`US 20100138914Al
`
`c19) United States
`c12) Patent Application Publication
`Davis et al.
`
`c10) Pub. No.: US 2010/0138914 Al
`Jun. 3, 2010
`(43) Pub. Date:
`
`(54) SYSTEM AND METHOD OF PROVIDING
`BIOMETRIC QUICK LAUNCH
`
`(75)
`
`Inventors:
`
`Dinah Davis, Waterloo (CA); Neil
`Patrick Adams, Waterloo (CA)
`
`Correspondence Address:
`RIDOUT & MAYBEE LLP
`225 KING STREET WEST, 10TH FLOOR
`TORONTO, ON M5V 3M2 (CA)
`
`(73) Assignee:
`
`Research In Motion Limited
`
`(21) Appl. No.:
`
`12/325,568
`
`(22) Filed:
`
`Dec.1, 2008
`
`START
`-~-404
`
`402
`
`RECEIVE UNLOCK
`COMMAND
`
`PRESENT UNLOCK
`DIALOG
`
`406
`
`408
`
`416
`
`418
`
`RECEIVE DEVICE
`PASSWORD
`
`RECEIVE SMART
`CARD PASSWORD
`
`PRESENT FINGER-
`PRINT DIALOG
`
`RECEIVE LIVE
`SCAN FROM SCR
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`H04L 9132
`(2006.01)
`(52) U.S. Cl. ............................................. 726/19; 726/20
`ABSTRACT
`
`(57)
`
`By providing a biometric candidate to a biometric input
`device, a user may cause a computing device to be unlocked
`and cause a specific application to be launched on the com(cid:173)
`puting device. The biometric input device may be on the
`computing device or on a peripheral security device that is in
`communication with the computing device. Indeed, the spe(cid:173)
`cific application may be launched pre-loaded with certain
`data, selection of which data is controlled by the particular
`biometric provided to the biometric input device.
`
`>----NO
`
`---- TO VERIFY
`
`INDICATE FAILURE
`
`414
`
`- - - - - - - - - - - - - - - - - - - - - -
`420
`
`NO --- INDICATE FAILURE
`
`TOVERIFY
`
`424
`
`END
`
`Apple Ex. 1015
`Apple Inc. v. Firstface Co., Ltd.
`IPR2019-01011
`Page 00001
`
`
`
`Patent Application Publication
`
`Jun. 3, 2010 Sheet 1 of 6
`
`US 2010/0138914 Al
`
`C)
`
`C) -
`
`LU
`Cl)~
`ii: a:
`(01
`a.. 0
`cc: <! 0
`LU i:= -
`I- w zz
`
`LU
`
`11 ~
`
`...J a:
`<( w
`z~c-..il
`0 a.. -
`~~-
`WC)
`a.. u
`
`o:::t
`
`C)
`-
`
`-r ,,hmi>
`
`-.
`
`C!)
`LL.
`
`w
`u
`>
`w
`Cl ~I
`w
`...J
`cc
`0
`~
`
`i1
`
`uw ~I
`
`Cl
`cc:
`<( a:
`I- Cl
`cc: <(
`<( w
`~ a:
`Cl)
`
`IPR2019-01011 Page 00002
`
`
`
`·.
`.
`'lo;
`I VOICE COMM. MOD. 230A f .......
`:
`. -
`I
`I DATACOMM:MOD.2N8_I
`.
`I SECURITYMOD . .2NC. I
`.
`:
`I OTHER MODULES~ , ..................
`
`I
`I
`
`\. I DISPLAY 226
`
`- - - -
`.----------, .
`H
`.
`f--1 AUXILIARY 1/0 206
`
`\ ...... _____ _
`I
`I
`I
`FLASH
`MEMORY216 r-+J
`
`~ SERIAL PORT 208
`-
`
`,
`_ ....... ·
`
`RAM 218
`
`MICROPROCESSOR
`228
`
`KEYBOARD 224
`
`-~--------------------------------,
`COMMUNICATION:
`254
`SUBSYSTEM 202:
`.,I DSP
`SIGNALS
`258
`
`RECEIVER
`250
`
`CONTROL
`
`I
`I
`I
`I
`I
`I
`I
`SIGNAL~ I I
`I
`+
`: SUBSYSTEMS 220
`TRANSMITTER 1:
`I
`SHORT-RANGE
`. I
`. COMMUNICATION
`SUBSYSTEM 2M
`~ 14------------
`I
`: ._______
`I I
`:·
`CONTROL
`[ ____________________________________ -~_
`MOBILE COMMUNICATION DEVICE 102 I
`'------------ ----------------------"'
`FIG. 2
`
`SPEAKER ill
`
`MICROPHONE 212
`
`I_,._.__, - -(cid:141) I
`
`OTHER DEVICE
`
`""O
`~ .....
`
`(')
`
`~ .....
`
`(')
`
`~ .....
`
`('D = ..... t "e -....
`.... 0 = ""O = O" -....
`.... 0 =
`2'
`?
`
`~
`
`~
`N
`
`0 ....
`
`0
`
`('D
`('D
`
`rJJ =(cid:173)
`.....
`N
`0 ....
`
`O'I
`
`c
`rJJ
`N
`0 ....
`0 ---0 ....
`....
`> ....
`
`.i;...
`
`~
`QO
`1,0
`
`IPR2019-01011 Page 00003
`
`
`
`f\.... I H
`
`DISPLAY 312
`\.
`...... ' - - - - - - . , - -
`..... ·...-------,
`FLASH
`MEMORY314
`
`r-------------------------------------~
`I
`I OPERATING SYSTEM 326
`MEMORY CARD DRIVER
`330
`
`H FINGERPRINT
`
`READER 325
`-
`
`SOFlWARE
`APPLICATIONS 328
`
`............ •·········
`
`RAM 316
`
`SERIAL PORT
`318
`
`FIG. 3
`
`MICROPROCESSOR
`310
`
`BUTTON 324
`
`SHORT-RANGE
`COMMUNICATION
`SUBSYSTEM 320
`
`STORAGE
`COMPONENT
`INTERFACE 322
`
`MEMORY CARD 334
`
`SMART CARD READER ill
`
`""O
`~ .....
`
`(')
`
`~ .....
`
`(')
`
`~ .....
`
`('D = ..... t "e -....
`.... 0 = ""O = O" -....
`.... 0 =
`2'
`?
`
`(,H
`
`~
`
`N
`
`0 ....
`
`0
`
`('D
`('D
`
`(,H
`
`rJJ =(cid:173)
`.....
`0 ....
`
`O'I
`
`c
`rJJ
`N
`0 ....
`0 ---0 ....
`....
`> ....
`
`(,H
`QO
`1,0
`
`.i;...
`
`IPR2019-01011 Page 00004
`
`
`
`START
`
`)
`404
`
`4027
`
`RECEIVE UNLOCK
`COMMAND
`
`PRESENT UNLOCK
`DIALOG
`
`4067
`
`4087
`
`RECEIVE DEVICE
`PASSWORD
`
`RECEIVE SMART
`CARD PASSWORD
`
`41 0~
`DEVICE
`
`y
`
`YES
`
`NO
`
`NO
`
`I
`
`INDICATE FAILURE
`TO VERIFY
`
`414
`
`YES
`
`4167
`
`t
`I PRESENT FINGER- I ...
`PRINT DIALOG
`
`'+L.U I
`
`4187
`
`RECEIVE LIVE
`SCAN FROM SCR
`
`FIG. 4
`
`, ... .., I
`
`1
`
`- - -
`
`INDICATE FAILURE
`TO VERIFY
`
`422-z
`
`I UNLOCK DEVICE K END
`
`424
`)
`
`"e
`
`(')
`
`""O
`~ .....
`('D = .....
`t
`-....
`....
`~ .....
`0 =
`""O =
`O" -....
`....
`~ .....
`0 =
`=
`~
`?
`
`(')
`
`~
`
`~
`
`N
`
`0 ....
`
`0
`
`('D
`('D
`
`.i;...
`
`rJJ =-
`.....
`0 ....
`
`O'I
`
`c
`rJJ
`N
`....
`0
`0 ---0
`....
`....
`> ....
`
`.i;...
`
`~
`QO
`1,0
`
`IPR2019-01011 Page 00005
`
`
`
`START
`
`)
`
`506
`
`5027
`
`RECEIVE LIVE
`SCAN FROM SCR
`
`INDICATE FAILURE
`TO VERIFY
`
`508
`
`5047
`
`NO
`/4.~.,.. ... ~ I
`
`PRESENT FINGER-
`PRINT DIALOG
`
`NO
`
`INDICATE FAILURE
`TO VERIFY
`
`I
`
`524
`
`NO
`
`YES
`
`"e
`
`(')
`
`""O
`~ .....
`('D = .....
`t
`-....
`....
`~ .....
`0 =
`""O =
`O" -....
`....
`~ .....
`0 =
`~ = ?
`
`(')
`
`YES
`
`I PRESENT UNLOCK I
`..,
`DIALOG
`
`512 7
`
`5147
`
`RECEIVE DEVICE
`PASSWORD
`
`RECEIVE SMART
`CARD PASSWORD
`
`FIG. 5
`
`I <,A-j~~:~•n~
`_(y
`
`518
`
`YES
`
`520
`
`.)
`
`UNLOCK DEVICE
`
`5227
`
`LAUNCH APPL.
`ASSOC. WITH
`I FINGERPRINT
`
`END
`
`~
`
`~
`
`....
`
`N
`0
`0
`
`('D
`('D
`
`rJJ
`
`=-
`.....
`Ul
`0 .....
`O'I
`
`c
`rJJ
`N
`....
`0
`0 ---
`0 ....
`....
`> ....
`
`.i;...
`
`~
`QO
`1,0
`
`IPR2019-01011 Page 00006
`
`
`
`Patent Application Publication
`
`Jun. 3, 2010 Sheet 6 of 6
`
`US 2010/0138914 Al
`
`I
`a:
`LU C!J
`(!) 0
`z ....J
`-
`<(
`LL -
`I- C
`z 1--
`LUZ
`LU a:
`Cl) -
`a: a..
`a..
`
`w
`a:
`=>
`:=:! it
`<C-
`LL a:
`W LU
`1-- >
`<Co
`!:2 I-
`C
`z
`
`0 z
`
`(0
`0
`(0
`
`Cl)
`w
`>
`
`_j ::c I-
`a.. 1-- z
`a.. - -
`<( ~~
`:c
`. a:
`(..) (..) w
`z O C!J
`=> ~ z
`~ <( u::::
`
`C
`z
`w
`
`c.c .
`
`C!J
`LL
`
`¢
`
`-
`
`(0
`
`0
`
`-
`
`(0
`
`1--
`a:
`<(
`1--
`Cl)
`
`a:
`wU
`> Cl)
`::::i ~
`WO
`> a:
`W LL
`(..) z
`LU<(
`a: (..)
`Cl)
`
`-
`
`N
`(0
`
`IPR2019-01011 Page 00007
`
`
`
`US 2010/0138914 Al
`
`Jun. 3, 2010
`
`1
`
`SYSTEM AND METHOD OF PROVIDING
`BIOMETRIC QUICK LAUNCH
`
`FIELD
`
`[0001] The present application relates generally to launch(cid:173)
`ing applications on a device and, more particularly, to a sys(cid:173)
`tem and method oflaunching applications, access to which is
`controlled, at least in part, by biometric authentication.
`
`BACKGROUND
`
`[0002] As an increasing volume of sensitive personal infor(cid:173)
`mation is stored on computers, personal and otherwise, it is
`increasingly important that access to these computers is con(cid:173)
`trolled. Even the most basic user of computers is familiar with
`a requirement to provide a password to gain access to a
`computer and execute various software application on the
`processor of the computer. Such a one-factor authentication
`scheme is based solely on what the user knows, i.e., the
`password. Should the password become known to those other
`than the user whose account access to which is controlled by
`the password, the others can use the password to gain access
`to the user's account.
`[0003] To increase security, some computers have been
`configured to implement a two-factor authentication scheme.
`The user is provided with a smart card and a smart card reader
`that may connect to the computer of interest either by wired
`means or wireless means. The smart card may have an asso(cid:173)
`ciated password previously revealed to the user. Now, to gain
`access to the computer of interest, the user provides a first
`password, which may be called a device password, and a
`second password, which may be called a smart card pass(cid:173)
`word. The user will only gain access to the computer of
`interest by submitting correct values for both the device pass(cid:173)
`word and the smart card password. The computer generally
`determines whether the provided smart card is a correct value
`by passing the provided smart card password to the smart card
`reader and receiving a yes or no answer. Such a two-factor
`authentication scheme is based on what the user knows, i.e.,
`the device password and the smart card password, and what
`the user has, i.e., the smart card, since the computer ofinterest
`can not confirm the validity of the provided smart card pass(cid:173)
`word in the absence of the smart card.
`[0004] To increase security even further, some computers
`have been configured to implement an additional authentica(cid:173)
`tion scheme. The additional factor is biometric information.
`Biometric information includes fingerprints, retinal scans,
`face geometry scans, hand geometry scans, voice or speech
`prints, etc. In one particular implementation, the smart card
`reader can also have a biometric input device. Now, to gain
`access to the computer of interest, the user provides a device
`password and a smart card password. If the passwords are
`determined to be valid, the user is prompted to provide bio(cid:173)
`metric information. The user will only gain access to the
`computer of interest if the biometric information submitted
`responsive to the prompt properly matches a previously
`established and stored version of the biometric information.
`Incorporating the above-described factors, a three-factor
`authentication scheme may be based on what the user knows,
`i.e., the device password and the smart card password, what
`the user has, i.e., the smart card, and something that is unique
`to the user, e.g., a fingerprint. Accordingly, even if the smart
`card falls into the hands of a nefarious person who also gains
`knowledge of the device password and the smart card pass-
`
`word, the lack of the correct biometric data should keep the
`nefarious person from gaining access to the computer of
`interest.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0005] Reference will now be made to the drawings, which
`show by way of example, embodiments of the present disclo(cid:173)
`sure, and in which:
`[0006] FIG. 1 shows in block diagram form a communica(cid:173)
`tion system suitable for a smart card reader and mobile com(cid:173)
`munication device in accordance with one embodiment;
`[0007] FIG. 2 shows an operational block representation of
`the mobile communication device of FIG. 1 according to one
`embodiment;
`[0008] FIG. 3 shows an operational block representation of
`an embodiment of the smart card reader of FIG. 1;
`[0009] FIG. 4 illustrates steps in an example method of
`maintaining secure access to the mobile communication
`device of FIG. 1;
`[0010] FIG. 5 illustrates steps in an example method of
`launching execution of an application on the mobile commu(cid:173)
`nication device of FIG. 1 through the provision of biometric
`data and passwords according to an embodiment; and
`[0011] FIG. 6 illustrates steps in an example method of
`launching execution of an application on the mobile commu(cid:173)
`nication device of FIG. 1 through the provision of biometric
`data according to another embodiment.
`
`DETAILED DESCRIPTION
`
`[0012] While three-factor authentication is secure, three(cid:173)
`factor authentication may be considered time consuming to
`employ every time access to the computer of interest is
`desired. It is clear that any gains in efficiency in accomplish(cid:173)
`ing the task for which access to the computer is desired would
`be welcome.
`[0013] By providing a biometric candidate to a biometric
`input device, a user may cause a computing device to be
`unlocked and cause a specific application to be launched on
`the computing device. The biometric input device may be on
`the computing device or on a peripheral security device that is
`in communication with the computing device. Indeed, the
`specific application may be launched pre-loaded with certain
`data, selection of which data is controlled by the particular
`biometric provided to the biometric input device.
`[0014] According to one aspect described herein, there is
`provided a method oflaunching applications on a computing
`apparatus. The method includes receiving a biometric candi(cid:173)
`date, determining that the biometric candidate matches a
`stored biometric template and that the stored biometric tem(cid:173)
`plate is associated with an application, determining that the
`stored biometric template is associated with unlocking the
`computing apparatus, unlocking said computing apparatus
`and launching execution of the application. In other aspects of
`the present application, an apparatus is provided for carrying
`out this method and a computer readable medium is provided
`for adapting a processor to carry out this method.
`[0015] Other aspects and features of the present disclosure
`will become apparent to those of ordinary skill in the art upon
`review of the following description of specific embodiments
`of the present disclosure in conjunction with the accompany(cid:173)
`ing figures.
`[0016] Reference is first made to FIG. 1, which shows an
`illustrative communication system 100 to which embodi-
`
`IPR2019-01011 Page 00008
`
`
`
`US 2010/0138914 Al
`
`Jun. 3, 2010
`
`2
`
`ments described herein can be applied. The system 100
`includes one or more mobile communication devices 102
`(only one of which is shown in FIG. 1) that are enabled to
`communicate with one or more wireless networks 104 (only
`one of which is shown in FIG. 1). In other embodiments, the
`mobile communication devices 102 may be replaced by or
`augmented with desktop personal computers, notebook com(cid:173)
`puters, palmtop computers, etc. The wireless network 104
`may be implemented as a packet-based cellular wide area
`wireless network that includes a number of base stations each
`providing wireless Radio Frequency (RF) coverage to a cor(cid:173)
`responding area or cell. In some embodiments, instead of, or
`in addition to, a wide area wireless network, the wireless
`network 104 may include a local wireless area network, such
`as for example a wireless local area network that conforms to
`Institute of Electrical and Electronics Engineers (IEEE) 802.
`11 standards such as 802.11 band/or 802.1 lg. Inat least some
`example embodiments, the wireless network 104 is con(cid:173)
`nected to one or more enterprise networks 106 ( only one of
`which is shown in FIG.1). The connection between the wire(cid:173)
`less network 104 and the enterprise network 106 may involve
`an intermediate communications link 108, which may pass
`through additional networks including, for example, the
`Internet. The enterprise network 106 may be associated with
`the illustrated mobile device 102, such that the mobile device
`102 is enabled to exchange electronic messages and other
`information with the enterprise network 106. Optionally, the
`mobile device 102 may be associated with a secondary
`mobile device in the form of a smart card reader 110. Addi(cid:173)
`tionally, a user of the mobile device 102 and the smart card
`reader 110 is likely to have access to a personal computer 112
`that is connected to the enterprise network 106 over a com(cid:173)
`munications link 114. In one embodiment, the communica(cid:173)
`tions link 114 is a local area network or wide area network
`providing organizational connectivity with the enterprise net(cid:173)
`work 106. The smart card reader 110 may also be used with
`the personal computer 112, through either a wired or wireless
`connection.
`[0017] FIG. 2 illustrates the mobile communication device
`102 as an example of a device that may be employed in the
`illustrative communication system 100 ofFIG.1. The mobile
`communication device 102 includes a housing, an input
`device ( e.g., a keyboard 224 having a plurality of keys) and an
`output device ( a display 226), which may be a full graphic, or
`full color, Liquid Crystal Display (LCD). Other types of
`output devices may alternatively be utilized. A processing
`device ( a microprocessor 228) is shown schematically in FIG.
`2 as coupled between the keyboard 224 and the display 226.
`The microprocessor 228 controls the operation of the display
`226, as well as the overall operation of the mobile communi(cid:173)
`cation device 102, in part, responsive to actuation of the keys
`on the keyboard 224 by a user. Notably, the keyboard 224 may
`comprise physical buttons (keys) or, where the display 226 is
`a touchscreen device, the keyboard 224 may be implemented,
`at least in part, as "soft keys". Actuation of a so-called soft key
`involves either touching the display 226 where the soft key is
`displayed or actuating a physical button in proximity to an
`indication, on the display 226, of a temporary action associ(cid:173)
`ated with the physical button.
`[0018] The housing may be elongated vertically, or may
`take on other sizes and shapes (including clamshell housing
`structures). Where the keyboard 224 includes keys that are
`associated with at least one alphabetic character and at least
`one numeric character, the keyboard 224 may include a mode
`
`selection key, or other hardware or software, for switching
`between alphabetic entry and numeric entry.
`[0019]
`In addition to the microprocessor 228, other parts of
`the mobile communication device 102 are shown schemati(cid:173)
`cally in FIG. 2. These include: a communications subsystem
`202; a short-range communications subsystem 204; the key(cid:173)
`board 224 and the display 226, along with other input/output
`devices including a set of auxiliary I/O devices 206, a serial
`port 208, a speaker 210 and a microphone 212; as well as
`memory devices including a flash memory 216 and a Random
`Access Memory (RAM) 218; and various other device sub(cid:173)
`systems 220. The mobile communication device 102 may be
`a two-way radio frequency (RF) communication device hav(cid:173)
`ing voice and data communication capabilities. In addition,
`the mobile communication device 102 may have the capabil(cid:173)
`ity to communicate with other computer systems via the
`Internet.
`[0020] Operating system software executed by the micro(cid:173)
`processor 228 may be stored in a computer readable medium,
`such as the flash memory 216, but may be stored in other types
`of memory devices, such as a read only memory (ROM) or
`similar storage element. In addition, system software, spe(cid:173)
`cific device applications, or parts thereof, may be temporarily
`loaded into a volatile store, such as the RAM 218. Commu(cid:173)
`nication signals received by the mobile device may also be
`stored to the RAM 218.
`[0021] The microprocessor 228, in addition to its operating
`system functions, enables execution of software applications
`on the mobile communication device 102. Executable code
`for a predetermined set of software applications that control
`basic device operations, such as a voice communications
`module 230A and a data communications module 230B, may
`be installed on the mobile communication device 102 during
`manufacture. A security module 230C may also be installed
`on the mobile communication device 102 during manufac(cid:173)
`ture, to implement aspects of the present application. As well,
`additional software modules, illustrated as an other software
`module 230N, which may be, for instance, a PIM application,
`may be installed during manufacture. The PIM application
`may be capable of organizing and managing data items, such
`as e-mail messages, calendar events, voice mail messages,
`appointments and task items. The PIM application may also
`be capable of sending and receiving data items via the wire(cid:173)
`less network 104 represented by a radio tower. The data items
`managed by the PIM application may be seamlessly inte(cid:173)
`grated, synchronized and updated via the wireless network
`104 with the device user's corresponding data items stored or
`associated with a host computer system.
`[0022] Communication functions, including data and voice
`communications, are performed through the communication
`subsystem 202 and, possibly, through the short-range com(cid:173)
`munications subsystem 204. The communication subsystem
`202 includes a receiver 250, a transmitter 252 and one or more
`antennas, illustrated as a receive antenna 254 and a transmit
`antenna 256. In addition, the communication subsystem 202
`also includes a processing module, such as a digital signal
`processor (DSP) 258, and local oscillators (LOs) 260. The
`specific design and implementation of the communication
`subsystem 202 is dependent upon the communication net(cid:173)
`work in which the mobile communication device 102 is
`intended to operate. For example, the communication sub(cid:173)
`system 202 of the mobile communication device 102 may be
`designed to operate with the Mo bitex ™, Data TAC™ or Gen(cid:173)
`eral Packet Radio Service (GPRS) mobile data communica-
`
`IPR2019-01011 Page 00009
`
`
`
`US 2010/0138914 Al
`
`Jun. 3, 2010
`
`3
`
`tion networks and also designed to operate with any of a
`variety of voice connnunication networks, such as Advanced
`Mobile Phone Service (AMPS), Time Division Multiple
`Access (TDMA), Code Division Multiple Access (CDMA),
`Personal Connnunications Service (PCS), Global System for
`Mobile Connnunications (GSM), Enhanced Data rates for
`GSM Evolution (EDGE), Universal Mobile Teleconnnunica(cid:173)
`tions System (UMTS), Wideband Code Division Multiple
`Access (W-CDMA), etc. Other types of data and voice net(cid:173)
`works, both separate and integrated, may also be utilized with
`the mobile connnunication device 102.
`[0023] Network access requirements vary depending upon
`the type of connnunication system. Typically, an identifier is
`associated with each mobile device that uniquely identifies
`the mobile device or subscriber to which the mobile device
`has been assigned. The identifier is unique within a specific
`network or network technology. For example, in Mobitex™
`networks, mobile devices are registered on the network using
`a Mobitex Access Number (MAN) associated with each
`device and in DataTAC™ networks, mobile devices are reg(cid:173)
`istered on the network using a Logical Link Identifier (LLI)
`associated with each device. In GPRS networks, however,
`network access is associated with a subscriber or user of a
`device. A GPRS device therefore uses a subscriber identity
`module, connnonly referred to as a Subscriber Identity Mod(cid:173)
`ule (SIM) card, in order to operate on a GPRS network.
`Despite identifying a subscriber by SIM, mobile devices
`within GSM/GPRS networks are uniquely identified using an
`International Mobile Equipment Identity (IMEI) number.
`[0024] When required network registration or activation
`procedures have been completed, the mobile connnunication
`device 102 may send and receive connnunication signals over
`the wireless network 104. Signals received from the wireless
`network 104 by the receive antenna 254 are routed to the
`receiver 250, which provides for signal amplification, fre(cid:173)
`quency down conversion, filtering, channel selection, etc.,
`and may also provide analog to digital conversion. Analog(cid:173)
`to-digital conversion of the received signal allows the DSP
`258 to perform more complex connnunication functions,
`such as demodulation and decoding. In a similar manner,
`signals to be transmitted to the wireless network 104 are
`processed ( e.g., modulated and encoded) by the DSP 258 and
`are then provided to the transmitter 252 for digital to analog
`conversion, frequency up conversion, filtering, amplification
`and transmission to the wireless network 104 ( or networks)
`via the transmit antenna 256.
`[0025]
`In addition to processing connnunication signals,
`the DSP 258 provides for control of the receiver 250 and the
`transmitter 252. For example, gains applied to connnunica(cid:173)
`tion signals in the receiver 250 and the transmitter 252 may be
`adaptively controlled through automatic gain control algo(cid:173)
`rithms implemented in the DSP 258.
`[0026]
`In a data connnunication mode, a received signal,
`such as a text message or web page download, is processed by
`the connnunication subsystem 202 and is input to the micro(cid:173)
`processor 228. The received signal is then further processed
`by the microprocessor 228 for output to the display 226, or
`alternatively to some auxiliary I/O devices 206. A device user
`may also compose data items, such as e-mail messages, using
`the keyboard 224 and/or some other auxiliary I/O device 206,
`such as a touchpad, a rocker switch, a thumb-wheel, a track(cid:173)
`ball, a touchscreen, or some other type of input device. The
`composed data items may then be transmitted over the wire(cid:173)
`less network 104 via the connnunication subsystem 202.
`
`[0027]
`In a voice connnunication mode, overall operation
`of the device is substantially similar to the data connnunica(cid:173)
`tion mode, except that received signals are output to a speaker
`210, and signals for transmission are generated by a micro(cid:173)
`phone 212. Alternative voice or audio I/O subsystems, such as
`a voice message recording subsystem, may also be imple(cid:173)
`mented on the mobile communication device 102. In addi(cid:173)
`tion, the display 226 may also be utilized in voice connnuni(cid:173)
`cation mode, for example, to display the identity of a calling
`party, the duration of a voice call, or other voice call related
`information.
`[0028] The short-range connnunications subsystem 204
`enables connnunication between the mobile connnunication
`device 102 and other proximate systems or devices, which
`need not necessarily be similar devices. For example, the
`short-range communications subsystem 204 may include an
`infrared device and associated circuits and components, or a
`Bluetooth™ connnunication module to provide for connnu(cid:173)
`nication with similarly-enabled systems and devices. For
`example, the smart card reader 110 may be enabled to com(cid:173)
`municate with the mobile device 102 by way of the short(cid:173)
`range connnunications subsystem 204.
`[0029] Reference is next made to FIG. 3, which shows, in
`greater detail, an example embodiment of a secondary mobile
`device, namely the smart card reader 11 0. The smart card
`reader 11 0 includes a controller including at least one micro(cid:173)
`processor 310, which is suitably progrannned to control the
`overall operation and functions of the smart card reader 110,
`and an output device ( e.g., a display module 312). The smart
`card reader 110 further includes peripheral devices or sub(cid:173)
`systems such as a flash memory 314, a random access
`memory (RAM) 316, a serial port 318 (e.g., a USB port), a
`short-range connnunications subsystem 320 ( e.g., an infrared
`transceiver, wireless bus protocol such as a Bluetooth system
`or any other means oflocal connnunications ), a storage com(cid:173)
`ponent interface 322 (e.g., for a memory card or any other
`data storage device), a user input device 324 ( e.g., a push
`button), and a biometric information input device 325 ( e.g., a
`fingerprint sensor).
`[0030] A fingerprint sensor generally comprises an elec(cid:173)
`tronic device used to capture a digital image of a fingerprint
`pattern. The captured digital image is called a live scan. As
`part of configuring a fingerprint access system, a live scan
`may be digitally processed to create a biometric template,
`which is stored and used for later matching. A future live scan
`may be similarly digitally processed to create a biometric
`candidate in a format that facilitates matching with the pre(cid:173)
`viously captured and stored biometric template. Some of the
`more connnonly used fingerprint sensor technologies
`include: optical; ultrasonic; and capacitance.
`[0031] One example fingerprint sensor has a bar shape. A
`silicon sensor constructs a fingerprint as a user swipes a finger
`across the bar. Another example fingerprint sensor has a pad
`shape. A sensor constructs a fingerprint as a user holds a finger
`on the pad, which is designed with a size to accommodate an
`entire fingerprint.
`[0032] The microprocessor 310 operates under stored pro(cid:173)
`gram control with code or firmware being stored in the flash
`memory 314 ( or other type of non-volatile memory device or
`devices). As depicted in FIG. 3, the stored programs include
`an operating system program or code module 326 and other
`programs or software applications indicated generally by ref(cid:173)
`erence 3 28. The operating system 3 26 of the smart card reader
`110 further includes a memory card driver component 330.
`
`IPR2019-01011 Page 00010
`
`
`
`US 2010/0138914 Al
`
`Jun. 3, 2010
`
`4
`
`The memory card driver 330 is responsible for coordinating
`communications between the smart card reader 110 and a
`memory card 334 and/or between the smart card reader 110
`and related drivers of a device to be used in conjunction with
`the smart card reader 110, such as the drivers 244 of the
`personal computer 112. The operating system code 326, code
`for specific software applications 328, code for the memory
`card driver 330, or code components thereof, may be tempo(cid:173)
`rarily loaded into a volatile storage medium such as the RAM
`316. Received communication signals and other data with
`information may also be stored in the RAM 316. Addition(cid:173)
`ally, the storage component interface 322 receives the remov(cid:173)
`able memory card 334, providing additional storage space for
`the smart card reader 110. In one embodiment, the memory
`card 334 may be a smart card similar to the smart cards known
`to those skilled in the art. The memory card 334 may include
`fingerprint authentication data, password or pin code related
`data, or other security related data. While operation of the
`smart card reader 110 is described using a smart card, it will
`be understood by those skilled in the art that the smart card
`reader 110 may be designed using any suitable form of
`removable media without departing from the intended scope
`of the smart card reader 110.
`[0033] The stored program control (e.g., operating system
`326, software applications 328) for the microprocessor 310
`also includes a predetermined set of applications or code
`components or software modules that control basic device
`operations, for example, management and security related
`control of the data of the smart card reader 110 and may be
`installed on the smart card reader 110 as a component of the
`software applications 328 during the manufacturing process.
`Further applications may also be loaded (i.e., downloaded)
`onto the smart card reader 110 through the operation of the
`serial port 318, the operation of the short-range communica(cid:173)
`tions subsystem 320 or from the smart card 334. The down(cid:173)
`loaded code module or components are then installed by the
`user (or automatically) in the non-volatile program memory
`(e.g., the flash memory 314) or the RAM 316.
`[0034] The serial port 318 may comprise a USB-type inter(cid:173)
`face port for interfacing or synchronizing with another
`device, such as the personal computer 112 or the mobile
`device 102. The serial port 318 is used to exchange data with
`a device such as the personal computer 112 to be stored on the
`smart card 334 that is plugged into the storage component
`interface 322 of the smart card reader 110. The serial port 318
`is also used to extend the capabilities of the smart card reader
`110 by providing for information or software downloads,
`including any user interface information, to the smart card
`reader 110.
`[0035]
`In various example embodiments, the short-range
`communications subsystem 320 provides an interface for
`communication between the smart card reader 110 and the
`personal computer 112 or the mobile device 102. In one
`embodiment, the short-range communications subsystem
`320 includes an infrared communication link or channel. In
`another embodiment, the subsystem 320 comprises a wireless
`RF bus protocol such as a Bluetooth™ communications sub(cid:173)
`system. However, the short-range communications sub(cid:173)
`system 320 may comprise any suitable local wireless means
`of communication, so long as the short range communica(cid:173)
`tions subsystem 232 of the personal computer 112 is chosen
`to operate using the same protocol, which may for example
`facilitate wireless communication between the personal com(cid:173)
`puter 112 and the smart card reader 110. Any suitable com-
`
`munications mechanism and/or protocol may be imple(cid:173)
`mented for the short range communications subsystems 320
`and 204.
`[0036]
`In information technology, biometric authentication
`refers to technologies that measure and analyze human physi(cid:173)
`cal and behavioral characteristics for authentication pur(cid:173)
`poses. Examples of physical characteristics include finger(cid:173)
`prin