throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2006/0208066A1
`(43) Pub. Date:
`Sep. 21, 2006
`Finn et al.
`
`US 20060208066A1
`
`(54) RFID TOKEN WITH MULTIPLE INTERFACE
`CONTROLLER
`(75) Inventors: David Finn, Tourmakeady (IE); Dennis
`Ryan, Tipp City, OH (US)
`
`Correspondence Address:
`D.A. STAUFFER PATENT SERVICES LLC
`1OO6 MONTFORD ROAD
`CLEVLAND HTS., OH 44121-2016 (US)
`(73) Assignee: DPD Patent Trust
`
`(21) Appl. No.:
`
`11/355,264
`
`Provisional application No. 60/664.974, filed on Mar.
`24, 2005. Provisional application No. 60/660,398,
`filed on Mar. 10, 2005. Provisional application No.
`60/652,895, filed on Feb. 15, 2005. Provisional appli
`cation No. 60/633,541, filed on Dec. 6, 2004. Provi
`sional application No. 60/602.595, filed on Aug. 18,
`2004. Provisional application No. 60/562,204, filed
`on Apr. 14, 2004. Provisional application No. 60/520,
`698, filed on Nov. 17, 2003.
`
`Publication Classification
`
`(51) Int. Cl.
`G06K 5/00
`G06K 7/06
`
`(2006.01)
`(2006.01)
`
`Related U.S. Application Data
`
`(52) U.S. Cl. ........................... 235/380: 235/.441; 235/451
`
`(63) Continuation-in-part of application No. 10/990,296,
`filed on Nov. 16, 2004.
`Continuation-in-part of application No. 11/295,685,
`filed on Dec. 6, 2005.
`
`(60) Provisional application No. 60/652,895, filed on Feb.
`15, 2005. Provisional application No. 60/660,398,
`filed on Mar. 10, 2005. Provisional application No.
`60/664,974, filed on Mar. 24, 2005. Provisional appli-
`cation No. 60/734,409, filed on Nov. 8, 2005. Provi-
`sional application No. 60/725,818, filed on Oct. 12,
`2005. Provisional application No. 60/708,707, filed
`on Aug. 16, 2005. Provisional application No. 60/708,
`628, filed on Aug. 16, 2005. Provisional application
`No. 60/691,337, filed on Jun. 16, 2005. Provisional
`application No. 60/685,503, filed on May 27, 2005.
`
`(57)
`
`ABSTRACT
`
`An RFID token apparatus has a connection module for
`interfacing with an appliance capable of communicating and
`interacting with remote servers and networks, a translation
`module for moving signals between a USB interface and a
`Smart card interface, a processor module which may be
`capable of operating as a dual-interface (DI) chip; and an
`input/output module having at least one RF antenna and a
`modulator. An RFID-contactless interface according to ISO
`14443 & ISO 15693 and/or NFC. A wireless interface
`according to Zigbee, Bluetooth, WLAN 802.11, UWB, USB
`wireless and/or any similar interface. An RFID reader appa
`ratus has a housing; a slot for a contact or contactless fob;
`and a USB Stick alternately protruding from the housing and
`retracted within the housing.
`
`
`
`
`
`USB Stick
`
`Housing/Reader
`
`Magnetic
`Stripe
`
`Contactless
`Fob
`
`Fob Slot
`
`IPR2022-00412
`Apple EX1037 Page 1
`
`

`

`Patent Application Publication Sep. 21, 2006 Sheet 1 of 5
`
`US 2006/0208066A1
`
`FIG 1A
`100 y
`
`USB Plug
`
`Connection
`Module
`
`Translation
`Module
`
`Processor
`Module
`FIG. 1B
`120 y
`
`Input/Output
`Module
`
`
`
`
`
`
`
`Connection
`Module
`
`Translation
`Module
`
`:
`
`Input/Output
`Module
`
`:
`
`Module
`
`FIG 1C
`140 v
`
`142
`
`144
`
`146
`
`148
`
`Connection
`Module
`
`Translation
`Module
`150
`
`
`
`Processor
`Module
`
`Input/Output
`Module
`
`IPR2022-00412
`Apple EX1037 Page 2
`
`

`

`Patent Application Publication Sep. 21, 2006 Sheet 2 of 5
`
`US 2006/0208066A1
`
`FIG 1D
`400 y
`
`402
`
`406
`
`408
`
`
`
`
`
`
`
`
`
`
`
`USB Plug
`
`Connection
`Module
`
`410
`
`RJ-45
`Connector
`/
`translator
`module
`
`Module
`
`Processor
`Module
`
`502
`
`504
`
`506
`
`508
`
`USB Plug
`
`
`
`
`
`
`
`
`
`Connection
`Module
`
`Translation
`Module
`
`
`
`Processor
`Module
`
`Input/Output
`Module
`
`510
`
`IPR2022-00412
`Apple EX1037 Page 3
`
`

`

`Patent Application Publication Sep. 21, 2006 Sheet 3 of 5
`
`US 2006/0208066 A1
`
`FIG. 2A
`
`Housing/Reader
`
`
`
`USB & N
`Na
`
`
`
`
`
`Fob Slot
`
`Magnetic
`Stripe
`
`Contactless
`Fob
`
`->1
`
`FIG. 2B
`
`Release
`Pivot
`
`Housing
`
`
`
`USB Stick
`
`
`
`Connector
`
`IPR2022-00412
`Apple EX1037 Page 4
`
`

`

`Patent Application Publication Sep. 21, 2006 Sheet 4 of 5
`
`US 2006/0208066 A1
`
`FIG. 3A
`
`Bluetooth
`Interface
`
`Wireless Interface
`IEEE 802.11b/g/n
`
`
`
`
`
`Address, Data
`and Control bus
`
`Data and Control bus
`-1
`Controller (Memory
`Management), OS with
`Embedded USB HUB
`
`
`
`Wireless Interface
`IEEE 802.11b/g/n
`
`Address, Data
`and Control bus
`
`Hard Disk
`Drive
`
`Address, Data
`and Control bus
`
`IPR2022-00412
`Apple EX1037 Page 5
`
`

`

`Patent Application Publication Sep. 21, 2006 Sheet 5 of 5
`FIG. 3C
`
`US 2006/0208066 A1
`
`
`
`
`
`
`
`
`
`Power
`(step down 5v to 3.3v)
`
`Other I/O
`Ports
`
`USB from PC
`
`Gatekeeper
`Microcontroller
`Memory Management
`Embedded HUB
`
`
`
`
`
`Data
`
`Flash Memory
`NAND
`
`
`
`
`Internal OS
`memory reader
`control logic
`
`USB Devices
`such as
`wireless/
`Bluetooth
`
`FIG. 3D
`
`
`
`
`
`Bluetooth
`Interface
`
`
`
`
`
`
`
`
`
`Address, Data
`and Control bus
`USB
`
`
`
`Control bus
`
`Data and Control bus
`
`FN Wireless Interface
`
`Controller (Memory
`Management), OS with
`Embedded USB HUB
`
`IEEE 802.11b/g/n
`
`Address, Data
`and Control bus
`
`Flash
`Memory
`
`Hard Disk
`Drive
`Address, Data
`and Control bus
`
`IPR2022-00412
`Apple EX1037 Page 6
`
`

`

`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`RFID TOKEN WITH MULTIPLE INTERFACE
`CONTROLLER
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`0001. This is a continuation-in-part of U.S. Ser. No.
`10/990,296 filed Nov. 16, 2004
`0002 This is a continuation-in-part of U.S. Ser. No.
`11/295,685 filed Dec. 06, 2005.
`0003. This is a non-provisional filing of U.S. Ser. No.
`60/652,895 filed Feb. 15, 2005.
`0004. This is a non-provisional filing of U.S. Ser. No.
`60/660,398 filed Mar. 10, 2005.
`0005. This is a non-provisional filing of U.S. Ser. No.
`60/664,974 filed Mar. 24, 2005.
`0006 Priority is claimed from the following:
`0007 Provisional Application No. 60/734,409 filed
`Nov. 8, 2005
`0008 Provisional Application No. 60/725,818 filed
`Oct. 12, 2005
`0009 Provisional Application No. 60/708,707 filed
`Aug. 16, 2005
`0010) Provisional Application No. 60/708,628 filed
`Aug. 16, 2005
`0011 Provisional Application No. 60/691,337 filed
`Jun. 16, 2005
`0012 Provisional Application No. 60/685,503 filed
`May 27, 2005
`0013 Provisional Application No. 60/664,974 filed
`Mar. 24, 2005
`0014) Provisional Application No. 60/660,398 filed
`Mar. 10, 2005
`0.015
`Provisional Application No. 60/652,895 filed
`Feb. 15, 2005
`0016 Patent application Ser. No. 11/295,685 filed Dec. 6,
`2005, claiming priority of
`0017 Provisional Application No. 60/633,541 filed
`Dec. 6, 2004
`0018 Patent application Ser. No. 10/990.296 filed Nov.
`16, 2004, claiming priority of
`0.019
`Provisional Application No. 60/602,595 filed
`Aug. 18, 2004
`0020 Provisional Application No. 60/562,204 filed
`Apr. 14, 2004
`0021 Provisional Application No. 60/520,698 filed
`Nov. 17, 2003
`all of which are incorporated by reference herein, and all
`of which name Finn as an inventor.
`
`TECHNICAL FIELD OF THE INVENTION
`0022. This invention relates generally to RFID technol
`ogy, and also to Smart card technology.
`
`BACKGROUND OF THE INVENTION
`0023. A smart card resembles a credit card in size and
`shape. (See ISO 7810). The inside of a smart card usually
`contains an embedded 8-bit microprocessor. The micropro
`cessor is under a gold contact pad on one side of the card.
`Smarts cards may typically have 1 kilobyte of RAM, 24
`kilobytes of ROM, 16 kilobytes of programmable ROM, and
`an 8-bit microprocessor running at 5 MHz. The Smart card
`uses a serial interface and receives its power from external
`Sources like a card reader. The processor uses a limited
`instruction set for applications such as cryptography. The
`most common Smart card applications are:
`0024 Credit cards
`0025) Electronic cash
`0026 Computer security systems
`0027 Wireless communication
`0028 Loyalty systems (like frequent flyer points)
`0029 Banking
`0030) Satellite TV
`0031 Government identification
`0032 Smart cards can be used with a smart-card reader
`attachment to a personal computer to authenticate a user.
`(However, these readers are relatively costly, and have not
`been well accepted by users.) Web browsers also can use
`Smart card technology to Supplement Secure Sockets Layer
`(SSL) for improved security of Internet transactions. The
`American Express Online Wallet shows how online pur
`chases work using a Smart card and a PC equipped with a
`Smart-card reader. Smart-card readers can also be found in
`vending machines.
`0033. There are three basic types of smart cards: contact
`chip, contactless and dual interface (DI) cards.
`0034. A contact smart card (or contact chip card) is a
`plastic card about the size of a credit card that has an
`embedded integrated circuit (IC) chip to store data. This data
`is associated with either value or information or both and is
`stored and processed within the card's chip, either a memory
`or microprocessor device.
`0035. The predominant contact smart cards in consumer
`use are telephone cards as a stored value tool for pay phones
`and bank cards for electronic cash payments. Contact Smart
`cards require the placement of the card in a terminal or
`automatic teller machine for authentication and data trans
`action. By inserting the contact Smart card into the terminal,
`mechanical and electrical contact is made with the embed
`ded chip module.
`0036 Contactless smart cards have an embedded antenna
`connected to a microchip, enabling the card to pick up and
`respond to radio waves. The energy required for the Smart
`card to manipulate and transmit data is derived from the
`electromagnetic field generated by a reader. Contactless
`Smart cards do not require direct contact with the reader
`because they employ the passive transponder technology of
`Radio Frequency Identification (RFID). By just waving the
`card near the reader, secure identification, electronic pay
`ment transaction and authentication are completed in milli
`seconds.
`
`IPR2022-00412
`Apple EX1037 Page 7
`
`

`

`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`0037 Contactless chip card technology is based on two
`standards: ISO/IEC 14443 Type A and Type B (for proximity
`cards), and ISO/IEC 15693 (for vicinity cards). Cards that
`comply with these standards operate at the 13.56 MHz
`frequency. ISO/IEC 14443 products have a range of up to 10
`cm (centimeters), while ISO/IEC 15693 products can oper
`ate at a range between 50 and 70 cm.
`0038. Dual interface (DI) cards, sometimes called com
`bination chip cards, are microprocessor multi-function cards
`that incorporate both the functions of a contact chip card and
`a contactless card. Within the Smart card is a microprocessor
`or micro-controller chip with radio frequency identification
`(RFID) capability that manages the memory allocation and
`file access. The on-board memory is shared and can be
`accessed either in contact or contactless mode.
`0039. This type of chip is similar to those found inside all
`personal computers and when implanted in a Smart card,
`manages data in organized file structures, via a card oper
`ating system. This capability permits different and multiple
`functions and/or different applications to reside on the card.
`0040. A dual interface (DI) card is ideal for single and
`multi-application markets ranging from micro-payment
`(convenient alternative to low value cash transaction) to
`e-commerce and from ticketing in mass transit to secure
`identification for cross border control. Originally, such cards
`were intended to be used in conjunction with a reader
`connected to a PC for downloading tickets, tokens, or
`electronic money via the contact interface and used in
`contactless mode in the application for physical access or
`proximity payment
`0041
`Passive radio frequency identification (RFID)
`devices derive their energy from the electromagnetic field
`radiated from the reader. Because of international power
`transmission restrictions at the frequencies of 125 KHZ and
`13.56MHz, the contactless integrated circuits are generally
`low voltage and low power devices. Read/Write circuits use
`low voltage EEPROM and low power analogue cells. The
`read/write memory capacity in transponders, contact Smart
`cards, contactless memory based Smart cards, dual interface
`Smart cards (contact & contactless) and multi-interface
`micro-controllers is generally limited to approximately 64
`kilobytes.
`0042. The dual interface (DI) Smart cards typically have
`an 8, 16 or 32 bit microprocessor controller, operate at a low
`voltage of 1.8V-5V and run at an internal frequency of 5 or
`15 MHz. The open platform architecture includes memory
`management, non volatile memory, contactless interfaces
`and security features such as Advanced Crypto Engine
`(ACE) 1100 bit, triple DES encryption and RSA.
`0.043 High performance crypto controllers with multiple
`interfaces such as USB, ISO 14443 Type A, B, Felica have
`been developed for multi-functional Smart cards in applica
`tions such as security access, healthcare, electronic purse,
`banking etc.
`0044) The main focus of the smart card industry has been
`on Secure card applications where large memory capacity is
`not of paramount importance, and/or where pertinent infor
`mation and application Software is stored at a centralized
`server location.
`0045 Copending U.S. patent application Ser. No. 10/990,
`296 (the 296 application) generally discloses a compact
`
`personal token apparatus, Suitably resembling a conven
`tional USB memory fob in size, shape, and form which can
`be plugged into a PC and interfaced with the virtual world
`of the Internet. The apparatus is capable of loading and
`storing information from the Internet, via the PC to its flash
`memory or EEPROM and then using the stored information
`or value via its contactless or wireless interface in the real
`world. The apparatus is capable of implementing an auto-run
`application, when inserted into a personal computer. The
`apparatus is capable of exchanging information with other
`devices having compatible interfaces. The apparatus can
`also function as a firewall when plugged between an Internet
`connection and a PC.
`0046. Apart from using USB tokens for file storage, they
`are also used for desktop settings, screen lock, network login
`& access control, log book, user authentication (storing
`digital signatures, certificates, key sets, finger-based biomet
`ric templates, usernames and passwords), digital content and
`transaction security as well as enterprise and Internet Secu
`rity.
`0047 A USB token can also be used to download emails,
`remotely access a PC or to open a customized browser that
`allows the user to surf the Web with total privacy.
`0048 Recent developments in USB flash memory drives
`have resulted in CDROM-like auto-run devices that auto
`matically execute a file when the USB token is inserted into
`a PC. The read-only and auto-run contents are installed
`during the manufacturing process. Examples of auto-run
`contents include opening a website, running a demo appli
`cation, showing a presentation, making a product pitch,
`providing customers with discount coupons etc.
`0049 U.S. Pat. No. 6,763.399, incorporated by reference
`herein, entitled “USB key apparatus for interacting with a
`USB host via a USB port describes a smart card host
`system that operates without the intermediation of a Smart
`card reader. The Smart card host system comprises a host,
`which has a USB interface, and a portable device, which
`provides Smart card function(s). The portable device has a
`Smart card chip for performing the Smart card function(s); a
`USB interface for connecting the portable device with the
`host via USB protocol; and a microprocessor for controlling
`the transfer of data between the USB interface and the smart
`card chip, for converting data from a USB format to the
`format of the Smart card chip and for converting data from
`the format of the smart card chip to a USB format.
`0050 U.S. Pat. No. 6,801.956, incorporated by reference
`herein, entitled “Arrangement with a Microprocessor
`describes an arrangement with a microprocessor, particu
`larly a microprocessor for use in a chip card. The arrange
`ment includes a microprocessor, which is connected to at
`least a USB interfaces and an ISO interface for exchanging
`data signals. A selection unit within the microprocessor may
`be configured to select between the USB and ISO interfaces,
`and a Switching unit within the microprocessor may be
`configured to subsequently switch between the USB and
`ISO interfaces by initiating an internal reset of the micro
`processor.
`0051) International Patent Publication No. WO 01/96990,
`incorporated by reference herein, entitled “USB-Compliant
`Personal Key using a Smartcard Processor and a Smartcard
`Reader Emulator” describes a compact, self-contained, per
`
`IPR2022-00412
`Apple EX1037 Page 8
`
`

`

`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`Sonal key. The personal key comprises a USB-compliant
`interface releaseably coupleable to a host processing device
`operating under command of an operating system; a Smart
`card processor having a Smartcard processor-compliant
`interface of communicating according to a Smartcard input
`and output protocol; and an interface processor, communi
`catively coupled to the USB-compliant interface and to the
`Smartcard processor-compliant interface, the interface pro
`cessor implementing a translation module for interpreting
`USB-compliant messages into Smartcard processor-compli
`ant messages and for interpreting Smartcard processor-com
`pliant messages into USB-compliant messages.
`0.052
`U.S. Patent Publication No. 2003/0236821, incor
`porated by reference herein, describes a body wearable
`personal network server device having a display, function
`keys, alarm output indicators, a disk drive to receive and
`store client’s data, and communication devices to commu
`nicate to its clients, such as mobile phone, personal digital
`assistant (PDA), personal computer, and notebook com
`puter. A body wearable personal network device also con
`taining software modules; Such as a protocol handler to
`handle Internet based protocols XML/FTP/HTTP/TCP/IP.
`diagnostic system to automatically transmit of notification
`messages to its clients, and various applications to provide
`various services for its clients. A body wearable personal
`network device having gate way functionality between PAN
`(using Bluetooth) and WLAN (using IEEE 802.11b).
`0053 U.S. Pat. No. 6,148,354, incorporated by reference
`herein, describes a flash memory device, containing one or
`more flash modules, in which the flash memory is mapped
`to the address space of an ASIC or a controller which has a
`USB-defined electrical interface and a USB-defined logical
`interface. This controller/ASIC (hereinafter termed a “con
`troller') supports the USB functionality according to the
`USB standard, thereby supporting enumeration onto the
`USB bus, as well as data reception and transmission over
`USB pipes to and from USB endpoints. This controller also
`Supports the functionality and control of the flash memory
`device, as well as the processing of command and data
`packets from the host controller. The host controller uses one
`of several possible protocols, either standard or proprietary,
`to signal the next command to be performed to the USB flash
`controller. Thus, the entire device acts as a dynamically
`attachable/detachable non-volatile storage device for the
`host platform. The primary function of the controller is
`memory management and to directly interface between the
`host computing device and the flash memory.
`0054 U.S. Pat. No. 6,763,399 (“Alladin”), incorporated
`by reference herein, describes a portable device, for provid
`ing Smart card function(s), said portable device having
`thereon a Smart card chip, for performing said Smart card
`function(s), a USB interface, for connecting said portable
`device with said host via USB protocol; and a microproces
`Sor, for enabling at least one function selected from the
`group consisting of controlling the transfer of data between
`said USB interface and said smart card chip, for converting
`data from a USB format to the format of said smart card chip
`and for converting data from the format of said Smart card
`chip to a USB format. The portable device is configured to
`translate the USB communications from USB protocol, into
`smart card protocol such as an ISO 7816 protocol, and from
`smart card protocol into USB protocol and a smart card chip
`operative to perform at least one Smart card function Such as
`
`authentication, encryption, access control and secure
`memory. In Alladin, the term “smart card” refers to a plastic
`card with an embedded chip, which interacts with a smart
`card reader.
`0.055
`Patent Publication WO01/61692, incorporated by
`reference herein, describes a portable data storage device
`comprising a coupling device for coupling to a computer
`serial bus, an interface device coupled to the coupling
`device, a memory control device and a non-volatile Solid
`state memory device; the memory control device being
`coupled between the interface device and the memory
`device to control the flow of data from the memory device
`to the coupling device. The interface device comprises of a
`universal serial bus (USB) driver to convert data between a
`USB format and a PC format. Alternatively, the interface
`device comprises of a driver for IEEE 1394 (FireWire)
`protocol. The configuration as described is a modular
`approach to the memory management controller provided in
`the U.S. Pat. No. 6,148,354.
`0056 Patent Publication No. WO00/42491, incorporated
`by reference herein, describes a cryptographic USB token as
`a compact personal token, comprising: a USB-compliant
`interface releasably coupleable to a host processing device;
`a memory; a processor, communicatively coupled to the
`memory and communicatively coupleable to the host pro
`cessing device via the USB-compliant interface, the proces
`sor for providing the host processing device conditional
`access to data storable in the memory; and a user input
`device, communicatively coupled to the processor by a path
`distinct from the USB-compliant interface'. The compact
`personal token or key as described includes a processor and
`a memory which implements software protection schemes to
`prevent copying and unauthorized use. The personal key
`provides for the storage and management of digital certifi
`cates, allowing the user to store all of his or her digital
`certificates in one media that is portable from platform to
`platform. In another embodiment, the personal key com
`prises a biometric sensor disposed to measure biometrics
`Such as fingerprint data. The biometric sensor measures
`characteristics of the person holding the key (Such as fin
`gerprints) to confirm that the person possessing the key is the
`actual owner of the key.
`GLOSSARY, DEFINITIONS, BACKGROUND
`0057 The following terms may be used throughout the
`descriptions presented herein and should generally be given
`the following meaning unless contradicted or elaborated
`upon by other descriptions set forth herein. Many of the
`definitions below were taken from World Wide Web at
`webopedia.com. Some of the terms set forth below may be
`registered trademarks (R).
`0.058 ADPCM Short for Adaptive Differential Pulse
`Code Modulation. ADPCM is a form of pulse code modu
`lation (PCM) that produces a digital signal with a lower bit
`rate than standard PCM. ADPCM produces a lower bit rate
`by recording only the difference between samples and
`adjusting the coding scale dynamically to accommodate
`large and small differences. Some applications use ADPCM
`to digitize a Voice signal so voice and data can be transmitted
`simultaneously over a digital facility normally used only for
`one or the other.
`0059 ATA Short for Advanced Technology Attachment.
`ATA is a disk drive implementation that integrates the
`
`IPR2022-00412
`Apple EX1037 Page 9
`
`

`

`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`controller on the disk drive itself. There are several versions
`of ATA, all developed by the Small Form Factor (SFF)
`Committee:
`0060 ATA: Known also as IDE, supports one or two
`hard drives, a 16-bit interface and PIO modes 0, 1 and
`2.
`0061 ATA-2: Supports faster PIO modes (3 and 4) and
`multiword DMA modes (1 and 2). Also supports logical
`block addressing (LBA) and block transfers. ATA-2 is
`marketed as Fast ATA and Enhanced IDE (EIDE).
`0062 ATA-3: Minor revision to ATA-2.
`0063 Ultra-ATA: Also called Ultra-DMA, ATA-33,
`and DMA-33, supports multiword DMA mode 3 run
`ning at 33 MBps.
`0064 ATA/66: A version of ATA proposed by Quan
`tum Corporation, and supported by Intel, that doubles
`ATA’s throughput to 66 MBps.
`0065. ATA/100: An updated version of ATA/66 that
`increases data transfer rates to 100 MBps.
`0.066 ATA is also called Parallel ATA. Contrast with
`Serial ATA
`0067 SERIAL ATA Often abbreviated SATA or
`S-ATA, an evolution of the Parallel ATA physical
`storage interface. Serial ATA is a serial link—a single
`cable with a minimum of four wires creates a point
`to-point connection between devices. Transfer rates for
`Serial ATA begin at 150 MBps. One of the main design
`advantages of Serial ATA is that the thinner serial
`cables facilitate more efficient airflow inside a form
`factor and also allow for Smaller chassis designs. In
`contrast, IDE cables used in parallel ATA systems are
`bulkier than Serial ATA cables and can only extend to
`40 cm long, while Serial ATA cables can extend up to
`one meter. Serial ATA supports all ATA and ATAPI
`devices. Source: World Wide Web at webopedia.com
`0068 AVI Short for Audio Video Interleave. AVI is the
`file format for Microsoft's Video for Windows standard.
`0069 Bluetooth A wireless technology developed by
`Ericsson, Intel, Nokia and Toshiba that specifies how mobile
`phones, computers and PDAS interconnect with each other,
`with computers, and with office or home phones. The
`technology enables data connections between electronic
`devices in the 2.4 GHz range at 720 Kbps (kilo bits per
`second) within a 30-foot range. Bluetooth uses low-power
`radio frequencies to transfer information wirelessly between
`similarly equipped devices. Bluetooth wireless technology
`Supports ad hoc networking, enables devices from many
`different manufacturers to pair with each other and estab
`lishes secure connections “on the fly'. It is good at real-time
`data in Synchronous connected oriented mode, but requires
`relatively high power, so is unsuitable for extremely small
`battery-powered applications.
`0070 Byte Abinary digital signal is essentially a string of
`ones and Zeros—in other words, one voltage level or
`another, typically with no values in-between. Since having
`only two fingers (or one, depending on how you count) is not
`a very useful means of representing a wide number of
`variables, such as letters of the alphabet, it soon became
`apparent to bundle bits into bytes, such as eight bits to a byte.
`
`An 8-bit byte can represent 28=256 different values, gener
`ally plenty for representing letters of an alphabet, numerals
`and special characters. When more different values are
`needed, the bytes can be made longer (more bits per byte),
`or bytes can be strung together into words. MB is short for
`megabyte, one million bytes.
`0071 Challenge-Response An OTP method in which a
`challenge is entered or sent to the token and this challenge
`is combined with the credential through an algorithm to
`create a response (the OTP).
`0072 Client The client part of a client-server architec
`ture. Typically, a client is an application that runs on a
`personal computer or workstation and relies on a server to
`perform some operations. For example, an e-mail client is an
`application that enables you to send and receive e-mail.
`0073 Computer A programmable machine. The two prin
`cipal characteristics of a computer are:
`0074. It responds to a specific set of instructions in a
`well-defined manner.
`0075. It can execute a pre-recorded list of instructions
`(a program).
`0076 Modern computers are electronic and digital. The
`actual machinery—wires, transistors, and circuits—is called
`hardware; the instructions and data are called Software.
`0.077
`Data Transmission Rates
`0078 Zigbee devices have a radio bit rate of 250 kbps
`as specified by IEEE 802.15.4
`0079 Near Field Communication (NFC) has a data
`exchange speed up to 424 kbps
`0080 Bluetooth 2.0 devices operate at data rates below
`3 megabits per second
`0081
`WiFi can deliver data rates of up to 54 megabits
`per second using a shared, unlicensed radio band at 2.4
`GHZ
`0082) Ultra-Wideband (UWB) technology supports up
`to 480 megabits per second with a roadmap to 1 gigabit
`per second over short distances
`0.083 DHCP Short for Dynamic Host Configuration Pro
`tocol. DHCP is a protocol for assigning dynamic IP
`addresses to devices on a network. With dynamic address
`ing, a device can have a different IP address every time it
`connects to the network. In some systems, the device's IP
`address can even change while it is still connected. DHCP
`also supports a mix of static and dynamic IP addresses.
`Dynamic addressing simplifies network administration
`because the software keeps track of IP addresses rather than
`requiring an administrator to manage the task. This means
`that a new computer can be added to a network without the
`hassle of manually assigning it a unique IP address. Many
`ISPs use dynamic IP addressing for dial-up users.
`0084) DMA Short for direct memory access. DMA is a
`technique for transferring data from main memory to a
`device without passing it through the CPU. Computers that
`have DMA channels can transfer data to and from devices
`much more quickly than computers without a DMA channel
`can. This is useful for making quick backups and for
`real-time applications.
`
`IPR2022-00412
`Apple EX1037 Page 10
`
`

`

`US 2006/0208066 A1
`
`Sep. 21, 2006
`
`0085. DRM Short for digital rights management. DRM is
`a system for protecting the copyrights of data circulated via
`the Internet or other digital media by enabling secure
`distribution and/or disabling illegal distribution of the data.
`Typically, a DRM system protects intellectual property by
`either encrypting the data so that it can only be accessed by
`authorized users or marking the content with a digital
`watermark or similar method so that the content can not be
`freely distributed.
`0.086
`Ethernet A local-area network (LAN) architecture
`developed by Xerox Corporation in cooperation with DEC
`and Intel in 1976. Ethernet uses a bus or star topology and
`supports data transfer rates of 10 Mbps. The Ethernet
`specification served as the basis for the IEEE 802.3 standard,
`which specifies the physical and lower software layers.
`Ethernet uses the CSMA/CD access method to handle
`simultaneous demands. It is one of the most widely imple
`mented LAN standards. A newer version of Ethernet, called
`100Base-T (or Fast Ethernet), supports data transfer rates of
`100 Mbps. And the newest version, Gigabit Ethernet Sup
`ports data rates of 1 gigabit (1,000 megabits) per second.
`0087 Firewall A system designed to prevent unautho
`rized access to or from a private network. Firewalls can be
`implemented in both hardware and Software, or a combina
`tion of both. Firewalls are frequently used to prevent unau
`thorized Internet users from accessing private networks
`connected to the Internet, especially intranets. All messages
`entering or leaving the intranet pass through the firewall,
`which examines each message and blocks those that do not
`meet the specified security criteria. There are several types
`of firewall techniques:
`0088 Packet filter: Looks at each packet entering or
`leaving the network and accepts or rejects it based on
`user-defined rules. Packet filtering is fairly effective
`and transparent to users, but it is difficult to configure.
`In addition, it is susceptible to IP spoofing.
`0089 Application gateway: Applies security mecha
`nisms to specific applications, such as FTP and Telnet
`servers. This is very effective, but can impose a per
`formance degradation.
`0090 Circuit-level gateway: Applies security mecha
`nisms when a TCP or UDP connection is established.
`Once the connection has been made, packets can flow
`between the hosts without further checking.
`0091 Proxy server: Intercepts all messages entering
`and leaving the network. The proxy server effectively
`hides the true network addresses.
`0092. In practice, many firewalls use two or more of
`these techniques in concert. A firewall is considered a
`first line of defense in protecting private

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket