throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`
` (11) International Publication Number:
`
`(22) International Filing Date:
`
`12 January 2000 (12.01.00)
`
`(30) Priority Data:
`60/1 16,006
`09/281,017
`09/449,159
`
`15 January 1999 (15.01.99)
`30 March 1999 (30.03.99)
`24 November 1999 (24.11.99)
`
`US
`US
`US
`
`
`
`
`
`
`WO 00/42491
`(51) International Patent Classification 7 :
`20 July 2000 (20.07.00)
`G06F 1/00
`
`
`(43) International Publication Date:
`
`
`
`
`(21) International Application Number: PCT/US00/00711|(81) Designated States; AE, AL, AM, AT, AU, AZ, BA, BB, BG,
`
`
`BR, BY, CA, CH, CN, CR, CU, CZ, DE, DK, DM, EE,
`ES, FI, GB, GD, GE, GH, GM, HR, HU,ID,IL,IN,IS, JP,
`KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MA,
`MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU,
`SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, TZ, UA, UG,
`
`UZ, VN, YU, ZA, ZW, ARIPO patent (GH, GM, KE,LS,
`MW,SD, SL, 8Z, TZ, UG, ZW), Eurasian patent (AM, AZ,
`BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, BE,
`
`CH, CY, DE, DK,ES, FI, FR, GB, GR, IE, IT, LU, MC,
`NL, PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, GA,
`
`GN, GW, ML, MR, NE, SN, TD, TG).
`
`
`
`
`
`
` 220
`
`
`
`(71) Applicant: RAINBOW TECHNOLOGIES, INC. [US/US]; 50
`Technology Drive, Irvine, CA 92618 (US).
`
`(72) Inventors: ABBOTT, Shawn, D.; 305 Pinnacle Ridge Place,
`RR12, Calgary, Alberta T3E 6W3 (CA). AFGHANI,
`Bahram; 891 Tia Juana Street, Laguna Beach, CA 92651
`(US).
`SOTOODEH, Mehdi;
`17 Paloma Drive, Mission
`Viejo, CA 92692 (US). DENTON, Norman,L., TI; 34052
`Capo-by-the-Sea, Dana Point, CA 92629 (US). LONG,
`Calvin, W.; 1260 Oakhaven Lane, Arcadia, CA 91006 (US).
`PUNT, Maarten, G.; 24942 Paseo Arboleda, Lake Forest,
`CA 92630 (US). ANDERSON,Allan, D.; 11158 Bertha
`Place, Cerritos, CA 90703 (US). GODDING,Patrick, N.;
`22665 Shady Grove Circle, Lake Forest, CA 92630 (US).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`
`
`
`
`
`
`
`
`
`
`(74) Agent: COOPER, Victor, G.; Gates & Cooper, Suite 1050,
`6701 Center Drive, West, Los Angeles, CA 90025 (US).
`
`(54) Title: USB-COMPLIANT PERSONAL KEY WITH INTEGRAL INPUT AND OUTPUT DEVICES
`
`INPUT
`DEVICE
`
`OUTPUT}
`DEVICE
`
`|BIOMETRIC
`SENSOR
`
`(57) Abstract
`
`A compact, self—contained, personal key is disclosed. The personal key comprises a USB-compliant interface (206) releasably coupl
`eable to a host processing device (102); a memory (214); and a processor (212). The processor (212) provides the host processing device
`(102) conditional access to data storable in the memory (214) as well as the functionality required to managefiles stored in the personal key
`and for performing computations based on the data in the files. In one embodiment, the personal key also comprises an integral user input
`device (218) and anintegral user output device (222). The input and output devices (218, 222) communicate with the processor (212) by
`communication paths (220, 222) which are independent from the USB-compliant interface (206), and thus allow the user to communicate
`with the processor (212) without manifesting any private information external to the personal key.
`
`
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 1 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 1 of 57
`
`

`

`Zimbabwe
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`i§
`Slovenia
`Albania
`ES
`Slovakia
`FI
`SK
`Armenia
`FR
`SN
`Austria
`Senegal
`GA
`SZ
`Swaziland
`Australia
`TD
`Chad
`GB
`Azerbaijan
`TG
`Togo
`Bosnia and Herzegovina
`Barbados
`TJ
`Tajikistan.
`Turkmenistan
`Belgium
`Burkina Faso
`Turkey
`Trinidad and Tobago
`Bulgaria
`Ukraine
`Benin
`Brazil
`Uganda
`Belarus
`United States of America
`Uzbekistan
`Canada
`Viet Nam
`Central African Republic
`Yugoslavia
`Congo
`Switzerland
`Céte dIvoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`™T
`
`R
`TT
`UA
`UG
`us
`UZ
`VN
`YU
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`
`Page 2 of 57
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Treland
`Tsrael
`Iceland.
`Ttaly
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`GH
`GN
`GR
`HU
`IE
`IL
`Is
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`ul
`LK
`LR
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`Mx
`NE
`NL
`NO
`NZ
`PL
`PT
`RO
`RU
`sD
`SE
`8G
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 2 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`USB-COMPLIANT PERSONALKEY WITH
`
`INTEGRAL INPUT AND OUTPUT DEVICES
`
`BACKGROUND OF THE INVENTION
`
`1,
`
`Field of the Invention
`
`The present invention relates to computerperipherals, and in particular to a
`
`personal key having input and output devices integrated therewith to provide for
`
`increased security.
`
`2.
`
`
`Description of the Related Art
`
`In the last decade,the use of personal computers in both the home and in the
`
`office have become widespread. These computers provide a highlevel of
`
`20
`
`functionality to many people at a moderate price, substantially surpassing the
`
`performanceofthe large mainframe computersof only a few decades ago. The trend
`
`is further evidenced by the increasing popularity of laptop and notebook computers,
`
`which provide high-performance computing power on a mobile basis.
`
`The widespread availability of personal computers has had a profound impact
`
`25
`
`on interpersonal communications as well. Only a decade ago, telephonesor fax
`
`machinesoffered virtually the only media for rapid business communications. Today,
`a growing numberofbusinesses and individuals communicate via electronic mail
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 3 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 3 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`2.
`
`(e-mail). Personal computers have also been instrumental in the emergenceofthe
`
`Internet and its growing use as a medium of commerce.
`
`While certainly beneficial, the growing use of computers in personal
`
`communications, commerce, and business hasalso given rise to a number of unique
`
`A
`
`challenges.
`
`First, the growing use of computers has resulted in extensive unauthorized use
`
`and copying of computersoftware, costing software developers substantial revenue.
`
`Although unauthorized copyingoruse of software is a violation of the law, the
`
`widespreadavailability of pirated software and enforcement difficulties have limited
`
`10
`
`the effectiveness of this means of preventing software piracy.
`
`Software developers and computer designers alike have sought technica!
`
`solutions to attack the problemof software piracy. One solution uses an external
`
`device knownas a hardwarekey, or "dongle" coupled to an input/output (I/O) port of
`
`the host computer.
`
`15
`
`While the use of such hardware keysis an effective way to reduce software
`
`piracy, to date, their use has been substantially limited to high value software
`
`products. Hardware keys have not been widely applied to popular software packages,
`
`in part, because the hardware keys are too expensive, and in part, because thereis a
`
`reluctance on thepart of the application program user to bother with a hardware key
`
`20
`
`wheneveruse of the protected programis desired. Also, in many cases, the hardware
`
`keys are designed for use with only one application. Hence, where the use of multiple
`
`applications on the same computeris desired, multiple hardware keys must be
`
`operated at the same time.
`
`Whileit reflects a tremendous advance over telephones and facsimile
`
`25
`
`machines, e-mail also has its problems. Oneof these problems involves security.
`
`Telephonelinesarcrelatively secure and a legally sanctioned way to engage in the
`
`private transmission of information, however, e-mails are generally sent over the
`
`Internet with no security whatsoever. Persons transmitting electronic messages must
`
`be assured that their messages are not openedor disclosed to unauthorized persons.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`
`Page 4 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 4 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`3.
`
`Further, the addressee of the electronic message should be certain of the identity of the
`
`sender and that the message was not tampered with at some point during transmission.
`
`Although the packet-switching nature of Internet communications helps to
`
`minimizethe risk of intercepted communications, it would not be difficult for a
`
`wa
`
`determined interloper to obtain access to an unprotected e-mail message.
`
`Many methods have been developed to secure the integrity of electronic
`
`messages during transmission. Simple encryption is the most common method of
`
`securing data. Both secret key encryption such as DES (Data Encryption Standard) and
`
`public key encryption methodsthat use both a public and a private key are implemented.
`
`Public and private key encryption methodsallowusers to send Internet and e-mail
`
`messages without concern that the message will be read by unauthorized personsor that
`
`its contents will be tampered with. However, key cryptographic methods do notprotect
`
`the receiver of the message, because they do not allow the recipient to authenticate the
`
`validity of the public key or to validate the identity of the sender of the electronic
`
`message.
`
`The useof digital certificates presents one solution to this problem. A digital
`
`certificate is a signed documentattesting to the identity and public key of the person
`
`signing the message.Digital certificates allow the recipient to validate the authenticity of
`
`a public key. However, the typical user may use e-mail to communicate with hundreds
`
`20
`
`of persons, and may use any one of several computers to do so. Hence, a meansfor
`
`managing a numberof digital certificates across several computer platformsis needed.
`
`Internet commerceraises other challenges. Users seeking to purchase goods or
`
`services using the Internet must be assured thattheir credit card numbersandthe like are
`
`safe from compromise. At the same time, vendors must be assured that services and
`
`25
`
`goods are delivered only to those who have paid for them. In many cases, these goals
`
`are accomplished with the use of passwords. However,as Internet commerce becomes
`
`more commonplace, customersare finding themselves in a position where they must
`
`either decide to use a small numberof passwordsforall transactions, or face the
`
`daunting task of remembering multiple passwords. Using a small number of passwords
`
`30
`
`for all transactions inherently compromisessecurity, since the disclosure of any of the
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 5 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 5 of 57
`
`

`

`WO00/42491
`
`PCT/US00/00711
`
`4.
`
`passwords maylead to a disclosure of the others. Even the use of a large numberof
`
`passwords can lead to compromised security. Because customers commonlyforget their
`
`password, many Internet vendors provide an option wherebythe user can be reminded of
`
`their password by providing other personal information such as their birthplace, mother's
`
`wn
`
`maiden name, and/orsocial security number. This feature, while often necessary to
`
`promote Internet commerce, severely compromises the password byrelying on "secret"
`
`information thatis in fact, publicly available.
`
`Even in cases where the user is willing and able to keep track of a large number
`
`of passwords, the password security techniqueis often compromised bythe fact that the
`
`10
`
`user ts inclinedto select a passwordthatis relatively easy to remember.
`
`It 1s indeed rare
`
`that a userselects a truly random password. What is needed is a meansfor generating
`
`and managing random passwordsthat can be stored and recalled for use on a wide
`
`variety of computerplatforms.
`
`Internet communications have also seen the increased use of "cookies." Cookies
`
`15
`
`comprise data and programsthat keep track of a user's patterns and preferencesthat
`
`can be downloaded from the Internet server for storage on the user's computer.
`
`Typically, cookies contain a range of addresses. When the browser encounters those
`
`addresses again, the cookies associated with the addresses are provided to the Internet
`
`server. For example, if a user's password were stored as a cookie, the use of the
`
`20
`
`cookie would allow the user to request services or goods without requiring that the
`
`user enter the password again when accessing that service for the second and
`
`subsequenttime.
`
`Howeverbeneficial, cookies can also have their dark side. Many users object
`
`to storage of cookies on their computer's hard drive. In response to these concerns,
`
`25
`
`Internet browser software allows the user to select an option so that they are notified
`
`before cookies are stored or used, The trouble with this solution is that this usually
`
`results in an excessive numberof messages prompting the user to accept cookics. A
`
`better solution thanthis all-or-nothing approach would beto allowthe storage and/or
`
`use of cookies, but to isolate and control that storage and use to comply with user-
`
`30
`
`specified criteria.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 6 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 6 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`5.
`
`Smartcard provide someof the above mentioned functionality, but smartcards
`
`do not present an ideal solution, First, personal keys are only valuableto the userif
`
`they offer a single, widely accepted secure repository for digital certificates and
`
`passwords. Smartcard readers are relatively expensive, and are not in wideuse, at
`
`wm
`
`least in the United States, and are therefore unsuited to the task.
`
`Second, smartcards do not provide for entering data directly into the card.
`
`This opens the smartcard to possible sniffer modules in malicious software, which can
`
`monitor the smartcard-reader interface to determinethe user’s personalidentification
`
`or password information. This problem is especially problematic in situations where
`
`10
`
`the user is using an unknownor untrusted smartcard reader. The lack of any direct
`
`input device also prevents the user from performing any smartcard-related functions in
`
`the relatively common situation where no smartcard readeris available.
`
`Third, data cannot be accessed from the smartcard unless the smartcard is in
`
`the reader. This prevents the user from viewing data stored in the smartcard (i.e. a
`
`stored password) until a smartcard reader can be located. Given that smartcard
`
`readers (especially trusted ones) can be difficult to find, this substantially limits the
`
`usefulness of the card. Of course, the user may simply write the password down on
`
`paper, but this may compromise the security of all of the data in the card, andis
`
`inconsistent with the goal of providing a central, secure, portable repository for private
`
`20
`
`data.
`
`From the foregoing, it can be seen that there is a need for a personal key that
`
`allowsthe userto store and retrieve passwordsand digital certificates without
`
`requiring the use of vulnerable external interfaces.
`
`25
`
`SUMMARY OF THE INVENTION
`
`The present invention satisfies all of these needs with a personal key in a form
`
`factor that is compliant with a commonly available I/O interface such as the Universal
`
`Serial Bus (USB). The personal key includes a processor and a memory which
`
`30
`
`implement software protection schemesto prevent copying and unauthorized use.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page7 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 7 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-6-
`
`The personal key provides for the storage and managementof digital certificates,
`
`allowing the userto storeall of his digital certificates in one media that is portable
`
`from platform to platform. The personal kcy provides for the generation, storage, and
`
`management of many passwords, providing additional security and relieving the user
`
`from the task of remembering multiple passwords. The personal kcy provides a
`
`meansto store cookies and other Java-implemented software programs,allowing the
`
`user to accept cookies in a removable and secure form-factor. These features are
`
`especially useful when the present inventionis used in a virtual private network
`
`(VPN). The present invention can also be used for several applications
`
`10
`
`Because the personal key is capable of storing virtually all of the user's
`
`sensitive information, it is important that the personal key be as secure as possible.
`
`Hence, one embodimentof the personal key also comprises a biometric sensor
`
`disposed to measure biometrics suchas fingerprint data. The biometric sensor
`
`measures characteristics of the person holding the key (such as fingerprints) to
`
`confirm that the person possessing the key is the actual ownerofthe key.
`
`Since the personal key represents a single, secure repository for a great deal of
`
`the data the user will need to use and interact with a variety of computer platforms,it
`
`is also important that the personal key be able to interface(i.e., transmit and receive
`
`data) with a large variety of computers and computerperipherals. Hence, one
`
`embodimentof the personal key includes an electromagnetic wave transception device
`
`such as an infrared (IR) transceiver. This transceiver allows the personal key to
`
`exchange information with a wide variety of computers and peripherals without
`
`physical coupling.
`
`The present invention is well suited for controlling access to network services,
`
`or anywhere a password, cookie, digital certificate, or smartcard might otherwise be
`
`20
`
`25
`
`used, including:
`
`* Remote accessservers, including Internet protocol security (IPSec), point
`
`to point tunneling protocol (PPTP), password authentication protocol
`
`(PAP), challenge handshake authentication protocol (CHAP), remote
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 8 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 8 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-J-
`
`access dial-in user service (RADIUS), terminal access controller access
`
`control system (TACACS);
`
`Providing Extranet and subscription-based web access control, including
`
`hypertext transport protoco! (HTTP), secure sockets layer (SSL);
`
`Supporting secure online banking, benefits administration, account
`
`management;
`
`Supporting secure workflow and supply chain integration (form signing);
`
`Preventing laptop computer theft (requiring personalkey for laptop
`
`*
`
`*
`
`*
`
`*
`
`operation);
`
`* Workstation logon authorization;
`
`:
`
`*
`
`*
`
`Preventing the modification or copying of software;
`
`Encrypting files;
`
`Supporting secure e-mail, for example, with secure multipurposeInternet
`
`mail extensions (S/MIME), and open pretty good privacy (OpenPGP)
`
`* Administering nctwork equipment administration; and
`
`*
`
`° Electronic wallets, with, for example, secure electronic transaction (SET,
`
`MilliCent, eWallet)
`
`In one embodiment, the present invention comprises a compact, self-
`
`contained, personal token or key. The personal key comprises a USB-compliant
`
`interface releaseably coupleable to a host processing device; a memory; and a
`
`processor. The processor provides the host processing device conditional access to
`
`data storable in the memory as wellas the functionality required to managefiles
`
`stored in the personal key and for performing computations based on the data in the
`
`files. In one embodiment, the personal key also comprises an integral user input
`
`device and an integral user output device. The input and output devices communicate
`
`with the processor by communication paths which are independent from the USB-
`
`compliant interface, and thus allow the user to communicate with the processor
`
`without manifesting any private information external to the personal key.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 9 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 9 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-8-
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Referring nowto the drawings in which like reference numbers represent
`
`corresponding parts throughout:
`
`FIG. |
`
`is a diagram showing an exemplary hardware environmentfor
`
`Ww
`
`practicing the present invention;
`
`FIG. 2 is a block diagram illustrating selected modules of one embodiment of
`
`the present invention;
`
`FIG. 3 is a diagram of the memory resources provided by the memory of the
`
`personal key;
`
`FIG. 4 is a diagram showing one embodiment of how an encryption engineis
`
`used to authenticate the identity of the personal key or the application data stored
`
`therein;
`
`FIG. 5 is a diagramillustrating the data contentsof a file system memory
`
`resource of anactive personal key that provides authentication and specific
`
`configuration data for several application;
`
`FIG. 6 is a diagram presenting an illustration of one embodimentof the
`
`personal key;
`
`FIGs. 7A-7C are diagrams showing one embodimentof the personal key
`
`having an input device including a first pressure sensitive device and a second
`
`20
`
`pressure sensitive device, each communicatively coupled the processor by a
`
`communication path distinct from the USB-compliantinterface;
`
`FIGs. 8A-8C are diagrams presenting an illustration of another embodiment of
`
`the present invention;
`
`FIG. 9 is a flow chart illustrating an embodimentof the present invention in
`
`25
`
`which processoroperations are subject to user authorization; and
`
`FIG. 10 is a flow chart illustrating an embodimentof the present invention in
`
`which the PIN is entered directly into the personal key.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 10 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 10 of 57
`
`

`

`WO 00/42491
`
`-9.
`
`PCT/US00/00711
`
`DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
`
`In the following description, reference is made to the accompanying drawings
`
`which form a part hereof, and which is shown, by wayof illustration, several
`
`embodiments of the present invention. It is understood that other embodiments may
`
`be utilized and structural changes may be made without departing from the scope of
`
`the present invention.
`
`Hardware Environment
`
`FIG. 1 illustrates an exemplary computer syste 100 that could be used to
`
`implementthe present invention. The computer 102 comprises a processor 104 and a
`
`memory, such as random access memory (RAM) 106. The computer 102 is
`
`operatively coupled to a display 122, which presents images such as windowsto the
`
`user on a graphicaluser interface 118B. The computer 102 may be coupled to other
`
`devices, such as a keyboard 114, a mouse device 116, a printer 128, etc. Of course,
`
`those skilled in the art will recognize that any combination of the above components,
`
`or any numberofdifferent components,peripherals, and other devices, may be used
`
`with the computer 102.
`
`Generally, the computer 102 operates under control of an operating system 108
`
`stored in the memory 106, and interfaces with the user to accept inputs and commands
`
`and to present results through a graphical user interface (GUI) module 118A.
`
`Although the GU] module 118A is depicted as a separate module,the instructions
`
`performing the GUI functions can be resident ordistributed in the operating system
`
`108, the computer program 110, or implemented with special purpose memory and
`
`processors. The computer 102 also implements a compiler 112 which allows an
`
`application program 110 written in a programming language such as COBOL, C++,
`
`FORTRAN,or other languageto be translated into processor 104 readable code.
`
`After completion, the application 110 accesses and manipulates data stored in the
`
`memory 106 of the computer 102 using the relationships and logic that are generated
`
`using the compiler 112. The computer 102 also comprises an input/output (I/O) port
`
`130 for a personal token 200 (hereinafter alternatively referred to also as a personal
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 11 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 11 of 57
`
`

`

`wo 00/42491
`
`-10-
`
`PCT/US00/00711
`
`key 200).
`
`In one embodiment, the I/O port 130 is a USB-compliant port
`
`implementing a USB-compliantinterface.
`
`in one embodiment, instructions implementing the operating system 108, the
`
`computer program 110, and the compiler 112 are tangibly embodied in a computer-
`
`readable medium, e.g., data storage device 120, which could include one or more
`
`fixed or removable data storage devices, such as a zip drive, floppy disc drive 124,
`
`hard drive, CD-ROM drive,tape drive, etc. Further, the operating system 108 and the
`
`computer program 110 are comprisedof instructions which, when read and executed
`
`by the computer 102, causes the computer 102 to perform the steps necessary to
`
`implement and/or use the present invention. Computer program 110 and/or operating
`
`instructions mayalso be tangibly embodied in memory 106 and/or data
`
`communications devices, thereby making a computer program productorarticle of
`
`manufacture according to the invention. As such, the terms "article of manufacture"
`
`and "computer program product" as used herein are intended to encompass a computer
`
`program accessible from any computer readable device or media.
`
`The computer 102 may be communicatively coupled to a remote computer or
`
`server 134 via communication medium 132 suchas a dial-up network, a wide area
`
`network (WAN), local area network (LAN), virtual private network (VPN)or the
`
`Internet. Program instructions for computer operation, including additional or
`
`alternative application programs can be loaded from the remote computer/server 134.
`
`In one embodiment, the computer 102 implements an Internet browser, allowing the
`
`user to access the world wide web (WWW)andother internet resources.
`
`Those skilled in the art will recognize that many modifications may be made to
`
`this configuration without departing from the scope of the present invention. For
`
`example, those skilled in the art will recognize that any combination of the above
`
`components, or any numberof different components, peripherals, and other devices,
`
`may be used with the present invention.
`
`Architectural Overview
`
`20
`
`25
`
`FIG. 2 is a block diagram illustrating selected modules of the present
`
`30
`
`invention. The personal key 200 communicates with and obtains power from the host
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 12 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 12 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-ll-
`
`computer through a USB-compliant communication path 202 in the USB-compliant
`
`interface 204 which includes the input/output port 130 of the host computer 102 and a
`
`matching input/output(I/O) port 206 on the personal key 200. Signals received at the
`
`personal key I/O port 206 are passed to and from the processor 212 by a driver/buffer
`
`208 via communication paths 210 and 216. The processor 212 is communicatively
`
`coupled to a memory 214, which maystore data and instructions to implement the
`
`above-described features of the invention.
`
`In one embodiment, the memory214 is a
`
`non-volatile random-access memory that can retain factory-supplied data as well as
`
`customer-supplied application related data. The processor 212 mayalso include some
`
`internal memory for performing someofthese functions.
`
`The processor 212 is optionally communicatively coupled to an input device
`
`218 via an input device communication path 220 and to an output device 222 via an
`
`output device communication path 224, both of whichare distinct from the USB-
`
`compliant interface 204 and communication path 202. These separate communication
`
`paths 220 and 224 allow the user to view information about processor 212 operations
`
`and provide input related to processor 212 operations without allowing a process or
`
`other entity with visibility to the USB-compliantinterface 204 to eavesdrop or
`
`intercede. This permits secure communications between the key processor 212 and
`
`the user.
`
`In one embodimentof the invention set forth more fully below, the user
`
`communicates directly with the processor 212 by physical manipulation of mechanical
`
`switches or devices actuatable from the external side ofthe key (for example, by
`
`pressure-sensitive devices such as buttons and mechanical switches). In another
`
`embodimentof the invention set forth more fully below, the input device includes a
`
`wheel with tactile detents indicating the selection of characters.
`
`The input device and output devices 218, 222 may cooperatively interact with
`
`one another to enhancethe functionality of the personal key 200. For example, the
`
`output device 222 may provide information prompting the user to enter information
`
`into the input device 218. For example, the output device 222 may comprise a visual
`
`display such as an alphanumeric LED or LCD display (which can display Arabic
`
`numbers andor letters) and/or an aural device. The user may be promptedto enter
`
`15
`
`20
`
`25
`
`30
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885(US 8,539,047)
`Exhibit 2079
`
`Page 13 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 13 of 57
`
`

`

`WO 00/42491
`
`-12-
`
`PCT/US00/00711
`
`information by a beepingofthe aural device, by a flashing pattern of the LED,or by
`
`both. The output device 222 mayalso optionally be used to confirm entry of
`
`information by the input device 218. For example, an aural output device may beep
`
`when the user enters information into the input device 218 or when the user input 1s
`
`invalid. The input device 218 may take one of many forms,including different
`
`combinationsof input devices.
`
`Although the input device communication path 220 and the output device
`
`communication path 224 are illustrated in FIG. 2 as separate paths, the present
`
`invention can be implemented by combining the paths 220 and 224 while still
`
`retaining a communication path distinct from the USB-compliant interface 204. For
`
`example, the input device 218 and output device 222 may be packagedin a single
`
`device and communications with the processor 212 multiplexed overa single
`
`communication path.
`
`In one embodimentof the invention, the present invention further comprises a
`
`second output device 222 that may be coupled to the USB-compliantinterface 204
`
`instead of being coupled to the processor via a communication path distinct from the
`
`USB-compliant interface 204. This embodiment may be used, for example, to
`
`indicate to the user that the personal key 200 has been correctly inserted into the host
`
`computer’s USB port (for example, by providing an indication of a powersignal of
`
`the USB-compliant interface). The second output device may also be used to show
`
`that data is passing to and from the host computer and the personal key 200 (for
`
`example, by providing an indication of a data signal from the USB-compliant
`
`interface).
`
`The personal key has an interface including a USB driver module 266
`
`communicatively coupled to an application program interface (API) 260 having a
`
`plurality of API library routines. The API 260 provides an interface with the
`
`application 110 to issue commandsandacceptresults from the personal key 200.
`
`In
`
`one embodiment, a browser 262, such as the browser available from NETSCAPE,Inc.
`
`operates with the API 260 and the public key cryptographic standard (PKCS) module
`
`20
`
`25
`
`30
`
`264 to implement a token-based user authentication system.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`
`Page 14 of 57
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00885 (US 8,539,047)
`Exhibit 2079
`Page 14 of 57
`
`

`

`WO 00/42491
`
`PCT/US00/00711
`
`-13-
`
`While the portability and utility of the personal key has many advantages,it
`
`also has one important disadvantage...it can be lost or stolen. This is especially
`
`troublesome because the personal key 200 represents a secure repository for so much
`
`of the user's private data. For these reasons, the ultimate security of the information
`
`contained in the personal key 200 (but not necessarily the personal ke

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket