`US 20020141586Al
`
`(19) United States
`(12) Patent Application Publication
`Margalit et al.
`
`(10) Pub. No.: US 2002/0141586 A1
`Oct. 3, 2002
`(43) Pub. Date:
`
`(54) AUTHENTICATION EMPLOYING THE
`BLUETOOTH COMMUNICATION
`PROTOCOL
`
`(22) Filed:
`
`Mar. 29, 2001
`
`Publication Classification
`
`(75)
`
`Inventors: Yanki Margalit, Ramat Gan (IL); Dany
`Margalit, Ramat Gan (IL); Michael
`Zunke, Tel Aviv (IL)
`
`Int. Cl? ....................................................... H04L 9/00
`(51)
`(52) U.S. Cl. .............................................................. 380/270
`
`Correspondence Address:
`Ladas & Parry
`26 West 61 Street
`New York, NY 10023 (US)
`
`(73) Assignee: ALADDIN KNOWLEDGE SYSTEMS
`LTD.
`
`(21) Appl. No.:
`
`09/821,716
`
`(57)
`
`ABSTRACT
`
`A device and method capable of communicating with a
`communication network via a Bluetooth communication
`protocol, wherein the device includes at least one authenti(cid:173)
`cation functionality, at least part of at least one of which is
`operative to communicate authentication information via the
`Bluetooth communication protocol.
`
`ii!001
`
`1
`10
`01010
`
`0
`
`Canon Exhibit 1019, Page 1
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 1 of 45
`
`US 2002/0141586 A1
`
`co
`..--
`
`(
`
`0
`0
`
`CJ
`u..
`
`C\J
`C\J
`
`co
`0
`
`Canon Exhibit 1019, Page 2
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 2 of 45
`
`US 2002/0141586 A1
`
`0
`0
`C\1 ~
`
`0 ,....
`C\1
`
`C\1
`0
`C\1
`
`co
`,....
`
`C\1 qfu
`
`.r
`
`CD
`C\1
`C\1
`
`CD
`,....
`C\1
`
`~~ C\1
`
`.--·------.
`
`...__,....
`
`-··
`
`'¢
`C\1
`
`·--
`
`\
`
`0
`C\1
`C\J
`
`C\J
`CJ
`LL
`
`Canon Exhibit 1019, Page 3
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 3 of 45
`
`US 2002/0141586 A1
`
`C'l
`0
`C')
`
`...:-
`0
`C')
`
`0
`N
`C')
`
`...:-
`
`~~
`
`I D
`
`I
`
`~
`
`co
`,....
`
`C')
`
`(")
`
`0
`LL
`
`Canon Exhibit 1019, Page 4
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 4 of 45
`
`US 2002/0141586 A1
`
`(
`
`0
`0
`'<t
`
`N
`0
`~
`
`N
`
`~
`;:_·-~ ~
`I []flJ
`
`~
`
`1, _ _ _ _ _ _ /
`
`.
`CJ
`LL
`
`Canon Exhibit 1019, Page 5
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 5 of 45
`
`US 2002/0141586 A1
`
`C\J
`0
`1.[)
`
`0 ......
`
`1.[)
`
`(
`
`0
`0
`1.[)
`
`L()
`
`C)
`LL
`
`co
`'<:t
`1.[)
`
`~
`
`-.;;t
`C\J
`LO
`
`\B
`
`co
`...-
`1.[)
`
`Canon Exhibit 1019, Page 6
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 6 of 45
`
`US 2002/0141586 A1
`
`<..0
`CJ
`LL
`
`Canon Exhibit 1019, Page 7
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 7 of 45
`
`US 2002/0141586 A1
`
`0
`r--
`
`0
`
`N r--
`
`II
`.-----~ 0
`
`'I]
`
`(
`
`0
`0
`1'-
`
`C\J
`
`;:::: i [J?l]
`
`...
`
`_,.
`
`(9
`LL
`
`co
`,....
`r--
`
`Canon Exhibit 1019, Page 8
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 8 of 45
`
`US 2002/0141586 A1
`
`C\J
`0 co
`
`(
`
`0
`0 co
`
`C\J
`
`co . -·
`
`t~ ·--
`
`~ .
`
`_ ..
`
`co
`CJ
`lL
`
`co
`a;
`
`Canon Exhibit 1019, Page 9
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 9 of 45
`
`US 2002/0141586 A1
`
`0
`N
`(J)
`
`r---
`
`(
`
`0
`0
`Ol
`
`N .,.....
`(J)
`
`ID?l]
`
`'·-
`
`-.,
`
`-··
`
`m
`C)
`lL
`
`N
`0
`Ol
`
`v
`0
`Ol
`
`0 o· IJ
`
`I
`
`Canon Exhibit 1019, Page 10
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 10 of 45
`
`US 2002/0141586 A1
`
`FIG. 10A
`
`Canon Exhibit 1019, Page 11
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 11 of 45
`
`US 2002/0141586 A1
`
`FIG. 108
`
`1010
`
`-..
`
`_________ ,
`~001
`
`I
`
`0
`
`1
`10
`01010
`•• 1
`
`.. -
`
`1012
`
`-..
`
`--·
`·--
`-------·
`
`Canon Exhibit 1019, Page 12
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 12 of 45
`
`US 2002/0141586 A1
`
`FIG. 10C
`
`Canon Exhibit 1019, Page 13
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 13 of 45
`
`US 2002/0141586 A1
`
`FIG. 100
`
`Canon Exhibit 1019, Page 14
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 14 of 45 US 2002/0141586 A1
`
`FIG. 10E
`
`1041
`
`D
`
`~ o:
`
`1046
`
`1048
`
`Pas sit:]
`**** .&
`
`I
`
`D
`
`I
`
`D
`
`Canon Exhibit 1019, Page 15
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 15 of 45
`
`US 2002/0141586 A1
`
`FIG. 11A
`
`1100
`
`-~.
`
`~
`
`i ! 1
`0
`10
`01010
`
`-
`-·
`
`I -
`
`I
`
`I
`
`--
`
`~
`
`Canon Exhibit 1019, Page 16
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 16 of 45
`
`US 2002/0141586 A1
`
`FIG. 11B
`
`Passwo~
`AAAA~
`
`-
`~
`ii!oo~! ~
`
`10
`01010
`
`0
`
`1112
`
`~o:
`~
`
`Canon Exhibit 1019, Page 17
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 17 of 45 US 2002/0141586 A1
`
`FIG. 11C
`
`1120
`
`ii!001
`
`1
`10
`01010
`
`0
`
`Canon Exhibit 1019, Page 18
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 18 of 45
`
`US 2002/0141586 A1
`
`FIG. 110
`
`1130
`
`i?.!001
`
`1
`10
`01010
`
`0
`
`Passwo~
`AAAA~
`
`Canon Exhibit 1019, Page 19
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 19 of 45
`
`US 2002/0141586 A1
`
`FIG. 11 E
`
`1140
`
`1142
`
`(
`
`.. -
`
`-..
`
`i!001
`--·------
`
`1
`10
`01010
`
`0
`
`Canon Exhibit 1019, Page 20
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 20 of 45
`
`US 2002/0141586 A1
`
`FIG. 11 F
`
`Canon Exhibit 1019, Page 21
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 21 of 45 US 2002/0141586 A1
`
`FIG. 12A
`
`1205
`
`1200
`
`i?o!001
`·--·-------·
`
`1
`10
`01010
`
`0
`
`; !001
`
`1
`10
`01010
`
`0
`
`Canon Exhibit 1019, Page 22
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 22 of 45 US 2002/0141586 A1
`
`FIG. 128
`
`1215
`
`i!001
`
`1
`10
`01010
`
`0
`
`i!001
`
`1
`10
`01010
`
`0
`
`Canon Exhibit 1019, Page 23
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 23 of 45 US 2002/0141586 A1
`
`FIG. 12C
`
`1227
`
`; !001
`
`1
`10
`01010
`
`0
`
`~ -..
`~ 1226 ~
`-
`
`-
`
`1222
`
`1224
`
`~o :
`
`E=:=J
`
`Canon Exhibit 1019, Page 24
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 24 of 45 US 2002/0141586 A1
`
`FIG. 13A
`
`j PDA AND AUTHENTICATOR NEGOTIATE
`: - ' NEXT AUTHENTICATION FUNCTIONALITY
`~~· -------,------~
`!
`
`PDA AND AUTHENTICATOR NEGOTIATE
`AUTHENTICATION FUNCTIONALITY
`
`BASED ON - -----<<
`
`BIOMETR IC
`
`FINGERPRINTS
`
`BIOMETRIC
`BASED ON
`PORTRAIT
`
`-----
`
`APPROPRIATE
`AUTHENTICATION
`~~?
`USER
`TYPED - -
`PASSWORD
`
`PDA CARRIES OUT
`BLUETOOTH
`AUTHENTICATION IN
`CONJUNCTION WITH
`A BLUETOOTH HUB
`
`IS
`AUTHENTICATION
`SUCCESSFUL?
`
`YES
`
`[ PDA
`
`CAPTURES
`I FINGERPRINT
`DATA
`i
`YES
`
`__J---
`PDA
`USER USES
`CAPTURES
`PEN TO
`USER'S
`INPUT
`PORTRAIT PASSWORD
`
`CRYPTOGRAPHIC
`KEY
`I
`PDAFETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`I
`
`I t
`
`PDA TRANSMIT
`AUTHENTICATION
`INFORMATION TO
`AUTHENTICATOR USING
`BLUE TOOTH
`COMMUNICATION
`PROTOCOL
`
`REQUESTS
`PDA
`TOOTH HUB
`BLUE
`OSEND
`T
`CONFI
`RMATION TO
`
`ENTICATOR AUTH
`
`AUTHENTICATOR
`CHECKS WHETHER
`HUB IS CERTIFIED
`FOR
`AUTHENTICATION
`
`NO
`
`AUTHENTICATOR
`TRANSMITS ERROR
`MESSAGE TO
`PERSONAL DIGITAL
`ASSISTANT
`
`NO
`
`IS
`USER/DEVICE
`VALID?
`
`PERSONAL
`DIGITAL
`ASSISTANT
`
`\
`\
`I
`I
`\ ~~~nMUNICATES 1
`~RTOUSE/
`I
`
`!
`AUTHENTICATOR
`AUTHENTICATES USER
`, USING TRANSMITTED DATA
`I
`
`,
`
`_>...~1---yEs
`
`I
`
`Ll
`
`/
`ARE
`/
`/ / " ADDITIONAL
`AUTHENTICATION
`~ FUNCTIONS
`~QUI RED?
`'"'-
`
`AUTHENTICATOR l
`
`NO
`i
`
`'
`
`-
`
`TRANSMITS
`
`AUTHO . . R. IZATION TO
`PERSONAL DIGITAL
`ASSISTANT
`
`" - - --
`
`'-------·~
`END
`
`\ .
`
`Canon Exhibit 1019, Page 25
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 25 of 45 US 2002/0141586 A1
`
`FIG. 138
`
`(
`
`START
`
`)
`
`I
`
`USER REQUEST ACCESS TO RESOURCE
`PROTECTED BY AUTHENTICATOR
`
`~-
`SMART CARD AND AUTHENTICA:JOR I
`~~ NEGOTIATE NEXT AUTHENTICATION
`i
`i
`FUNCTIONALITY
`i
`L______ __ ___ _ _ _ ,---_ _ _ _ _
`
`SMART CARD AND AUTHENTICATOR
`NEGOTIATE AUTHENTICATION
`FUNCTIONALITY
`
`--.----------~
`CRYPTOGRAPHIC ~ BLUE TOOTH
`-------------- APPROPRIATE ---------------
`AUTHENTICATION
`KEY
`~ AUTHENTICATION ~
`------- FUNCTION 1s? ~
`I
`~ I DEDICATED AUTHENTICATION
`DEVICE PERFORMS BLUETOOTH
`I DEDICATED AUTHENTICATION
`AUTHENTICATION WITH
`DEVICE FETCHES
`UB
`I
`CRYPTOGRAPHIC KEY
`BLUETOOTH H
`INFORMATION
`l
`FROM MEMORY
`
`, - - - _ ___ _I__ ____ ______,
`
`!
`
`YES
`
`DEDICATED
`AUTHENTICATION
`DEVICE REQUESTS
`BLUETOOTH HUB TO
`' SEND CONFIRMATION
`TO AUTHENTICATOR
`
`AUTHENTICATOR
`CHECKS WHETHER HUB
`IS CERTIFIED FOR
`AUTHENTICATION
`
`NO
`
`NO
`
`AUTHENTICATOR
`TRANSMITS ERROR
`MESSAGE TO
`DEDICATED
`AUTHENTICATION
`DEVICE
`
`DEDICATED
`AUTHENTICATION
`DEVICE
`COMMUNICATES
`RROR TO USER /
`
`1)
`
`
`
`DEDICATED AUTHENTICATION
`DEVICE TRANSMITS
`AUTHENTICATION INFORMATION
`TO AUTHENTICATOR USING BLUE
`TOOTH COMMUNICATION
`
`YES
`I
`I
`
`AU::::::::OR
`
`~---~~~---_T_R_A_N_s_M_I,TT_E_D_D_A_TA _ _ _j
`
`AUTHENTICATES USER USING
`
`II
`
`NO
`
`THENTICATOR
`TRANSMITS
`HORIZATION TO
`DEDICATED
`AUTHENT ICATION DEVICE
`
`-
`
`L----------~
`
`END
`
`Canon Exhibit 1019, Page 26
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 26 of 45 US 2002/0141586 A1
`
`FIG. 13C
`
`START
`
`USER REQUEST ACCESS TO RESOURCE
`PROTECTED BY AUTHENTICATOR
`
`I
`~---- .
`
`CELLULAR PHONE AND AUTHENTICATOR
`NEGOTIATE NEXT AUTHENTICATION
`FUNCTIONALITY
`
`CELLULAR PHONE AND AUTHENTICATOR
`NEGOTIATE AUTHENTICATION
`FUNCTIONALITY
`
`BIOMETRIC
`BASE ON
`FINGERPRINTS
`
`APPROPRIATE
`-~ AUTHENTICATION
`~CTIONIS?
`---r
`USER
`TYPED ~
`I
`PASSWORD
`
`BIOMETRIC
`BASED ON
`PORTRAIT
`
`CELLULAR
`PHONE
`
`CELLULAR
`
`'I
`
`PHONE
`CAPTURES
`FINGERPRINT
`I
`DATA
`
`CRYPTOGRAPHIC
`KEY
`
`CELLULAR PHONE
`FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`BLUE TOOTH
`AUTHENTICATION
`I
`
`CELLULAR PHONE
`PERFORMS
`BLUETOOTH
`AUTHENTICATION
`WITH BLUETOOTH
`HUB
`
`CELLULAR PHONE
`TRANSMITS
`AUTHENTICATION
`INFORMATION TO
`AUTHENTICATOR USING
`BLUE TOOTH
`COMMUNICATION
`PROTOCOL
`
`L____._ YES I
`
`AUTHENTICATOR
`AUTHENTICATES USER
`
`CELLULAR PHONE
`REQUESTS
`BLUETOOTH HUB
`TO SEND
`CONFIRMATION TO
`AUTHENTICATOR
`
`AUTHENTICATOR
`CHECKS WHETHER
`HUB IS CERTIFIED
`FOR
`
`J . ::NG TMNSLM-IT_T_E_D_D_A_T_A--
`
`---,--A-U_T_H_E_N__jTICATION
`
`NO
`
`/ . ADDITIONAL
`<,
`AUTHENTICATION
`~~ ~~~CTIONS
`~UIRE O?
`
`YES
`
`LNo~
`'
`
`AUTHENTICATOR
`TRANSMITS
`AUTHORIZAT ION TO
`CELLULAR PHONE
`- - - , - - - -_ j
`
`-
`
`-
`
`~-E-N_D _
`
`__,
`
`NO
`
`AUTHENTICATOR
`TRANSMITS ERROR
`MESSAGE TO
`CELLULAR PHONE
`
`CELLULAR PHONE
`DISPLAYS
`COMMUNICATES
`TO USER
`
`\
`
`I
`
`Canon Exhibit 1019, Page 27
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 27 of 45 US 2002/0141586 A1
`
`FIG. 130
`
`~ START
`
`)
`
`r-~j
`!
`l
`
`ELECTRONIC WALLET AND
`A UTHENTICATOR NEGOTIATE NEXT
`AUTHENTICATION FUNCTIONALI1Y
`
`I
`
`i
`
`CRYPTOGRAPHIC
`KEY
`____.----
`
`1 ~-
`
`ELECTRONIC WALLET FETCHE~
`
`CRYPTOGRAPHIC KEY
`INFORMATION
`FROM MEMORY
`
`I '
`I '
`
`USER REQUEST ACCESS TO RESOURCE
`PROTECTED BY AUTHENTICATOR
`
`ELECTRONIC WALLET AND
`AUTHENTICATOR NEGOTIATE
`AUTHENTICATION FUNCTIONALITY
`
`BLUE TOOTH
`AUTHENTICATION
`__ c> - · --1
`
`ELECTRONIC WALLET PERFORMS
`BLUETOOTH AUTHENTICATION
`WITH BLUETOOTH HUB
`
`YES
`
`ELECTRONIC WALLET
`TRANSMITS AUTHENTICATION
`INFORMATION TO
`AUTHENTICATOR USING BLUE
`TOOTH COMMUNICATION
`PROTOCOL
`
`!I
`
`AUTHENTICATOR
`AUTHENTICATES USER USING
`TRANSMITTED DATA
`
`I
`
`/
`
`/
`
`ARE ~DDITIONAL
`< AU:HENTICA TION
`
`,,, FU NCTIONS
`~EQUIRED?
`
`YES
`
`NO
`I
`
`AUTHENTICATOR
`TRANSMITS
`AUTHORIZATION TO
`ELECTRONIC WALLET
`
`1
`
`:
`
`YES
`
`ELECTRONIC WALLET
`REQUESTS BLUETOOTH
`HUB TO SEND
`CONFIRMATION TO
`AUTHENTICATOR
`
`AUTHENTICATOR
`CHECKS WHETHER HUB
`IS CERTIFIED FOR
`AUTHENTICATION
`
`NO
`
`NO
`
`AUTHENTICATOR
`TRANSMITS ERROR
`MESSAGETO
`ELECTRONIC
`WALLET
`
`ELECTRONIC
`WALLET
`COMMUNICATES
`ERROR TO USER
`
`1
`)
`
`'-----------~ __.--E-N-0-..__ 1-o _ _ __
`
`_ _ _j
`
`Canon Exhibit 1019, Page 28
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 28 of 45 US 2002/0141586 A1
`
`FIG. 13E
`
`(
`
`START
`
`"'\\----------~
`
`USER REQUEST ACCESS TO RESOURCE
`PROTECTED BY AUTHENTICATOR
`
`PC AND AUTHENTICATOR NEGOTIATE
`PC AND AUTHENTICATOR NEGOTIATE
`~!
`NEXT AUTHENTICATION FUNCTIONALITY
`AUTHENTICATION FUNCTIONALITY
`I
`L-------------~---_-_-_-_-_-_-_-~--------~--~--------------~
`
`I
`
`'
`
`ust:u.
`TYI)fm
`1'1\SSWO R
`
`BIOMETR!
`B/\SCON
`F!NGI:RPR!N S
`
`USER USES
`PEN TO INPUT
`PASSWORD
`
`I
`
`PC
`CAPTURES
`FINGERPRINT
`DATA
`
`i I '--------'
`
`BLUE TOOTH
`AUTHENTICATION
`
`I
`
`PC PERFORMS
`BLUETOOTH
`AUTHENTICATION
`WITH BLUETOOTH
`HUB
`
`PC FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION ~-+-------<
`FROM MEMORY
`
`CRYPTOGRAPHIC
`KEY
`
`SMART CARD
`
`KEY
`DISK
`
`USB10KCN
`
`IS
`AUTHENTICATION
`UCCESSFU
`
`YES
`
`RIOMETR C
`i
`I :PC CAPTURE
`B/\SEO
`r
`POR!RAI
`USER'S
`,._ __ _ _ j
`i
`PORTRA IT
`
`I
`~· _, __ ________ ..~._ ______ ____,
`
`LYES
`
`ARE
`ADDITIONAL
`AUTHENTICATION
`,
`''--'---- FUNCTIONS
`"-REQUIRED?
`'
`
`YES
`
`PC TRANSMITS
`AUTHENTICATION
`INFORMATION TO
`AUTHENTICATOR USING
`BLUE TOOTH
`COMMUNICATION
`PROTOCOL
`
`AUTHENTICATOR
`AUTHENTICATES USER
`USING TRANSMITTED DATA
`
`NO
`
`PC REQUESTS
`BLUETOOTH HUB
`TO SEND
`CONFIRMATION TO
`AUTHENTICATOR
`
`AUTHENTICATOR
`CHECKS WHETHER
`HUB IS CERTIFIED
`FOR
`AUTHENTICATION
`
`NO
`
`I
`
`AUTHENTICATOR
`TRANSMITS ERROR
`MESSAGE TO PC
`
`I
`NO
`i !
`I
`"\~- ______ (cOMM~~CATES )/
`AUTHENTICATOR TRANSMITS \----------<•~( END
`~-A_U_T_H_O_R_IZ_A_TI_O_N_T_O __ PC __ ~
`~~---~/
`~ RRORTOUSER ,
`
`Canon Exhibit 1019, Page 29
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 29 of 45 US 2002/0141586 A1
`
`FIG. 14A
`
`(
`
`START
`
`)
`
`START
`AUTHENTICATION
`USING SMART CARD
`ORPC?
`
`SMART CARD
`
`EMPLOY
`FUNCTlONALITY
`OF FIG. 138
`
`'
`
`,
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13E
`
`PC~---<
`
`I _,_
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13E
`
`,
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 138
`
`I
`
`~~c END
`
`)
`
`-.
`
`Canon Exhibit 1019, Page 30
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 30 of 45 US 2002/0141586 A1
`
`FIG. 148
`
`START
`AUTHENTICATION
`USING CELLULAR
`PHONE OR PC?
`
`PC---<.
`
`I ' EMPLOY
`
`FUNCTIONALITY
`OF FIG. 13E
`
`r
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13C
`
`CELLULAR
`PHONE
`
`~
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13C
`
`r
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13E
`
`END
`
`....
`
`Canon Exhibit 1019, Page 31
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 31 of 45
`
`US 2002/0141586 A1
`
`FIG. 14C
`
`c START
`
`)
`
`START
`AUTHENTICATION USING
`PERSONAL DIGITAL
`ASSIST ANT OR PC?
`
`PC
`
`I
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13E
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13A
`
`PERSONAL
`DIGITAL
`ASSISTANT
`
`I
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13A
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13E
`
`END
`
`Canon Exhibit 1019, Page 32
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 32 of 45 US 2002/0141586 A1
`
`FIG. 140
`
`c START
`
`)
`
`CELLULAR
`PHONE --<
`I
`
`START
`UTHENTICATJON USIN
`PERSONAL DIGITAL
`SSISTANT OR CELLULA
`PHONE?
`
`PERSONAL
`DIGITAL
`ASSISTANT
`I
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13A
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13C
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13C
`
`I
`i
`J
`EMPLOY
`
`I
`FUNCTIONALITY
`OF FIG. 13A
`
`II
`
`END
`
`Canon Exhibit 1019, Page 33
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 33 of 45 US 2002/0141586 A1
`
`FIG. 14E
`
`EMPLOY
`FUNCTIONALITY
`I OFFIG.13A
`
`PERSONAL
`DIGITAL
`ASSISTANT
`I
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13A
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13B
`
`START
`
`END
`
`Canon Exhibit 1019, Page 34
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 34 of 45 US 2002/0141586 A1
`
`FIG. 14F
`
`CELLULAR
`PHONE ----<
`I
`
`START
`AUTHENTICATION USING
`CELLULAR PHONE OR
`ELECTRONIC WALLET?
`
`ELECTRONIC
`>---- WALLET
`
`I
`
`EMPLOY
`. FUNCTIONALITY
`I OF FIG. 13C
`
`EMPLOY
`FUNCTIONALITY
`OF FIG . 130
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 13C
`
`EMPLOY
`FUNCTIONALITY
`OF FIG. 130
`
`END
`
`Canon Exhibit 1019, Page 35
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 35 of 45
`
`US 2002/0141586 A1
`
`FIG. 15A
`
`(
`I
`
`START
`
`)
`
`i
`
`I '
`
`AUTHENTICATION
`FUNCTION IS?
`
`BIOMETRIC
`BASED ON
`FINGERPRINTS
`I
`I
`I
`I
`I
`I
`I
`I PERS
`ONAL
`I
`
`I DIG ITAL
`STANT I
`I ASS I
`I CAPT
`URES
`1 FINGE RPRINT !
`I
`DA TA
`i
`I
`I
`I
`
`I
`
`BIOMETRIC
`BASED ON
`PORTRAIT
`
`USER
`TYPED
`PASSWORD
`
`CRYPTOGRAPHIC
`KEY
`
`I
`
`I
`PERSONAL
`DIGITAL
`ASSISTANT
`CAPTURES
`USER'S
`PORTRAIT
`
`r:.....----
`USER USES
`PEN TO
`INPUT
`PASSWORD
`
`AL DIGITAL
`PERSON
`STANT
`ASS I
`CHES FET
`
`GRAPHIC CRYPTO
`
`
`RMATION KEY INFO
`FROM MEMORY
`
`;
`I
`
`'
`
`Canon Exhibit 1019, Page 36
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 36 of 45 US 2002/0141586 A1
`
`FIG. 158
`
`START
`
`CRYPTOGRAPHIC
`KEY
`
`WIRELESS SMART
`CARD FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`Canon Exhibit 1019, Page 37
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 37 of 45
`
`US 2002/0141586 A1
`
`FIG. 15C
`
`BIOMETRIC
`BASED ON
`FINGERPRINTS
`
`!
`
`
`ULAR CELL
`ONE
`PH
`
`CAPT URES
`FINGE
`RPRINT
`TA
`I
`DA
`I
`
`'
`
`AUTHENTICATION
`
`BIOMETRIC
`BASED ON
`PORTRAIT
`
`USER
`TYPED
`PASSWORD
`
`CRYPTOGRAPHIC
`KEY
`
`CELLULAR
`PHONE
`CAPTURES
`USER'S
`PORTRAIT
`
`L--------
`
`USER USES
`PEN TO
`INPUT
`PASSWORD
`
`CELLULAR PHONE
`FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`Canon Exhibit 1019, Page 38
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 38 of 45
`
`US 2002/0141586 A1
`
`FIG. 150
`
`START
`
`CRYPTOGRAPHIC
`KEY
`
`ELECTRONIC
`WALLET FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`I 3
`
`Canon Exhibit 1019, Page 39
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 39 of 45 US 2002/0141586 A1
`
`FIG. 15E
`
`USER USES
`PEN TO INPUT
`PASSWORD
`
`PC
`CAPTURES
`1 FINGERPRINT
`i
`DATA
`
`PC CAPTURE
`USER'S
`PORTRAIT
`
`USER TYPED
`PASSWORD
`
`CRYPTOGRAPHIC
`KEY
`
`PC FETCHES
`CRYPTOGRAPHIC
`KEY INFORMATION
`FROM MEMORY
`
`BIOMETRIC
`BASE ON
`FINGERPRINTS
`
`SMART CARD
`
`KEY
`DISK
`
`BIOMETRIC
`BASE ON
`PORTRAIT
`
`USB TOKEN
`
`I
`
`L__---,--__
`
`END
`
`Canon Exhibit 1019, Page 40
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 40 of 45 US 2002/0141586 A1
`
`FIG. 16A
`
`__ .,...
`
`AUTHENTICATION DEVICE AND
`AUTHENTICATOR NEGOTIATE NEXT
`AUTHENTICATION FU NCTIONALITY
`
`AUTHENTICATION DEVICE AND
`AUTHENTICATOR NEGOTIATE
`AUTHENTICATION FUNCTIONALITY
`
`AUTHENTICATION
`DEVICE CARRIES
`OUT BLUETOOTH
`AUTHENTICATION IN
`CONJUNCTION WITH
`A BLUETOOTH HUB
`
`IS
`AUTHENTICATION
`SUCCESSFUL?
`
`YES
`
`AUTHENTICATION
`DEVICE REQUESTS
`BLUETOOTH HUB
`TO SEND
`CONFIRMATION TO \
`AUTHENTICATO~
`
`AUTHENTICATOR
`CHECKS WHETHER
`HUB IS CERTIFIED
`FOR
`AUTHENTICATION
`
`ANOTHER
`AUTHENTICATION ------------(cid:173)
`FUNCTIONALITY
`
`I
`
`AUTHENTICATION DEVICE
`ACQUIRES
`AUTHENTICATION DATA
`EMPLOYING AT LEAST ONE
`OF THE FUNCTIONALITIES
`OF FIGS. 15A-15E
`
`II
`
` AUTHENTICATION DEVICE
`TRANSMITS
`AUTHENTICATION
`I
`INFORMATION TO
`i AUTHENTICATOR AT LEAST
`PARTIALLY USING BLUE
`I
`TOOTH COMMUNICATION
`PROTOCOL
`
`YES
`
`AUTHENTICATOR
`AUTHENTICATES USER
`USING TRANSMITTED DATA
`
`!
`
`/ARE
`'
`,/
`I
`Aoo'ITIONAL
`~/ AUTHENTICATION
`"~ FUNCTIONS
`"-~EQUIRED?
`,~/
`i
`
`>~~-----YES--------<
`
`NO
`
`AUTHENT ICATOR
`TRANSMITS RELEVANT
`MESSAGE TO
`AUTHENTICATION DEVICE
`
`(~
`
`Canon Exhibit 1019, Page 41
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 41 of 45 US 2002/0141586 A1
`
`f
`~ START
`I
`!
`AUTHENTICATION DEVICE AND
`AUTHENTICATION DEVICE AND
`:
`AUTHENTICATOR NEGOTIATE
`AU THENTICATOR NEGOTIATE NEXT
`I
`~~
`AUTHENTICATION FUNCTIONALITY
`AUTHENTICATION FUNCTIONALITY
`i COMMUNICATING THROUGH ANOTHER DEVICE : COMMUNICATING THROUGH ANOTHER DEVICE
`I
`~--------------,----------------~
`
`FIG. 168
`
`i
`!
`
`\
`)
`
`I
`I
`
`ANOTHER
`AUTHENTICATION
`FUNCTIONALITY
`
`I
`
`AUTHENTICATION DEVICE
`ACQUIRES AUTHENTICATION DATA
`EMPLOYING AT LEAST ONE OF THE
`FUNCTIONALITIES OF FIGS. 15A-15E
`
`YES
`
`AUTHENTICATION DEVICE
`TRANSMITS AUTHENTICATION
`INFORMATION TO AUTHENTICATOR
`USING BLUE TOOTH
`COMMUNICATION PROTOCOL
`COMMUNICATING THROUGH
`ANOTHER DEVICE
`
`AUTHENTICATION
`DEVICE CARRIES
`OUT BLUETOOTH
`AUTHENTICATION IN
`CONJUNCTION WITH
`A BLUETOOTH HUB
`
`IS
`AUTHENTICATION
`SUCCESSFUL?
`
`YES
`
`I
`
`AUTHENTICATION DEVICE
`REQUESTS BLUETOOTH HUB TO •
`SEND CONFIRMATION TO
`AUTHENTICATOR
`COMMUNICATING THROUGH
`ANOTHER DEVICE
`
`AUTHENTICATOR AUTHENTICATES
`USER USING TRANSMITIED DATA t - - - - - - ,
`
`AUTHENTICATOR CHECKS '
`WHETHER HUB IS
`CERTIFIED FOR
`AUTHENTICATION
`
`I
`
`/_ ARE
`
`' I ~~?DITIONAL
`
`>--1-----YES----<
`
`NO
`
`I
`
`/
`
`AUTHENTICATION
`t___.,"-..
`'--,,
`FUNCTIONS
`"-..~~OU I RED?
`
`I
`
`'
`i
`I
`AUTHENTICATOR
`I
`TRANSMITS RELEVANT
`LNo- ------.,..:
`MESSAGE TO
`. AUTHENTICATION DEVICE
`'COMMUNICATING THROUGH
`ANOTHER DEVICE
`
`Canon Exhibit 1019, Page 42
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 42 of 45 US 2002/0141586 A1
`
`FIG. 16C
`AUTHENTICATION DEVICE A~ ~
`
`(
`START
`)
`'"--~-~-~/
`
`AUTHENTICATOR NEGOTIATE. N-~~-T
`I
`I
`AU THENTICATION FUNCTIONALITY
`EMPLOYING A PROXY ___j
`
`r---~:
`
`I
`I
`
`AUTHENTICATION DEVICE AND
`AUTHENTICATOR NEGOTIATE
`AUTHENTICATION FUNCTIONALITY
`EMPLOYING ANOTHER DEVICE AS A
`PROXY
`I
`------------,-----------~
`
`ANOTHER
`AUTHENTICATION
`FUNCTIONALITY
`
`1
`
`I t
`
`AUTHENTICATION DEVICE
`ACQUIRES AUTHENTICATION DATA
`EMPLOYING AT LEAST ONE OF THE
`FUNCTIONALITIES OF FIGS. 15A·15E
`
`YES
`
`AUTHENTICATION DEVICE
`TRANSMITS AUTHENTICATION
`INFORMATION TO PROXY USING
`BLUE TOOTH COMMUNICATION
`PROTOCOL
`
`I
`
`- -
`
`l.
`
`PROXY TRANSMITS
`AUTHENTICATION INFORMATION TO
`AUTHENTICATOR
`
`AUTHENTICATOR AUTHENTICATES
`USER USING TRANSMITIED DATA
`
`'
`'
`
`I
`I
`I
`ARE
`/
`I
`ADD ITIONAL
`~ AUTHENTICATION
`~ FUN CTIONS
`~QUI REO?
`
`/
`
`'"-.-/
`
`~--YES
`I
`
`AUTHENTICATION
`DEVICE CARRIES
`OUT BLUETOOTH
`AUTHENTICATION IN
`CONJUNCTION WITH
`A BLUETOOTH HUB
`
`YES
`
`IS
`AUTHENTICATION
`SUCCESSFUL?
`
`AUTHENTICATION DEVICE
`REQUESTS BLUETOOTH
`HUB TO SEND
`CONFIRMATION TO PROXY
`
`PROXY SENDS
`CONFIRMATION TO
`AUTHENTICATOR
`
`AUTHENTICATOR CHECKS
`WHETHER HUB IS
`CERTIFIED FOR
`AUTHENTICATION
`
`NO
`
`I AUTH~NTICATOR TRANSMITS
`'
`L_NO---_.,!
`RELEVANT MESSAGE TO
`PROXY
`
`I t
`
`PROXY TRANSMITS RELEVANT
`MESSAGETO AUTHENTICATION -
`DEVICE
`
`i
`
`END
`
`/"
`(
`\,__
`
`\
`/
`
`I
`
`Canon Exhibit 1019, Page 43
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 43 of 45
`
`US 2002/0141586 A1
`
`FIG. 17A
`
`(
`
`START
`
`)
`
`I
`
`USER REQUESTS ACCESS TO RESOURCE
`PROTECTED BY AUTHENTICATOR
`
`AUTHENTICATION DEVICE AND
`AUTHENTICATOR PERFORM
`AUTHENTICATION EMPLOYING AT LEAST
`ONE OF THE FUNCTIONALITIES OF FIGS.
`16A- 16C
`
`,----- NO---~
`
`I I
`
`i L _ _ ___
`/~TICATION \
`( DEVICE DISPLAYS
`\
`ERROR MESSAGE
`~ TOUSER
`
`AUTHENTICATION
`DEVICE DISPLAYS
`CONFIRMATION
`ESSAGE TO USER
`
`END
`
`Canon Exhibit 1019, Page 44
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 44 of 45 US 2002/0141586 A1
`
`FIG. 17B
`
`(
`
`START
`
`)
`
`I
`
`•. USER REQUESTS ACCESS TO RESOURCE II
`:
`PROTECTED BY AUTHENTICATOR
`.
`
`I
`,-------- -- -~~
`
`USER AND AUTHENTICATOR NEGOTIATE
`FIRST DEVICE TO USE
`
`USER AND AUTHENTICATOR NEGOTIATE
`NEXT DEVICE TO USE
`
`'
`
`SELECTED AUTHENTICATION DEVICE AND
`AUTHENTICATOR PERFORM
`, AUTHENTICATION EMPLOYING AT LEAST
`ONE OF THE FUNCTIONALITIES OF FIGS.
`16A-16C
`
`------------~-wAs AUTHENTICATION
`--------------
`~ SUCCESSFUL?
`-----
`~~
`--------
`
`'
`
`---------
`I
`I
`I
`
`NO
`
`-------------
`
`::>-- - - - -YES - - - ,
`
`YES
`
`ARE
`ADDITIONAL
`AUTHENTICATION
`DEVICES
`
`~~NO------,
`
`'
`
`AUTHORIZATION IS 1 - - - - - - - - - , - - - - - - - - - - 1
`NOT GRANTED
`
`(
`
`END
`
`)
`
`Canon Exhibit 1019, Page 45
`
`
`
`Patent Application Publication
`
`Oct. 3, 2002 Sheet 45 of 45
`
`US 2002/0141586 A1
`
`FIG. 17C
`
`[ USER REQUESTS ACCESS TO RESOURCE
`I
`PROTECTED BY AUTHENTICATOR
`
`AUTHENTICATOR REQUIRES
`AUTHENTICATION DEVICE TO ACQUIRE
`PERMISSION TO AUTHENTICATE FROM
`AUTHENTICATION ENABLING DEVICE
`
`'
`
`AUTHENTICATION BETWEEN
`AUTHENTICATION ENABLING DEVICE AND
`AUTHENTICATOR IS PERFORMED
`EMPLOYING AT LEAST ON OF THE
`FUNCTIONALITIES OF
`FIGS. 16A- 16C
`
`YES
`I
`
`AUTHENTICATION BETWEEN
`AUTHENTICATION DEVICE AND
`AUTHENTICATOR IS PERFORMED
`EMPLOYING AT LEAST ONW OF THE
`FUNCTIONALITIES OF
`FIGS. 16A- 16C
`
`NO
`
`NO
`
`!
`
`I
`i
`
`--,----------1~)
`~
`
`/AuTHEN+icATION "'\
`DEVICE DISPLAYS
`\ ERROR MESSAGE
`}
`~
`I
`(
`
`END
`
`·~--__/
`
`Canon Exhibit 1019, Page 46
`
`
`
`US 2002/0141586 A1
`
`Oct. 3, 2002
`
`1
`
`AUTHENTICATION EMPLOYING THE
`BLUETOOTH COMMUNICATION PROTOCOL
`
`FIELD OF THE INVENTION
`
`[0001] The present invention relates to authentication in
`computer systems generally.
`
`BACKGROUND OF THE INVENTION
`
`[0002] The following publications are believed to repre(cid:173)
`sent the state of the art relevant to the present invention:
`
`[0003]
`"Bluetooth Security Architecture, Version
`1.0" by Thomas Muller, Jul. 15, 1999;
`
`[0004]
`"Bluetooth specifications core, Version l.Ob",
`Dec. 1, 1999;
`
`[0005]
`"Bluetooth specifications profile, Version
`l.Ob", Dec. 1, 1999;
`
`[0006]
`"First Access and Bluetooth Announce Tech(cid:173)
`nological Collaboration", Feb. 21, 2000;
`
`[0007]
`"CeBit bluetooth™ pavilion to showcase
`Ensure's patented XyLoc wireless pc security", Feb.
`24, 2000;
`
`[0008] U.S. Pat. No. 6,070,240.
`
`SUMMARY OF THE INVENTION
`
`[0009] There is thus provided in accordance with a pre(cid:173)
`ferred embodiment of the present invention a device capable
`of communicating with an authenticator at least partially
`using a Bluetooth communication protocol. The device
`includes at least one authentication functionality, at least part
`of at least one of which operates to communicate authenti(cid:173)
`cation information via the Bluetooth communication proto(cid:173)
`col.
`
`[0010] There is provided in accordance with another pre(cid:173)
`ferred embodiment of the present invention a device capable
`of communicating with an authenticator. The device
`includes at least one authentication functionality at least part
`of at least one of which forms part of the Bluetooth com(cid:173)
`munication protocol.
`
`[0011] There is provided in accordance with a preferred
`embodiment of the present invention a device capable of
`communicating with an authenticator at least partially using
`a Bluetooth communication protocol. The device includes at
`least one authentication functionality at least part of at least
`one of which employs a Bluetooth communication protocol.
`
`[0012] There is also provided in accordance with a pre(cid:173)
`ferred embodiment of the present invention a system includ(cid:173)
`ing a communication network, at least one authenticator and
`at least one device capable of communicating with the
`authenticator through the communication network, via a
`Bluetooth communication protocol. The device includes at
`least one authentication functionality, at least part of at least
`one of which is operative to communicate authentication
`information via the Bluetooth communication protocol to
`the at least one authenticator.
`
`[0013] There is also provided in accordance with yet
`another preferred embodiment of the present invention a
`system including a communication network, at least one
`authenticator and at least one device capable of communi-
`
`eating communicating with the authenticator through the
`communication network. The device includes at least one
`authentication functionality, at least part of at least one of
`which forms part of the Bluetooth communication protocol.
`[0014] There is also provided in accordance with a pre(cid:173)
`ferred embodiment of the present invention a system includ(cid:173)
`ing a communication network, at least one authenticator and
`at least one device capable of communicating with the
`authenticator through the communication network, via a
`Bluetooth communication protocol. The device includes at
`least one authentication functionality at least part of at least
`one of which employs a Bluetooth communication protocol.
`[0015] There is provided in accordance with another pre(cid:173)
`ferred embodiment of the present invention a system includ(cid:173)
`ing at least one authenticator and at least one device capable
`of communicating with the authenticator via a Bluetooth
`communication protocol. The device includes at least one
`authentication functionality, at least part of at least one of
`which is operative to communicate authentication informa(cid:173)
`tion via the Bluetooth communication protocol to the
`authenticator.
`[0016] There is further provided in accordance with yet
`another preferred embodiment of the present invention a
`system including at least one authenticator and at least one
`device capable of communicating with the authenticator.
`The device includes at least one authentication functionality,
`at least part of at least one of which forms part of the
`Bluetooth communication protocol.
`[0017] There is further provided in accordance with
`another preferred embodiment of the present invention a
`system including at least one authenticator and at least one
`device capable of communicating with the authenticator via
`a Bluetooth communication protocol. The device includes at
`least one authentication functionality at least part of at least
`one of which employs a Bluetooth communication protocol.
`[0018] There is provided in accordance with a preferred
`embodiment of the present invention a system including at
`least one device and at least one second device. Said system
`includes at least one multi -tier authentication functionality,
`at least part of at least one of which operates to communicate
`authentication information via the Bluetooth communication
`protocol to at least one authenticator.
`[0019] There is provided in accordance with a preferred
`embodiment of the present invention a system including at
`least one device and at least one second device. Said system
`includes at least one multi -tier authentication functionality,
`at least part of at least one of which forms part of the
`Bluetooth communication protocol.
`[0020] There is provided in accordance with a preferred
`embodiment of the present invention a system including at
`least one device and at least one second device. Said system
`includes at least one multi-tier authentication functionality at
`least part of at least one of which employs a Bluetooth
`communication protocol.
`[0021] There is further provided in accordance with yet
`another preferred embodiment of the present invention a
`method for authenticating with an authenticator. The method
`includes at least one authentication functionality, at least part
`of at least one of which is operative to communicate
`authentication information via the Bluetooth communication
`protocol.
`
`Canon Exhibit 1019, Page 47
`
`
`
`US 2002/0141586 Al
`
`Oct. 3, 2002
`
`2
`
`[0022] There is further provided in accordance with yet
`another preferred embodiment of the present invention a
`method for authenticating with an authenticator. The method
`includes at least one authentication functionality, at least part
`of at least one of which forms part of the Bluetooth com(cid:173)
`munication protocol.
`
`[0023] There is further provided in accordance with yet
`another preferred embodiment of the present invention a
`method for authenticating with an authenticator. The method
`includes at least one authentication functionality at least part
`of at least one of which employs a Bluetooth communication
`protocol.
`
`[0024] Further in accordance with a preferred embodiment
`of the present invention the device is effective in identifying
`at least one of the device, another device, a user of the device
`and the user of the other device, to at least one authenticator
`coupled to the communication network.
`
`in accordance with a preferred
`[0025] Additionally
`embodiment of the present invention the device is a dedi(cid:173)
`cated authentication device.
`
`[0026] Further in accordance with a preferred embodiment
`of the present invention the device includes substantial
`non-authentication functionality.
`
`[0027] Preferably, the device includes a telephone, a PDA,
`a computer, an electronic wallet and a wireless smart card.
`
`[0028] Further in accordance with a preferred embodiment
`of the present invention the authentication functionality is
`selected from the following authentication functionalities: a
`cryptographic authentication functionality, a password
`based authentication functionality, a smartcard based
`authentication functionality, a token based authentication
`functionality and a biometric based authentication function(cid:173)
`ality.
`
`in accordance with a preferred
`[0029] Additionaly
`embodiment of the present invention the authentication
`functionality forms part of the Bluetooth communication
`protocol.
`
`in accordance with a preferred
`[0030] Additionaly
`embodiment of the present invention the authentication
`functionality includes at least a plurality of the following
`authentication functionalities: a cryptographic authentica(cid:173)
`tion functionality, a password based authentication function(cid:173)
`ality, a smartcard based authentication functionality, a token
`based authentication functionality and a biometric based
`authentication functionality.
`
`in accordance with a preferred
`[0031] Additionaly
`embodiment of the present invention, the authentication
`functionality includes plural authentication functionalities.
`
`[0032] Preferably, the device includes substan