throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2002/0109580 A1
`Shreve et al.
`(43) Pub. Date:
`Aug. 15, 2002
`
`US 2002O10958OA1
`
`(54) WIRELESS UNIVERSAL PERSONAL
`ACCESS SYSTEM
`
`(76) Inventors: Gregory A. Shreve, Huntsville, AL
`S. Barry Dunbridge, Torrance, CA
`
`Correspondence Address:
`Patent Counsel
`TRW Inc.
`S&EG Law Department, E2/6051
`One Space Park
`Redondo Beach, CA 90278 (US)
`
`(21) Appl. No.:
`
`09/784,526
`
`(22) Filed:
`
`Feb. 15, 2001
`
`
`
`12
`
`Publication Classification
`(51) Int. Cl." ....................................................... H04Q 1700
`(52) U.S. Cl. ........................ 340/5.61; 713/201; 340/5.74
`(57)
`ABSTRACT
`The invention relates to a two-way bi-directional wireless
`based acceSS communication System that allows a user to
`acceSS any one of multiple independent Secured domain
`Systems from a single handheld remote keyleSS entry device,
`whereupon activation of the remote keyleSS device by the
`user, an encoded request Signal containing a predetermined
`acceSS code is generated and transmitted by the remote
`keyleSS entry device to one of the multiple Secure domain
`Systems. And, based on the acceSS code contained within the
`encoded request Signal, the domain System determines the
`validity of the acceSS code and transmits a corresponding
`encoded authorization signal to user at the transceiver
`device.
`
`-
`
`Authentication
`Algorithm
`
`Petitioner's Exhibit 1012, Page 1
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 1 of 9
`
`US 2002/0109580 A1
`
`
`
`Petitioner's Exhibit 1012, Page 2
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 2 of 9
`
`US 2002/0109580 A1
`
`
`
`ez eun61-I
`
`Petitioner's Exhibit 1012, Page 3
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 3 of 9
`
`US 2002/0109580 A1
`
`
`
`
`
`Petitioner's Exhibit 1012, Page 4
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 4 of 9
`
`US 2002/0109580 A1
`
`14
`
`
`
`24
`
`Authentication
`Algorithm
`
`Figure 2c
`
`Petitioner's Exhibit 1012, Page 5
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 5 of 9
`
`US 2002/0109580 A1
`
`
`
`Microprocessor
`
`Figure 3a
`
`Petitioner's Exhibit 1012, Page 6
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 6 of 9
`
`US 2002/0109580 A1
`
`
`
`H
`2.
`
`
`
`i.:
`
`O (Y)
`
`O
`Y
`c
`
`O
`LL
`
`3
`c
`s
`9?
`l
`
`S
`
`&S
`
`S i
`
`RS
`
`SS.
`
`y
`y
`y
`y
`
`N
`&
`
`9
`D
`O)
`l
`
`-
`
`w
`cy
`
`CN
`w
`
`P
`-D
`
`O)
`
`\ .
`s
`9.
`
`CN
`wn
`
`o
`CN
`--
`
`Od
`CN
`
`i
`
`i
`
`Petitioner's Exhibit 1012, Page 7
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 7 of 9
`
`US 2002/0109580 A1
`
`12
`
`12
`
`12
`
`2
`
`28
`
`46
`
`40
`
`27
`
`t
`
`40<
`
`46
`
`Figure 4a
`
`Figure 4b
`
`Figure 4c
`
`
`
`Microprocessor
`
`Figure 4d
`
`Petitioner's Exhibit 1012, Page 8
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 8 of 9
`
`US 2002/0109580 A1
`
`48
`
`48
`
`12
`
`40
`
`12
`
`12
`
`51
`
`Figure 4e
`
`Figure 4f
`
`Figure 4g
`
`
`
`Petitioner's Exhibit 1012, Page 9
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 9 of 9
`
`US 2002/0109580 A1
`
`50
`v
`
`12
`/
`
`52
`
`12
`
`54
`
`Figure 5a
`
`Figure 5b
`
`50
`
`54
`
`Figure 5c
`
`Figure 5d
`
`Petitioner's Exhibit 1012, Page 10
`
`

`

`US 2002/0109580 A1
`
`Aug. 15, 2002
`
`WIRELESS UNIVERSAL PERSONAL ACCESS
`SYSTEM
`
`BACKGROUND OF THE INVENTION
`0001) 1. Field of the Invention
`0002 The present invention relates generally to a com
`munication System and, more Specifically to a long range,
`interactive and wireleSS personal access communication
`System that, using a single two-way remote keyleSS entry
`based interactive wireleSS device, facilitates transactions
`between a user and any one of Several independent Secure
`domain Systems.
`0003 2. Description of the Prior Art
`0004 Increasingly, a majority of individuals are faced
`with having to access many different Secured domain SyS
`tems, each having its own unique Security access require
`ments. And as the number of Such Systems increases, So too
`increase the number of access codes, acceSS devices and the
`like for which an individual must be accountable. For
`example, a consumer wanting to withdraw money from an
`automated teller machine (ATM) is currently required to
`Swipe a magnetically Striped bank card acroSS a card reader
`and manually input his or her personal identification number
`(PIN). Similarly, in many building access Systems, an indi
`vidual is required to Swipe a badge acroSS a card reader
`and/or manually enter his or her own personal access code
`into a keypad. Moreover, approximately 10 to 20 million
`automobile owners currently use remote keyleSS entry
`(RKE) systems (see U.S. Pat. Nos., 5.896,094, 5,499, 022
`and 5,844.517) to turn on or off the automotive security
`systems of their vehicles. And with the advent of Smart
`cards, a consumer wanting to perform a point of Sale
`transaction using an automated payment System like those
`popularized by the Mobile SpeedpassTM system and the EZ
`PassTM toll-collection system, must pay from a prepaid
`account that is linked to a card, or to a decal that is mounted
`on the windshield of the an automobile. Likewise, with Such
`Smart badge systems such as IBM's IBM PANTM (personal
`access network) system and Hewett Packard's TM Smart
`badge System, a card or decal is embedded with a chip
`containing an individual's account information. And a ter
`minal located at a transaction Site utilizes a card reader or
`emits a radio Signal that reads the account information
`contained within the Smart badge chip. Various other acceSS
`methods known in the art include, biometrics (e.g. finger
`print, Voiceprint, retina, face recognition, Skin temperature
`Sensing, body measurement, dynamic signatures), bar codes,
`conventional keys, forensics, one-wire buttons, radio fre
`quency (RF) identification.
`0005. Unfortunately, because each of the systems men
`tioned above exists independently of each other System, an
`individual must conduct transactions with each of the SyS
`tems using a variety of access platforms. The invention
`embodied in U.S. Pat. Nos. 5,982,891; 5,949,876; 5,917,
`912; 5,915,019; 5,910,987; and 5,892,900 seeks to over
`come this disadvantage by disclosing a capability to conduct
`Secure transactions from one remote location, Such as a
`Secure computer. However, the invention does not provide a
`convenient enabling device that an individual could carry to
`provide the Security acceSS codes and identification proce
`dures necessary to conduct remote transactions with many
`different Secure Systems.
`
`0006 Therefore, based on techniques known in the art for
`accessing Secured domain Systems, a universal personal
`acceSS System having the capability to utilize an enabling
`device, such as a remote keyless entry (RKE) fob device
`already carried by a majority of individuals, to provide the
`Security codes and identification procedures necessary to
`conduct Secured transactions with many independent
`Secured domain Systems is highly desirable.
`
`SUMMARY OF THE INVENTION
`0007. The present invention provides an access commu
`nication System having a transceiver device for transmitting
`and receiving Signals and an electronic database Storage
`element for Storing an acceSS code that provides the neces
`Sary identification of a user. The transceiver device is
`responsive to activation by the user, whereupon a coded
`request Signal containing the predetermined acceSS code is
`generated and transmitted by the remote keyleSS entry
`transceiver device to any one of many Secured domain
`Systems. The Secured domain Systems, each being remote
`from the transceiver device and independent from each other
`Secure domain System, each have a base unit and Service
`provider for receiving the digitally encoded request Signals
`from the remote keyleSS entry transceiver device and trans
`mitting a digitally encoded authorization signal to the
`remote keyleSS entry transceiver device in response to the
`receipt of the appropriate encoded request Signal.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0008 Reference is now made to the following description
`and attached drawings, wherein:
`0009 FIG. 1 is a block diagram illustration of a remote
`keyleSS entry based wireleSS universal access System in
`accordance with a preferred embodiment of the present
`invention;
`0010 FIG. 2a is a functional illustration of a remote
`authentication Server configuration between a two-way
`remote keyleSS entry device and a domain System Service
`provider in accordance with an alternate embodiment of the
`present invention;
`0011 FIG. 2b is a functional illustration of a hybrid
`authentication Server configuration between a two-way
`remote keyleSS entry device and a domain System Service
`provider in accordance with an alternate embodiment of the
`present invention;
`0012 FIG.2c is a functional illustration of a standalone
`authenticator in accordance with an alternate embodiment of
`the present invention;
`0013 FIG. 3a is a functional illustration of a remote
`keyleSS entry device in accordance with a preferred embodi
`ment of the present invention;
`0014 FIG. 3b is a front view illustration of a remote
`keyleSS entry device in accordance with the remote keyleSS
`entry device of FIG. 3a;
`0.015 FIG. 3c is a front view illustration of a remote
`keyleSS entry device including an intelligent control button
`in accordance with an alternate embodiment of the present
`invention;
`0016 FIG. 3d is a side view illustration of the remote
`keyless entry device of FIG. 3c,
`
`Petitioner's Exhibit 1012, Page 11
`
`

`

`US 2002/0109580 A1
`
`Aug. 15, 2002
`
`0017 FIG. 3e is a front view illustration of the remote
`keyless entry device of FIG. 3b including a modular remov
`able microdisplay;
`0018 FIG. 3f is a front view illustration of a remote
`keyleSS entry device without an internal display, but includ
`ing a modular removable microdisplay in accordance with
`an alternate embodiment of the present invention;
`0019 FIG. 3g is a front view illustration of the remote
`keyless entry device of FIG. 3f with the modular removable
`microdisplay removed;
`0020 FIG. 3h is a side view illustration of a remote
`keyleSS entry device including a modular removable micro
`display that includes a microdisplay Screen and lens for
`magnifying the view the microdisplay Screen view in accor
`dance with an alternate embodiment of the present inven
`tion;
`FIG. 4a is a side view illustration of remote
`0021
`keyleSS entry device including a button control interface;
`0022 FIG. 4b is a side view illustration of a remote
`keyleSS entry device including a skin conduction Sensing
`interface in accordance with an alternate embodiment of the
`present invention;
`0023 FIG. 4c is a back view illustration of the remote
`keyless entry device of FIG. 4b;
`0024 FIG. 4d is a schematic illustration of the skin
`conduction interface of FIG. 4b,
`0025 FIG. 4e is a side view illustration of a remote
`keyleSS entry device including an electrode for contact
`transactions in accordance with an alternate embodiment of
`the present invention;
`0026 FIG. 4f is a back view illustration of the remote
`keyless entry device of FIG. 4e,
`0027 FIG. 4g is a back view illustration of the remote
`keyleSS entry device of the present invention including an
`input/output (I/O) port for providing a physical connection
`to a domain System;
`0028 FIG. 4h is a functional illustration of the physical
`connection between the remote keyless entry device of FIG.
`4g and a domain System;
`0029 FIG. 5a is a side view illustration of a remote
`keyleSS entry device of the present invention including a
`biometric Sensor attachment;
`0030 FIG. 5b is a back view illustration of the remote
`keyless entry device of FIG. 5a with the biometric sensor
`attachment removed from an electrical connector and
`mechanical attachment Socket of the remote keyleSS entry
`device;
`0031 FIG. 5c is a side view illustration of the biometric
`sensor attachment of FIG. 5a; and
`0032 FIG. 5d is a back view illustration of the biometric
`sensor attachment of FIGS. 5a and 5c including an active
`area for extracting Sensor data.
`DETAILED DESCRIPTION OF THE
`INVENTION
`Referring to FIG. 1, the present invention discloses
`0.033
`a remote keyless entry (RKE) based, wireless access System
`
`10 that allows a user to independently access any one of a
`variety of independent Secured Systems from a Single uni
`versal platform. To accomplish this, the system 10 includes
`a single transceiver device 12, preferably, but not necessar
`ily, a remote keyleSS entry-based transceiver device, that is
`capable of performing two-way bi-directional wireleSS data
`communication with any one of a plurality of independent
`Secure electronic domain Systems 14. More particularly,
`Specific digitally encoded pulse command signals (18.20)
`are continuously and Securely transmitted and received
`between the transceiver device 12 and a particular domain
`System 14 until a transaction between the two is complete.
`Typically, a user 16 initiates the transaction with the par
`ticular domain System 14 by activating the transceiver fob
`device 12 using the interface methods described and illus
`trated in FIGS. 3 and 4. Upon activation, the transceiver
`device 12 digitally encodes a request signal 18 with certain
`acceSS code information, described below, and transmits the
`request signal 18 to the domain system 14. The domain
`System 14 may respond to the user's request 18 in a variety
`of ways, for example, the domain System 14 may send an
`authorization signal 20 to the transceiver device 12 notifying
`the user 16 that access has been granted or denied. Alter
`natively, the domain System 14 may send an authorization
`Signal 20 to the transceiver device 12 requesting additional
`information from the user 16. In this case, either the user 16
`will activate the fob device 12 to Send Subsequent request
`Signals 18 containing the information requested by the
`domain system 14 or the fob device 12 will, itself, auto
`matically Send the information.
`0034. As noted above, the transceiver device 12 sends a
`digitally encoded request Signal 18 to the domain System 14
`either upon initial activation by the user 16 or automatically.
`As illustrate in detail in FIG. 2, each domain system 14
`preferably includes a base unit 22 and a Service provider 24
`that may be either directly or remotely connected to each
`other. Communication between the RKE fob device 12 and
`the domain system 14 is established once the base unit 22
`receives the encoded request signal 18 from the fob device
`12. The base unit 22 forwards the request signal 18 to the
`Service provider 24, and the Service provider 24, acting as an
`issuing authority, determines whether to authorize the user's
`request and generates an authorization signal 20 correspond
`ing thereto. The service provider 24 then sends the autho
`rization signal 20 to the base unit 22 where the base unit 22
`forwards the authorization signal 20 to the user's RKE fob
`device 12.
`0035. The digitally encoded request signals 18 transmit
`ted by the device 12 to the base unit 22 may be encoded with
`access codes Such as a user identification (ID) code, a user
`account number, a personal identification number, a written
`Signature recorded from a touch Screen display, a personal
`biometric Signature, Voice authentication information, or
`other personal information Such as a mother's maiden name.
`An advantage of the present invention is that all acceSS codes
`can be converged into the single RKE fob device 12 by
`Storing the codes in a Secure electronic memory element 30
`(see FIG.3a) of the device 12. And, as a result of having all
`of the user's 16 access codes Stored in the device memory
`element 30, the present invention is able to provide multiple
`layers of Security for transactions between the user 16 and
`the domain system 14. In other words, the more value that
`is attached to a particular transaction, the more levels of
`Security the user 16 may be required to provide to complete
`
`Petitioner's Exhibit 1012, Page 12
`
`

`

`US 2002/0109580 A1
`
`Aug. 15, 2002
`
`the transaction. So, for example, level one Security may
`require a user ID or a user account number, level two
`Security may require a personal identification number (PIN),
`level three Security may require personal information Such
`as mother's maiden name, and level four Security may
`require a biometric Signature. For example, as shown in
`FIG. 5., biometric-based security levels may be imple
`mented using a detachable biometric sensor device 50. As
`illustrated in FIGS. 5a and 5b, in side and back views
`respectively, the biometeric sensor device 50 may attach to
`an electrical connector and mechanical Socket 52 located at
`the back-side of the fob device 12. As illustrated in FIGS.
`5c and 5b, inside and back views respectively, the biometric
`sensor device 50 includes an active region 54 that is utilized
`to extract invariant features from the user 16, the combina
`tion of which is called the biometric signature. The biomet
`ric sensor device 50 may be selected having the capability to
`extract invariant Such features from the user 16 as finger
`prints, voice data, eye iris or retina data, handwritten Sig
`nature and/or dynamic handwritten signature force measure
`ments, optical imaging of the face or palm, or other similar
`features. Although it is preferable that the biometeric Sensor
`device 50 be small enough to integrate mechanically with
`the fob device 12, this is not necessary requirement of the
`invention.
`0036) Referring now to FIG. 2, the base unit 22 and the
`service provider 24 of the domain system 14 may be directly
`or remotely connected, depending on the particular needs of
`the system 10. For example, FIG. 2a illustrates a remote
`authentication architecture, FIG. 2b illustrates a hybrid
`authentication architecture, and FIG. 2c illustrates a Stan
`dalone authentication architecture. However, it is important
`to note that the present invention is not limited to the
`architectures illustrated in FIG. 2 and can accommodate any
`domain System 14 architecture So long as the domain System
`14 is capable of processing a Secure transaction request from
`an fob device 12.
`0037 Referring specifically to FIG.2a, a remote authen
`tication embodiment of the domain System 14 includes a
`base unit 22 that is located within range of the fob device 12
`and is located remotely from the Service provider 24. A data
`communication network 25 is also included in the domain
`System 14 that provides a communication link between the
`base unit 22 and Service provider 24. The data communica
`tion network 25 may generally be any Secure communica
`tion link maintained by the service provider 24-for
`example, the Internet, a virtual private network (VPN), a
`telephone line a Satellite link an optical fiber, or a microwave
`or laser link. In other words, the data communication
`network 25 may be any communication path connecting the
`location at which a transaction occurs, here the base unit 22,
`with a location(s) at which an authentication of the trans
`action occurs, here the Service provider 24. The domain
`system 14 configuration illustrated in FIG.2a is likely to be
`a typical domain System configuration Since today many
`conventional service providers 24-for example, ATM
`machines, credit card point of Sale terminals, Service pro
`Viding public web kiosks or the like-already require Such
`a configuration.
`0038) Referring still to FIG.2a, because the base unit 22
`does no data processing or encryption/decryption, at least
`for the purposes of the transaction itself, it may include a
`simple transceiver 27. The transceiver 27 provides the base
`
`unit 22 with the capability to convert the data signals (18.20)
`sent between the key fob device 12 and the service provider
`24 from a wireless medium that can be recognized by the fob
`device 12 to a medium that can be recognized by the Service
`provider 24, and Vice-versa. Additionally, the base unit 22
`may include a computer (not shown) for managing the data
`communication to and from the data communication net
`work 25.
`0039. The FIG. 2a service provider 24 preferably
`includes a central processing unit (CPU) 29 and a secured
`database 31. Moreover, to provide authentication of a trans
`action initiated by the fob device 12 at the base unit 22, an
`“authentication algorithm'23-for example, a Software pro
`gram or a hardware encryption chip-is executed within the
`CPU 29. The authentication algorithm 23 typically requires
`information from the user 16, as input by the user 16 to the
`fob device 12, as well as information from the database 31
`to perform what are typically known complex mathematical
`encryption and decryption operations, Such as those
`described in “Applied Cryptography,” Bruce Schneier, 1996.
`In other words, the key fob device 12, or perhaps the user 16
`of the device 12, has to be identified uniquely, typically via
`a key fob identification code (ID) that may be a large number
`stored in a nonvolatile memory 30 (see also FIG.3a) of the
`fob device 12. In addition to the key fob ID, authentication
`algorithm 23 may require the fob device 12 to provide the
`service provider 24 with other user specific information. All
`of the information may be provided by the fob device 12 to
`the service provider 24 by way of the data signals (18.20)
`sent between the fob device 12 and the base unit 22. Once
`provided to the authentication algorithm 23, the information
`may be combined, in an unambiguous way, with information
`already stored on the service provider database 31. For
`example, the encryption/decryption keys which, as previ
`ously mentioned are Stored in the database 31, can be used
`in combination with the key fob ID to provide authentication
`for a particular transaction. The database 31 may also
`contain cross-references between the key fob ID and other
`user Specific information (e.g., accounts, access privileges,
`biometrics, etc) that can be used by the authentication
`algorithm 23 to further facilitate the authentication process.
`Thus, as part of the execution of the authentication algorithm
`23, the CPU 29 uses keys stored in the database 31, to
`decrypt and encrypt the various data signals (1820) trans
`mitted between the fob device 12 and the service provider
`24. Based on the results of the authentication process, the
`CPU 29 may also query and take responses from the
`database 31 to acceSS certain customer information Stored in
`the database 31.
`0040. Referring now to FIG.2b, a hybrid authentication
`embodiment of the domain system 14 is illustrated having
`Similar components and operation as the embodiment shown
`in FIG. 2a, except that here the base unit 22, in addition to
`having the transceiver 27, also includes an authentication
`algorithm 15 and a database 35. The CPU 33, the authen
`tication algorithm 15 and the database 35 work together to
`provide the base unit 22 with Some type of authentication,
`validation or other processing (not necessarily related to a
`Specific user) which takes place at the Site of the key fob
`device 12 transaction. In other words, for various reasons,
`Such as a need to reduce bandwidth over the data commu
`nication network 25 or to perform a check that “any valid
`user' or particular user tier is involved in a transaction, the
`base unit 22 includes the CPU 33, the authentication algo
`
`Petitioner's Exhibit 1012, Page 13
`
`

`

`US 2002/0109580 A1
`
`Aug. 15, 2002
`
`rithm 15, and the database 35 together may perform certain
`pre-processing on post-processing procedures on the infor
`mation eXchanged between the fob device 12 and the Service
`24 provider. However, it is important to note that in the
`present embodiment, user-specific authentication Still takes
`place at the remotely located Service provider 24 in the
`manner previously described and illustrated in FIG. 2a.
`0041
`Referring now to FIG. 2c, a standalone authenti
`cation embodiment of the domain system 14 is illustrated in
`which, similar to the FIGS. 2a and 2b embodiments, the
`base unit 22 is located within range of the fob device 12.
`However, unlike the FIG.2a and FIG.2b embodiments, the
`domain System 14 here is configured So that the base unit 22
`and the Service provider 24 are centrally located. Here, the
`base unit 22 is similar to the base unit shown in FIG. 2a,
`namely it includes a transceiver 27 that provides the base
`unit 22 with the capability to convert the data signals (18.20)
`sent between the key fob device 12 and the service provider
`37. Alternatively, the base unit 22 may also include its own
`CPU (not shown), authentication algorithm and database
`(not shown) in a configuration similar to the configuration
`illustrated in FIG. 2b.
`0.042
`Referring still to FIG. 2c, the service provider 24
`includes a CPU 29, an authentication algorithm 23 and a
`database 31 that operate in a manner Similar to that described
`by the FIGS. 2a and 2b embodiments. The domain system
`14 architecture of the present embodiment is preferred for
`conducting the short-range contact messaging transactions
`described in detail in FIGS. 4e and 4f. In such transactions,
`the nonvolatile memory 30 (see also FIG. 3a) of the fob
`device 12 Stores encrypted information in a manner Similar
`to that used with Smart cards or Similar devices. Thus, the
`CPU 29, the authentication algorithm 23 and the database 31
`work together to process a transaction by crediting a mon
`etary amount of an account located within the Service
`provider database 31 and, correspondingly, debiting the
`Same amount from an account located within the memory 30
`of the key fob device 12. Moreover, if the same architecture
`were used as a physical acceSS mechanism, Such as that used
`for a door or a gate, it is possible that the Service provider
`database 31 could also be configured to provide authentica
`tion for Specific users 16.
`0043 Referring now to FIGS. 3a and 3b, a preferred
`embodiment of the key fob transceiver device 12 is
`described and illustrated. The fob device 12 is preferably a
`two-way handheld bi-directional remote keyleSS entry
`(RKE) fob device that, for the convenience of the user 16,
`can be physically attached to a key ring (not shown) or
`Similar article, and Stored in a pocket, purse or wallet. The
`fob device 12 includes a microprocessor element 47, the
`memory element 30, a display element 26 and a control
`interface 28, each facilitating a transaction between the user
`16 and the secured domain system 14. The fob device 12
`may also include a power source 45 (see FIG. 4d) that
`provides power supply to the fob device 12. The power
`Source 45 is preferably an interchangeable and rechargeable
`battery that, for example, may be charged from a conven
`tional base unit (not shown) whose external contacts make
`contact with the external contacts of the fob device 12 once
`the device 12 is placed in the base unit. The power source 45
`may also be charged by using a known induction coil
`approach that allows the battery 45 to be charged without the
`use of external contacts on the device 12. Charging by an
`
`induction coil approach is accomplished by Setting the fob
`device 12 in a charging base (not shown) having a primary
`coil with alternating current flowing through it.
`0044) The display 26 of the fob device 12 is preferably a
`liquid crystal display (LCD) with backlight. The display 26
`may provide feedback capabilities to the user 16 that
`include, but are not limited to, whether a particular domain
`System 14 is available for acceSS and, if So, whether Such
`acceSS has been granted or denied. The display 26 preferably
`includes an approximately 600 to 800 pixel high-resolution
`screen 37 whose resolution is substantially similar to present
`state of the art video cameras. Alternatively, the screen 37
`may include a touch Sensitive interface. The backlight of the
`display 26 may be provided using the Indiglo TM technology
`currently used in ultra low power wristwatches. And in
`addition to having the capability to display textual charac
`ters, the display 26 may also include the capability to display
`Symbols that, for example, may indicate the operational
`mode of the fob device 12.
`004.5 The memory element 30, preferably a non-volatile
`memory chip, is included in the key fob device 12 to allows
`for, among other things, rewritable and updatable access
`information to be input to the display 26 directly or through
`the control interface 28 and stored within the memory 30.
`The fob device memory 30 may also store a history of prior
`transactions. For example, a transaction history might
`include recent account balance information, latest medical
`record information, the levels of Security required for par
`ticular transactions, acceSS expiration information, or
`encrypted proof of a past transactions.
`0046) As shown in FIGS. 3c and 3d, in side and back
`ViewS respectively, an intelligent button 42 can be used in
`addition to, or in place of the volatile memory 30. Intelligent
`buttons 42, like the iButton device manufactured by Dallas
`Semiconductor, are typically packaged processor and
`memory devices (chips) that carry information that can be
`used for remote authorization to gain access to a Secured
`System. Thus, during a transaction, information Stored in the
`intelligent button device 42 is transmitted to the domain
`System 14 into which access is desired. By providing the
`intelligent button 42 in addition to the device memory 30,
`the user 16 is given an additional means of identification that
`may be used to acquire access to a particular domain System
`14. And by providing the intelligent button 42 as an inter
`changeable replacement for the device memory 30, the fob
`device 12 could function as it did with the device memory
`30, So long as the intelligent button 42 is plugged into a
`device port 44. Here, the fob device 12 provides a more
`universal means of access for the user 16, Since the user 16
`can not only Select from a variety of interchangeable intel
`ligent buttons 42, but the intelligent button 42 can be shared
`among multiple fob devices 12.
`0047 Because the memory elements (30, 42) of fob
`device 12 may contain proprietary information, it is worth
`mentioning here what approaches might be taken to mitigate
`against a Situation where the fob device 12 is lost or Stolen.
`For example, prior to a loSS, a domain System 14 may, on an
`ongoing basis, duplicate or backup the contents of the device
`memory 30 to a database contained within the domain
`system 14 each time the user 16 transacts with the domain
`System 14. Such backups can automatically occur depending
`upon Such criteria as the time elapsed Since the last trans
`
`Petitioner's Exhibit 1012, Page 14
`
`

`

`US 2002/0109580 A1
`
`Aug. 15, 2002
`
`action or the nature of the transaction itself. However, once
`a loSS has occurred, the loSS may be mitigated using the
`measures Similar to those typically taken when an ATM card,
`credit card or similar item is lost or Stolen. In other words,
`the user 16 would notify the appropriate domain system 14
`administrator that the device 12 had been lost or stolen and
`the administrator would, in turn, invalidate any authorization
`requests that are associated with the access codes (keys)
`stored in the memory 30 of the lost or stolen fob device 12.
`0048 Referring now to FIGS. 3e through 3f, the RKE
`fob device 12 may alternatively include a removable micro
`display module 32 that plugs into the RKE device 12, thus
`allowing the device 12 to exploit a variety of display
`options. For example, as shown in FIG. 3e, the fob device
`12 is illustrated including the display module 32 in addition
`to the existing LCD display 26. Alternatively, as shown in
`FIGS. 3f and 3g, the fob device 12 may include only the
`display module 32. And, as shown in FIG.3h, the removable
`module 32 may optionally include a microdisplay Screen 34
`and a magnifying lens assembly 36 that is capable of
`magnifying the high-resolution display of the Screen 34 by
`at least a factor of approximately ten.
`0049 Referring now to FIG. 4a, the control interface 28
`of the fob device 12 preferably includes features such as
`conventional keypad buttons 40, that are similar to those
`used in present State of the art remote keyleSS entry devices.
`0050 Referring to FIGS. 4b, 4c and 4d, the control
`interface 28 may also include features that mitigate against
`unintentional wireless transactions that can occur as a result
`of inadvertent actions by the user 16. For example, as shown
`in FIGS. 4b and 4c in side and back views, respectively, one
`Such control feature is a skin conduction interface. The skin
`conducti

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket