the complaint)...

https://search.rpxcorp.com/litigation_documents/12021127#page=5

ANDDDD...

Has anyone Read the 698 patent? If you did, your argument collapses in on itself.

I have.

It's a VERY LONG and esoteric read, but very interesting nonetheless.

http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=8&f=G&l=50&co1=AND&d=PTXT&s1=8,484,698&OS=8,484,698&RS=8,484,698

DESCRIPTION OF THE PREFERRED EMBODIMENT

I like this specific part (talk about covering your AUTHentication bases !!!)

This is in contradistinction to present authentication processes as the out-of-band security network 40 is isolated from the corporate network 38 and does not depend thereon for validating data. The first shows a biometric validation which, in this case, is in the form of voice recognition and is within voice network 42. While voice recognition is used herein, it is merely exemplary of many forms of recognizing or identifying an individual person. Others include, but are not limited to fingerprint identification, iris recognition, retina identification, palms recognition, and face recognition. Each of these are similar to the first embodiment in that these are a requirement for monitoring the particular parameter of the individual person; including the parameter to a mathematical representation or algorithm therefore; retrieving a previously stored sample (biometric data), thereof from a database and comparing the stored sample with the input of the accessor.