throbber
Roku Exhibit 1007
`Roku, Inc. v. Canon Kabushiki Kaisha
`IPR2020-00342
`Page 00001
`
`

`

`[19] The State Intellectual Property Office of the People’s Republic of China
`
`[51] Int. Cl.
`
`
`
`G11C 5/00 (2006. 01)
`
`G11C 7/24 (2006. 01)
`
`
`
`[12] Description of Utility Model Patent
`
`Patent No. ZL 200620120188.4
`
`
`
`[45] Patent Date: August 15, 2007
`
`
`
`
`
`
`
` [11] Patent No.: CN 2935383Y
`
`[22] Filed on:
`
`June 30, 2006
`
`[21] Appl. No.:
`
`200620120188.4
`
`[73] Patent Holder: Beijing Feitian Technologies Co., Ltd.
`
` Address:
`
`5th Floor, Yan 7A Building, No. 40 Xueyuan Road, Haidian District,
`
`Beijing 100083
`
`[72] Inventor(s): LU Zhou, YU Huangzhang
`
`[74] Patent Firm or Agency: Unitalen Attorneys at Law, Beijing
`
`
`
`Agent: SUN Changlong
`
`
`
`[54] Title of Utility Model
`
`
`
`Claims: 2 pages, Description: 10 pages, Drawings: 6 pages
`
`Automatically running composite USB device with mass storage and fingerprint lock
`
`[57] Abstract of Disclosures
`
`
`
`The present utility model relates to a composite USB device with a mass storage and a
`
`fingerprint lock which can be automatically operated. The present utility model comprises a USB
`
`interface, a mass storage application sub-module and a fingerprint lock application sub-module
`
`respectively connected to the USB interface, the USB interface is further connected with an
`
`automatic running circuit for automatically controlling USB enumeration, a storage controller in
`
`the mass storage application submodule or/and the fingerprint lock controller in the fingerprint
`
`lock application submodule include(s) an automatic running function module. The present utility
`
`
`
`
`
`IPR2020-00342 Page 00002
`
`

`

`model not only has the functions of identity recognition and authentication, but also has a
`
`powerful storage function. After the device of the utility model is inserted into a computer, the
`
`operating system can automatically recognize the device immediately, generate a corresponding
`
`drive letter, and run the specified program or file (such as prompting a user to input a fingerprint
`
`or PIN code, or install a driver). Therefore, it is greatly convenient for users to use and can
`
`improve work efficiency.
`
`USB KEY
`controller
`
`Fingerprint
`KEY unit
`
`Host
`
`USB
`interface
`
`USB HUB
`module
`
`
`
`Automatic
`running
`circuit
`
`USB mass
`storage
`device
`controller
`
`Mass
`storage
`unit
`
`
`
`
`
`
`
`
`
`
`
`IPR2020-00342 Page 00003
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Claims
`
`
`
`
`
`
`
`Page 1 of 2
`
`What is claimed is:
`
`
`
`
`
`1. An automatically running composite USB device with a mass storage and a fingerprint
`
`lock, characterized in that the device comprises: a USB interface, and a mass storage
`
`application sub-module and a fingerprint lock application sub-module respectively
`
`connected to the USB interface, the mass storage application sub-module comprises a
`
`storage controller and a mass storage unit, and is connected to the USB interface via the
`
`storage controller, the fingerprint lock application sub-module comprises a fingerprint
`
`lock controller and a fingerprint lock storage unit, and is connected to the USB interface
`
`via the a fingerprint lock controller, the storage controller in the mass storage application
`
`submodule or/and the fingerprint lock controller in the fingerprint lock application
`
`submodule are each a microprocessor that comprises an automatic running function
`
`module and are connected with an automatic running circuit for automatic control of
`
`USB enumeration.
`
`
`
`2. The automatically running composite USB device with a mass storage and a fingerprint
`
`lock according to claim 1, characterized in that the automatic running circuit comprises a
`
`triode and a resistor, a base of the triode is configured to receive an enumeration control
`
`signal, an emitter thereof is connected to a power source, and a collector thereof is
`
`connected to a data end of the USB interface via the resistor.
`
`
`
`3. The automatically running composite USB device with a mass storage and a fingerprint
`
`lock according to claim 1, characterized in that the automatic running function module
`
`comprises an Autorun.inf file.
`
`
`
`4. The automatically running composite USB device with a mass storage and a fingerprint
`
`lock according to claim 1, 2 or 3, characterized in that the device further comprises a
`
`USB hub module, and the mass storage application submodule and the fingerprint lock
`
`application submodule are respectively connected to the USB interface via the USB hub
`
`module.
`
`
`
`IPR2020-00342 Page 00004
`
`

`

`
`
`5. The automatically running composite USB device with a mass storage and a fingerprint
`
`lock according to claim 1, 2 or 3, characterized in that the storage controller in the mass
`
`storage application sub-module and the fingerprint lock controller in the fingerprint lock
`
`application submodule are separate microprocessor chips or integrated in the same
`
`microprocessor chip.
`
`
`
`
`
`
`
`
`
`IPR2020-00342 Page 00005
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Description
`
`
`
`
`
`
`
`Page 1 of 10
`
`
`
`Automatically running compound USB device with mass storage and fingerprint lock
`
`Technical Field
`
`
`
`
`
`The present utility model relates to a USB device, in particular to an automatically
`
`running composite USB device with a mass storage and a fingerprint lock.
`
`
`
`Background Art
`
`
`
`Fingerprint recognition technology is the earliest computer-based identification method,
`
`and it is still the most widely used biometric technology today. In the past, it was mainly used in
`
`the criminal investigation systems. In recent years, it has gradually moved to a wider civilian
`
`market. As early as in ancient times, humans have recognized the characteristics of fingerprints
`
`and have used fingerprints as a symbol of personal identity. In the middle of the 19th century,
`
`scientists began scientific research on the true meaning of fingerprints, and reached two
`
`important conclusions: 1. No two fingers have identical fingerprints; 2. the shape of the
`
`fingerprint remained unchanged for life. These studies had led some governments to use
`
`fingerprints for criminal identification. In the field of modern scientific research, the
`
`identification of fingerprints belongs to “pattern recognition”. At the core of this fingerprint
`
`recognition system is the OCR (Optical Character Recognition) technology. Fingerprint is
`
`extracted by a CMOS (Complementary Metal Oxide Semiconductor) camera, then input into a
`
`computer, and goes through a series of complex fingerprint recognition algorithms. Modern
`
`technology can complete any person’s identity authentication in a very short time. Thus, it can be
`
`said that fingerprint recognition is the revolution of the century in the field of identity
`
`identification.
`
`
`
`
`
`With the continuous development of USB KEY technology, a USB information security
`
`lock based on fingerprint acquisition and recognition has emerged, which is referred to as a
`
`fingerprint lock or fingerprint KEY. The fingerprint KEY is a personal mobile security product
`
`based on the fingerprint recognition technology. It scans the human fingerprint through an
`
`optical sensor, and a user does not need to input a PIN code. It can achieve reliable strong two-
`
`
`
`
`
`IPR2020-00342 Page 00006
`
`

`

`factor identity authentication by virtue of fingerprint plus hardware. The fingerprint KEY can be
`
`built into a 32-bit core intelligent card chip, a high-performance fingerprint processing chip, and
`
`a scanning live fingerprint image sensor. The processes of fingerprint collection, storage and
`
`verification are performed entirely in the KEY, that is, the user’s fingerprint information and key
`
`will never appear in the computer’s memory, and the user’s personal data can be protected safely
`
`and effectively. The fingerprint KEY has a built-in RSA algorithm; the hardware generates a
`
`1024-bit or 2048-bit RSA key pair, a 64K user storage space is provided; it supports PKCS#11
`
`and CSP standard middleware, and fully supports a PKI application.
`
`
`
`
`
`A USB mass storage device is a portable mobile storage device that has emerged in
`
`recent years; it is characterized by small size, low price, being easy to carry, stable performance,
`
`large storage capacity (ranging from tens of megabytes to several gigabytes and extendable. It
`
`can completely replace the functions of floppy disk and floppy disk drive. Like the fingerprint
`
`KEY, the USB mass storage device uses a USB interface, and the storage medium can be Flash
`
`Memory, EPROM, EEPROM, MRAM or FRAM. USB mass storage devices can be used to store
`
`various types of data files, drivers, and applications. With the continuous development of the
`
`USB mass storage device technology, USB mass storage devices using the Autorun technology
`
`have appeared on the market. After a USB mass storage device is connected to a computer, the
`
`specified program or file can automatically run, such as automatically playing Flash animation,
`
`video advertisement, PPT presentation, web page display and automatic link login. With a
`
`management tool, a user can switch the content that is automatically run, or can set the order and
`
`mode of execution or display of each file. The importable contents include: movie files (AVI,
`
`WMV, ASF, DAT), presentation files (PPT), OFFICE files (WORD, EXCEL, etc.), image files
`
`(BMP, JPG), executable files (EXE), FLASH files. (SWF), sound files (WAV, MP3), web page
`
`files (HTML), web addresses, and the like. Programs or files will be terminated immediately
`
`after the USB mass storage device is unplugged, and no information will be left on the computer,
`
`making it easy, efficient, and secure.
`
`
`
`
`
`However, the fingerprint KEY typically only has a single function and limited storage
`
`capacity, which cannot meet the increasing storage requirements. Although USB mass storage
`
`devices have large storage capacity, in general, the data in USB mass storage devices are
`
`
`
`
`
`IPR2020-00342 Page 00007
`
`

`

`unencrypted. Thus, the fingerprint KEY can be used to encrypt data in the USB mass storage
`
`device. In addition, sometimes it is necessary to install the fingerprint KEY driver through a CD
`
`or a network, such that the fingerprint KEY can be recognized by the computer, which may bring
`
`a lot of inconvenience to the user. At present, more and more users need a composite portable
`
`device that can be used as an identity authentication terminal, has certain storage capacity, and
`
`has the Autorun function.
`
`
`
`Summary of the utility model
`
`
`
`In order to solve the above problems, the present utility model provides an automatically
`
`running composite USB device with a mass storage and a fingerprint lock which is simple in
`
`structure and complete in function.
`
`
`
`
`
`The technical solution employed by the present utility model to solve the technical
`
`problems is as follows: the device comprises: a USB interface, and a mass storage application
`
`sub-module and a fingerprint lock application sub-module respectively connected to the USB
`
`interface, the mass storage application sub-module comprises a storage controller and a mass
`
`storage unit, and is connected to the USB interface via the storage controller, the fingerprint lock
`
`application sub-module comprises a fingerprint lock controller and a fingerprint lock storage
`
`unit, and is connected to the USB interface via the a fingerprint lock controller, the storage
`
`controller in the mass storage application submodule or/and the fingerprint lock controller in the
`
`fingerprint lock application submodule are each a microprocessor that comprises an automatic
`
`running function module and are connected with an automatic running circuit for automatic
`
`control of USB enumeration.
`
`
`
`
`
`The automatic running circuit comprises a triode and a resistor, a base of the triode is
`
`configured to receive an enumeration control signal, an emitter thereof is connected to a power
`
`source, and a collector thereof is connected to a data end of the USB interface via the resistor.
`
`
`
`
`
`
`
`
`
`The automatic running function module comprises an Autorun.inf file.
`
`
`
`IPR2020-00342 Page 00008
`
`

`

`
`
`The device further comprises a USB hub module, and the mass storage application
`
`submodule and the fingerprint lock application submodule are respectively connected to the USB
`
`interface via the USB hub module.
`
`
`
`
`
`The storage controller in the mass storage application sub-module and the fingerprint
`
`lock controller in the fingerprint lock application submodule are separate microprocessor chips
`
`or integrated in the same microprocessor chip.
`
`
`
`
`
`The present utility model comprises a USB interface, and a mass storage application sub-
`
`module and a fingerprint lock application sub-module respectively connected to the USB
`
`interface, the USB interface is further connected with an automatic running circuit for
`
`automatically controlling USB enumeration, the storage controller in the mass storage
`
`application submodule or/and the fingerprint lock controller in the fingerprint lock application
`
`submodule include(s) an automatic running function module. The present utility model not only
`
`has the functions of identification and authentication, but also has a powerful storage function. A
`
`user can store useful data (such as a fingerprint KEY driver or an executable program) on the
`
`USB mass storage device. After the device of the present utility model is inserted into a
`
`computer, the operating system can automatically recognize the device immediately, generate a
`
`corresponding drive letter, and run the specified program or file (such as prompting the user to
`
`input a fingerprint or PIN code, or installing a driver). Therefore, it is greatly convenient for
`
`users to use and improves work efficiency.
`
`
`
`
`
`The present utility model can achieve the following functions: 1) provide a multi-
`
`functional composite device, which reduces the product cost; 2) encrypt the content on the USB
`
`mass storage through a fingerprint KEY to ensure the security of the data; 3) store a large
`
`amount of data; 4) recognize fingerprints and provide all of the functions that a fingerprint KEY
`
`can provide; 5) automatically run certain programs or files (such as prompting users to enter
`
`fingerprints or PIN codes, or installing drivers).
`
`
`
`Brief Description of Drawings
`
`FIG. 1 is a structural block diagram of embodiment 1 of the present utility model.
`
`
`
`
`
`
`
`IPR2020-00342 Page 00009
`
`

`

`FIG. 2 is a structural block diagram of embodiment 2 of the present utility model.
`
`FIG. 3 is a structural block diagram of embodiment 3 of the present utility model.
`
`FIG. 4 is a flow chart of the interaction between embodiments 1, 2 and a host according
`
`to the present utility model.
`
`FIG. 5 is a flow chart of the interaction between embodiment 3 and the host according to
`
`the present utility model.
`
`FIG. 6 is a schematic diagram of the automatic running circuit according to the present
`
`utility model.
`
`
`
`Description of the Embodiments:
`
`
`
`The device of the present utility model mainly comprises two parts in the hardware
`
`structure, namely a fingerprint KEY and a USB mass storage device. The content of the present
`
`utility model will be described in detail below in conjunction with specific embodiments.
`
`
`
`
`
`
`
`Embodiment 1 is shown in FIG. 1, which is composed of a USB interface 102, a USB
`
`HUB module 103, a USB KEY controller 104, a fingerprint KEY unit 105, a USB mass storage
`
`device controller 106, a mass storage unit 107, and an automatic running circuit 108. The
`
`fingerprint KEY unit 105 is connected to the USB HUB module 103 through the USB KEY
`
`controller 104, and then connected to the USB interface 102 through the USB HUB module 103,
`
`and finally the USB bus is connected to the host 101 to implement the fingerprint KEY function.
`
`The fingerprint KEY unit 105 and the USB KEY controller 104 together form a fingerprint lock
`
`application sub-module 109. At the same time, the mass storage unit 107 is connected to the
`
`automatic running circuit 108 through the USB mass storage device controller 106, and then
`
`connected to the USB interface 102 through the USB HUB module 103, and finally connected to
`
`the host 101 through the USB bus, to achieve the function of the USB mass storage device. The
`
`mass storage unit 107, the USB mass storage device controller 106 and the automatic running
`
`circuit 108 together constitute a mass storage application sub-module 110. In this embodiment,
`
`the fingerprint KEY and the USB mass storage device are coupled together by a USB HUB
`
`module, wherein the USB KEY controller 104 and the fingerprint KEY unit 105 are two
`
`independent microprocessor chips. This embodiment is characterized by a fast execution speed
`
`but a slightly higher cost.
`
`
`
`
`
`IPR2020-00342 Page 00010
`
`

`

`
`
`As shown in FIG. 2, embodiment 2 is composed of a USB interface 202, a USB HUB
`
`module 203, a USB KEY controller and a fingerprint KEY integration module 204, a USB mass
`
`storage device controller 205, a mass storage unit 206, and an automatic running circuit 207. The
`
`USB KEY controller and the fingerprint KEY integration module 204 (i.e., the fingerprint lock
`
`application sub-module) are connected to the USB HUB module 203, and then connected to the
`
`USB interface 202 through the USB HUB module 203, and finally connected to the host 201
`
`through the USB bus, to implement the function of the fingerprint KEY. At the same time, the
`
`mass storage unit 206 is connected to the USB mass storage device controller 205, and the USB
`
`mass storage device controller 205 is in turn connected to the automatic running circuit 207, and
`
`then connected to the USB interface 202 through the USB HUB module 203, and finally
`
`connected to the host 201 through a USB bus, to implement the function of USB mass storage
`
`device. The mass storage unit 206, the USB mass storage device controller 205, and the
`
`automatic running circuit 207 collectively constitute a mass storage application sub-module. In
`
`this embodiment, the fingerprint KEY and the USB mass storage device are coupled together by
`
`a USB HUB module, wherein the USB KEY controller and the fingerprint KEY unit are
`
`integrated into one chip. The feature of this embodiment is that it can save some costs, and the
`
`disadvantage is that the execution speed is slightly slower.
`
`
`
`The flow of the interaction operation with the host in embodiments 1, 2 of the present
`
`invention is as shown in FIG. 4: in step 401, the device of the present invention is inserted into
`
`the host, and each work is started. First, in step 402, a command is issued by the host. In step
`
`403, the USB HUB determines which device command is used, and the USB HUB sends the host
`
`command to different devices according to different device numbers. If it is a command of the
`
`mass storage device, step 404 is executed to determine whether it is the first bus reset, and if so,
`
`step 405 is performed to enumerate the mass storage device. Step 406 reports the system
`
`descriptor as a CD ROM. Step 407 searches if there is an Autorun.inf file, and if so, executes
`
`step 408 to run the Autorun.inf file. Then, step 409 is performed to perform USB enumeration
`
`again. If the Autorun.inf file does not exist, step 409 is directly performed to re-enumerate the
`
`USB device. Step 410: the mass storage device receives the command sent by the host in step
`
`402 and parses the command. Next, the step 411 performs data exchange. The data exchange
`
`
`
`
`
`IPR2020-00342 Page 00011
`
`

`

`includes receiving data of the host and returning internal data of the mass storage device to the
`
`host, including reading of the file allocation table. Finally, at step 412, the information is
`
`returned to the host. If it is determined in step 404 that the USB peripheral is not the first bus
`
`reset, then step 410 is directly executed to receive the host command and parsed without re-
`
`enumerating the USB device. In step 403, if it is a fingerprint KEY, the fingerprint KEY data
`
`branch is executed. Step 413 performs USB device enumeration. In step 414, the fingerprint
`
`KEY receives the data and parses it. Step 415 processes information internally, including
`
`receiving data and transmitting data, encrypting and decrypting data, verifying password
`
`information, verifying biometrics, verifying signatures, etc., as well as storing passwords, storing
`
`certificates, storing biometrics, and setting authority settings activity. Step 416 organizes the
`
`processed information. Step 417 returns the data information to the host.
`
`
`
`In embodiment 3, as shown in FIG. 3, the device of the present invention is composed of
`
`a USB interface 302, a composite controller module 303, a fingerprint KEY unit 304, a mass
`
`storage unit 305, and an automatic running circuit 306. The fingerprint KEY unit 304 is
`
`connected to the composite controller module 303, and the composite controller module 303 is
`
`connected to the automatic running circuit 306, and then the automatic running circuit 306 is
`
`connected to the USB interface 302. Finally, it is connected to the host 301 through the USB bus
`
`to implement the function of the fingerprint KEY. At the same time, the mass storage unit 305 is
`
`connected to the composite controller module 303, which is in turn connected to the automatic
`
`running circuit 306, and is connected to the USB interface 302 through the automatic running
`
`circuit 306. Finally, it is connected to the host 301 through the USB bus in order to implement
`
`the function of the USB mass storage device. The embodiment integrates a fingerprint processing
`
`KEY unit and a micro processing unit for controlling the mass storage unit through a composite
`
`controller module to simultaneously control the fingerprint KEY unit and the mass storage unit,
`
`thereby coupling the fingerprint KEY and the USB mass storage device. Together, the composite
`
`controller module is a composite chip with dual control functions of fingerprint KEY and USB
`
`mass storage device. The feature of this embodiment is that the fingerprint KEY and the USB
`
`mass storage device are directly connected to the USB interface, thereby improving the
`
`execution speed. On the other hand, since the USB HUB is not used, the cost is also saved.
`
`
`
`
`
`
`
`IPR2020-00342 Page 00012
`
`

`

`The working process of embodiment 3 is as shown in FIG. 5. The flow of the interaction
`
`with the host in the third embodiment of the present invention is as follows: Step 501: after the
`
`utility model is connected to the host, the operation is started, and the host sends a command in
`
`step 502. Step 503 then determines if the USB peripheral is the first bus reset. If yes, step 504
`
`performs hardware initialization USB enumeration to establish connection with the host. If it is
`
`not inserted into the host for the first time, no USB enumeration is performed. In step 505, the
`
`device reports the USB descriptor as a CD ROM. Step 506 searches if there is an Autorun.inf file,
`
`and if so, executes step 507 to run the Autorun.inf file. Next, in step 508, the USB device is re-
`
`enumerated, and the device descriptor is enumerated as a mass storage device or fingerprint KEY.
`
`If the search for the Autorun.inf file does not exist in step 506, then step 508 is directly
`
`performed to re-enumerate the USB device. Next, the USB device will work normally. Step 509
`
`needs to receive USB data and analyze the content of the data. Then, step 510 determines the
`
`working state of the system according to the obtained parsed data. If it is a mass storage device
`
`command, step 511 needs to further analyze the data to determine whether to enumerate the file
`
`allocation table (after the device is inserted into the host, the host enumerates a large amount of
`
`file partition tables of the storage device). If the file allocation table needs to be enumerated, step
`
`513 is executed to establish a virtual device on the host for the removable storage. If the file
`
`partition table of the device has been read, step 512 transfers the file normally, and finally returns
`
`data to the host in step 516. If the step 510 analysis is fingerprint KEY data, then the processing
`
`of the command is required at step 514. Data is collated by step 515, and then the data is returned
`
`to the host in step 516. If it is determined in step 503 that the USB peripheral is not the first bus
`
`reset, then step 509 is directly performed to receive the data and then parse the data, and it is not
`
`necessary to perform several steps 504-508.
`
`
`
`The present utility model implements the Autorun function by running the Autorun.inf
`
`file. The principle of the Autorun function is to allocate a part of the storage area of the USB
`
`mass storage device for storing the Autorun.inf file. After the device is plugged in, the computer
`
`recognizes it as two parts: the CD ROM and the disk storage, where the Autorun.inf file is stored
`
`on the CD ROM and data cannot be written to the portion, and the disk storage portion is used to
`
`store large amounts of data.
`
`
`
`
`
`
`
`IPR2020-00342 Page 00013
`
`

`

`In order to implement the automatic running function, the utility model first reports the
`
`system descriptor as a CD ROM when initializing the enumeration, so that the system can
`
`execute the Autorun.inf file, and the system needs to re-enumerate the USB device after the
`
`automatic running function is completed. It is implemented by the automatic running circuit
`
`shown in FIG. 6. Taking embodiment 1 as an example, the automatic running circuit is formed
`
`by a transistor P and a resistor R1. The base of the transistor is connected to a control terminal
`
`IO0 of the controller U1 for receiving an enumeration control signal. The emitter is connected to
`
`the power source Vcc, and the collector is connected to the data terminal, the D+ terminal of the
`
`USB interface J1 via the resistor R1. When the device of the present invention is connected to
`
`the host 101, the IO0 of the controller is low, and the voltage VA of the A point is high level. The
`
`device is in a state of being plugged. At this time, USB enumeration is performed, and the device
`
`reports the descriptor as a CD ROM. To perform the automatic running function, the next step is
`
`to re-enumerate the device of the utility model, set IO0 to high, the voltage VA at point A is low,
`
`the USB device is pulled out, and then IO0 is set to low, voltage VA at point A is at high level,
`
`the device is in the inserted state, which is equivalent to the operation of re-inserting after the
`
`device is pulled out, and then the second enumeration is performed according to the command
`
`issued by the host 101, and the device descriptor is reported as a USB mass storage device or
`
`fingerprint KEY. When the enumeration is initialized, the utility model first reports the system
`
`descriptor as a CD ROM, so that the system can execute the Autorun.inf file. After the
`
`completion, the system needs to re-enumerate the USB, and the device descriptor is reported as
`
`the fingerprint KEY or USB mass storage device for automatic running.
`
`
`
`The above describes an automatically running composite USB device with mass storage
`
`and fingerprint lock as provided by the present utility model. In this disclosure, the specific
`
`examples are used to explain the principle and implementation of the present utility model. The
`
`description of the above embodiments is only for helping to understand the method of the present
`
`invention and its core idea; at the same time, for a person of ordinary skill in the art, in
`
`accordance with the basic idea of the present utility model, there may be changes in specific
`
`embodiments and applications. In summary, the content of the description should not be
`
`construed as limiting the present utility model.
`
`
`
`
`
`
`
`IPR2020-00342 Page 00014
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 1 of 6 pages
`
`Host
`
`USB
`interface
`
`USB HUB
`module
`
`USB KEY
`controller
`
`Fingerprint
`KEY unit
`
`Automatic
`running
`circuit
`
`USB mass
`storage
`device
`
`Mass
`storage
`unit
`
`FIG. 1
`
`
`
`
`
`
`
`
`
`
`
`IPR2020-00342 Page 00015
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 2 of 6 pages
`
`
`
`
`
`
`
`
`
`Host
`
`USB
`interface
`
`USB HUB
`module
`
`USB KEY
`controller and
`fingerprint KEY
`integrated module
`
`Automatic
`running
`circuit
`
`USB mass
`storage
`device
`
`Mass
`storage
`unit
`
`
`
`FIG. 2
`
`
`
`
`
`IPR2020-00342 Page 00016
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 3 of 6 pages
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Host
`
`USB
`interface
`
`Automatic
`running
`circuit
`
`Composite
`controller
`module
`
`Fingerprint
`KEY unit
`
`Mass
`storage unit
`
`FIG. 3
`
`
`
`
`
`
`
`IPR2020-00342 Page 00017
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 4 of 6 pages
`
`Start
`
`Host issues a
`command
`
`Determine whether USB HUB device code is a
`mass storage device or a fingerprint KEY
`
`Mass storage
`device
`
`Fingerprint
`KEY
`
`USB
`enumeration
`
`Fingerprint KEY data
`receiving and analysis
`
`
`Internal information
`processing
`
`
`Data organization
`
`No
`
`
`Return information
`to host
`
`Is it a first-time
`bus reset?
`
`Yes
`
`USB
`enumeration
`
`Report system
`descriptor to CD
`ROM
`
`Determine whether an
`Autorun file exists or not
`
`No
`
`Yes
`
`
`Run Autorun file
`
`Re-enumeration
`USB device
`
`
`Receive and parse
`information
`
`
`Data exchange
`
`
`Return information
`to host
`
`
`
`FIG. 4
`
`
`
`
`
`IPR2020-00342 Page 00018
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 5 of 6 pages
`
`
`
`
`
`Start
`
`Host issues a
`command
`
`Is it a first-time
`bus reset?
`
`Yes
`
`System initiation USB
`enumeration
`
`Report system
`descriptor to CD ROM
`
`Yes
`
`No
`
`Determine whether an
`Autorun file exists or not
`
`
`Run Autorun file
`
`No
`
`Re-enumeration
`
`Receive and
`parse
`information
`
`Is host command a mass storage device command or
`fingerprint KEY command?
`
`Mass storage device
`command
`Is it an enumeration
`file allocation table?
`
`Fingerprint KEY
`command
`
`
`Data organization
`
`No
`
`Yes
`
`
`File transfer
`
`
`Enumeration file
`allocation table
`
`
`Return information
`to host
`
`Return
`information to
`host
`
`FIG. 5
`
`
`
`
`
`
`
`IPR2020-00342 Page 00019
`
`

`

`200620120188.4
`
`
`
`
`
`
`
`Drawings
`
`
`
`
`
` Page 6 of 6 pages
`
`
`
`
`
`
`
`
`
`Controller
`
`FIG. 6
`
`
`
`
`
`IPR2020-00342 Page 00020
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket