throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2001/0014883 A1
`(43) Pub. Date:
`Aug. 16, 2001
`Yamane et al.
`
`US 20010014883A1
`
`(54) PORTABLE RECORDING MEDIUMAND
`METHOD OF USING PORTABLE
`RECORDING MEDIUM
`(76) Inventors: Shigeaki Yamane, Tokyo (JP);
`Tadahiro Imajo, Tokyo (JP); Naokuni
`Yoshida, Tokyo (JP)
`Correspondence Address:
`DONALD. K. HUBER
`McCORMICK, PAULDING & HUBER LLP
`CityPlace II
`185 Asylum Street
`Hartford, CT 06103-4102 (US)
`(21) Appl. No.:
`09/781,839
`(22) Filed:
`Feb. 12, 2001
`(30)
`Foreign Application Priority Data
`
`Feb. 15, 2000 (JP)......................................... 2OOO-36399
`
`Publication Classification
`
`(51) Int. Cl." .............................. G06F 12/14; H04L 9/00
`(52) U.S. Cl. ............................... 705/51; 380/201; 705/59
`
`(57)
`
`ABSTRACT
`
`This invention makes it possible to conveniently use various
`application Softwares with high portability and high Security.
`A CD-RW comprises a read-only physical access protect
`area and a rewritable area in which data can be rewritten. A
`plurality of application Softwares, a user authentication
`program for performing user authentication by fingerprint
`collation, a fingerprint authentication engine, and the like are
`Stored in the physical acceSS protect area. A registered
`fingerprint data and a fingerprint information in which a
`corresponding user ID is Stored in a protect area, which can
`not be copied, of the rewritable area, So that user authenti
`cation by fingerprint collation and user of the application
`Software after the authentication are completed in one CD
`RW.
`
`
`
`
`
`
`
`
`
`u1000
`
`1001
`
`OO2
`
`LACCESS PROTECT AREA) }
`ROM (PHYSICA)
`
`USERAUTHENTCATION:10
`
`USERIE MANAGEMENT 0
`
`INGRPRINT ENFORMATON
`MANAEMEN
`
`0-2
`
`AUTHENTICATION REQUEST O-3
`
`NGERPRINATHENTICATION INNE: 20
`
`EXTRACTION
`
`COLLATION
`
`20-1
`
`20-2
`
`2-PHASE AUTHENTICATION:30
`30-1
`
`ATIENTICAONSERVERLENKAE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`)
`RAM (REWRITABLE)
`PROTECT AREA (COPY IMPOSSIBLE)
`ENCRYPTION PERFORMED BY SOFTWARE
`
`1002-1
`
`USERINFORMATION: 60
`USERD o
`RESENCEIABSENCE OF
`60-2
`FNGERRINTREGSRA
`
`FINGERPRNT
`NFORMATION:
`
`
`
`USERID
`
`70-1
`
`FINGERPRINT DATA 70-2
`
`LOGINFORMATION: 80
`
`USERI)
`
`AUTHENTICATION KEY
`INFORMATION: 9
`USERD 90-l
`APPLICATION NAME 90-2
`
`
`
`
`
`LICENSEKEY
`
`9-3
`
`FINGERPRNTATA
`-
`-
`TRACER:40
`INGERPRENT DATA COLLECTION 40-l
`
`APPLICATION MANAGEMENTSO
`APPLECATION CENSE
`KEY MANAGEMENT
`
`50-1
`
`FREE AREA (FREELY USED BY USER}
`
`APPLICAONSOFTWARE
`
`--rr-uu-all------
`
`S
`
`IPR2022-00600
`Apple EX1006 Page 1
`
`

`

`NOY
`
`7-06FWYNNOILVOITdd¥
`
`
`COL|VLVGINRdaONT|rou|_aruasa
`
`AgaNOMLYOLLNERLAY,
`06+NOMLYAMOANI
`
`OL:NOILVAYOANI
`LNTEdCaSONT
`
`
`
`(AIEISSOdWIAdOD)VAAVLOALOUd
`
`
`(aaSnAGGASNATATADVAUVTAMA
`
`a08VIVdLNTaddaONL
`1-08diwasn
`ais|09:NOILYWRIOINIwasn
`NDILYULSIOgeeINRERIZONTel
`08+NOILVWUOUNIO07
`AOTINTSAV/ANASAad!
`
`(AIAVINIMRDAVE
`
`
`AUVMIAOSAdGHNUOAMdNOILLdAYONG::
`
`
`O@*ENIDN'TNOILVOLLNSHLAVLNONET
`zozNOLLVTIO09
`|.“
`
`1-02NOLLOVULXA
`
`
`€-O1LsHndOddNOILVOLLNEHLNV
`
`
`colNOLLVWHOANTLNIAAYTONTA
`
`Of:-NOLLVOLLNAHLNY4SVHd-e
`
`
`
`
`ADVANIWAAMHSNOLLVOLLNEHLAY
` LNAWADVNYWCIaasn
`
`Tol
`
`JNFINFDVYNYA
`
`
`
`OL-NOILVOTLNAHLINYVYasn
`
`
`
`
`
`LOINOLLOATIONV.LYCLNIAdYAONIS
`
`OPAVUL
`
`
`
`OS-LNAWADVNVIANOLLVOIIddv
`
`
`
`HSNAOTTNOLLVOITddy¥
`
`LNEYNADYNVAAd
`
`
`
`FaAVAMLAOSNOIMLVOITddV
`
`IPR2022-00600
`Apple EX1006 Page 2
`
`Patent Application Publication Aug. 16,2001 Sheet 1 of 6
`
`US 2001/0014883 Al
`
`I D
`
`JA
`
`
`
`
`
`
`
`(VEMVLOBLOUdSSHQOVTVOISAHA)
`
`IPR2022-00600
`Apple EX1006 Page 2
`
`

`

`Patent Application Publication Aug. 16, 2001 Sheet 2 of 6
`
`US 2001/0014883 A1
`
`000},
`
`(0002),
`
`
`
`CTI RIGHS []
`
`
`
`
`
`NOI LWW HOHNI HEISIT
`
`
`
`*{{HJLSIO EIXI
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CII RIGHST|
`
`9
`
`09
`
`(L-OL)
`
`900S
`
`(L-OL)
`
`(L-OL)
`
`Z00S
`
`SEÅ
`
`IPR2022-00600
`Apple EX1006 Page 3
`
`

`

`Patent Application Publication Aug. 16, 2001 Sheet 3 of 6
`
`US 2001/0014883 A1
`
`
`
`
`
`|-EIJ.W.O.H.LNEH, V RIGHST)
`
`(THOORTH
`
`[[OS
`
`IPR2022-00600
`Apple EX1006 Page 4
`
`

`

`Patent Application Publication Aug. 16, 2001 Sheet 4 of 6
`
`US 2001/0014883 A1
`
`(000Z)
`000?
`
`
`
`
`
`
`
`NOI LVOITJAV JLYHVILS
`
`
`
`
`
`CII RIGHSQ I–06
`
`8-00),
`
`8
`
`Z
`
`I-001 |
`
`OILVOITIAIAV
`
`(1-008
`
`CTRIOO™OETH
`
`()007
`
`0008
`
`
`
`
`
`09 : NOJ LVW HOHNI HOEIS!)
`
`IPR2022-00600
`Apple EX1006 Page 5
`
`

`

`Patent Application Publication Aug. 16,2001 Sheet 5 of 6
`
`US 2001/0014883 Al
`
`asvavLvd COOL
`
`T-00L|NOLLVoridav¢-009INIddaaON||
`
`
`
`004"NOLLVARON.009‘NOLLVWUYOANIDOT
`AIAVN7Vivd
`
`
`
`O07:SNIONANOLLVOLINSHLAVLNIdddaON
`QO7|LNANFDVNYWSNNOLLVOITdd¥
`
`100eUHAUASNOLLVOLLNAHLAV
`
`
`$fNOLLVOMdg¥
`
`
`
`N05:NOILVNWYOANIWASA
`
`VIVOLNIdYION
`
`LOATIOO
`
`00€+WADVAL
`
`
`
`/AITIAISSOdFAIA
`
`aSnNOILVOTIddv
`
`dOALIIISSOdWI
`
`0008
`
`Toor]araasndovNVN
`
`QOL+NOLLVOLINGHLAVYasn
`
`NOLLVOITddV
`
`C00NOILVOITddVAOVNVA
`
`
`
`
`can,GOISSIAGAASNAOMTASN
`
`IPR2022-00600
`Apple EX1006 Page 6
`
`IPR2022-00600
`Apple EX1006 Page 6
`
`
`

`

`Patent Application Publication Aug. 16, 2001 Sheet 6 of 6
`
`US 2001/0014883 A1
`
`FIG.6
`
`4000
`
`2005
`
`v
`
`NETWORK
`
`INTERFACE
`
`2001
`
`MPU
`
`2002
`MAIN MEMORY (
`
`
`
`2009
`
`50A
`97 (10)
`(20)
`(30)
`(40)
`(50)
`
`2008
`
`2006
`
`2004
`
`USER INTERFACE
`
`2007
`
`INPUT DEVICE
`
`PORTABLE O
`MEDIUM DRIVE
`O
`
`(O) to
`
`IPR2022-00600
`Apple EX1006 Page 7
`
`

`

`US 2001/0014883 A1
`
`Aug. 16, 2001
`
`PORTABLE RECORDING MEDUMAND METHOD
`OF USING PORTABLE RECORDING MEDIUM
`
`user is increased because of the password management, e.g.,
`recitation, concealment, or the like of the password.
`
`FIELD OF THE INVENTION
`0001. The present invention relates to a portable record
`ing medium and a technique of using the Same and, more
`particularly, a technique effectively applied to a portable
`recording medium or the like in which an application
`Software requiring advanced and various Security manage
`ments is Stored.
`
`BACKGROUND OF THE INVENTION
`0002 For example, with development of information
`networkS Such as So-called Internet and wide spreading of
`high-performance personal computers, electronic com
`merce, Securities and financial Services using personal com
`puters as exchange terminals have spread.
`0003. Each of these various services using personal com
`puters as exchange terminals is often performed Such that a
`terminal Software (application Software) only for the corre
`sponding Services is installed in an external Storage device
`such as a fixed disk drive (HDD) included in a specific
`personal computer.
`0004. When a terminal software is installed in a specific
`personal computer to use a Service, a place where the
`corresponding Service is available is limited to a place where
`the personal computer is established. This is a technical
`problem that is inconvenient for users.
`0005. In addition, prior to actual use of a service, a
`Software must be installed in a personal computer. A general
`user who is poor in the knowledge of a personal computer
`is too hard to use the Service. This is an obstacle to the spread
`of the Services and lacks convenience.
`0006. On the other hand, in recent years, rewritable
`portable large-capacity Storage medium represented by a
`CD-RW (Compact Disc-Rewritable), an MO (Magneto
`Optical disc), a DVD (Digital Versatile Disc), and the like
`have been able to be used. In particular, the CD-RW System
`is rapidly spread because the price of a medium and the price
`of a drive are low and because a CD-ROM of the previous
`generation can be used.
`0007. Therefore, terminal softwares only for various ser
`vices are installed at once in the large-capacity portable
`medium such as a CD-RW, and an arbitrary terminal soft
`ware is directly started from the CD-RW loaded on an
`arbitrary personal computer, So that a Service that has high
`portability and is not limited to the position where the
`computer is established may be realized.
`0008 However, since a large-capacity portable medium
`has high portability, the large-capacity portable medium
`always has the risks of loss, theft, and the like. When the
`large-capacity portable medium is managed by a conven
`tional password, Security management for checking a user is
`insufficient. For this reason, it is worried to apply the
`large-capacity portable media to Services Such as electronic
`commerce, Securities and financial Services that require high
`Security.
`0009 AS countermeasures to the security, for example, a
`method of causing a user to Set a complex password, the
`other technical problem is posed. That is, a load acting on the
`
`SUMMARY OF THE INVENTION
`0010. It is an object of the present invention to provide a
`portable recording medium for making it possible to easily
`use various application Softwares with high portability and
`high Security and a technique of using the portable recording
`medium.
`0011. It is another object of the present invention to
`provide a portable recording medium for making it possible
`to easily use various application Softwares with high port
`ability and high Security without giving a load Such as
`password management to a user and a technique of using the
`portable recording medium.
`0012. It is still another object of the present invention to
`provide a portable recording medium for making it possible
`to use an application Software at various license levels with
`high portability and high Security and a technique of using
`the portable recording medium.
`0013. According to the present invention, personal iden
`tification information Such as a fingerprint is registered in
`advance in a portable recording medium in which an appli
`cation Software is Stored, and personal authentication using
`the personal identification information makes it possible that
`only a true uses the application Software.
`0014) More specifically, the portable recording medium
`according to the present invention is designed to Store an
`application Software, personal identification information of
`a proper user of the application Software and an authenti
`cation Software for performing personal authentication using
`the personal identification information prior to the use of the
`application Software by an arbitrary user.
`0015 According to a method of using a portable record
`ing medium according to the present invention, in a portable
`recording medium in which an application Software is
`Stored, personal identification information of a proper user
`of the application Software is Stored, and personal authen
`tication using the personal identification information is
`performed prior to the use of the application Software in the
`portable recording medium by an arbitrary user So as to
`cause the proper user to use the application Software Stored
`in the portable recording medium.
`0016. According to a portable recording medium and a
`method of using a portable recording medium according to
`the present invention, an advantage of making it possible to
`conveniently use various application Softwares with high
`portability and high Security can be achieved.
`0017 According to a portable recording medium and a
`method of using a portable recording medium according to
`the present invention, without giving a load Such as pass
`word management to a user, an advantage of making it
`possible to conveniently use various application Softwares
`with high portability and high Security can be achieved.
`0018. According to a portable recording medium and a
`method of using a portable recording medium according to
`the present invention, an advantage of making it possible to
`use an application Software at various license levels with
`high portability and high Security can be achieved.
`
`IPR2022-00600
`Apple EX1006 Page 8
`
`

`

`US 2001/0014883 A1
`
`Aug. 16, 2001
`
`BRIEF DESCRIPTIONS OF THE DRAWINGS
`0.019
`FIG. 1 is a conceptual diagram showing an
`example of the configuration of a portable recording
`medium according to an embodiment of the present inven
`tion;
`0020 FIG. 2 is a flow chart showing an example of a
`method of using a portable recording medium according to
`an embodiment of the present invention;
`0021
`FIG. 3 is a flow chart showing an example of a
`method of using a portable recording medium according to
`an embodiment of the present invention;
`0022 FIG. 4 is a flow chart showing an example of a
`method of using a portable recording medium according to
`another embodiment of the present invention;
`0023 FIG. 5 is a conceptual diagram showing an
`example of the configuration of an authentication Server
`used in a method of using a portable recording medium
`according to another embodiment of the present invention;
`and
`0024 FIG. 6 is a conceptual diagram showing an
`example of the configuration of an information processing
`device Such as a personal computer using a method of using
`a portable recording medium according to an embodiment of
`the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`0.025 Embodiments of the present invention will be
`described below in detail with reference to the accompany
`ing drawings.
`0026 (Embodiment 1)
`0.027
`FIG. 1 is a conceptual diagram showing an
`example of the configuration of a portable recording
`medium according to an embodiment of the present inven
`tion, and FIGS. 2 and 3 are flow charts showing a method
`of using a portable recording medium according to the
`embodiment.
`0028. In this embodiment, as an example of a portable
`recording medium, a CD-RW will be exemplified.
`0029 A CD-RW 1000 according to the embodiment has
`a data Storage region constituted by a read-only physical
`access protect area 1001 and a rewritable area 1002 in which
`data can be rewritten.
`0.030. In the physical access protect area 1001, when
`various Softwares (to be described later) are written, data
`Writing is executed by using a rewritable data writing
`Scheme, and it is impossible to perform falsification by
`rewriting or the like.
`0031) The rewritable area 1002 is constituted by a protect
`area 1002-1 in which written data is protected by encryption
`performed by a software and a free area 1002-2 which can
`be accessed by a user or an application program (to be
`described later).
`0.032 The physical access protect area 1001 stores a user
`authentication program 10, a fingerprint authentication
`engine 20, a 2-phase authentication program 30, a tracer 40,
`
`an application management program 50, a plurality of appli
`cation Softwares 50A, and the like.
`0033. The user authentication program 10, as will be
`described later, is a Software for performing a process of
`deciding a proper user on the basis of user fingerprint
`information input from the outside and fingerprint informa
`tion which is registered in advance, and has the functions of
`a user ID management function 10-1, a fingerprint informa
`tion management function 10-2, a authentication request
`function 10-3, and the like.
`0034. The fingerprint authentication engine 20 is a soft
`ware for performing a collation process of fingerprint infor
`mation under the control of the user authentication program
`10. The fingerprint authentication engine 20 comprises func
`tions Such as a fingerprint data extraction function 20-1 for
`extracting pieces of characteristic information from the input
`fingerprint information and the registered fingerprint infor
`mation; and a fingerprint collation function 20-2 for decid
`ing if it is identified or not by collation of the pieces of
`characteristic information.
`0035. The 2-phase authentication program 30 is a soft
`ware for performing Such an authentication process that an
`external authentication server (to be described later) is
`requested to perform the collation of fingerprints, and com
`prises an authentication Server linkage function 30-1 or the
`like.
`0036) The tracer 40 performs processes of monitoring
`and recording an authentication proceSS by a fingerprint, and
`comprises a fingerprint data collection function 40-1 or the
`like for recording input fingerprint information or the like
`when authentication is a failure to Subsequently perform
`analysis or the like of illegal access later.
`0037. The application management program 50 com
`prises an application license key management function 50-1
`for limiting a available function or the like with respect to
`the various application Softwares 50A depending on a
`license key or the like obtained from an authentication
`Server or the like in the 2-phase authentication program 30
`(to be described later).
`0038. As the application softwares 50A, for example, a
`banking transaction Software for Supporting a Service related
`to a Settlement transaction with a bank, an asset management
`Software for performing an operating management Service of
`investment trusts, Stocks, and other financial products, a life
`planning Software for performing insurance product Ser
`vices, a financial information Software for providing invest
`ment-related information, corporate information, and the
`like; and an electronic commerce Software for performing
`electronic commerce and the like, can be Stored.
`0039) User information 60, fingerprint information 70,
`log information 80, authentication key information 90, and
`the like are stored in the protect area 1002-1 of the rewritable
`area 1002.
`0040. The user information 60 is constituted by pieces of
`information Such as a user ID 60-1 and a fingerprint regis
`tration presence/absence flag 60-2 which are uniquely given
`to respective users.
`0041. The fingerprint information 70 is constituted by
`pieces of information such as a user ID 70-1 and fingerprint
`data 70-2 or the like which are obtained in the following
`registration process.
`
`IPR2022-00600
`Apple EX1006 Page 9
`
`

`

`US 2001/0014883 A1
`
`Aug. 16, 2001
`
`0042. The log information 80 is constituted by pieces of
`information such as user ID 80-1, fingerprint data 80-2, and
`date data (not shown) which are obtained when collation in
`a fingerprint authentication proceSS is a failure.
`0043. The authentication key information 90 is consti
`tuted by pieces of information such as a user ID 90-1, an
`application software name 90-2, and a license key 90-3.
`0044 FIG. 6 is a conceptual diagram showing an
`example of the configuration of an information processing
`device Such as a personal computer used in a method of
`using a portable recording medium according to this
`embodiment.
`0045. In a personal computer 2000 in FIG. 6, reference
`numeral 2001 denotes a microprocessor (MPU); 2002, a
`main memory in which a Software and data executed in the
`microprocessor 2001 are stored; 2003, an external storage
`device such as a fixed disk drive (HDD); 2004, a portable
`medium drive Such as a CD-ROM drive or a CD-RW drive
`for input/output data to/from the CD-RW 1000 loaded from
`the outside; 2005, a network interface connected to an
`information network Such as the Internet, 2006, a user
`interface; 2007, a personal identification information input
`device for receiving personal identification information Such
`as a fingerprint; and 2008, a bus to which these components
`are connected.
`0046) The personal identification information input
`device 2007, for example, may be a device integrated with
`a display, a keyboard, a mouse, and the like constituting the
`user interface 2006 or may be a device being independent of
`the display, the keyboard, the mouse, and the like.
`0047. In the main memory 2002, for example, a general
`purpose operating System 2002a for a personal computer is
`resident. On the general-purpose operating System 2002a,
`the main memory 2002 is loaded from the CD-RW 1000, and
`the application softwares 50A are operated.
`0.048. An example of the portable recording medium
`according to this embodiment and the method of using the
`portable recording medium will be described below. Refer
`ence numerals in parentheses in FIG. 2 denote the reference
`numerals of programs and functions for executing the pro
`CCSSCS.
`0049. The process of registering the fingerprint informa
`tion of a proper user on the CD-RW 1000 will be described
`below with reference to the flow chart in FIG. 2. This
`registering process keeps its Security Such that, for example,
`the registering process is performed by the proper user under
`the control of a provider when the application software 50A
`or the like is stored in the CD-RW 1000 to be provided to the
`USC.
`0050. The user of the CD-RW 1000 loads the CD-RW
`1000 on the portable medium drive 2004 to cause a medium
`automatic start mechanism of the OS 2002a to start the
`CD-RW 1000, and loads the user authentication program 10,
`the fingerprint authentication engine 20, and the like on the
`main memory 2002 to execute the user authentication pro
`gram 10, the fingerprint authentication engine 20, and the
`like (step S001).
`0051) The start of the CD-RW 1000 is not performed by
`using only the medium automatic Start mechanism of the OS
`2002a. The start of the CD-RW 1000 may be performed such
`
`that a menu program is started to Select the Start of the
`CD-RW 1000 from the menu program.
`0052 The user ID management function 10-1 of the user
`authentication program 10 decides whether a fingerprint has
`been registered or not with reference to the fingerprint
`registration presence/absence flag 60-2 of the user informa
`tion 60 (step S002). If the fingerprint has not been registered,
`an authentication information Setting Screen for urging a
`user to register a fingerprint is shown to the user (step S003).
`0053. The user who saw the screen inputs a user ID of a
`predetermined form (step S004). The input user ID is written
`in the user information 60 as the user ID 60-1 by the userID
`management function 10-1 (step S005).
`0054 The user causes the personal identification infor
`mation input device 2007 to read the fingerprint of the user
`(step S006). Characteristic information is extracted from the
`read fingerprint information by the fingerprint data extrac
`tion function 20-1 of the fingerprint authentication engine 20
`started by the user authentication program 10 (step S007).
`The extracted fingerprint data is encrypted by the fingerprint
`information management function 10-2, and then Stored
`together with the user ID in the fingerprint information 70 as
`the user ID 70-1 and the fingerprint data 70-2 (step S008),
`So that the fingerprint data registering process is completed.
`0055 An example of a method of using an application
`Software at an arbitrary opportunity after the registration
`described above.
`0056. The user of the CD-RW 1000 loads the CD-RW
`1000 on the portable medium drive 2004 of the nearest
`personal computer 2000 to cause the medium automatic start
`mechanism of the OS 2002a to start the CD-RW 1000, and
`loads the user authentication program 10, the fingerprint
`authentication engine 20, and the like on the main memory
`2002 to execute the user authentication program 10, the
`fingerprint authentication engine 20, and the like (Step
`S010).
`0057 The user ID management function 10-1 of the user
`authentication program 10 refers to the fingerprint registra
`tion presence/absence flag 60-2 of the user information 60 to
`confirm that the fingerprint has registered (step S011).
`0058. The user ID management function 10-1 shows a
`fingerprint authentication Screen for urging the user to
`execute a fingerprint reading process to user to perform
`fingerprint authentication for deciding whether the user is a
`proper user or not (step S012).
`0059. The user who saw the screen inputs the fingerprint
`of the user from the personal identification information input
`device 2007 (step S013). Characteristic information is
`extracted from the read fingerprint as fingerprint data by the
`fingerprint data extraction function 20-1 of the fingerprint
`authentication engine 20. At the same time, the fingerprint
`data extraction function 20-1 reads the registered fingerprint
`data 70-2 from the fingerprint information 70 (step S014).
`The fingerprint collation function 20-2 performs a collation
`decision to check if it is identified or not between the input
`fingerprint data and the registered fingerprint data 70-2 (Step
`S015). If it is determined that the fingerprint data is identi
`fied with each other, a start request of an arbitrary applica
`tion software 50A is accepted from the user to permit the use
`of the application software 50A (step S016). The application
`
`IPR2022-00600
`Apple EX1006 Page 10
`
`

`

`US 2001/0014883 A1
`
`Aug. 16, 2001
`
`Software 50A is read from the CD-RW 1000 and started to
`be used by the user (step S017).
`0060. By using a free region of the protect area 1002-1 of
`the CD-RW 1000, the started application software 50A
`encrypts and writeS data required for the operation and data
`required for Security management among data generated
`during the operation. The other data are recorded by using
`the free area 1002-2. In this manner, the application software
`50A is operated by only the CD-RW 1000.
`0061 Unlike the above description, the application soft
`ware 50A is not only started and caused to be used. For
`example, an arbitrary application Software 50A and license
`level information for a Specific user Specified by a user ID
`may be set in a part of the user information 60 or the
`fingerprint information 70, and functions which can be used
`by the application software 50A may be limited at the start
`of step S016.
`0062) If it is decided not-identified in step S015, pieces of
`passage information Such as input fingerprint data, a userID,
`and date data are recorded as the log information 80 (Step
`S018). With reference to the log information 80, tracing and
`analyzing the progress of use of the CD-RW 1000 and illegal
`use can be appropriately performed.
`0.063. In the above deciding process, step S013 to step
`S015 and step S018 are repeated a predetermined set number
`of times. When the number of times exceeds the predeter
`mined Set number of times, a process of making the Subse
`quent use of the CD-RW 1000 impossible may be added.
`0064. In this manner, according to the CD-RW 1000 of
`this embodiment and the method of using the CD-RW 1000,
`user authentication is performed by using personal identifi
`cation information Such as fingerprints and the like regis
`tered in the CD-RW 1000 in advance. For this reason,
`without user's burden about control of password and the
`like, identity can be guaranteed, and high Security can be
`realized. In addition, since all application softwares 50A
`required to provide services are stored in the CD-RW 1000
`Serving as a portable medium, in addition to the high
`portability which is an advantage of the CD-RW 1000, the
`easy use of the various application softwares 50A stored in
`the CD-RW 1000 can be advantageously made possible.
`0065) More specifically, when a user holding the CD-RW
`1000 only loads the CD-RW 1000 on the nearest personal
`computer 2000, an arbitrary service that requires high Secu
`rity can be received.
`0066. As a result, the CD-RW 1000 can be reliably used
`to store and use the application software 50A which requires
`high Security in electronic commerce, financial transaction,
`and the like. An improvement in convenience on a user Side
`and a Service provider Side by high Security and high
`portability can be realized.
`0067 (Embodiment 2)
`0068 Another embodiment of a method of using a por
`table recording medium according to the present invention
`will be described below.
`0069. In the above description of Embodiment 1, by
`using the user authentication program 10 or the like Stored
`in the CD-RW 1000, an authentication process is performed
`in a closed state in the CD-RW 1000. However, when an
`
`external Server or the like is requested to perform collation
`offingerprints and the authentication process, authentication
`management or the like in use of the various application
`Softwares 50A can also be realized. An example of a method
`ofusing the CD-RW 1000 described above will be described
`below.
`0070 FIG. 4 is a flow chart showing an example of a
`method of using a portable recording medium according to
`Embodiment 2 of the present invention, and FIG. 5 is a
`conceptual diagram showing an example of the configura
`tion of an authentication Server used in Embodiment 2.
`0071. The same reference numerals as in Embodiment 1
`denote the same parts in Embodiment 2, and a repetitive
`description will be omitted.
`0072 First, a configuration of an authentication server
`3000 according to Embodiment 2 will be described below,
`referring to FIG. 5. The authentication server 3000 com
`prises a user authentication program 100, a fingerprint
`authentication engine 200, a tracer 300, and an application
`use management program 400.
`0073. The user authentication program 100 comprises a
`user ID management function 100-1.
`0074 The fingerprint authentication engine 200 com
`prises a fingerprint collation function 200-1.
`0075. The tracer 300 comprises a fingerprint data collec
`tion function 300-1.
`0076. The application use management program 400
`comprises an application use possibility/impossibility deci
`Sion function 400-1 and an application use license key issue
`management function 400-2.
`0077. The authentication server 3000 comprises, as a
`database 3002, user information 500, a log information 600,
`application use information 700, and the like.
`0078. In the user information 500, a user ID 500-1
`registered and managed by a manager of the authentication
`Server 3000 is recorded.
`0079. In the log information 600, a user ID 600-1
`obtained in an authentication proceSS in which fingerprint
`authentication is a failure, a fingerprint data 600-2, date data
`(not shown), and the like are recorded.
`0080. In the application use information 700, a plurality
`of user IDs 700-1 registered and managed by a manager of
`the authentication server 3000; an application software name
`700-2 of an application software 50A the use of which is
`permitted in accordance with the user IDs 700-1; a license
`key 700-3 representing the possibility/impossibility of the
`use and a usage level permitted and Set for the user of the
`user IDs 700-1 with respect to the application software 50A,
`and the like are Stored to correspond to each other.
`0081. An example of the operation of Embodiment 2 will
`be described below with reference to the flow chart in FIG.
`4. Reference numerals in parentheses in FIG. 4 denote the
`reference numerals of programs and functions for executing
`the processes.
`0082) The start of the CD-RW 1000 is the same as that in
`Embodiment 1. However, in Embodiment 2, a user authen
`tication program 10 and a 2-phase authentication program
`30 are used. A menu program (not shown) for Service
`
`IPR2022-00600
`Apple EX1006 Page 11
`
`

`

`US 2001/0014883 A1
`
`Aug. 16, 2001
`
`Selection is Started, and, at the entrance of each actual
`Service, fingerprint authentication using the authentication
`server 3000 is performed by the user authentication program
`10 and the 2-phase authentication program 30.
`0.083 More specifically, when a service using an arbitrary
`application software 50A at the start of the CD-RW 1000 is
`Selected, an input process of a user ID and a fingerprint from
`a user is executed by the user authentication program 10
`(step S020). The fingerprint data input by the user; the user
`ID 70-1 and the fingerprint data 70-2 registered in the
`CD-RW 1000 in advance by the process of the flow chart in
`FIG. 2; and the application software name 90-2 serving as
`the name of the application software 50A started by the
`corresponding Service, are transmitted to the authentication
`server 3000 by the authentication server linkage function
`30-1 of the 2-phase authentication program 30 (step S021).
`0084. The authentication server 3000, which receives
`these data, performs user confirmation by collation between
`the user ID 500-1 and the user ID 70-1 in the user authen
`tication program 100 (step S022). Thereafter, the authenti
`cation server 3000 collates the fingerprint data input by the
`user with the registered fingerprint data 70-2 (step S023).
`0085. If the fingerprint data is not identified with each
`other, the fingerprint data or the like received from the user
`(personal computer 2000) side is recorded together with date
`data or the like (step S024). It is answered to the user that
`the use of the corresponding Service be impossible (Step
`S025).
`If the fingerprint data is identified with each other,
`0.086
`the possibility/impossibility of the use of the application
`Software 50A by the user is decided with reference to the
`application use information 700 by using the application
`Software name 90-2 and the user ID 70-1 received from the
`user

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket