throbber
PCT
`
`PROPERTY ORGANIZATION
`WORLD INTELLECTUAL
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`
`W0 00/42491
`(
`(51) International Patent Classification 7 :
`11) International Publication Number:
`G06F 1/00
`
`(43) International Publication Date:
`20 July 2000 (20.07.00)
`
`
`
`(81) Designated States: AE, AL, AM, AT, AU, AZ, BA, BB, BG,
`(2]) International Application Number:
`PCT/USOO/0071 1
`
`
`BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK, DM, EE,
`ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP,
`
`
`12 January 2000 (12.01.00)
`(22) International Filing Date:
`
`
`KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MA,
`
`MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU,
`
`SD, SE, SG, SI, SK, SL, TJ, TM, TR, 'I'I‘, TZ, UA, UG,
`(30) Priority Data:
`US
`
`
`UZ, VN, YU, ZA, ZW, ARIPO patent (GH, GM, KE, LS,
`60/ 1 16,006
`15 January 1999 (15.01.99)
`US
`MW, SD, SL, SZ, TZ, UG, ZW), Eurasian patent (AM, AZ,
`30 March 1999 (30.03.99)
`09/28 1 ,0 17
`US
`BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, BE,
`24 November 1999 (24.11.99)
`09/449, l 59
`
`
`CH, CY, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC,
`
`NL, PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, GA,
`GN, GW, ML, MR, NE, SN, TD, TG).
`(71) Applicant: RAINBOW TECHNOLOGIES, INC. [US/US]; 50
`
`Technology Drive, Irvine, CA 92618 (US).
`
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`
`
`(72) Inventors: ABBOTT, Shawn, D.; 305 Pinnacle Ridge Place,
`RR12, Calgary, Alberta T3E 6W3 (CA). AFGHANI,
`Bahram; 891 Tia Juana Street, Laguna Beach, CA 92651
`(US).
`SOTOODEH, Mehdi;
`17 Paloma Drive, Mission
`Viejo, CA 92692 (US). DENTON, Norman, L., III; 34052
`Capo—by—the—Sea, Dana Point, CA 92629 (US). LONG,
`Calvin, W.; 1260 Oakhaven Lane, Arcadia, CA 91006 (US).
`PUNT, Maarten, G.; 24942 Paseo Arboleda, Lake Forest,
`CA 92630 (US). ANDERSON, Allan, D.; 11158 Bertha
`Place, Cerritos, CA 90703 (US). GODDING, Patrick, N.;
`22665 Shady Grove Circle, Lake Forest, CA 92630 (US).
`
`
`
`
`
`
`
`
`
`
`
`(74) Agent: COOPER, Victor, G.; Gates & Cooper, Suite 1050,
`6701 Center Drive, West, Los Angeles, CA 90025 (US).
`
`
`
`(54) Title: USE—COMPLIANT PERSONAL KEY WITH INTEGRAL INPUT AND OUTPUT DEVICES
`
`
`
`
`
`(57) Abstract
`
`A compact, self—contained, personal key is disclosed. The personal key comprises a USE—compliant interface (206) releasably coupl
`cable to a host processing device (102); a memory (214); and a processor (212). The processor (212) provides the host processing device
`(102) conditional access to data storable in the memory (214) as well as the functionality required to manage files stored in the personal key
`and for performing computations based on the data in the files. In One embodiment, the personal key also comprises an integral user input
`device (218) and an integral user output device (222). The input and output devices (218, 222) communicate with the processor (212) by
`communication paths (220, 222) which are independent from the USE—compliant interface (206), and thus allow the user to communicate
`with the processor (212) without manifesting any private information external to the personal key.
`
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 1 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 1 of 57
`
`

`

`Singapore
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`Cdte d‘Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People's
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`N0
`NZ
`PL
`PT
`R0
`RU
`SD
`SE
`SG
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`ZW
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`Zimbabwe
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 2 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 2 of 57
`
`

`

`WO 00/42491
`
`PCT/USOO/00711
`
`USB-COMPLLANT PERSONAL KEY WITH
`
`INTEGRAL INPUT AND OUTPUT DEVICES
`
`10
`
`15
`
`2O
`
`25
`
`BACKGROUND OF THE INVENTION
`
`1.
`
`Field ofthe Invention
`
`The present invention relates to computer peripherals, and in particular to a
`
`personal key having input and output devices integrated therewith to provide for
`
`increased security
`
`2.
`
`Description of the Related Art
`
`In the last decade, the use of personal computers in both the home and in the
`
`office have become widespread. These computers provide a high level of
`
`functionality to many people at a moderate price, substantially surpassing the
`
`performance of the large mainframe computers of only a few decades ago. The trend
`
`is further evidenced by the increasing popularity of laptop and notebook computers,
`
`which provide high—performance computing power on a mobile basis.
`
`The widespread availability of personal computers has had a profound impact
`
`on interpersonal communications as well. Only a decade ago, telephones or fax
`
`machines offered virtually the only media for rapid business communications. Today,
`
`a growing number of businesses and individuals communicate via electronic mail
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 3 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 3 of 57
`
`

`

`WO 00/4249]
`
`PCT/USOO/007ll
`
`-2-
`
`(e-mail). Personal computers have also been instrumental in the emergence of the
`
`lntemet and its growing use as a medium of commerce.
`
`While certainly beneficial, the growing use of computers in personal
`
`communications, commerce, and business has also given rise to a number of unique
`
`5
`
`challenges.
`
`First, the growing use of computers has resulted in extensive unauthorized use
`
`and copying of computer software, costing software developers substantial revenue.
`
`Although unauthorized copying or use of software is a violation of the law, the
`
`widespread availability of pirated software and enforcement difficulties have limited
`
`to
`
`the effectiveness ofthis means ofpreventing software piracy.
`
`Software developers and computer designers alike have sought technical
`
`solutions to attack the problem of software piracy. One solution uses an external
`
`device known as a hardware key, or "dongle" coupled to an input/output (1/0) port of
`
`the host computer.
`
`15
`
`While the use of such hardware keys is an effective way to reduce software
`
`piracy, to date, their use has been substantially limited to high value software
`
`products. Hardware keys have not been widely applied to popular software packages,
`
`in part, because the hardware keys are too expensive, and in part, because there is a
`
`reluctance on the part of the application program user to bother with a hardware key
`
`20
`
`whenever use of the protected program is desired. Also, in many cases, the hardware
`
`keys are designed for use with only one application. Hence, where the use of multiple
`
`applications on the same computer is desired, multiple hardware keys must be
`
`operated at the same time.
`
`While it reflects a tremendous advance over telephones and facsimile
`
`25
`
`machines, e-mail also has its problems. One of these problems involves security.
`
`Telephone lines are relatively secure and a legally sanctioned way to engage in the
`
`private transmission of information, however, e-mails are generally sent over the
`
`Internet with no security whatsoever. Persons transmitting electronic messages must
`
`be assured that their messages are not opened or disclosed to unauthorized persons.
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 4 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 4 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-3-
`
`'JI
`
`10
`
`Further, the addressee of the electronic message should be certain of the identity of the
`
`sender and that the message was not tampered with at some point during transmission.
`
`Although the packet—switching nature of Internet communications helps to
`
`minimize the risk of intercepted communications, it would not be difficult for a
`
`determined interloper to obtain access to an unprotected e-mail message.
`
`Many methods have been developed to secure the integrity of electronic
`
`messages during transmission, Simple encryption is the most common method of
`
`securing data. Both secret key encryption such as DES (Data Encryption Standard) and
`
`public key encryption methods that use both a public and a private key are implemented.
`
`Public and private key encryption methods allow users to send Intemet and e-mail
`
`messages without concern that the message will be read by unauthorized persons or that
`
`its contents will be tampered with. However, key cryptographic methods do not protect
`
`the receiver of the message, because they do not allow the recipient to authenticate the
`
`validity of the public key or to validate the identity of the sender of the electronic
`
`15
`
`message.
`
`The use of digital certificates presents one solution to this problem. A digital
`
`certificate is a signed document attesting to the identity and public key of the person
`
`signing the message. Digital certificates allow the recipient to validate the authenticity of
`
`a public key. However, the typical user may use e—mail to communicate with hundreds
`
`of persons, and may use any one of several computers to do so. Hence, a means for
`
`managing a number of digital certificates across several computer platforms is needed.
`
`Internet commerce raises other challenges. Users seeking to purchase goods or
`
`services using the Internet must be assured that their credit card numbers and the like are
`
`safe from compromise. At the same time, vendors must be assured that services and
`
`goods are delivered only to those who have paid for them. In many cases, these goals
`
`are accomplished with the use of passwords. However, as Internet commerce becomes
`
`more commonplace, customers are finding themselves in a position where they must
`
`either decide to use a small number of passwords for all transactions, or face the
`
`daunting task of remembering multiple passwords. Using a small number of passwords
`
`for all transactions inherently compromises security, since the disclosure of any of the
`
`20
`
`25
`
`3O
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 5 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 5 of 57
`
`

`

`WO 00/42491
`
`PCT/USOO/007ll
`
`.4-
`
`passwords may lead to a disclosure of the others. Even the use of a large number of
`
`passwords can lead to compromised security. Because customers commonly forget their
`
`password, many Internet vendors provide an option whereby the user can be reminded of
`
`their password by providing other personal information such as their birthplace, mother's
`
`5
`
`maiden name, and/or social security number. This feature, while often necessary to
`
`promote Internet commerce, severely compromises the password by relying on ”secret"
`
`information that is in fact, publicly available.
`
`Even in cases where the useris willing and able to keep track of a large number
`
`of passwords, the password security technique is often compromised by the fact that the
`
`10
`
`user is inclined to select a password that is relatively easy to remember. It is indeed rare
`
`that a user selects a truly random password. What is needed is a means for generating
`
`and managing random passwords that can be stored and recalled for use on a wide
`
`variety of computer platforms.
`
`Internet communications have also seen the increased use of "cookies." Cookies
`
`15
`
`comprise data and programs that keep track of a user‘s patterns and preferences that
`
`can be downloaded from the Internet server for storage on the user's computer.
`
`Typically, cookies contain a range of addresses. When the browser encounters those
`
`addresses again, the cookies associated with the addresses are provided to the Internet
`
`server. For example, ifa user's password were stored as a cookie, the use ofthe
`
`20
`
`cookie would allow the user to request services or goods without requiring that the
`
`user enter the password again when accessing that service for the second and
`
`subsequent time.
`
`However beneficial, cookies can also have their dark side. Many users object
`
`to storage of cookies on their computer's hard drive. In response to these concerns,
`
`25
`
`Internet browser software allows the user to select an option so that they are notified
`
`before cookies are stored or used. The trouble with this solution is that this usually
`
`results in an excessive number ofmessages prompting the user to accept cookies. A
`
`better solution than this all-or-nothing approach would be to allow the storage and/or
`
`use of cookies, but to isolate and control that storage and use to comply with user—
`
`30
`
`specified criteria.
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 6 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 6 of 57
`
`

`

`W0 00/4249]
`
`PCT/USOO/00711
`
`-5-
`
`Smartcard provide some of the above mentioned functionality, but smartcards
`
`do not present an ideal solution. First, personal keys are only valuable to the user if
`
`they offer a single, widely accepted secure repository for digital certificates and
`
`passwords. Smartcard readers are relatively expensive, and are not in wide use, at
`
`5
`
`least in the United States, and are therefore unsuited to the task.
`
`Second, smartcards do not provide for entering data directly into the card.
`
`This opens the smartcard to possible sniffer modules in malicious software, which can
`
`monitor the smartcard—reader interface to determine the user’s personal identification
`
`or password information. This problem is especially problematic in situations where
`
`10
`
`the user is using an unknown or untrusted smartcard reader. The lack of any direct
`
`input device also prevents the user from performing any smartcard-related functions in
`
`the relatively common situation where no smartcard reader is available.
`
`Third, data cannot be accessed from the smartcard unless the smartcard is in
`
`the reader. This prevents the user from viewing data stored in the smartcard (ie. a
`
`15
`
`stored password) until a smartcard reader can be located. Given that smartcard
`
`readers (especially trusted ones) can be difficult to find, this substantially limits the
`
`usefulness of the card. Of course, the user may simply write the password down on
`
`paper, but this may compromise the security of all of the data in the card, and is
`
`inconsistent with the goal of providing a central, secure, portable repository for private
`
`20
`
`data.
`
`From the foregoing, it can be seen that there is a need for a personal key that
`
`allows the user to store and retrieve passwords and digital certificates without
`
`requiring the use of vulnerable external interfaces.
`
`25
`
`SUMMARY OF THE INVENTION
`
`The present invention satisfies all of these needs with a personal key in a form
`
`factor that is compliant with a commonly available I/O interface such as the Universal
`
`Serial Bus (USE). The personal key includes a processor and a memory which
`
`30
`
`implement software protection schemes to prevent copying and unauthorized use.
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 7 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 7 of 57
`
`

`

`W0 00/4249]
`
`PCT/USOO/0071 l
`
`-6-
`
`The personal key provides for the storage and management of digital certificates,
`
`allowing the user to store all ofhis digital certificates in one media that is portable
`
`from platform to platform. The personal key provides for the generation, storage, and
`
`management of many passwords, providing additional security and relieving the user
`
`from the task of remembering multiple passwords. The personal key provides a
`
`means to store cookies and other J ava—implemented software programs, allowing the
`
`user to accept cookies in a removable and secure form-factor. These features are
`
`especially useful when the present invention is used in a virtual private network
`
`(VPN). The present invention can also be used for several applications
`
`Because the personal key is capable of storing virtually all of the user‘s
`
`sensitive information, it is important that the personal key be as secure as possible.
`
`Hence, one embodiment of the personal key also comprises a biometric sensor
`
`disposed to measure biometrics such as fingerprint data. The biometric sensor
`
`measures characteristics of the person holding the key (such as fingerprints) to
`
`confirm that the person possessing the key is the actual owner ofthe key.
`
`Since the personal key represents a single, secure repository for a great deal of
`
`the data the user will need to use and interact with a variety of computer platforms, it
`
`is also important that the personal key be able to interface (i.e., transmit and receive
`
`data) with a large variety of computers and computer peripherals. Hence, one
`
`embodiment of the personal key includes an electromagnetic wave transception device
`
`such as an infrared (IR) transceiver. This transceiver allows the personal key to
`
`exchange information with a wide variety of computers and peripherals without
`
`physical coupling.
`
`The present invention is well suited for controlling access to network services,
`
`or anywhere a password, cookie, digital certificate, or smartcard might otherwise be
`
`used, including:
`
`' Remote access servers, including Internet protocol security (IPSec), point
`
`to point tunneling protocol (PPTP), password authentication protocol
`
`(PAP), challenge handshake authentication protocol (CHAP), remote
`
`10
`
`20
`
`25
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 8 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 8 of 57
`
`

`

`WO 00/42491
`
`PCT/USOO/OO711
`
`access dial-in user service (RADIUS), terminal access controller access
`
`control system (TACACS);
`
`Providing Extranet and subscription—based web access control, including
`
`hypertext transport protocol (HTTP), secure sockets layer (SSL);
`
`Supporting secure online banking, benefits administration, account
`
`management;
`
`Supporting secure workflow and supply chain integration (form signing);
`
`Preventing laptop computer theft (requiring personal key for laptop
`

`
`‘
`
`'
`
`~
`
`operation);
`
`- Workstation logon authorization;
`
`-
`
`-
`
`-
`
`Preventing the modification or copying of software;
`
`Encrypting files;
`
`Supporting secure e-mail, for example, with secure multipurpose Internet
`
`mail extensions (S/MIME), and open pretty good privacy (OpenPGP)
`
`' Administering network equipment administration; and
`
`-
`
`' Electronic wallets, with, for example, secure electronic transaction (SET,
`
`MilliCent, eWallet)
`
`In one embodiment, the present invention comprises a compact, self-
`
`contained, personal token or key. The personal key comprises a USE—compliant
`
`interface releaseably coupleable to a host processing device; a memory; and a
`
`processor. The processor provides the host processing device conditional access to
`
`data storable in the memory as well as the functionality required to manage files
`
`stored in the personal key and for performing computations based on the data in the
`
`files.
`
`In one embodiment, the personal key also comprises an integral user input
`
`device and an integral user output device. The input and output devices communicate
`
`with the processor by communication paths which are independent from the USB-
`
`compliant interface, and thus allow the user to communicate with the processor
`
`without manifesting any private information external to the personal key.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 9 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 9 of 57
`
`

`

`W0 00/4249]
`
`PCT/USOO/00711
`
`-8-
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Referring now to the drawings in which like reference numbers represent
`
`corresponding parts throughout:
`
`FIG. I is a diagram showing an exemplary hardware environment for
`
`practicing the present invention;
`
`FIG. 2 is a block diagram illustrating selected modules ofone embodiment of
`
`the present invention;
`
`FIG. 3 is a diagram of the memory resources provided by the memory of the
`
`personal key;
`
`FIG. 4 is a diagram showing one embodiment of how an encryption engine is
`
`used to authenticate the identity of the personal key or the application data stored
`
`therein;
`
`FIG. 5 is a diagram illustrating the data contents of a file system memory
`
`resource of an active personal key that provides authentication and specific
`
`configuration data for several application;
`
`FIG. 6 is a diagram presenting an illustration of one embodiment of the
`
`personal key;
`
`FIGS. 7A—7C are diagrams showing one embodiment of the personal key
`
`having an input device including a first pressure sensitive device and a second
`
`pressure sensitive device, each communicatively coupled the processor by a
`
`communication path distinct from the USB-compliant interface;
`
`FIGS. 8A-8C are diagrams presenting an illustration of another embodiment of
`
`the present invention;
`
`FIG. 9 is a flow chart illustrating an embodiment of the present invention in
`
`which processor operations are subject to user authorization; and
`
`FIG. 10 is a flow chart illustrating an embodiment of the present invention in
`
`which the PIN is entered directly into the personal key.
`
`10
`
`IS
`
`20
`
`25
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 10 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 10 of 57
`
`

`

`W0 00/4249]
`
`-9-
`
`PCT/USOO/00711
`
`DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
`
`In the following description, reference is made to the accompanying drawings
`
`which form a part hereof, and which is shown, by way of illustration, several
`
`embodiments of the present invention. It is understood that other embodiments may
`
`5
`
`be utilized and structural changes may be made without departing from the scope of
`
`the present invention.
`
`Hardware Environment
`
`FIG.
`
`1 illustrates an exemplary computer system 100 that could be used to
`
`to
`
`implement the present invention. The computer 102 comprises a processor 104 and a
`
`memory, such as random access memory (RAM) 106. The computer 102 is
`
`operatively coupled to a display 122, which presents images such as windows to the
`
`user on a graphical user interface 118B. The computer 102 may be coupled to other
`
`devices, such as a keyboard 114, a mouse device 116, a printer 128, etc. Of course,
`
`15
`
`those skilled in the art will recognize that any combination of the above components,
`
`or any number of different components, peripherals, and other devices, may be used
`
`with the computer 102.
`
`Generally, the computer 102 operates under control of an operating system 108
`
`stored in the memory 106, and interfaces with the user to accept inputs and commands
`
`20
`
`and to present results through a graphical user interface (GUI) module 118A.
`
`Although the GUI module 118A is depicted as a separate module, the instructions
`
`performing the GUI functions can be resident or distributed in the operating system
`
`108, the computer program 110, or implemented with special purpose memory and
`
`processors. The computer 102 also implements a compiler 112 which allows an
`
`25
`
`application program 110 written in a programming language such as COBOL, C++,
`
`FORTRAN, or other language to be translated into processor 104 readable code.
`
`After completion, the application 110 accesses and manipulates data stored in the
`
`memory 106 of the computer 102 using the relationships and logic that are generated
`
`using the compiler 112. The computer 102 also comprises an input/output (I/O) port
`
`30
`
`130 for a personal token 200 (hereinafter alternatively referred to also as a personal
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 11 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 11 of 57
`
`

`

`WO 00/42491
`
`PCT/USOO/007ll
`
`-10-
`
`key 200). In one embodiment, the I/O port 130 is a USE-compliant port
`
`implementing a USE-compliant interface.
`
`In one embodiment, instructions implementing the operating system 108, the
`
`computer program 110, and the compiler 112 are tangibly embodied in a computer-
`
`readable medium, e.g., data storage device 120, which could include one or more
`
`fixed or removable data storage devices, such as a zip drive, floppy disc drive 124,
`
`hard drive, CD-ROM drive, tape drive, etc. Further, the operating system 108 and the
`
`computer program 1 10 are comprised of instructions which, when read and executed
`
`by the computer 102, causes the computer 102 to perform the steps necessary to
`
`implement and/or use the present invention. Computer program 110 and/or operating
`
`instructions may also be tangibly embodied in memory 106 and/or data
`
`communications devices, thereby making a computer program product or article of
`
`manufacture according to the invention. As such, the terms "article of manufacture"
`
`and "computer program product" as used herein are intended to encompass a computer
`
`program accessible from any computer readable device or media.
`
`The computer 102 may be communicatively coupled to a remote computer or
`
`server 134 via communication medium 132 such as a dial—up network, a wide area
`
`network (WAN), local area network (LAN), virtual private network (VPN) or the
`
`Intemet. Program instructions for computer operation, including additional or
`
`alternative application programs can be loaded from the remote computer/server 134.
`
`In one embodiment, the computer 102 implements an Internet browser, allowing the
`
`user to access the world wide web (WWW) and other internet resources.
`
`Those skilled in the art will recognize that many modifications may be made to
`
`this configuration without departing from the scope of the present invention. For
`
`example, those skilled in the an will recognize that any combination of the above
`
`components, or any number of different components, peripherals, and other devices,
`
`may be used with the present invention.
`
`Architectural Overview
`
`FIG. 2 is a block diagram illustrating selected modules of the present
`
`invention. The personal key 200 communicates with and obtains power from the host
`
`10
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 12 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 12 of 57
`
`

`

`W0 00/4249]
`
`PCT/USOO/007ll
`
`-11-
`
`computer through a USE-compliant communication path 202 in the USE-compliant
`
`interface 204 which includes the input/output port 130 ofthe host computer 102 and a
`
`matching input/output (L’O) port 206 on the personal key 200. Signals received at the
`
`personal key I/O port 206 are passed to and from the processor 212 by a driver/buffer
`
`208 via communication paths 210 and 216. The processor 212 is communicatively
`
`coupled to a memory 214, which may store data and instructions to implement the
`
`above-described features of the invention In one embodiment, the memory 214 is a
`
`non-volatile random-access memory that can retain factory-supplied data as well as
`
`customer-supplied application related data. The processor 212 may also include some
`
`internal memory for performing some of these functions.
`
`The processor 212 is optionally communicatively coupled to an input device
`
`218 via an input device communication path 220 and to an output device 222 via an
`
`output device communication path 224, both of which are distinct from the USB-
`
`compliant interface 204 and communication path 202. These separate communication
`
`paths 220 and 224 allow the user to view information about processor 212 operations
`
`and provide input related to processor 212 operations without allowing a process or
`
`other entity with visibility to the USE-compliant interface 204 to eavesdrop or
`
`intereede. This permits secure communications between the key processor 212 and
`
`the user.
`
`In one embodiment ofthe invention set forth more fully below, the user
`
`communicates directly with the processor 212 by physical manipulation of mechanical
`
`switches or devices aetuatable from the external side of the key (for example, by
`
`pressure-sensitive devices such as buttons and mechanical switches).
`
`In another
`
`embodiment of the invention set forth more fully below, the input device includes a
`
`wheel with tactile detents indicating the selection of characters.
`
`The input device and output devices 218, 222 may cooperatively interact with
`
`one another to enhance the functionality of the personal key 200. For example, the
`
`output device 222 may provide information prompting the user to enter information
`
`into the input device 218. For example, the output device 222 may comprise a visual
`
`display such as an alphanumeric LED or LCD display (which can display Arabic
`
`numbers and or letters) and/or an aural device. The user may be prompted to enter
`
`U-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 13 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 13 of 57
`
`

`

`W0 00/4249]
`
`-12-
`
`PCT/US00/00711
`
`information by a beeping of the aural device, by a flashing pattern of the LED, or by
`
`both. The output device 222 may also optionally be used to confirm entry of
`
`information by the input device 218. For example, an aural output device may beep
`
`when the user enters information into the input device 218 or when the user input is
`
`invalid. The input device 218 may take one of many forms, including different
`
`combinations of input devices.
`
`Although the input device communication path 220 and the output device
`
`communication path 224 are illustrated in FIG. 2 as separate paths, the present
`
`invention can be implemented by combining the paths 220 and 224 while still
`
`retaining a communication path distinct from the USE-compliant interface 204. For
`
`example, the input device 218 and output device 222 may be packaged in a single
`
`device and communications with the processor 212 multiplexed over a single
`
`communication path.
`
`In one embodiment of the invention, the present invention further comprises a
`
`second output device 222 that may be coupled to the USE-compliant interface 204
`
`instead of being coupled to the processor via a communication path distinct from the
`
`USE-compliant interface 204. This embodiment may be used, for example, to
`
`indicate to the user that the personal key 200 has been correctly inserted into the host
`
`computer’s USB port (for example, by providing an indication of a power signal of
`
`the USE-compliant interface). The second output device may also be used to show
`
`that data is passing to and from the host computer and the personal key 200 (for
`
`example, by providing an indication of a data signal from the USE-compliant
`
`interface).
`
`The personal key has an interface including a USB driver module 266
`
`communicatively coupled to an application program interface (API) 260 having a
`
`plurality of API library routines. The API 260 provides an interface with the
`
`application 110 to issue commands and accept results from the personal key 200. In
`
`one embodiment, a browser 262, such as the browser available from NETSCAPE, Inc.
`
`operates with the API 260 and the public key cryptographic standard (PKCS) module
`
`264 to implement a token-based user authentication system.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`|PR2019-00884 (US 8,539,047)
`Exhibit 2079
`
`Page 14 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884 (US 8,539,047)
`Exhibit 2079
`Page 14 of 57
`
`

`

`WO 00/42491
`
`PCT/USOO/007ll
`
`-13-
`
`While the portability and utility of the personal key has many advantages, it
`
`also has one important disadvantage. . .it can be lost or stolen. This is especially
`
`troublesome because the personal key 200 represents a secu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket