`(12) Patent Application Publication (10) Pub. No.: US 2006/0208066A1
`(43) Pub. Date:
`Sep. 21, 2006
`Finn et al.
`
`US 20060208066A1
`
`(54) RFID TOKEN WITH MULTIPLE INTERFACE
`CONTROLLER
`(75) Inventors: David Finn, Tourmakeady (IE); Dennis
`Ryan, Tipp City, OH (US)
`
`Correspondence Address:
`D.A. STAUFFER PATENT SERVICES LLC
`1OO6 MONTFORD ROAD
`CLEVLAND HTS., OH 44121-2016 (US)
`(73) Assignee: DPD Patent Trust
`
`(21) Appl. No.:
`
`11/355,264
`
`Provisional application No. 60/664.974, filed on Mar.
`24, 2005. Provisional application No. 60/660,398,
`filed on Mar. 10, 2005. Provisional application No.
`60/652,895, filed on Feb. 15, 2005. Provisional appli
`cation No. 60/633,541, filed on Dec. 6, 2004. Provi
`sional application No. 60/602.595, filed on Aug. 18,
`2004. Provisional application No. 60/562,204, filed
`on Apr. 14, 2004. Provisional application No. 60/520,
`698, filed on Nov. 17, 2003.
`
`Publication Classification
`
`(51) Int. Cl.
`G06K 5/00
`G06K 7/06
`
`(2006.01)
`(2006.01)
`
`Related U.S. Application Data
`
`(52) U.S. Cl. ........................... 235/380: 235/.441; 235/451
`
`(63) Continuation-in-part of application No. 10/990,296,
`filed on Nov. 16, 2004.
`Continuation-in-part of application No. 11/295,685,
`filed on Dec. 6, 2005.
`
`(60) Provisional application No. 60/652,895, filed on Feb.
`15, 2005. Provisional application No. 60/660,398,
`filed on Mar. 10, 2005. Provisional application No.
`60/664,974, filed on Mar. 24, 2005. Provisional appli-
`cation No. 60/734,409, filed on Nov. 8, 2005. Provi-
`sional application No. 60/725,818, filed on Oct. 12,
`2005. Provisional application No. 60/708,707, filed
`on Aug. 16, 2005. Provisional application No. 60/708,
`628, filed on Aug. 16, 2005. Provisional application
`No. 60/691,337, filed on Jun. 16, 2005. Provisional
`application No. 60/685,503, filed on May 27, 2005.
`
`(57)
`
`ABSTRACT
`
`An RFID token apparatus has a connection module for
`interfacing with an appliance capable of communicating and
`interacting with remote servers and networks, a translation
`module for moving signals between a USB interface and a
`Smart card interface, a processor module which may be
`capable of operating as a dual-interface (DI) chip; and an
`input/output module having at least one RF antenna and a
`modulator. An RFID-contactless interface according to ISO
`14443 & ISO 15693 and/or NFC. A wireless interface
`according to Zigbee, Bluetooth, WLAN 802.11, UWB, USB
`wireless and/or any similar interface. An RFID reader appa
`ratus has a housing; a slot for a contact or contactless fob;
`and a USB Stick alternately protruding from the housing and
`retracted within the housing.
`
`
`
`
`
`USB Stick
`
`Housing/Reader
`
`Magnetic
`Stripe
`
`Contactless
`Fob
`
`Fob Slot
`
`IPR2022-00412
`Apple EX1037 Page 1
`
`
`
`Patent Application Publication Sep. 21, 2006 Sheet 1 of 5
`
`US 2006/0208066A1
`
`FIG 1A
`100 y
`
`USB Plug
`
`Connection
`Module
`
`Translation
`Module
`
`Processor
`Module
`FIG. 1B
`120 y
`
`Input/Output
`Module
`
`
`
`
`
`
`
`Connection
`Module
`
`Translation
`Module
`
`:
`
`Input/Output
`Module
`
`:
`
`Module
`
`FIG 1C
`140 v
`
`142
`
`144
`
`146
`
`148
`
`Connection
`Module
`
`Translation
`Module
`150
`
`
`
`Processor
`Module
`
`Input/Output
`Module
`
`IPR2022-00412
`Apple EX1037 Page 2
`
`
`
`Patent Application Publication Sep. 21, 2006 Sheet 2 of 5
`
`US 2006/0208066A1
`
`FIG 1D
`400 y
`
`402
`
`406
`
`408
`
`
`
`
`
`
`
`
`
`
`
`USB Plug
`
`Connection
`Module
`
`410
`
`RJ-45
`Connector
`/
`translator
`module
`
`Module
`
`Processor
`Module
`
`502
`
`504
`
`506
`
`508
`
`USB Plug
`
`
`
`
`
`
`
`
`
`Connection
`Module
`
`Translation
`Module
`
`
`
`Processor
`Module
`
`Input/Output
`Module
`
`510
`
`IPR2022-00412
`Apple EX1037 Page 3
`
`
`
`Patent Application Publication Sep. 21, 2006 Sheet 3 of 5
`
`US 2006/0208066 A1
`
`FIG. 2A
`
`Housing/Reader
`
`
`
`USB & N
`Na
`
`
`
`
`
`Fob Slot
`
`Magnetic
`Stripe
`
`Contactless
`Fob
`
`->1
`
`FIG. 2B
`
`Release
`Pivot
`
`Housing
`
`
`
`USB Stick
`
`
`
`Connector
`
`IPR2022-00412
`Apple EX1037 Page 4
`
`
`
`Patent Application Publication Sep. 21, 2006 Sheet 4 of 5
`
`US 2006/0208066 A1
`
`FIG. 3A
`
`Bluetooth
`Interface
`
`Wireless Interface
`IEEE 802.11b/g/n
`
`
`
`
`
`Address, Data
`and Control bus
`
`Data and Control bus
`-1
`Controller (Memory
`Management), OS with
`Embedded USB HUB
`
`
`
`Wireless Interface
`IEEE 802.11b/g/n
`
`Address, Data
`and Control bus
`
`Hard Disk
`Drive
`
`Address, Data
`and Control bus
`
`IPR2022-00412
`Apple EX1037 Page 5
`
`
`
`Patent Application Publication Sep. 21, 2006 Sheet 5 of 5
`FIG. 3C
`
`US 2006/0208066 A1
`
`
`
`
`
`
`
`
`
`Power
`(step down 5v to 3.3v)
`
`Other I/O
`Ports
`
`USB from PC
`
`Gatekeeper
`Microcontroller
`Memory Management
`Embedded HUB
`
`
`
`
`
`Data
`
`Flash Memory
`NAND
`
`
`
`
`Internal OS
`memory reader
`control logic
`
`USB Devices
`such as
`wireless/
`Bluetooth
`
`FIG. 3D
`
`
`
`
`
`Bluetooth
`Interface
`
`
`
`
`
`
`
`
`
`Address, Data
`and Control bus
`USB
`
`
`
`Control bus
`
`Data and Control bus
`
`FN Wireless Interface
`
`Controller (Memory
`Management), OS with
`Embedded USB HUB
`
`IEEE 802.11b/g/n
`
`Address, Data
`and Control bus
`
`Flash
`Memory
`
`Hard Disk
`Drive
`Address, Data
`and Control bus
`
`IPR2022-00412
`Apple EX1037 Page 6
`
`
`
`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`RFID TOKEN WITH MULTIPLE INTERFACE
`CONTROLLER
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`0001. This is a continuation-in-part of U.S. Ser. No.
`10/990,296 filed Nov. 16, 2004
`0002 This is a continuation-in-part of U.S. Ser. No.
`11/295,685 filed Dec. 06, 2005.
`0003. This is a non-provisional filing of U.S. Ser. No.
`60/652,895 filed Feb. 15, 2005.
`0004. This is a non-provisional filing of U.S. Ser. No.
`60/660,398 filed Mar. 10, 2005.
`0005. This is a non-provisional filing of U.S. Ser. No.
`60/664,974 filed Mar. 24, 2005.
`0006 Priority is claimed from the following:
`0007 Provisional Application No. 60/734,409 filed
`Nov. 8, 2005
`0008 Provisional Application No. 60/725,818 filed
`Oct. 12, 2005
`0009 Provisional Application No. 60/708,707 filed
`Aug. 16, 2005
`0010) Provisional Application No. 60/708,628 filed
`Aug. 16, 2005
`0011 Provisional Application No. 60/691,337 filed
`Jun. 16, 2005
`0012 Provisional Application No. 60/685,503 filed
`May 27, 2005
`0013 Provisional Application No. 60/664,974 filed
`Mar. 24, 2005
`0014) Provisional Application No. 60/660,398 filed
`Mar. 10, 2005
`0.015
`Provisional Application No. 60/652,895 filed
`Feb. 15, 2005
`0016 Patent application Ser. No. 11/295,685 filed Dec. 6,
`2005, claiming priority of
`0017 Provisional Application No. 60/633,541 filed
`Dec. 6, 2004
`0018 Patent application Ser. No. 10/990.296 filed Nov.
`16, 2004, claiming priority of
`0.019
`Provisional Application No. 60/602,595 filed
`Aug. 18, 2004
`0020 Provisional Application No. 60/562,204 filed
`Apr. 14, 2004
`0021 Provisional Application No. 60/520,698 filed
`Nov. 17, 2003
`all of which are incorporated by reference herein, and all
`of which name Finn as an inventor.
`
`TECHNICAL FIELD OF THE INVENTION
`0022. This invention relates generally to RFID technol
`ogy, and also to Smart card technology.
`
`BACKGROUND OF THE INVENTION
`0023. A smart card resembles a credit card in size and
`shape. (See ISO 7810). The inside of a smart card usually
`contains an embedded 8-bit microprocessor. The micropro
`cessor is under a gold contact pad on one side of the card.
`Smarts cards may typically have 1 kilobyte of RAM, 24
`kilobytes of ROM, 16 kilobytes of programmable ROM, and
`an 8-bit microprocessor running at 5 MHz. The Smart card
`uses a serial interface and receives its power from external
`Sources like a card reader. The processor uses a limited
`instruction set for applications such as cryptography. The
`most common Smart card applications are:
`0024 Credit cards
`0025) Electronic cash
`0026 Computer security systems
`0027 Wireless communication
`0028 Loyalty systems (like frequent flyer points)
`0029 Banking
`0030) Satellite TV
`0031 Government identification
`0032 Smart cards can be used with a smart-card reader
`attachment to a personal computer to authenticate a user.
`(However, these readers are relatively costly, and have not
`been well accepted by users.) Web browsers also can use
`Smart card technology to Supplement Secure Sockets Layer
`(SSL) for improved security of Internet transactions. The
`American Express Online Wallet shows how online pur
`chases work using a Smart card and a PC equipped with a
`Smart-card reader. Smart-card readers can also be found in
`vending machines.
`0033. There are three basic types of smart cards: contact
`chip, contactless and dual interface (DI) cards.
`0034. A contact smart card (or contact chip card) is a
`plastic card about the size of a credit card that has an
`embedded integrated circuit (IC) chip to store data. This data
`is associated with either value or information or both and is
`stored and processed within the card's chip, either a memory
`or microprocessor device.
`0035. The predominant contact smart cards in consumer
`use are telephone cards as a stored value tool for pay phones
`and bank cards for electronic cash payments. Contact Smart
`cards require the placement of the card in a terminal or
`automatic teller machine for authentication and data trans
`action. By inserting the contact Smart card into the terminal,
`mechanical and electrical contact is made with the embed
`ded chip module.
`0036 Contactless smart cards have an embedded antenna
`connected to a microchip, enabling the card to pick up and
`respond to radio waves. The energy required for the Smart
`card to manipulate and transmit data is derived from the
`electromagnetic field generated by a reader. Contactless
`Smart cards do not require direct contact with the reader
`because they employ the passive transponder technology of
`Radio Frequency Identification (RFID). By just waving the
`card near the reader, secure identification, electronic pay
`ment transaction and authentication are completed in milli
`seconds.
`
`IPR2022-00412
`Apple EX1037 Page 7
`
`
`
`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`0037 Contactless chip card technology is based on two
`standards: ISO/IEC 14443 Type A and Type B (for proximity
`cards), and ISO/IEC 15693 (for vicinity cards). Cards that
`comply with these standards operate at the 13.56 MHz
`frequency. ISO/IEC 14443 products have a range of up to 10
`cm (centimeters), while ISO/IEC 15693 products can oper
`ate at a range between 50 and 70 cm.
`0038. Dual interface (DI) cards, sometimes called com
`bination chip cards, are microprocessor multi-function cards
`that incorporate both the functions of a contact chip card and
`a contactless card. Within the Smart card is a microprocessor
`or micro-controller chip with radio frequency identification
`(RFID) capability that manages the memory allocation and
`file access. The on-board memory is shared and can be
`accessed either in contact or contactless mode.
`0039. This type of chip is similar to those found inside all
`personal computers and when implanted in a Smart card,
`manages data in organized file structures, via a card oper
`ating system. This capability permits different and multiple
`functions and/or different applications to reside on the card.
`0040. A dual interface (DI) card is ideal for single and
`multi-application markets ranging from micro-payment
`(convenient alternative to low value cash transaction) to
`e-commerce and from ticketing in mass transit to secure
`identification for cross border control. Originally, such cards
`were intended to be used in conjunction with a reader
`connected to a PC for downloading tickets, tokens, or
`electronic money via the contact interface and used in
`contactless mode in the application for physical access or
`proximity payment
`0041
`Passive radio frequency identification (RFID)
`devices derive their energy from the electromagnetic field
`radiated from the reader. Because of international power
`transmission restrictions at the frequencies of 125 KHZ and
`13.56MHz, the contactless integrated circuits are generally
`low voltage and low power devices. Read/Write circuits use
`low voltage EEPROM and low power analogue cells. The
`read/write memory capacity in transponders, contact Smart
`cards, contactless memory based Smart cards, dual interface
`Smart cards (contact & contactless) and multi-interface
`micro-controllers is generally limited to approximately 64
`kilobytes.
`0042. The dual interface (DI) Smart cards typically have
`an 8, 16 or 32 bit microprocessor controller, operate at a low
`voltage of 1.8V-5V and run at an internal frequency of 5 or
`15 MHz. The open platform architecture includes memory
`management, non volatile memory, contactless interfaces
`and security features such as Advanced Crypto Engine
`(ACE) 1100 bit, triple DES encryption and RSA.
`0.043 High performance crypto controllers with multiple
`interfaces such as USB, ISO 14443 Type A, B, Felica have
`been developed for multi-functional Smart cards in applica
`tions such as security access, healthcare, electronic purse,
`banking etc.
`0044) The main focus of the smart card industry has been
`on Secure card applications where large memory capacity is
`not of paramount importance, and/or where pertinent infor
`mation and application Software is stored at a centralized
`server location.
`0045 Copending U.S. patent application Ser. No. 10/990,
`296 (the 296 application) generally discloses a compact
`
`personal token apparatus, Suitably resembling a conven
`tional USB memory fob in size, shape, and form which can
`be plugged into a PC and interfaced with the virtual world
`of the Internet. The apparatus is capable of loading and
`storing information from the Internet, via the PC to its flash
`memory or EEPROM and then using the stored information
`or value via its contactless or wireless interface in the real
`world. The apparatus is capable of implementing an auto-run
`application, when inserted into a personal computer. The
`apparatus is capable of exchanging information with other
`devices having compatible interfaces. The apparatus can
`also function as a firewall when plugged between an Internet
`connection and a PC.
`0046. Apart from using USB tokens for file storage, they
`are also used for desktop settings, screen lock, network login
`& access control, log book, user authentication (storing
`digital signatures, certificates, key sets, finger-based biomet
`ric templates, usernames and passwords), digital content and
`transaction security as well as enterprise and Internet Secu
`rity.
`0047 A USB token can also be used to download emails,
`remotely access a PC or to open a customized browser that
`allows the user to surf the Web with total privacy.
`0048 Recent developments in USB flash memory drives
`have resulted in CDROM-like auto-run devices that auto
`matically execute a file when the USB token is inserted into
`a PC. The read-only and auto-run contents are installed
`during the manufacturing process. Examples of auto-run
`contents include opening a website, running a demo appli
`cation, showing a presentation, making a product pitch,
`providing customers with discount coupons etc.
`0049 U.S. Pat. No. 6,763.399, incorporated by reference
`herein, entitled “USB key apparatus for interacting with a
`USB host via a USB port describes a smart card host
`system that operates without the intermediation of a Smart
`card reader. The Smart card host system comprises a host,
`which has a USB interface, and a portable device, which
`provides Smart card function(s). The portable device has a
`Smart card chip for performing the Smart card function(s); a
`USB interface for connecting the portable device with the
`host via USB protocol; and a microprocessor for controlling
`the transfer of data between the USB interface and the smart
`card chip, for converting data from a USB format to the
`format of the Smart card chip and for converting data from
`the format of the smart card chip to a USB format.
`0050 U.S. Pat. No. 6,801.956, incorporated by reference
`herein, entitled “Arrangement with a Microprocessor
`describes an arrangement with a microprocessor, particu
`larly a microprocessor for use in a chip card. The arrange
`ment includes a microprocessor, which is connected to at
`least a USB interfaces and an ISO interface for exchanging
`data signals. A selection unit within the microprocessor may
`be configured to select between the USB and ISO interfaces,
`and a Switching unit within the microprocessor may be
`configured to subsequently switch between the USB and
`ISO interfaces by initiating an internal reset of the micro
`processor.
`0051) International Patent Publication No. WO 01/96990,
`incorporated by reference herein, entitled “USB-Compliant
`Personal Key using a Smartcard Processor and a Smartcard
`Reader Emulator” describes a compact, self-contained, per
`
`IPR2022-00412
`Apple EX1037 Page 8
`
`
`
`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`Sonal key. The personal key comprises a USB-compliant
`interface releaseably coupleable to a host processing device
`operating under command of an operating system; a Smart
`card processor having a Smartcard processor-compliant
`interface of communicating according to a Smartcard input
`and output protocol; and an interface processor, communi
`catively coupled to the USB-compliant interface and to the
`Smartcard processor-compliant interface, the interface pro
`cessor implementing a translation module for interpreting
`USB-compliant messages into Smartcard processor-compli
`ant messages and for interpreting Smartcard processor-com
`pliant messages into USB-compliant messages.
`0.052
`U.S. Patent Publication No. 2003/0236821, incor
`porated by reference herein, describes a body wearable
`personal network server device having a display, function
`keys, alarm output indicators, a disk drive to receive and
`store client’s data, and communication devices to commu
`nicate to its clients, such as mobile phone, personal digital
`assistant (PDA), personal computer, and notebook com
`puter. A body wearable personal network device also con
`taining software modules; Such as a protocol handler to
`handle Internet based protocols XML/FTP/HTTP/TCP/IP.
`diagnostic system to automatically transmit of notification
`messages to its clients, and various applications to provide
`various services for its clients. A body wearable personal
`network device having gate way functionality between PAN
`(using Bluetooth) and WLAN (using IEEE 802.11b).
`0053 U.S. Pat. No. 6,148,354, incorporated by reference
`herein, describes a flash memory device, containing one or
`more flash modules, in which the flash memory is mapped
`to the address space of an ASIC or a controller which has a
`USB-defined electrical interface and a USB-defined logical
`interface. This controller/ASIC (hereinafter termed a “con
`troller') supports the USB functionality according to the
`USB standard, thereby supporting enumeration onto the
`USB bus, as well as data reception and transmission over
`USB pipes to and from USB endpoints. This controller also
`Supports the functionality and control of the flash memory
`device, as well as the processing of command and data
`packets from the host controller. The host controller uses one
`of several possible protocols, either standard or proprietary,
`to signal the next command to be performed to the USB flash
`controller. Thus, the entire device acts as a dynamically
`attachable/detachable non-volatile storage device for the
`host platform. The primary function of the controller is
`memory management and to directly interface between the
`host computing device and the flash memory.
`0054 U.S. Pat. No. 6,763,399 (“Alladin”), incorporated
`by reference herein, describes a portable device, for provid
`ing Smart card function(s), said portable device having
`thereon a Smart card chip, for performing said Smart card
`function(s), a USB interface, for connecting said portable
`device with said host via USB protocol; and a microproces
`Sor, for enabling at least one function selected from the
`group consisting of controlling the transfer of data between
`said USB interface and said smart card chip, for converting
`data from a USB format to the format of said smart card chip
`and for converting data from the format of said Smart card
`chip to a USB format. The portable device is configured to
`translate the USB communications from USB protocol, into
`smart card protocol such as an ISO 7816 protocol, and from
`smart card protocol into USB protocol and a smart card chip
`operative to perform at least one Smart card function Such as
`
`authentication, encryption, access control and secure
`memory. In Alladin, the term “smart card” refers to a plastic
`card with an embedded chip, which interacts with a smart
`card reader.
`0.055
`Patent Publication WO01/61692, incorporated by
`reference herein, describes a portable data storage device
`comprising a coupling device for coupling to a computer
`serial bus, an interface device coupled to the coupling
`device, a memory control device and a non-volatile Solid
`state memory device; the memory control device being
`coupled between the interface device and the memory
`device to control the flow of data from the memory device
`to the coupling device. The interface device comprises of a
`universal serial bus (USB) driver to convert data between a
`USB format and a PC format. Alternatively, the interface
`device comprises of a driver for IEEE 1394 (FireWire)
`protocol. The configuration as described is a modular
`approach to the memory management controller provided in
`the U.S. Pat. No. 6,148,354.
`0056 Patent Publication No. WO00/42491, incorporated
`by reference herein, describes a cryptographic USB token as
`a compact personal token, comprising: a USB-compliant
`interface releasably coupleable to a host processing device;
`a memory; a processor, communicatively coupled to the
`memory and communicatively coupleable to the host pro
`cessing device via the USB-compliant interface, the proces
`sor for providing the host processing device conditional
`access to data storable in the memory; and a user input
`device, communicatively coupled to the processor by a path
`distinct from the USB-compliant interface'. The compact
`personal token or key as described includes a processor and
`a memory which implements software protection schemes to
`prevent copying and unauthorized use. The personal key
`provides for the storage and management of digital certifi
`cates, allowing the user to store all of his or her digital
`certificates in one media that is portable from platform to
`platform. In another embodiment, the personal key com
`prises a biometric sensor disposed to measure biometrics
`Such as fingerprint data. The biometric sensor measures
`characteristics of the person holding the key (Such as fin
`gerprints) to confirm that the person possessing the key is the
`actual owner of the key.
`GLOSSARY, DEFINITIONS, BACKGROUND
`0057 The following terms may be used throughout the
`descriptions presented herein and should generally be given
`the following meaning unless contradicted or elaborated
`upon by other descriptions set forth herein. Many of the
`definitions below were taken from World Wide Web at
`webopedia.com. Some of the terms set forth below may be
`registered trademarks (R).
`0.058 ADPCM Short for Adaptive Differential Pulse
`Code Modulation. ADPCM is a form of pulse code modu
`lation (PCM) that produces a digital signal with a lower bit
`rate than standard PCM. ADPCM produces a lower bit rate
`by recording only the difference between samples and
`adjusting the coding scale dynamically to accommodate
`large and small differences. Some applications use ADPCM
`to digitize a Voice signal so voice and data can be transmitted
`simultaneously over a digital facility normally used only for
`one or the other.
`0059 ATA Short for Advanced Technology Attachment.
`ATA is a disk drive implementation that integrates the
`
`IPR2022-00412
`Apple EX1037 Page 9
`
`
`
`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`controller on the disk drive itself. There are several versions
`of ATA, all developed by the Small Form Factor (SFF)
`Committee:
`0060 ATA: Known also as IDE, supports one or two
`hard drives, a 16-bit interface and PIO modes 0, 1 and
`2.
`0061 ATA-2: Supports faster PIO modes (3 and 4) and
`multiword DMA modes (1 and 2). Also supports logical
`block addressing (LBA) and block transfers. ATA-2 is
`marketed as Fast ATA and Enhanced IDE (EIDE).
`0062 ATA-3: Minor revision to ATA-2.
`0063 Ultra-ATA: Also called Ultra-DMA, ATA-33,
`and DMA-33, supports multiword DMA mode 3 run
`ning at 33 MBps.
`0064 ATA/66: A version of ATA proposed by Quan
`tum Corporation, and supported by Intel, that doubles
`ATA’s throughput to 66 MBps.
`0065. ATA/100: An updated version of ATA/66 that
`increases data transfer rates to 100 MBps.
`0.066 ATA is also called Parallel ATA. Contrast with
`Serial ATA
`0067 SERIAL ATA Often abbreviated SATA or
`S-ATA, an evolution of the Parallel ATA physical
`storage interface. Serial ATA is a serial link—a single
`cable with a minimum of four wires creates a point
`to-point connection between devices. Transfer rates for
`Serial ATA begin at 150 MBps. One of the main design
`advantages of Serial ATA is that the thinner serial
`cables facilitate more efficient airflow inside a form
`factor and also allow for Smaller chassis designs. In
`contrast, IDE cables used in parallel ATA systems are
`bulkier than Serial ATA cables and can only extend to
`40 cm long, while Serial ATA cables can extend up to
`one meter. Serial ATA supports all ATA and ATAPI
`devices. Source: World Wide Web at webopedia.com
`0068 AVI Short for Audio Video Interleave. AVI is the
`file format for Microsoft's Video for Windows standard.
`0069 Bluetooth A wireless technology developed by
`Ericsson, Intel, Nokia and Toshiba that specifies how mobile
`phones, computers and PDAS interconnect with each other,
`with computers, and with office or home phones. The
`technology enables data connections between electronic
`devices in the 2.4 GHz range at 720 Kbps (kilo bits per
`second) within a 30-foot range. Bluetooth uses low-power
`radio frequencies to transfer information wirelessly between
`similarly equipped devices. Bluetooth wireless technology
`Supports ad hoc networking, enables devices from many
`different manufacturers to pair with each other and estab
`lishes secure connections “on the fly'. It is good at real-time
`data in Synchronous connected oriented mode, but requires
`relatively high power, so is unsuitable for extremely small
`battery-powered applications.
`0070 Byte Abinary digital signal is essentially a string of
`ones and Zeros—in other words, one voltage level or
`another, typically with no values in-between. Since having
`only two fingers (or one, depending on how you count) is not
`a very useful means of representing a wide number of
`variables, such as letters of the alphabet, it soon became
`apparent to bundle bits into bytes, such as eight bits to a byte.
`
`An 8-bit byte can represent 28=256 different values, gener
`ally plenty for representing letters of an alphabet, numerals
`and special characters. When more different values are
`needed, the bytes can be made longer (more bits per byte),
`or bytes can be strung together into words. MB is short for
`megabyte, one million bytes.
`0071 Challenge-Response An OTP method in which a
`challenge is entered or sent to the token and this challenge
`is combined with the credential through an algorithm to
`create a response (the OTP).
`0072 Client The client part of a client-server architec
`ture. Typically, a client is an application that runs on a
`personal computer or workstation and relies on a server to
`perform some operations. For example, an e-mail client is an
`application that enables you to send and receive e-mail.
`0073 Computer A programmable machine. The two prin
`cipal characteristics of a computer are:
`0074. It responds to a specific set of instructions in a
`well-defined manner.
`0075. It can execute a pre-recorded list of instructions
`(a program).
`0076 Modern computers are electronic and digital. The
`actual machinery—wires, transistors, and circuits—is called
`hardware; the instructions and data are called Software.
`0.077
`Data Transmission Rates
`0078 Zigbee devices have a radio bit rate of 250 kbps
`as specified by IEEE 802.15.4
`0079 Near Field Communication (NFC) has a data
`exchange speed up to 424 kbps
`0080 Bluetooth 2.0 devices operate at data rates below
`3 megabits per second
`0081
`WiFi can deliver data rates of up to 54 megabits
`per second using a shared, unlicensed radio band at 2.4
`GHZ
`0082) Ultra-Wideband (UWB) technology supports up
`to 480 megabits per second with a roadmap to 1 gigabit
`per second over short distances
`0.083 DHCP Short for Dynamic Host Configuration Pro
`tocol. DHCP is a protocol for assigning dynamic IP
`addresses to devices on a network. With dynamic address
`ing, a device can have a different IP address every time it
`connects to the network. In some systems, the device's IP
`address can even change while it is still connected. DHCP
`also supports a mix of static and dynamic IP addresses.
`Dynamic addressing simplifies network administration
`because the software keeps track of IP addresses rather than
`requiring an administrator to manage the task. This means
`that a new computer can be added to a network without the
`hassle of manually assigning it a unique IP address. Many
`ISPs use dynamic IP addressing for dial-up users.
`0084) DMA Short for direct memory access. DMA is a
`technique for transferring data from main memory to a
`device without passing it through the CPU. Computers that
`have DMA channels can transfer data to and from devices
`much more quickly than computers without a DMA channel
`can. This is useful for making quick backups and for
`real-time applications.
`
`IPR2022-00412
`Apple EX1037 Page 10
`
`
`
`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`0085. DRM Short for digital rights management. DRM is
`a system for protecting the copyrights of data circulated via
`the Internet or other digital media by enabling secure
`distribution and/or disabling illegal distribution of the data.
`Typically, a DRM system protects intellectual property by
`either encrypting the data so that it can only be accessed by
`authorized users or marking the content with a digital
`watermark or similar method so that the content can not be
`freely distributed.
`0.086
`Ethernet A local-area network (LAN) architecture
`developed by Xerox Corporation in cooperation with DEC
`and Intel in 1976. Ethernet uses a bus or star topology and
`supports data transfer rates of 10 Mbps. The Ethernet
`specification served as the basis for the IEEE 802.3 standard,
`which specifies the physical and lower software layers.
`Ethernet uses the CSMA/CD access method to handle
`simultaneous demands. It is one of the most widely imple
`mented LAN standards. A newer version of Ethernet, called
`100Base-T (or Fast Ethernet), supports data transfer rates of
`100 Mbps. And the newest version, Gigabit Ethernet Sup
`ports data rates of 1 gigabit (1,000 megabits) per second.
`0087 Firewall A system designed to prevent unautho
`rized access to or from a private network. Firewalls can be
`implemented in both hardware and Software, or a combina
`tion of both. Firewalls are frequently used to prevent unau
`thorized Internet users from accessing private networks
`connected to the Internet, especially intranets. All messages
`entering or leaving the intranet pass through the firewall,
`which examines each message and blocks those that do not
`meet the specified security criteria. There are several types
`of firewall techniques:
`0088 Packet filter: Looks at each packet entering or
`leaving the network and accepts or rejects it based on
`user-defined rules. Packet filtering is fairly effective
`and transparent to users, but it is difficult to configure.
`In addition, it is susceptible to IP spoofing.
`0089 Application gateway: Applies security mecha
`nisms to specific applications, such as FTP and Telnet
`servers. This is very effective, but can impose a per
`formance degradation.
`0090 Circuit-level gateway: Applies security mecha
`nisms when a TCP or UDP connection is established.
`Once the connection has been made, packets can flow
`between the hosts without further checking.
`0091 Proxy server: Intercepts all messages entering
`and leaving the network. The proxy server effectively
`hides the true network addresses.
`0092. In practice, many firewalls use two or more of
`these techniques in concert. A firewall is considered a
`first line of defense in protecting private