throbber
FILE HISTORY
`
`US 6,088,802
`
`PATENT:
`
`6,088,802
`
`INVENTORS: Bialick. William P.
`
`Sutherland, Mark J.
`
`Dolphin Peterson, Janet L.
`
`Rowland, Thomas K.
`
`Skeba, Kirk W.
`
`Housley, Russell D.
`
`TITLE:
`
`Peripheral device with integrated
`security functionality
`
`APPLICATION
`NO:
`FILED:
`
`US1997869305A
`04 JUN 1997
`
`ISSUED:
`
`11 JUL 2000
`
`COMPILED:
`
`03 OCT 2016
`
`Toshiba_Apricorn 1003-0001
`Toshiba_Apricorn 1003-0001
`|PR2018-01067
`IPR2018-01067
`
`

`

`
`
`ISSUECMSSIFICATION
`
`S E HIAL
`'INUM BER
`
`FATE NT
`N U MB EH
`
`_
`
`
`-'-'-.':,"_._'_..1_.
`
`Z'A-_,._..
`..fII-INGDAIE GM 7‘3
`
`“"i‘l'JI'JNTi[i'.||..r1|\n’,i fumvr
`\IEHII—‘ugr;
`
`.
`
`'
`
`:
`
`""’-=l-'CI.'""TEfii'J
`UE-IFTlF'lE'IF
`
`I'~'I':'|'-'|_I[I'_'Zri".'l ?I'.II\!FII=3
`
`_ mg;ilk/”JO
`
`PURE Iliil‘! FII. If‘iiii
`
`3..
`
`I {IE-NW -'-:B-I’-‘|.‘|
`
`|
`
`'
`
`.'I':-
`
`|
`
`'L
`
`'
`
`’- ""' ‘
`
`Fallon prlnnlydllnad
`aauso “Ewan-urns
`
`.
`
`if
`
`'
`
`-"I'|.‘I.'i
`
`“\"l'i...
`
`-
`
`‘le:I:-I.|J:"l
`
`l".
`
`I-"JHI'I'I'J't'l!'-JI-‘II_J.'!"':'
`
`PARTS OF APPLICATION
`FILED SEPARATELY
`NOTICE OF ALLOWANCE mILan
`
`I
`
`__
`
`.
`
`.
`
`Asslstanl Examiner
`
`U.B.DEPT. 090mm! mum—ML -
`
`g. g 59
`..-,_.
`M 1
`“mine,
`cLAIMs ALLowEn
`
`Tatar Claims
`
`.
`
`Print Clglyn
`
`DRAWING
`
`LYVJ'IUA
`#FHMAFIY EXAMINER
`
`Sheets Drwg. Flgs.Drwg_.
`7
`
`PflntFig
`
`#39188“: FEE [N m.
`(Rev. WI
`w 52%
`-
`.
`-
`-
`
`FormalDrawingsthnlfbfitmfla
`
`Toshiba_Apricorn 1003-0002
`Toshiba_Apricorn 1003-0002
`|PR2018-01067
`IPR2018-01067
`
`

`

`6,088,802
`
`. PERIPHERAL DEVICE WITH INTEGRATED SECURITY
`FUNCTIONALITY
`
`Transaction History
`
`
`
`
`03—12-1998
`
`
`tion
`'
`
`
`
`
`06 04-199?
`
`
`Workflow - Drawings Finished
`
`
`
`06 04-1997
`Workflow - Drawin ; Matched with File at Contractor
`
`
`
`06—04» 1 997
`
`
`Workflow - Drawings Received at Contractor
`
`
`Initial Exam Team nn
`0?- 1 4- l 997
`
`
`08-07- 1991l
`
`
`IFW Scan & PACR Auto Security Review
`
`11-04-1997 Notice Mailed--Agplication Incomplete-Filing Date Assigned
`03—05-1998 Anglication Is Now CornElete
`A . ulication Dis natched from OIPE
`03-12-1998
`
`
`
`
`
`
`. lication Dispatched from OIPE
`
`
`
`Case Docketed to Examiner in GAU
`04-07-1998
`
`Information Disclosure Statement IDS Filed
`08-15-1998
`
`
`
`
`Information Disclosure Statement IDS Filed
`
`
`
`10-03.1993
`Information Disclosure Statement (IDS) Filed
`
`Information Disclosure Statement (IDS! Filed
`Non-F inal Rejection
`Mail Non-Final Re'ection
`2-11-1993
`03-15—1999
`Res onse after Non—Fina] Action
`
`03-18-1999
`Su
`lemental Response
`
`
`03-25-1999 Date Forwarded to Examiner
`
`IDS Filed
`0380—1999
`Information Disclosure Statement
`
`03-30-1999
`Information Disclosure Statement (IDS) Filed
`
`
`Date Forwarded to Examiner
`04-01-1999
`
`Mai] Notice of Allowance
`06-0?~l999
`
`
`06-07-1999 Notice of Allowance Data Verification Completed
`06—23-1999
`Workflow - Drandn 5 Received at Contractor
`
`Workflow - Drawin 3 Sent to Contractor
`06-24- I999
`
`09- l 3- I 999
`Workflow - Incoming Corresgondence - Finish
`
`09—13-1999
`Workflow- Incomin Cortes ondence- Be ‘11
`I
`09-13-1999
`Information Disclosure Statement tIDS} Filed
`
`
`Informatiori Disclosure Statement (IDS) Filed
`| 09-13-1999
`UnMatched Pa ets in Pubs
`09-13—1999
`
`
`09-13-1999
`UnMatched Papers in Pubs
`M Issue Fee Pa
`
`12-16—1999
`Mail Miscellaneous Communication to A
`
`12-16-1999
`Miscellaneous Communication to A licant « No Action Coant
`
`
`
`0 1 -04-2 000
`
`
`
`05-26-2000
`Workflow - Com lete WF Records for Drawi
`
`0548-2000
`
`
`
`
`
`lication Is Considered Ready for Issue
`
`
`
`Issue Notification Mailed
`06-23-2000
`
`
`07L
`
`1 1-2000 | Recordation of Patent Grant Mailed
`
`___L_——_._—
`1 06252003 | Correspondence Address Chan e
`ENTITY STATUS SET TO UNDISCOUNTED (INITIAL DEFAULT SEI IING
`‘ 0112-2012
`OR STATUS CHANGE}
`03-02-2015 Chan e in Power of Attorne Ma Include Associate POA}
`
`L 09-29-20}6
`03-02~2015 Correspondence Address Chan e
`
`Workflow - File Sent to Contractor
`ent Verified
`
`
`
`
`
`
`_ loos-1998
`
`w1
`
`File Marked Found
`
`|
`
`Toshiba_Apricorn 1003-0003
`Toshiba_Apricorn 1003-0003
`|PR2018-01067
`IPR2018-01067
`
`

`

`I
`
`PATENT APPLICATION
`IWIIIIIIWIIIWIIIIWIIIII
`[13869305
`—
`
`CONTENTS
`
`APPROVED FEL'IEEng [:1 _
`INITIALS
`
`._
`
`.
`
`I .— 1. Agrpficatfon _.L ‘
`
`
`
`Scum. huh-«IMF- |-
`
`
`
`Toshiba_Apricorn 1003-0004
`Toshiba_Apricorn 1003-0004
`|PR2018-01067
`IPR2018-01067
`
`

`

`
`CROSS REFERENCES] SUBCLASS
`
`I“ W“ PER ILDCKJ
`
`IIT NF:
`l)
`'
`
`4
`
`
`
`
`
`I
`“Ell-“-
`
`(II
`
`4'.nu
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`flflflflIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`353%IIIIIIIflflfl
`
`
`
`EEEEEEBEE
`EEEEQB
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Toshiba_Apricorn 1003-0005
`Toshiba_Apricorn 1003-0005
`|PR2018-01067
`IPR2018-01067
`
`

`

`
`
`
`cmssmen -- ~
`m—m
`
`———I_
`m-_-
`_-_—
`
`—--zuma
`_-—m
`E %I
`———
`
` ID NO.
`
`INDEX OF CLAIMS
`
`
`
` I
`
`
`
`E
`E
`
`
`
`II
`II
`I-
`I :
`I
`. --
`E I —
`mmmaII II
`#1“... II
`~-.
`II I.
`I
`.—
`II I- ,.
`II I- -
`II I. ;
`II I. 5:.
`II I- .z
`II I- u-
`II
`IIII-
`= IIII-
`II II
`I
`I III
`IE II I:
`Ila L
`IE
`Ila
`IE
`II
`II
`II
`II
`II
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`III...
`I III--
`I-II-
`III-
`III=III
`"Eu-=3:
`IIII—III
`IEEIIIIIIIII
`IIIII-III
`IIIIIIIII-
`“II—III
`IIIIIIIII-
`IIIIIIIIII
`IIIIIIIII-
`ImIIIIIII-
`--IIIII--
`III-III.-
`mIII—II-
`ImIII—II-
`“III—II-
`laIIIIIIII
`as III III-
`54 III II-
`asIIIIIII-
`IIIIIIIII
`a? IIIIIIII
`mIIIIIII-
`IIIIIIIII
`90 III-III
`
`
`91 III-II-
`ImIII—II-
`IEEI-II—II-
`IEIIIIIIII-
`IEIIIIIII -
`Ital-Ill..-
`IIIIIIIIII
`IEEIIIIIIIII
`IEIIIIIIII
`ImaIIIIIIII
`
`
`
`
`
`Toshiba_Apricorn 1003-0006
`Toshiba_Apricorn 1003-0006
`|PR2018-01067
`IPR2018-01067
`
`—-.
`IPPLIC
`mare;
`ALLEN
`
`T5:3
`
`

`

`
`
`Toshiba_Apricorn 1003-0007
`Toshiba_Apricorn 1003-0007
`|PR2018-01067
`IPR2018-01067
`
`

`

`|||||ll||||||ll|||
`1|||l||||l|||||||Illllllllllllllllllllllllll
`USlIlfi(|888l)2A
`
`||||||||
`
`United States Patent
`Bialick cl al.
`
`[19|
`
`[11] Patent Number:
`[451
`[late of Patent:
`
`6,088,802
`Jul. 11, 2000
`
`[54]
`
`[HI
`
`PERIPHERAL DEVICE WITH INTEGRATED
`SECURI'I‘Y FUNC'I'IONALI'I’T
`
`lnwnlors: William P. Blulick. (‘lnrkwlllc. MIL;
`Mark J. Sulllerlnnd. Milpilas. Calif;
`Janet L. llulphln-Petursun. Bclvcdcm.
`filliE; Thomas K. Rowland. L05
`
`(i
`11%. (infill; Kirk W. Skebn, Frutnoul.
`(”alils. Russell D. Housley. llcrndou.
`Va.
`
`I73|
`
`Assiyicu: Spyrus, Inca. Selma ('laru. {‘allil'
`
`[3|]
`[31]
`1511
`1521
`1591
`
`1561
`
`Amal. No.1 081869.305
`l-‘ilullr
`Jun. 4. 1997
`Im. CI.’
`GIMK 147'67
`US. Cl.
`”3300. 7l392l1l; 713/203
`
`Field of Search
`395.1881“.
`|87.(Jl.
`
`. 49; 713.200. 201. 202
`395486; 350:4
`
`Rafi-mucus Ciled
`U.S. FA'l'LN‘l' DOCUMENTS
`
`“11087 Walmlllbc .
`4.700.136:
`31'1”“ Dykc
`LLUIlL'TT'r’)
`31003 lung
`5,l‘)].h|l
`
`Irl‘l‘H Mclxrm GI
`:11
`5.132.247
`
`3.0994 Orton
`5.297.206:
`
`3.1905 llullc)’
`5.441.104
`”1.4005 Harlutlclnl.
`360/133
`5.4
`.590
`
`
`lluwj
`IJnv
`380-25
`:1 Mi:
`
`21min ”all
`3051800
`5,401,827
`(‘ruslulsnn et al.
`370/58
`BIN-“NI
`5.514.134
`
`711‘101- Mousnwu 1-1 «I.
`irlHSIll
`37,544
`1S!) 15
`('nptlm cl al.
`311-191.
`$3.403
`.
`
`
`11 7.0 1
`BI] ”‘30 Durmluw .....
`5.. 48.731
`38!1/25
`311997 MOIlllk'y l'l .’Il
`SfillJHs]
`305$333
`
`5!]‘1‘17 Stone. lll cl ul.
`51110174
`3r- 1 mm
`imam: MW? Kikinb
`. JMJF I 4
`
`5.1194535
`l2.'l'J‘?7
`llullcnhcrg
`38073
`5.702.083 MEWS [.cc cl Ell.
`.
`33514312
`5.770.849
`hr'lllI’H Nuvir- cl a]
`300.223
`
`811095 lluuvcner cl :1].
`5.790.674
`
`
`3051181111
`IWIWS llnldcn el al.
`5.828.332
`
`.. £111,135
`1099‘) Farm“ er al.
`5,S7&l42
`FOREIGN I’MLN‘I‘ [)(X‘UMEN‘I‘S
`W0 82,1328“
`11111132 Wll’i).
`WO‘IWZ'i-lll-
`KIIWT Wll’fi.
`(I'J'llL-Lll PUHIJL‘A'I‘IHNS
`
`LLS. appliculiml Nu, 081309.120. Bizrlick cl :Il.. lilccl Jun. 4.
`I997. pending.
`Primary I:.'.rrum'.rlrr—Ly V. Ilu.‘
`
`.Mlurnqu 439m, ur Finn—David R. lirulmm
`ISTj
`ABSTRACT
`'I'hu ilwunlion unulalcs 1| periphrrul dcvicr to mnunlmiculu
`will] u husl mmPuIing device 10 2113th nne or mun: sucurily
`operations In hr: pcrl'mmcd by [he pcriphural device on (lnln
`slnrcd willu'n lhc lmsl computing dcvicc. dala pmvidcd l'rrJrrI
`Ihu hosl compuling device In ll'rc pcriphcral duvicc (which
`can then lac. fur cxnmplc. 510m! in the peripheral dcvicc nr
`Iransmillml In yr] anolhur LIL-vim), or dam relriuvurl by Ihc
`husl cumpuling dcviuc [rum ll’u: peripheral dcviu; (cg. dala
`Ilul has Iwun stored in Ihc puriplrural device. Iransmillurl In
`lhc peripheral device from another (lcvicc or inpul
`to 01¢
`pariphcra] dcviu: by a person]. In particular. 1111: peripheral
`device can be adapted to cnalvlc. in a single integral periph-
`eral device, pcrformanw [if one or more Securily opuralionfi
`un dala. and a (lEl'llIl—‘ll inlcracliun will] a husl crumpuling
`Llwicc Ihal has not prcviuusly been iuaegrulcd will: sucun'ly
`l'lpbrllllflfl‘i in x singl: inlcgral dcvim:
`'l'hu (Infincrl
`inlcrrrc-
`lions. can pmvidu :1 variety 0|]pr ol' l‘unclinnnlity (mg.
`dala sloragc. dalu cummuniculmn. dalu input and vulpul.
`user irlcnlifiurlliuu). Thu.- pcnphural dcvicc can 11150111: imple-
`mumcd so Ihal Ilic suturily upcralions arc pcrfnrmcd in-linc.
`i.r..
`lhc weurily armrarions an: purl'ormud l‘lclwucn 1111.-
`unmmunicaliun ul'dala [u or from [he hoezl compuling device
`and lhc performance (If the dclincrl imuraclinn. Momover.
`lhc peripheral duvicc can he ilnplcmcnwd 51: that Ihc secu‘
`riry funclicmalily nl‘ 1hr.- pun'phcral dwicu is Iransparcm lu
`Iln: husl rumpuling device.
`
`39 Claims, 9 llmwing Slit-em
`
`
`
`5031:
`
`507
`
`509
`
`608
`
`501
`
`613
`
`Toshiba_Apricorn 1003-0008
`Toshiba_Apricorn 1003-0008
`|PR2018-01067
`IPR2018-01067
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 1 ul' 9
`
`6,088,802
`
`Host
`Computing
`
`Device 101a
`
`Portable
`
`FIG. 1
`(PRIOR ART)
`
`100
`
`/
`
`200
`
`/
`
`Host
`Computing
`Device
`
`Security
`Device
`
`Portable
`
`Device
`
`FIG. 2
`(PRIOR ART)
`
`Toshiba_Apricorn 1003-0009
`Toshiba_Apricorn 1003-0009
`|PR2018—01067
`IPR2018-01067
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 2 ul'9
`
`6,088,802
`
`300
`
`Peripheral
`
`Host
`Computing
`
`Device
`
`Toshiba_Apricorn 1003-0010
`Toshiba_Apricorn 1003-0010
`|PR2018—01067
`IPR2018-01067
`
`

`

`US. Patent
`
`.lul.11.20|lll
`
`Sheet 3 ul'9
`
`6,088,802
`
`400
`
`Functionality
`
`Target
`Functionality
`
`/ Security
`
`i 404
`
`501
`
`502
`
`503
`
`504
`
`505
`
`Userconnects peripheral device
`
`to host computing device.
`
`500
`
`I
`
`Host computing device detects presence
`of peripheral device.
`
`Peripheral device establishes its identity.
`
`
`
`Host computing device identifies peripheral device.
`
`User interacts with host computing device
`to begin using peripheral device.
`
`FIG. 5
`
`Toshiba_Apricorn 1003-0011
`Toshiba_Apricorn 1003-0011
`|PR2018—01067
`IPR2018-01067
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 4 ul' 9
`
`6,088,802
`
`now
`
`somgas
`
`w.OE
`
`Toshiba_Apricorn 1003-0012
`Toshiba_Apricorn 1003-0012
`|PR2018-01067
`IPR2018-01067
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 5 ul' 9
`
`6,088,802
`
`(N.9“.
`
`8w\
`
`
`
`
`
`$82...3:mamauoom
`
`$8
`
`83mm@93289:
`
`2:835859:$535
`
`3:20:22
`
`
`
`3:58:82€33.o
`
`“52333E8.59:
`
`we.
`
`cmmm:
`
`«on
`
`
`
`
`
`$2.585%2:89..9:852mo...333m5.”
`
`5..0Eh.OE
`
`
`
`E..9“—
`
`2.8cozmusEmEBEE
`
`039cm53
`
`.cozmaaoEmuoE62%
`
`5.3Fnew3233
`
`3:33
`
`ED
`
`Toshiba_Apricorn 1003-0013
`Toshiba_Apricorn 1003-0013
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 6 of 9
`
`6,088,802
`
`
`
`22523;__m59:
`
`2.385%.59.2Eam:
`
`96602
`
`5:32325a“.
`
`320ng__m59:
`
`.cozommcm:9...:EQaceficzzmgs
`
`B3:@5289
`
`EL.SN
`
`
`
`.cozommcm:28me.cofimmcm:Ezuoxm
`
`
`
`
`
`mm>
`
`22.32%5:85.
`
`
`
`.cozummcm:Ezomxm
`
`mo»
`
`mon
`
`30:8sz__m:55
`826255__m:52
`
`.5533:aE292552:83
`.cofimmcm:m§3:95:822:88
`
`
`
`.6mm:9553..
`
`
`
`.6mm:9.65%.
`
`225355=m:55
`
`.cozommce.25E$2283.5923mm:
`9.65%..
`
`Non
`
`0K
`
`22.83%
`
`550%at
`
`oz
`
`Q?»02
`
`92m:
`
`m;
`
`mN.O_n_
`
`92mmt.
`
`Toshiba_Apricorn 1003-0014
`Toshiba_Apricorn 1003-0014
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`.lul.11.20¢lll
`
`Sheet 7 0|")
`
`6,088,802
`
`g5
`42%9.:
`$8
`
`807
`
`802
`
`localbus
`
`0-2
`
`HostComputingH
`
`PCMCIABus
`
`FIG.8
`
`806
`
`Device
`
`Toshiba_Apricorn 1003-0015
`Toshiba_Apricorn 1003-0015
`|PR2018—01067
`IPR2018-01067
`
`

`

`US. Patent
`
`.lul.11.20|ltl
`
`Sheet 3 ul'9
`
`6,088,802
`
`806
`
`Cryptographic
`Processing
`Device
`Interface
`
`Interface
`
`Target
`Functionality
`
`803
`
`FIG. 9A
`
`Toshiba_Apricorn 1003-0016
`Toshiba_Apricorn 1003-0016
`|PR2018—01067
`IPR2018-01067
`
`

`

`US. Patent
`
`Jul. 11. 2000
`
`Sheet 9 ul' 9
`
`6,088,802
`
`UUC>-ELI—O QEOQUJMWOCE -Z|—-LLI(IL|.-€EOIJ.I
`
`-!fi-l
`
`IlllmmeEII-Ezo
`
`4052002
`
`mohomm
`
`
`
`#052000252500
`
`
`
`IwfiumOFomhmo
`
`5min:
`
`
`
`405200.309
`
`
`
`«.20.299
`
`or
`
`5on
`
`whim-h—
`
`
`
`I93“..543200
`
` moimm._.z_
`
`wmmkmamm
`
`OEZOQ
`
`
`
`Imuqu(.23405200O:
`
`
`
`1.013»._.o<n=2001min.FUEEOO
`
`
`
`
`
`mOEO—d: —2|—Lul:|:u.<l:0Lu
`
`Toshiba_Apricorn 1003-0017
`Toshiba_Apricorn 1003-0017
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`

`

`l
`PERIPHERAL DEVICE WITH lN’l‘I'XiRATIil)
`SECURITY FUNCTIONALITY
`CROSS-REFERENCE TO REL-NIH)
`AFI’LICAHDN
`This application is related to the commonly owned.
`cit-pending United States patent Application entitled
`"Modular Security Device." by William P. Biatick. Mark J.
`Sutherland. Janet
`l.. Dolphin-Peterson. Thomas K.
`Rowland. Kirk W. Sheba and Russell D. ltuusley. tiled on
`the same date as the present application and havingAttorncy
`Docket No. SPY-003. the disclosure of which is incorpo—
`rated by reference herein.
`BACKGROUND OF THE INVENI'ION
`t. Field of the invention
`This invention relates to a peripheral. ut'ten portable.
`device (as wet] as the methods employed by such a periph-
`eral device. and systems including such a peripheral device
`and a host computing device with which tltc peripheral
`device communicates) that can communicate with a host
`computing device to enable one or more security operations
`to be performed by the peripheral device on data stored
`within the host computing device. data provided from the
`host computing device to the peripheral device. or data '
`retrieved by the host computing device from the peripheral
`device,
`1 Retated An
`Computing. capability is becoming increasingly portable.
`to particular, there are more and more portable peripheral
`devices that an: adapted for communication with a host
`computing device (Lag, desktop computer, notebook corri—
`pttter or personal digital assistant) to enable particular fune-
`tionalily to be achieved. These portable peripheral devious
`can take a variety of physical forms (c.g.. PCMCIA cards.
`smart cards. CD-ROMs) and can perform an monument of
`functions (e ,g,. storage. communications and cryptography).
`However. while portable computing attracts a number of
`advantages.
`it has a significant disadvantage in that
`the
`computational environment (including the pnnablc periph-
`eral devices. the host computing devices in which they are
`used. and any other computational devices that communi-
`cate with these devices) is more susceptible to security
`breaches.
`i.c.. unauthorized access to. or modification of.
`programs audior data resident Within the environment.
`Consequently. cryptographic devices and methods have
`heen developed for use with such wmputatiunal environ-
`ments (as well as other computational environments) to
`enable increased levels of environment security to he
`obtained
`is a block diagram of a prior art system iinr
`FIG.
`I
`cnablinga host computing device to provide secured data to.
`and retrieve secured data from. a portable device. In FIG. I.
`a system 100 includes a host computing device 101 and a
`portable device 102. The Imst computing device It“ and
`portable device 102 are adapted to enable communication
`between the devices lttl and I02. The host computing
`device 10] includes asccurity mechanism 10hr (which can
`be embodied by appropriately configured hardware. soft-
`ware and/or
`firmware. such as. for example. a general
`purpose mieroprncesmr operating in accordance with
`instructions alone or more computer programs stored in a
`data storage device such as a hard disk) which can be
`directed to perform one or more cryptographic operations.
`In the system 1%, if it is desired to provide secured data
`from the host computing device wt to the portable device
`
`3o
`
`35
`
`all]
`
`45
`
`50
`
`.
`
`a5
`
`6.088.802
`
`[it
`
`2
`102, the host computing device 101 causes the security
`mechanism 10111 to perform appropriate cryptographic
`operations on data before the data is transferred to the
`portable device 102. Similarly. the host computing device
`101 can receive secured data from the portable device 102
`and perform appropriate cryptographic operations on the
`data to convert the data into a form that enables the data to
`be accessed and/or modified by a person who is authorized
`to do so.
`A significant deficiency of the system 100 is that the
`security medianisnt 101:: is itself typically not adequately
`secure.
`It
`Ls commonly accepted that
`the components
`(including hardware. software andxor firmware) of most host
`computing devices are inherently insecure. ~l'his is because
`the system design of host computing devices is. typically.
`intentionally made open so that components made by dif-
`ferent manufacturers can work togethcrseamlcssly. Thus. an
`unauthorized person may obtain knowledge of the operation
`of the security mechanism Ulla (tug. identify a crypto-
`gmpllit: key). there'hy enabling that person to gain access to.
`andfor modify, the (thought in be secured) data.
`[‘16. 2 is a block diagram of another prior art system for
`enabling a host computing device to provide secured data to.
`and retrieve secured data from. a portable device. In FIG. 2.
`a system 200 includes a host computing device 20L a
`ponable device 202 and a security device 203. The host
`computing device 201. the portable device 202 and security
`device 2a: are adapted to enable utmrnunication between
`the devices 201. and 202, and between the devices 201 and
`203. The security device 203 includes appropriately config-
`ured hardware. software umlmr firmware which can be
`directed to perform one or more cryptographic operations.
`in the system 200. it it is desired to provide secured data
`from the host computing device 201 to the ponable device
`202, the host computing device 201 first causes data to he
`transferred to the security device 203. where appropriate
`cryptographic operations are performed on the data. The
`secured data is then transferred hack to the host computing
`device 20!. which. In turn. transfers the secured data to the
`portable device 202. Similarly. the host computing device
`201 can receive secured data from the portable device 202
`by. upon receipt ot‘securcd data. transferring the secured
`data to the security device 203. which performs appropriate
`cryptographic operations on the: data to convert the data into
`a form that enables the data to be accessed anrlr‘or moditied
`by a person who is authorized to do so, then transfers the
`unsecured data back to thI: bust computing device 201,
`The system 200 can overcome the problem with the
`system 100 identified above-.111: security device 203 can be
`constructed so that the cryptographic functionality of the
`device 203 can itselfbe made secure. (Such a security device
`is often referred to as a security “token.") Ari unauthorized
`person can therefore be prevented (or. at least. significantly
`deterred) from obtaining knowledge of the opcmtioo of the
`srantrily device 2015. thereby preventing (or significantly
`deterring) that person from gaining access to, anchor
`modifying. the secured data.
`tinwuver, the system 200 may still not always ensure
`adequately secured data. In particular. unsecured data may
`he provided by the host computing device 20f
`to the
`portable device 202 if the host computing device 2.01—
`whether through inadvertent error or deliberate attack by a
`user of the host computing device 201. or through malfunc-
`tion ofllu: host computing device fill—fails to first transfer
`data to the security device 203 for appropriate cryptographic
`treatment before providing the data to the portable device
`202,
`
`Toshiba_Apricorn 1003-0018
`Toshiba_Apricorn 1003-0018
`|PR2018-01067
`IPR2018-01067
`
`

`

`3
`Additionally. the system 200 requires the use of two
`scparalc pcripbcral dcviccs [portable device 202 and secu-
`rity device 203) to unable the host computing device 20: to
`exchange scoured data with lhc portable device 102, For
`scvern] reasons,
`this may bi:
`inconvenient. First. both
`dwiccs 202 and 103 may not be available at the time that it
`is desired to perform a mun: data exchange (cg. one may
`have bccn forgotten or misplaced). Second. even if both
`dcvicus 202 and 203 an: available, it may not I): possible to
`connect hotlt devices 202 anrl 203 at the some time to the
`host computing device 201. nothing ust: of thc dcviccs 202
`and 203 cumbersome and increasing thc likelihood that
`unsecured data is provided by the host computing device
`201 to the punable device 202.
`SUMMARY OF THE INVEN'I'IUN
`A pflt’iphfitfll dcvict: according to the invention can hr:
`used to communicate with a host computing device to enable
`one or more security operations to In: pcrlbrmcd hy the
`peripheral dcvicc on data stored within the host computing
`device. data provided from the host computing duviec to the
`pcriphurul duvicc (which can then be. for example, stored in
`the peripheral etc-vice or transmitted to yet another device) or
`data retrieved by the host computing dcvicc from the periph-
`crul dcvicc (cg... data that hits been stored in the peripheral _
`device, transmittud to the peripheral device from another
`device or input to the poriphcrai device by a person). In
`particular. the peripheral devicc can be adapted lo enable, in
`a Kinglc integral peripheral device. performance ofnne or
`more security operations on dulu. and u defined interaction
`with a host computing device that has not previously been
`integratud with security opcralions in a single integral
`device, The defined interactions can provide a variety of
`types of functionality (6.3...
`(Iala sloragc. data
`Communication. data input and output. uwr identification).
`as describnd further below. The peripheral device can be
`implemented so that thc pcriphcral device can be operated in
`any one of mull iplc user-selectable modes: 3 security func-
`tionality only mode.
`at
`target functionality mode. and a
`combined security and target
`functionality mode. The
`peripheral
`rluvioc can also hr:
`implementcd so that
`the
`security opurations are pc-rl'ormnd invlinc. i.c.. the security
`operations an: pcrforrnod bctwccn thc mmmunt‘catiun of
`data to or from tho host computing dcviot: and the perfor-
`mance of thc dutincd interaction. Moreover. the peripheral
`device can be implcmcntcd so that thc woun‘ly functionality
`of the peripheral devict: is transparcttt to lhc host computing
`device.
`Aperipheral device acutrdingtn the invention can advan-
`tageously enlblc application of security operations to a wide
`variety of interactions with :t host computing device, In
`particular. a peripheral device according to the invcntion can
`accomplish this without neccstily to use two peripheral
`devices: on: that performs 1hr: security upcralions and not:
`that performs the defined interaction, This can, for example.
`minimize the pissilaility that the device adapted to perform
`thr: defraud interaction will he tlfl-‘(I with the trust computing
`system Without proper n|1pli€atiun of security operations to
`that interaction. Moreover. the provision nl'in-Iinc security
`in a peripheral dcvicc according to lhu invcntion enables a
`more secure exchange of data between a host computing
`device and the peripheral device. overcoming the problems
`identified ahuvc in previous systems for pcrfurmingsecurily
`operations on data exchanged between such dcviccs.
`Additionally. implementing a modular device awarding to
`the invention so that the performance out security upcralions
`hy the: modular dcvicu is transparent can reduce or eliminate
`
`JS
`
`4!]
`
`45
`
`50
`
`55
`
`all
`
`as
`
`6,088,802
`
`[it
`
`4
`the need to modify aspects of the operation of the host
`computing dcvico (cg, dcviu: drivers oflhc host computing
`device). making implementation and use of a data security
`system including the modular device simpler and cusicr.
`Thus, the possibility that a usur will use thc system incor-
`rectly (cg. fail to apply security operations to an interaction
`with thc host computing devicu. or apply the security
`operations incorrectly or invomplctcly) is reduced. Making
`thc security opcrations transparent can also enhance the
`security of those ope-rations.
`BRIEF DESCRIPTION UP THE DRAWINGS
`
`is a block diagram of a prior art syslcm for
`1
`FIG.
`enabling a host computing device to provide secured data to.
`and retrieve secured data from. It portable device.
`FIG. 2 is a block diagram of auolhcr prior art syslcrn [or
`enabling a limit computing rlcvicu to provide secured data to.
`and retrieve secured data from. a portable device.
`FIG. 3A is a block diagram of a system according to the
`invention.
`FIG. .38 is a perspective vicw of a physical irrtplcmcnta-
`tion of the system of FIG. 3A according to one embodiment
`of the invention.
`FIG. It is a block diagram of a peripheral dcvicc according
`to an nmhndimcnt ofthc invention
`ttcmrding to an
`FIG. 5 is a flow chart of a method.
`embodiment of the invention, for initiating use of a system
`accord ing to the invention.
`FIG, 6 is it block diagram of ll system. according to an
`cmbortimunt of thc invuntiun. illustrating operation of the
`system during a method awarding to the invention as in
`FIG. 5.
`FIGSA 7A and TB is a llow chart of a method. according
`to an embodiment of the invention. for using it pcriphcrnl
`dcvicc according lu lltc invention.
`FIG. 8 is a block diagram nfa peripheral device according
`to another embodiment of the invention.
`FIG. 9A is a block diagram illustrating the [low of data
`through the interface control device of FIG. 8.
`FIG. SIB is a block diagram of it particuiar embodiment of
`an interface control device for use in a peripheral device
`according to the invention.
`DETAILED DESCRIPTION (IF THE
`INVENTION
`
`FIG. 3A is a block diagram ot‘a system 300 according to
`thc invention. The system 300 includes a host computing
`duvicc 3lll anti .1 peripheral device 392 that communicate
`via a communications.
`intert'aoc 363.
`llurcin, "peripheral
`device" can refer to any device that operates outside of a
`host computing dcvicc and that
`is connected to the host
`computing device. The peripheral device 3|l2 includes a
`security mechanism Stilt: that enalalcs security operations
`(examples of which are dcscrilrcd in more detail below) to
`he performed on data that is stored within [he hunt comput-
`ing device 30]. data that
`is transmitted from the host
`computing device 30! to the peripheral device 302. or data
`that is transmitted from the peripheral device to the host
`computing device Sill, As explained in more detail below.
`thc peripheral device 302 also provides additional function-
`ality (referred to hcrcin as "target functionality") In the
`system 300, such as. for example. IItt: capability to store data
`in u snIiddslate disk storage device. the capability to onatblc
`communications from the host computing device 30! to
`
`Toshiba_Apricorn 1003-0019
`Toshiba_Apricorn 1003-0019
`|PR2018-01067
`IPR2018-01067
`
`

`

`5
`another device. the capability to accept biometric input to
`enable user authentication to the host eornpulingdeviee 301.
`and the capability to receive and read a smart card inserted
`into the peripheral devirx 302.
`Generally. the communications interface 303 can be any
`embodied by any of a variety of communication interfaces.
`such as a wireless communications interface. a PCMCIA
`interface. a smarleard interface. amrial interface [such as an
`R3423? interface). a parallel intdface. a SCSI interface or an
`IDE interface.
`litreh embodiment of the communications
`interface 303 includes hardware present in ettch of the host
`computing device 301 and peripheral device 392 that oper-
`ates in accordance with a communications protocol (which
`can be embodied. for example. by software stored in a
`memory device artdr‘or firmware that is present in the host
`computing device 31" and/or peripheral device 302) appro-
`priate for that type of communications interface, as known
`to those skilled in the art. Each embodiment of the commu-
`nications interface 303 also includes mechanisms to enable
`physical engagement.
`it' any. between the host computing
`device 301 and. peripheral dcvirx 302.
`Generally. the security mechanism 302" can he mnllg—
`urcd to perform any electronic data security operation
`(herein.
`referred to simply Its "security operation")
`including, for example. operations that provide one or more '
`of the basic cryptographic functions. such as maintenance of
`data confidentiality, verification of data integrity. user
`authentication and user non-repudiation. Particular security
`operations that can be implemented in a peripheral device
`aceurding to the invention are described in more detail
`below.
`for example.
`The security mechanism 302a can be.
`embodied as a security token. Herein, “security token" refers
`to a device that performs security operations and that
`ineludes one or more meehrtniSrns (such as, I'urexatnple. use
`of a hardware random number generator anchor protected
`memory) lo provide security for the content of those open--
`lions.
`FIG. 33 is tr perspective view of a physical implementa-
`tion of the system 300 of l-‘lti. 3A. aemnding to one
`embodiment of the invention.
`In FIG. 3”. the peripheral
`device 392 is embodied as
`card 312 that can be inserted
`into a corresponding slot 313 formed in a pon able computer
`311 that.
`in FIG. SB, embodies the host computing device
`301. Often a peripheral device according to the invention is
`a portable device. sud) as the card .312 shown in FIG SB.
`Herein. “portable device" can refer generally to any device
`that
`is capable of being easily carried by hand
`HO. 4 is a block diagram of in peripheral device 400
`according to an embodiment at the invention. The peripheral
`device 400 includes security functionality 40L target func—
`tionality 402 aunt
`in host
`interface 403 that arc former]
`together as part of a single physical device. For example. the
`security functionality 4m and target functionality 402 can
`be enclosed in a single, cant-like housing (designated in
`FIG. 4 by the numeral 404) conforming to a l’C‘Mf‘tA card
`or smart card standard.
`111:: peripheral device 400 can have a number of advan-
`tageous characteristics. The peripheral device 400 can be
`implemented in a manner that enables [he security opera-
`tions of the security functionality 40] to he performed in a
`manner that is transparent to a host computing device (and.
`depending upon the particular implementation of the periph-
`eral device 400. to n user of a system including the periph—
`eral] device 400) of a system according to lllL' invention, so
`that the bust mmpnting device (and. perhaps. user) is aware
`
`III
`
`2r]
`
`3U
`
`35
`
`all]
`
`45
`
`50
`
`55
`
`at]
`
`as
`
`6.088.802
`
`6
`functionality 402.
`only of the presence of the target
`Additionally. the peripheral device 400 can be implemented
`so that security operations are pcri‘onncd "in-line." i.e.. the
`security operations are performed between the communica-
`tion of data to n: from the host computing device rind the
`perlbrmancc of the target functionality provided by the
`peripheral device. Furthet. the peripheral device 1le enables
`a wide variety of secure target functionality to be easily
`protrided lo a host computing (Jet/ice.
`FIG. 5 is a flow chart oi it method Hill. recording to an
`embodiment of the invention. for initiating use of a system
`according to the invention. The method 500 enables an
`aspect of the invention in which the presence of security
`functionality :L'i pan of a peripheral device is not detected by
`a host computing device. thus making the security function-
`ality transparent to the host computing device trod. depend-
`ing upon the particular manner in which the security fune-
`Lionulity is implemented, to a user of the system.
`[‘16. IS is a block diagram of a system 690. according to
`an embodiment ut‘the invention. illnstralirtguperutlon ofthc
`system 60“ during a method according to the invention such
`as the method Sill} of FIG. 5. The system 600 includes a host
`computing device 601 and a peripheral device 602. The host
`computing device mt includes a display device 603" (mg.
`a conventional computer display monitor) and user input
`device 693!) (mg. a keyboard, mouse, trackball. joystick or
`other appropriate device). referred to collectively hereinafter
`as user interface device- MIJ. The host computing device bill
`also includes. mounted within a housing (IN. a processing
`device 605. a memory device 606. an inputfoutput (1/0)
`device 607 for enabling communication with the user inter-
`face device m3, and an inpultnutput (”0) device 608 for
`enabling communication with peripheral device 602. The
`devices 605. 606, 607 and 608 can each be implemented by
`conventional such devices and can communicate with each
`other via a conventional computer has 6139.15 is Well known
`and understood, The peripheral device 602 include. security
`functionality 611, a memory device fill. an I'DPl-IUI'JIIIPII‘I
`(lift) device 613 for enabling communication with the host
`computing device 6m and target functionality 614. The
`security functionality 61]. memory device 612.. IN) device
`613 and target functionality 614 can each be implemented by
`conventional devices and can communicate with each other
`via a conventional. computer

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket