throbber
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`(43) International Publication Date
`4 March 2010 (04.03.2010)
`
`(10) International Publication Number
`WO 2010/023506 Al
`
`(51) International Patent Classification:
`H04L 9/08 (2006.01)
`
`(21) International Application Number:
`
`(22) International Filing Date:
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`PCT/IB2008/053436
`
`26 August 2008 (26.08.2008)
`
`English
`
`English
`
`(71) Applicant (for all designated States except US): NOKIA
`CORPORATION [FIZFI]; Keilalahdentie 4, FIN-02150
`Espoo (FI).
`
`(71) Applicant (for LC only): NOKIA INC. [US/US]; 6021
`Connection Drive, Irving, Texas 75039 (US).
`
`(72) Inventor; and
`(for US only): NYBERG, Kaisa
`(75) Inventor/Applicant
`Tellervo [FIZFI]; Temppelikatu 3-5 A 12, FIN-00100
`Helsinki (FI).
`
`(81) Designated States (unless otherwise indicated, for every
`kind of national protection available): AE, AG, AL, AM,
`AO, AT, AU, AZ, BA, BB, BG, BH, BR, BW, BY, BZ,
`CA, CH, CN, CO, CR, CU, CZ, DE, DK, DM, DO, DZ,
`EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN,
`HR, HU, ID, IL, IN, IS, JP, KE, KG, KM, KN, KP, KR,
`KZ, LA, LC, LK, LR, LS, LT, LU, LY, MA, MD, ME,
`MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO,
`NZ, OM, PG, PH, PL, PT, RO, RS, RU, SC, SD, SE, SG,
`SK, SL, SM, ST, SV, SY, TJ, TM, TN, TR, TT, TZ, UA,
`UG, US, UZ, VC, VN, ZA, ZM, ZW.
`
`(84) Designated States (unless otherwise indicated, for every
`kind of regional protection available): ARIPO (BW, GH,
`GM, KE, LS, MW, MZ, NA, SD, SL, SZ, TZ, UG, ZM,
`ZW), Eurasian (AM, AZ, BY, KG, KZ, MD, RU, TJ,
`TM), European (AT, BE, BG, CH, CY, CZ, DE, DK, EE,
`ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV,
`MC, MT, NL, NO, PL, PT, RO, SE, SI, SK, TR), OAPI
`(BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, ML, MR,
`NE, SN, TD, TG).
`
`Declarations under Rule 4.17:
`(74) Agents: LEYES, Charles Andrew et al; Bank of Ameri
`ca Plaza, 101 South Tryon Street, Suite 4000, Charlotte, — of inventorship (Rule 4L 7(iv))
`North Carolina 28280-4000 (US).
`
`(54) Title: METHODS, APPARATUSES, COMPUTER PROGRAM PRODUCTS, AND SYSTEMS FOR PROVIDING SE
`CURE PAIRING AND ASSOCIATION FOR WIRELESS DEVICES
`
`[Continued on next page]
`
`(57) Abstract: A method, apparatus, computer program product, and
`system are provided, which may enable use of a fixed secret value and
`fixed public key in a first device for use in pairing and association of the
`first device with a second device without compromising forward secre
`cy. In this regard,
`the first and second devices may establish a first
`shared secret key in accordance with a public key agreement protocol
`based at least in part upon the fixed public key of the first device and a
`public key associated with the second device. The first shared secret key
`may be used for verification of a second shared secret key. The second
`shared secret key may be established based at least in part upon the pub
`lic key associated with the second device and a fresh public key generat
`ed by the first device and may be used to facilitate encrypted communi
`cations between the devices.
`
`312
`
`FIG. 3.
`
`Canon Exhibit 1045, Page 1
`
`

`

`WO 2010/023506 AIIMMTIMITINIIUNTMTTUTTETATAA
`
`Published:
`
`—__with international search report (Art. 21(3))
`
`Canon Exhibit 1045, Page 2
`
`Published:
`
`Canon Exhibit 1045, Page 2
`
`

`

`METHODS, APPARATUSES, COMPUTER PROGRAM PRODUCTS, AND
`
`SYSTEMS FOR PROVIDING SECURE PAIRING AND ASSOCIATION FOR
`
`WIRELESS DEVICES
`
`TECHNOLOGICAL FIELD
`Embodiments of the present invention relate generally to mobile
`
`communication technology and, more particularly, relate to methods, apparatuses,
`
`computer program products, and systems for providing secure pairing and
`
`association for wireless devices.
`
`BACKGROUND
`The modern communications era has brought about a tremendous
`
`expansion of wireline and wireless networks. Computer networks, television
`
`networks, and telephony networks are experiencing an unprecedented
`
`technological expansion, fueled by consumer demand. Wireless and mobile
`
`networking technologies have addressed related consumer demands, while
`
`providing more flexibility and immediacy of information transfer.
`
`Current and future networking technologies continue to facilitate ease of
`
`information transfer and convenience to users. One area in which there is a
`
`demand to further improve the convenience to users is pairing and association for
`
`wireless devices. In the past few years, there have been several advancements in
`
`the development of wireless interfaces and protocols that allow multiple devices to
`
`communicate wirelessly.
`
`Recently new secure pairing and association models have been specified
`
`for Bluetooth, Wireless USB, Wimedia and Wi-Fi Alliance. These new
`
`mechanisms require that the devices have user interfaces for handling variable
`
`verification data and passkeys, or that they can be connected using fixed cable or
`
`Canon Exhibit 1045, Page 3
`
`

`

`secure out-of-band (OOB) connection. This requirement may present a problem in
`
`that not all devices have sufficient interfaces for handling the necessary
`
`authentication data. In this regard, some vendors are reluctant to provide such
`
`interfaces due to added cost. Further, from a user perspective, usability of such
`
`online interfaces is not always easy.
`
`There is a demand for an association model using a fixed secret, which
`
`comes with one of the devices. This association model is in use in many
`
`applications, including being the traditional one also for the Bluetooth devices.
`
`However, these fixed secret applications may not be secure in that the protocols
`
`currently in use do not protect the secrecy of the fixed secret. In this regard,
`
`existing pairing and association models utilizing a fixed secret may be vulnerable
`
`to passive eavesdropping and man-in-the-middle attacks.
`
`Further, if a fixed secret is hard coded into a first device, then it may be that
`
`the public key and the private key of the device must also be fixed. Fixing of the
`
`private key may present a problem when a public key agreement protocol, such as
`
`the Diffie-Hellman key agreement protocol, is used to establish a shared secret key
`
`between the first device and a second device for use to encrypt further
`
`communications between the first and second devices. A malicious party may
`
`record communications traffic between the first and second devices and may later
`
`acquire the first device. The malicious party may then extract the fixed private key
`
`and use the fixed private key to recalculate the shared secret key and use it to
`
`decrypt the recorded traffic. Thus, communications between the first and second
`
`devices may lack perfect forward secrecy.
`
`Accordingly, it may be advantageous to provide computing device users
`
`with methods, apparatuses, computer program products, and systems for providing
`
`secure pairing and association for wireless devices. These methods, apparatuses,
`
`computer program products, and systems may advantageously provide perfect
`
`forward secrecy such that devices do not contain any secrets that may be used to
`
`decrypt messages from previous communications sessions in spite of the use of a
`
`fixed secret value and fixed private key associated with a first device to initiate
`
`pairing with the second device.
`
`Canon Exhibit 1045, Page 4
`
`

`

`BRIEF SUMMARY OF SOME EXAMPLES OF THE INVENTION
`
`A method, apparatus, computer program product, and system are therefore
`
`provided, which may provide secure pairing and association for wireless devices.
`
`In particular, a method, apparatus, and computer program product may be provided
`
`to enable, for example, the use of a fixed secret value and fixed public key in a first
`
`device, wherein the fixed secret value and fixed public key are used to initiate
`
`pairing of the first device with a second device without compromising forward
`
`secrecy. In this regard, the first and second devices may establish a first shared
`
`secret key in accordance with a public key agreement protocol based at least in part
`
`upon the fixed public key of the first device and a public key associated with the
`
`second device. The first shared secret key, however, may only be used for
`
`verification of a second shared secret key. The second shared secret key may be
`
`established based at least in part upon the public key associated with the second
`
`device and a fresh public key generated by the first device. Accordingly,
`
`communications between the first and second devices may be encrypted based
`
`upon the second shared key and not the first shared key. Thus, neither the first nor
`
`the second device contains any secrets that can be used to decrypt messages from
`
`previous communications sessions in spite of the use of a fixed secret value and
`
`fixed public key associated with the first device to initiate pairing with the second
`
`device.
`
`In one exemplary embodiment, a method is provided which may include
`
`receiving a fixed shared secret value associated with a remote device. The method
`
`may further include receiving a fixed public key from the remote device. The
`
`fixed public key may be associated with the remote device. The method may also
`
`include verifying authenticity of the fixed public key as being associated with the
`
`remote device based at least in part upon the fixed shared secret. The method may
`
`additionally include generating a public key associated with a local device and
`
`sending the generated public key to the remote device. The method may further
`
`include establishing, with the remote device, a first shared secret key in accordance
`
`with a public key agreement protocol based at least in part upon the received fixed
`
`Canon Exhibit 1045, Page 5
`
`

`

`public key and the generated public key. The method may also include receiving a
`
`fresh public key associated with the remote device from the remote device. The
`
`fresh public key may be generated by the remote device for establishing a
`
`communications session with the local device. The method may additionally
`
`include establishing, with the remote device, a second shared secret key in
`
`accordance with the public key agreement protocol for use in communications
`
`between the local device and the remote device. The establishment of the second
`
`shared key may be based at least in part upon the received fresh public key and the
`
`generated public key.
`
`In another exemplary embodiment, a computer program product is
`
`provided. The computer program product includes at least one computer-readable
`
`storage medium having computer-readable program instructions stored therein.
`
`The computer-readable program instructions may include first, second, third,
`
`fourth, fifth, sixth, seventh, and eighth program instructions. The first program
`
`instruction is for receiving a fixed shared secret value associated with a remote
`
`device. The second program instruction is for receiving a fixed public key from
`
`the remote device. The fixed public key may be associated with the remote device.
`
`The third program instruction is for verifying authenticity of the fixed public key
`
`as being associated with the remote device based at least in part upon the fixed
`
`shared secret. The fourth program instruction is for generating a public key
`
`associated with a local device. The fifth program instruction is for sending the
`
`generated public key to the remote device. The sixth program instruction is for
`
`establishing, with the remote device, a first shared secret key in accordance with a
`
`public key agreement protocol based at least in part upon the received fixed public
`
`key and the generated public key. The seventh program instruction is for receiving
`
`a fresh public key associated with the remote device from the remote device. The
`
`fresh public key may be generated by the remote device for establishing a
`
`communications session with the local device. The eighth program instruction is
`
`for establishing, with the remote device, a second shared secret key in accordance
`
`with the public key agreement protocol for use in communications between the
`
`local device and the remote device. The establishment of the second shared key
`
`Canon Exhibit 1045, Page 6
`
`

`

`may be based at least in part upon the received fresh public key and the generated
`
`public key.
`
`In another exemplary embodiment, an apparatus is provided, which may
`
`include a processor. The processor may be configured to receive a fixed shared
`
`secret value associated with a remote device. The processor may be further
`
`configured to receive a fixed public key from the remote device. The fixed public
`
`key may be associated with the remote device. The processor may also be
`
`configured to verify authenticity of the fixed public key as being associated with
`
`the remote device based at least in part upon the fixed shared secret. The processor
`
`may additionally be configured to generate a public key associated with a local
`
`device and sending the generated public key to the remote device. The processor
`
`may further be configured to establish, with the remote device, a first shared secret
`
`key in accordance with a public key agreement protocol based at least in part upon
`
`the received fixed public key and the generated public key. The processor may
`
`also be configured to receive a fresh public key associated with the remote device
`
`from the remote device. The fresh public key may be generated by the remote
`
`device for establishing a communications session with the local device. The
`
`processor may additionally be configured to establish, with the remote device, a
`
`second shared secret key in accordance with the public key agreement protocol for
`
`use in communications between the local device and the remote device. The
`
`establishment of the second shared key may be based at least in part upon the
`
`received fresh public key and the generated public key.
`
`In another exemplary embodiment, an apparatus is provided that may
`
`include means for receiving a fixed shared secret value associated with a remote
`
`device. The apparatus may further include means for receiving a fixed public key
`
`from the remote device. The fixed public key may be associated with the remote
`
`device. The apparatus may also include means for verifying authenticity of the
`
`fixed public key as being associated with the remote device based at least in part
`
`upon the fixed shared secret. The apparatus may additionally include means for
`
`generating a public key associated with a local device and sending the generated
`
`public key to the remote device. The apparatus may further include means for
`
`establishing, with the remote device, a first shared secret key in accordance with a
`
`Canon Exhibit 1045, Page 7
`
`

`

`public key agreement protocol based at least in part upon the received fixed public
`
`key and the generated public key. The apparatus may also include means for
`
`receiving a fresh public key associated with the remote device from the remote
`
`device. The fresh public key may be generated by the remote device for
`
`establishing a communications session with the local device. The apparatus may
`
`additionally include means for establishing, with the remote device, a second
`
`shared secret key in accordance with the public key agreement protocol for use in
`
`communications between the local device and the remote device. The
`
`establishment of the second shared key may be based at least in part upon the
`
`received fresh public key and the generated public key.
`
`In another exemplary embodiment, a system is provided which may include
`
`a first communications device and a second communications device. The first
`
`communications device may have a hard coded fixed shared secret value and a
`
`hard coded fixed public key and may be configured to generate a fresh public key,
`
`send the fixed public key to the second communications device, receive a public
`
`key associated with the second communications device from the second
`
`communications device, and send the fresh public key to the second
`
`communications device. The second communications device may be configured to
`
`receive the fixed shared secret value and the fixed public key, generate a public
`
`key, send the generated public key to the first communications device, and receive
`
`the fresh public key from the first communications device. The first and second
`
`communications devices may be configured to establish a first shared secret key in
`
`accordance with a public key agreement protocol based at least in part upon the
`
`received fixed public key and the public key generated by the second
`
`communications device. The first and second communications devices may also
`
`be configured to establish a second shared secret key in accordance with the public
`
`key agreement protocol based at least in part upon the fresh public key and the
`
`public key generated by the second communications device.
`
`The above summary is provided merely for purposes of summarizing some
`
`example embodiments of the invention so as to provide a basic understanding of
`
`some aspects of the invention. Accordingly, it will be appreciated that the above
`
`described example embodiments are merely examples and should not be construed
`
`Canon Exhibit 1045, Page 8
`
`

`

`to narrow the scope or spirit of the invention in any way. It will be appreciated
`
`that the scope of the invention encompasses many potential embodiments, some of
`
`which will be further described below, in addition to those here summarized.
`
`BRIEF DESCRIPTION OF THE DRAWING(S)
`
`Having thus described embodiments of the invention in general terms,
`
`reference will now be made to the accompanying drawings, which are not
`
`necessarily drawn to scale, and wherein:
`
`FIG. 1 illustrates a block diagram of a system for providing secure pairing
`
`and association for wireless devices according to an exemplary embodiment of the
`
`present invention;
`
`FIG. 2 is a schematic block diagram of a mobile terminal according to an
`
`exemplary embodiment of the present invention;
`
`FIG. 3 is a control flow diagram of communications signals passed between
`
`entities of the system of FIG. 1 according to an exemplary embodiment of the
`
`present invention; and
`
`FIG. 4 is a flowchart according to an exemplary method for providing
`
`secure pairing and association for wireless devices according to an exemplary
`
`embodiment of the present invention.
`
`DETAILED DESCRIPTION
`
`Some embodiments of the present invention will now be described more
`
`fully hereinafter with reference to the accompanying drawings, in which some, but
`
`not all embodiments of the invention are shown. Indeed, the invention may be
`
`embodied in many different forms and should not be construed as limited to the
`
`embodiments set forth herein; rather, these embodiments are provided so that this
`
`disclosure will satisfy applicable legal requirements. Like reference numerals refer
`
`to like elements throughout.
`
`FIG. 1 illustrates a block diagram of a system 100 for providing secure
`
`pairing and association for wireless devices according to an exemplary
`
`embodiment of the present invention. As used herein, "exemplary" merely means
`
`an example and as such represents one example embodiment for the invention and
`
`Canon Exhibit 1045, Page 9
`
`

`

`should not be construed to narrow the scope or spirit of the invention in any way.
`
`It will be appreciated that the scope of the invention encompasses many potential
`
`embodiments in addition to those illustrated and described herein. As such, while
`
`FIG. 1 illustrates one example of a configuration of a system for providing secure
`
`pairing and association for wireless devices, numerous other configurations may
`
`also be used to implement embodiments of the present invention.
`
`As used herein, "public key agreement protocol" refers to any number of
`
`cryptographic protocols wherein two parties may jointly establish a shared secret
`
`key over an insecure communications channel. Such a shared secret key and/or
`
`keys derived therefrom may be used to encrypt subsequent communications
`
`between the parties over the communications channel. The Diffie-Hellman key
`
`agreement protocol may be referred to herein from time to time as an example of a
`
`public key agreement protocol that may be used in conjunction with embodiments
`
`of the present invention. However, it will be appreciated that embodiments of the
`
`present invention are not limited to the use of only the Diffie-Hellman key
`
`agreement protocol.
`
`As used herein, "fixed" as used in conjunction with, for example, a "fixed
`
`shared secret value" or a "fixed public key" refers to any value that is permanently
`
`hard coded into a device. In this regard, "hard coded" refers to the permanent
`
`coding of a value into a device. In this regard, hard coded values may be coded
`
`and/or stored in a device in hardware, software, firmware, and/or some
`
`combination thereof. In contrast, a "fresh key," such as, for example, a "fresh
`
`public key" refers to a value that is generated by a first device specifically for the
`
`purpose of establishing communications with a second device and which will be
`
`discarded by the end of the resulting communications session established with the
`
`second device.
`
`Further, the terms "association" and "pairing" are used interchangeably
`
`herein and refer to the establishment of a wireless communications session
`
`between two devices. In this regard, "associated" or "paired" devices are
`
`wirelessly coupled, having formed a trusted pair and may engage in
`
`communications over a wireless communications link.
`
`Canon Exhibit 1045, Page 10
`
`

`

`Referring now to FIG. 1, the system 100 may include a host device 102 and
`
`client device 104 configured to communicate over a wireless communications link
`
`106. It will be appreciated that the terms "host" and "client" with reference to the
`
`host device 102 and client device 104 are merely for purposes of distinguishing the
`
`devices in discussion of embodiments of the invention. Embodiments of the
`
`invention are not limited to embodiments wherein the host device 102 and client
`
`device 104 interface in a client-host relationship or to communications protocols
`
`which explicitly refer to a "host" and a "client." Instead, as used herein, a client
`
`device 104 is a device having a fixed secret value and a fixed public key hard
`
`coded into the device. A host device 102 is a device that securely receives a fixed
`
`shared secret associated with a client device 104. In some embodiments, one or
`
`both of the host device 102 and client device 104 may be embodied as a mobile
`
`computing device, such as, for example a mobile terminal 10 depicted in FIG. 2 .
`
`In this regard, FIG. 2 illustrates a block diagram of a mobile terminal 10
`
`representative of one embodiment of a host device 102 and/or client device 104 in
`
`accordance with embodiments of the present invention. It should be understood,
`
`however, that the mobile terminal illustrated and hereinafter described is merely
`
`illustrative of one type of host device 102 and/or client device 104 that may benefit
`
`from embodiments of the present invention and, therefore, should not be taken to
`
`limit the scope of the present invention. While several embodiments of the
`
`electronic device are illustrated and will be hereinafter described for purposes of
`
`example, other types of electronic devices, such as mobile telephones, mobile
`
`computers, portable digital assistants (PDAs), pagers, laptop computers, desktop
`
`computers, gaming devices, televisions, and other types of electronic systems, may
`
`employ embodiments of the present invention.
`
`As shown, the mobile terminal 10 may include an antenna 12 (or multiple
`
`antennas 12) in communication with a transmitter 14 and a receiver 16. The
`
`mobile terminal may also include a controller 20 or other processor(s) that
`
`provides signals to and receives signals from the transmitter and receiver,
`
`respectively. These signals may include signaling information in accordance with
`
`an air interface standard of an applicable cellular system, and/or any number of
`
`different wireless networking techniques, comprising but not limited to Wireless-
`
`Canon Exhibit 1045, Page 11
`
`

`

`Fidelity (Wi-Fi), wireless local access network (WLAN) techniques such as
`
`Institute of Electrical and Electronics Engineers (IEEE) 802.1 1, and/or the like. In
`
`addition, these signals may include speech data, user generated data, user requested
`
`data, and/or the like. In this regard, the mobile terminal may be capable of
`
`operating with one or more air interface standards, communication protocols,
`
`modulation types, access types, and/or the like. More particularly, the mobile
`
`terminal may be capable of operating in accordance with various first generation
`
`(IG), second generation (2G), 2.5G, third-generation (3G) communication
`
`protocols, fourth-generation (4G) communication protocols, and/or the like. For
`
`example, the mobile terminal may be capable of operating in accordance with 2G
`
`wireless communication protocols IS-136 (Time Division Multiple Access
`
`(TDMA)), Global System for Mobile communications (GSM), IS-95 (Code
`
`Division Multiple Access (CDMA)), and/or the like. Also, for example, the
`
`mobile terminal may be capable of operating in accordance with 2.5G wireless
`
`communication protocols General Packet Radio Service (GPRS), Enhanced Data
`
`GSM Environment (EDGE), and/or the like. Further, for example, the mobile
`
`terminal may be capable of operating in accordance with 3G wireless
`
`communication protocols such as Universal Mobile Telecommunications System
`
`(UMTS), Code Division Multiple Access 2000 (CDMA2000), Wideband Code
`
`Division Multiple Access (WCDMA), Time Division-Synchronous Code Division
`
`Multiple Access (TD-SCDMA), and/or the like. The mobile terminal may be
`
`additionally capable of operating in accordance with 3.9G wireless communication
`
`protocols such as Long Term Evolution (LTE) or Evolved Universal Terrestrial
`
`Radio Access Network (E-UTRAN) and/or the like. Additionally, for example, the
`
`mobile terminal may be capable of operating in accordance with fourth-generation
`
`(4G) wireless communication protocols and/or the like as well as similar wireless
`
`communication protocols that may be developed in the future.
`
`Some Narrow-band Advanced Mobile Phone System (NAMPS), as well as
`
`Total Access Communication System (TACS), mobile terminals may also benefit
`
`from embodiments of this invention, as should dual or higher mode phones (e.g.,
`
`digital/analog or TDMA/CDMA/analog phones). Additionally, the mobile
`
`Canon Exhibit 1045, Page 12
`
`

`

`terminal 10 may be capable of operating according to Wireless Fidelity (Wi-Fi)
`
`protocols.
`
`It is understood that the controller 20 may comprise circuitry for
`
`implementing audio/video and logic functions of the mobile terminal 10. For
`
`example, the controller 20 may comprise a digital signal processor device, a
`
`microprocessor device, an analog-to-digital converter, a digital-to-analog
`
`converter, and/or the like. Control and signal processing functions of the mobile
`
`terminal may be allocated between these devices according to their respective
`
`capabilities. The controller may additionally comprise an internal voice coder
`
`(VC) 20a, an internal data modem (DM) 20b, and/or the like. Further, the
`
`controller may comprise functionality to operate one or more software programs,
`
`which may be stored in memory. For example, the controller 20 may be capable of
`
`operating a connectivity program, such as a web browser. The connectivity
`
`program may allow the mobile terminal 10 to transmit and receive web content,
`
`such as location-based content, according to a protocol, such as Wireless
`
`Application Protocol (WAP), hypertext transfer protocol (HTTP), and/or the like.
`
`The mobile terminal 10 may be capable of using a Transmission Control
`
`Protocol/Internet Protocol (TCP/IP) to transmit and receive web content across the
`
`internet or other networks.
`
`The mobile terminal 10 may also comprise a user interface including, for
`
`example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a
`
`user input interface, and/or the like, which may be operationally coupled to the
`
`controller 20. As used herein, "operationally coupled" may include any number or
`
`combination of intervening elements (including no intervening elements) such that
`
`operationally coupled connections may be direct or indirect and in some instances
`
`may merely encompass a functional relationship between components. Although
`
`not shown, the mobile terminal may comprise a battery for powering various
`
`circuits related to the mobile terminal, for example, a circuit to provide mechanical
`
`vibration as a detectable output. The user input interface may comprise devices
`
`allowing the mobile terminal to receive data, such as a keypad 30, a touch display
`
`(not shown), a joystick (not shown), and/or other input device. In embodiments
`
`Canon Exhibit 1045, Page 13
`
`

`

`including a keypad, the keypad may comprise numeric (0-9) and related keys (#,
`
`*), and/or other keys for operating the mobile terminal.
`
`As shown in Figure 2, the mobile terminal 10 may also include one or more
`
`means for sharing and/or obtaining data. For example, the mobile terminal may
`
`comprise a short-range radio frequency (RF) transceiver and/or interrogator 64 so
`
`data may be shared with and/or obtained from electronic devices in accordance
`
`with RP techniques. The mobile terminal may comprise other short-range
`
`transceivers, such as, for example, an infrared (IR) transceiver 66, a Bluetooth™
`
`(BT) transceiver 68 operating using Bluetooth™ brand wireless technology
`
`developed by the Bluetooth™ Special Interest Group, a wireless universal serial
`
`bus (USB) 70 and/or the like. The Bluetooth transceiver 68 may be capable of
`
`operating according to ultra-low power Bluetooth technology (e.g., Wibree™)
`
`radio standards. In this regard, the mobile terminal 10 and, in particular, the short-
`
`range transceiver may be capable of transmitting data to and/or receiving data from
`
`electronic devices within a proximity of the mobile terminal, such as within 10
`
`meters, for example. Although not shown, the mobile terminal may be capable of
`
`transmitting and/or receiving data from electronic devices according to various
`
`wireless networking techniques, including Wireless Fidelity (Wi-Fi), WLAN
`
`techniques such as IEEE 802.1 1 techniques, and/or the like.
`
`The mobile terminal 10 may comprise memory, such as a subscriber
`
`identity module (SIM) 38, a removable user identity module (R-UIM), and/or the
`
`like, which may store information elements related to a mobile subscriber. In
`
`addition to the SIM, the mobile terminal may comprise other removable and/or
`
`fixed memory. The mobile terminal 10 may include volatile memory 40 and/or
`
`non-volatile memory 42. For example, volatile memory 40 may include Random
`
`Access Memory (RAM) including dynamic and/or static RAM, on-chip or off-chip
`
`cache memory, and/or the like. Non-volatile memory 42, which may be embedded
`
`and/or removable, may include, for example, read-only memory, flash memory,
`
`magnetic storage devices (e.g., hard disks, floppy disk drives, magnetic tape, etc.),
`
`optical disc drives and/or media, non-volatile random access memory (NVRAM),
`
`and/or the like. Like volatile memory 40 non-volatile memory 42 may include a
`
`cache area for temporary storage of data. The memories may store one or more
`
`Canon Exhibit 1045, Page 14
`
`

`

`software programs, instructions, pieces of information, data, and/or the like which
`
`may be used by the mobile terminal for performing functions of the mobile
`
`terminal. For example, the memories may comprise an identifier, such as an
`
`international mobile equipment identification (IMEI) code, capable of uniquely
`
`identifying the mobile terminal 10.
`
`Returning to FIG. 1, the host device 102 and client device 104 are not
`
`limited to being embodied as a mobile terminal 10 and may be embodied as any
`
`computing device, mobile or fixed, and may be embodied as a server, desktop
`
`computer, laptop computer, mobile terminal 10, and/or the like. The wireless
`
`communications link 106 may comprise any wireless link in accordance with any
`
`wireless communications protocol over which the host device 102 and client
`
`device 104 are configured to communicate. Example protocols that may be
`
`implemented for communication over the wireless communications link 106
`
`include, but are not limited to, Bluetooth™, wireless USB, and/or the like.
`
`The host device 102 may include various means, such as a processor 110,
`
`memory 112, communication interface 114, user interface 116, and host
`
`cryptography unit 118 for performing the various functions herein described.
`
`These means of the host device 102 as described herein may be embodied as, for
`
`example, hardware elements (e.g., a suitably programmed processor,
`
`combinational l

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket