`Anderson
`
`(10) Patent No.:
`(45) Date of Patent:
`
`
`
`11111 111111111111111 111111111111111 111111111111111 11111111
`
`I 1111111111111111
`
`
`US00650984 7Bl
`US 6,509,847 Bl
`Jan.21,2003
`
`(54) PRESSURE PASSWORD INPUT DEVICE AND
`METHOD
`
`(75)
`
`Inventor: Glen J. Anderson, Sioux City, IA (US)
`
`(73) Assignee: Gateway, Inc., Poway, CA (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by O days.
`
`(21) Appl. No.: 09/388,284
`
`(22)
`
`Filed:
`
`Sep. 1, 1999
`
`(51)
`(52)
`
`(58)
`
`(56)
`
`Int. Cl.7 . ... ... .. ... ... ... ... .. ... ... ... ... ... .. ... ... . H03M 11/00
`U.S. Cl. ............................. 341/34; 341/20; 341/22;
`178/18.01; 345/173; 340/5.51; 382/124
`Field of Search .. ... ... .. ... ... ... ... .. ... ... 341/34, 22, 20;
`345/168, 173; 382/115, 124; 340/5.51,
`5.74; 178/18.01
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,621,334 A
`4,725,817 A
`4,805,222 A *
`5,241,308 A
`5,386,219 A
`
`11/1986
`2/1988
`2/1989
`8/1993
`1/1995
`
`364/550
`Garcia ........................
`340/365
`Wihlborg ....................
`Young et al. .............. 340/5.51
`Young .........................
`341/34
`Greanias et al. ............ 345/174
`
`9/1995 Nakazawa et al. ............ 178/20
`5,451,724 A
`5,557,686 A * 9/1996 Brown et al. .............. 340/5.51
`5,581,484 A * 12/1996 Prince
`.....................
`340/407.1
`5,627,566 A * 5/1997 Litschel ......................
`345/168
`5,768,386 A
`6/1998 Yokomoto et al. ............ 380/24
`5,982,357 A * 11/1999 Burgett et al. ................ 341/22
`5,987,153 A * 11/1999 Chan et al. ................ 340/5.82
`5,995,026 A * 11/1999 Sellers
`........................
`341/22
`6,073,497 A * 6/2000 Jiang et al. ... ... ... ... .. 73/862.68
`6,193,153 Bl * 2/2001 Lambert
`.....................
`235/380
`6,307,956 Bl * 10/2001 Black .........................
`382/124
`* cited by examiner
`
`Primary Examiner-Michael Horabik
`Assistant Examiner-Albert K. Wong
`(74) Attorney, Agent, or Firm-Scott Charles Richardson;
`Kevin E. West; Suiter & Associates
`
`(57)
`
`ABSTRACT
`
`A method for inputting an access code via temporal varia(cid:173)
`tions in the amount of pressure applied to a touch interface
`is disclosed. The method facilitates the input of access codes
`such as passwords, personal identification codes, and the
`like in a manner that is indiscernible (via either sight or
`sound) to third parties thereby reducing the possibility that
`the access codes may be copied or stolen and used a third
`party to gain unauthorized access to a system or function.
`
`45 Claims, 8 Drawing Sheets
`
`100 I
`
`120
`
`IPR2022-00602
`Apple EX1006 Page 1
`
`
`
`U.S. Patent
`
`Jan.21,2003
`
`Sheet 1 of 8
`
`US 6,509,847 Bl
`
`100 I
`
`122
`
`120
`
`FIG. 1
`
`IPR2022-00602
`Apple EX1006 Page 2
`
`
`
`U.S. Patent
`
`Jan.21,2003
`
`Sheet 2 of 8
`
`US 6,509,847 Bl
`
`210
`
`202
`
`PROCESSOR
`
`HOST BUS
`
`214
`
`212
`
`CACHE
`
`SYSTEM
`CONTROLLER
`
`MAIN
`MEMORY
`
`220
`
`200
`
`~
`
`218
`
`DATA PATH
`CHIP
`
`224
`':::)
`225 1,oe CONNECTOR I+--+
`
`PCIBUS
`
`222
`
`227
`
`GRAPHICS
`CONTROLLER
`
`PCI CONNECTOR
`
`VGAPORT(S)
`
`229
`
`230
`
`ISABUS
`
`231
`
`SCSI CONNECTOR.,._--+1
`
`1/0
`BRIDGE
`
`__ us_B_P_O_R_T
`
`__ f+-,>
`?
`226
`
`BUFFER
`
`232
`
`240
`
`XBUS
`
`ISA CONNECTOR
`
`ISA CONNECTOR
`
`ISA CONNECTOR
`
`SERIAL PORT
`
`SERIAL PORT
`
`PARALLEL PORT
`
`FDD CONNECTOR
`
`254
`
`REAL TIME
`CLOCK
`
`KEYBOARD/
`MOUSE
`CONTROLLER
`
`SYSTEM
`BIOS ROM
`
`KEYBOARD/
`BIOS ROM
`
`242
`
`244
`
`245
`
`246
`
`252
`
`1/0
`CONTROLLE
`R
`
`PROGRAM/
`INSTRUCTIONS/
`DATA
`
`MEDIUM
`
`FDD
`
`260
`
`259
`
`FIG. 2
`
`258
`
`IPR2022-00602
`Apple EX1006 Page 3
`
`
`
`U.S. Patent
`
`Jan. 21, 2003
`
`Sheet 3 of 8
`
`US 6,509,847 Bl
`
`300
`~
`
`312
`
`314
`
`316
`
`REQUEST
`ACCESS CODE
`
`SENSE TEMPORAL
`PRESSURE
`VARIATIONS
`
`318
`
`320
`
`GENERATE
`CODE
`
`COMPARE
`TO
`TEMPLATE
`
`FIG. 3A
`
`IPR2022-00602
`Apple EX1006 Page 4
`
`
`
`U.S. Patent
`
`Jan.21,2003
`
`Sheet 4 of 8
`
`US 6,509,847 Bl
`
`300
`~
`
`BEGIN
`
`REQUEST
`ACCESS CODE
`
`SENSE TEMPORAL
`PRESSURE
`VARIATIONS
`
`318
`
`GENERATE
`CODE
`
`COMPARE
`TO
`TEMPLATE
`
`YES
`
`328
`
`DECREMENT
`COUNTER
`
`324
`
`330
`
`ENABLE
`FUNCTION
`
`DISABLE
`FUNCTION
`
`FIG. 38
`
`IPR2022-00602
`Apple EX1006 Page 5
`
`
`
`U.S. Patent
`
`Jan.21,2003
`
`Sheet 5 of 8
`
`US 6,509,847 Bl
`
`.
`G
`lJ_
`
`.
`c..?
`LL
`
`IPR2022-00602
`Apple EX1006 Page 6
`
`
`
`U.S. Patent
`
`Jan.21,2003
`
`Sheet 6 of 8
`
`US 6,509,847 Bl
`
`500
`
`I
`
`I 1
`
`1
`11
`
`514
`
`FIG. 5
`
`✓ 600
`
`--612
`
`614
`
`FIG. 6
`
`IPR2022-00602
`Apple EX1006 Page 7
`
`
`
`Jan. 21, 2003
`
`sheet 7 of 8
`
`U.S. Patent
`
`us 6.509.847 Bt
`US 6,509,847 "Bl
`
`700
`
`US.Patent
`
`7'\2
`
`f\G. 7
`
`IPR2022-00602
`Apple EX1006 Page 8
`
`IPR2022-00602
`Apple EX1006 Page 8
`
`
`
`U.S. Patent
`
`Jan. 21, 2003
`
`Sheet 8 of 8
`
`US 6,509,847 Bl
`
`812
`
`822
`
`800 \
`
`816
`
`814
`
`FIG. 8
`
`IPR2022-00602
`Apple EX1006 Page 9
`
`
`
`US 6,509,847 Bl
`
`1
`PRESSURE PASSWORD INPUT DEVICE AND
`METHOD
`
`FIELD OF THE INVENTION
`
`to systems
`relates generally
`invention
`The present
`employing user entered access codes such as passwords,
`personal identification numbers (PIN) and the like, and more
`particularly to a method for inputting such access codes via
`temporal variations in the amount of pressure applied to a
`touch interface.
`
`BACKGROUND OF THE INVENTION
`
`2
`sound) to third parties so as to reduce the possibility that the
`access code may be stolen and used for unauthorized access
`to a system or information by undesired third parties.
`In accordance with a first aspect of the invention, a
`5 method for inputting an access code by temporally varying
`the amount of pressure applied to the touch interface is
`disclosed. The method includes the steps of sensing tempo(cid:173)
`ral variations in pressure applied to the touch interface,
`encoding
`the sensed temporal variations
`in pressure
`to
`10 generate a code, and comparing the generated code with a
`stored code template to determine if the code and the code
`template match within a predetermined tolerance. Wherein
`the generated code and the code template match within the
`predetermined tolerance, the code may be used to enable a
`15 function. Exemplary functions which may be enabled in this
`manner include, but are not limited to, enabling startup of an
`information handling system, loading an operating system,
`executing a software application, establishing a communi(cid:173)
`cation link with a network, allowing access to a restricted
`20 area, allowing a transaction via a network, and allowing
`banking transactions via an automatic teller machine (ATM).
`In an exemplary embodiment, the method may be imple(cid:173)
`mented as a program of instructions storable on a medium
`readable by an information handling system for causing the
`25 information handling system to perform the steps of the
`method.
`In accordance with a second aspect of the present
`invention, an information handling system utilizing
`the
`method is disclosed. In an exemplary embodiment,
`the
`information handling system is comprised of a processor for
`executing the program of instructions
`implementing
`the
`method of the present invention, a memory coupled to the
`processor for storing the program of instructions, and a
`touch interface coupled to the processor for sensing varia-
`tions in pressure applied by a user of the information
`handling system for entering the access code. Exemplary
`touch interfaces include, resistive or capacitive digitizer
`pads (e.g., touch pads), cursor control sticks, mouses which
`include keys having pressure sensing elements, touch sen-
`40 sitive display overlays ( e.g., touch screens), and the like.
`It is to be understood that both the foregoing general
`description and the following detailed description are exem(cid:173)
`plary and explanatory only and are not restrictive of the
`invention claimed. The accompanying drawings, which are
`45 incorporated in and constitute a part of the specification,
`illustrate an embodiment of the invention and together with
`the general description, serve to explain the principles of the
`invention.
`
`Access codes such as passwords, personal identification
`numbers (PIN), and the like have long been employed as a
`security measure to restrict access to sensitive systems and
`information. Such access codes are typically entered as a
`unique string of alphanumeric characters that a user types
`into a keyboard or keypad. Once entered, the access code is
`compared against a stored code template. If the access code
`is legitimate, access is provided to the user.
`Because access codes are entered via a keyboard or
`keypad, the possibility exists that an undesired third party
`may discover the access code as it is typed. For example, a
`user of a portable computer who must enter a password to
`access a network, runs the risk that a third party such as a
`business competitor seated nearby on a commercial airplane,
`can discern the password as it is typed. Such a person could
`then use the stolen password to access the network and 30
`compromise
`information contained therein. Similar con(cid:173)
`cerns apply to security for telephone calling cards, for
`example, both for prepaid and for charge cards. And, in a
`similar vein, a person performing banking transactions at a
`automated teller machine (ATM) runs the risk that a third 35
`party may discern his or her personal identification number
`(PIN) as it is entered into the ATM's keypad. The PIN could
`then be used to access the user's bank accounts.
`Because of such limitations, a variety of other security
`methods have been developed. However, all such methods
`suffer similar drawbacks. For example, one such method,
`signature recognition, employs digitizer pads for entry of a
`user's signature. The signature is then compared with a
`stored signature template or list of signature templates. If the
`signature matches within a predetermined tolerance, access
`is provided to the user. However, software applications
`capable of comparing an entered signature with a stored
`signature template are extremely sophisticated since they
`must account for natural variations in the user's signature.
`As a result, such systems are expensive and require large
`amounts of memory to implement. Further, users may have
`concerns that a third party may be capable of forging their
`signatures. Similarly, other methods such as fingerprint
`recognition and the use of electronic keys ( e.g., radio
`frequency identification (RFID) transponders containing an
`access code) utilize specialized equipment and may require
`sophisticated software for implementation.
`
`50
`
`55
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`The numerous objects and advantages of the present
`invention may be better understood by those skilled in the art
`by reference to the accompanying figures in which:
`FIG. 1 is an isometric view of an exemplary information
`handling system having a touch interface and employing the
`method of the present invention for entry of an access code,
`wherein the touch interface is a digitizer pad;
`FIG. 2 is a block diagram illustrating an exemplary
`computer based information handling system such as the
`60 server and client information handling systems shown in
`FIG. 1;
`FIGS. 3A and 3B are flow diagrams illustrating methods
`in accordance with exemplary embodiments of the present
`invention;
`FIGS. 4A and 4B are diagrams illustrating entry of an
`access code via temporal pressure variation in accordance
`with an exemplary embodiment of the present invention;
`
`SUMMARY OF THE INVENTION
`
`Accordingly, the present invention is directed to a novel
`method for inputting information by temporally varying the
`amount of pressure applied to a touch interface such as a
`digitizer (touch) pad, cursor control stick, touch screen, or
`the like. The present invention thus facilitates the input 65
`access codes such as passwords and personal identification
`codes in a manner that is indiscernible (via either sight or
`
`IPR2022-00602
`Apple EX1006 Page 10
`
`
`
`US 6,509,847 Bl
`
`3
`FIG. 5 is an isometric view of an exemplary information
`handling system wherein the touch interface is a joystick
`cursor control device;
`FIG. 6 is an isometric view of an exemplary information
`handling system wherein the touch interface is mouse;
`FIG. 7 is an isometric view of an exemplary information
`handling system wherein the touch interface is a digitizer
`pad mounted to the bottom surface of the system housing;
`and
`FIG. 8 is an isometric view of an automated
`machine (ATM) employing the present invention.
`
`teller 10
`
`15
`
`4
`more PCI connectors 221, each of which accepts a standard
`PCI card. In one embodiment, 1/0 bridge 222 and graphics
`controller 227 are each integrated on the motherboard along
`with system controller 212, in order to avoid a board-to-
`5 connector-to-board signal crossing interface and thus pro(cid:173)
`vide better speed and reliability. In the embodiment shown,
`graphics controller 227 is coupled to a video memory 228
`that includes memory such as DRAM, EDO DRAM,
`SDRAM, or VRAM (Video Random-Access Memory), and
`drives VGA (Video Graphics Adapter) port 229. VGA port
`229 can connect to VGA-type or SVGA (Super VGA)-type
`displays or the like. Other input/output (1/0) cards having a
`PCI interface can be plugged into PCI connectors 221.
`In one embodiment, 1/0 bridge 222 is a chip that provides
`connection and control to one or more independent IDE
`connectors 224-225, to a USE (Universal Serial Bus) port
`226, and to ISA (Industry Standard Architecture) bus 230. In
`this embodiment, IDE connector 224 provides connectivity
`for up to two or more standard IDE-type devices such as
`20 hard disk drives, CD-ROM (Compact Disk-Read-Only
`Memory) drives, DVD (Digital Video Disk or Digital Ver(cid:173)
`satile Disk) drives, or TBU (Tape-Backup Unit) devices. In
`two IDE connectors 224 are
`one similar embodiment,
`provided, and each provide
`the EIDE (Enhanced IDE)
`25 architecture. In the embodiment shown, SCSI (Small Com(cid:173)
`puter System Interface) connector 225 provides connectivity
`for preferably up to seven or fifteen SCSI-type devices
`(depending on the version of SCSI supported by the
`embodiment). In one embodiment, 1/0 bridge 222 provides
`30 ISA bus 230 having one or more ISA connectors 231 (in one
`embodiment,
`three connectors
`are provided).
`In one
`embodiment, ISA bus 230 is coupled to 1/0 controller 252,
`which in turn provides connections to two serial ports 254
`and 255, parallel port 256, and FDD (Floppy-Disk Drive)
`35 connector 257. In one embodiment, FDD connector 257 is
`to FDD 258 that receives removable media
`connected
`(floppy diskette) 259 on which is stored data and/or program
`code 260. In one such embodiment, program code 260
`includes code that controls programmable system 200 to
`40 perform the methods described herein. In another such
`embodiment, serial port 254 is connectable to a computer
`network such as the Internet, and such network has program
`code 260 that controls programmable system 200 to perform
`the methods described herein. In one embodiment, ISA bus
`45 230 is connected to buffer 232, which is connected to X bus
`240, which provides connections to real-time clock 242,
`keyboard/mouse controller 244 and keyboard BIOS ROM
`(Basic Input/Output System Read Only Memory) 245, and
`to system BIOS ROM 246.
`FIG. 2 shows one exemplary embodiment of the present
`invention, however other bus structures and memory
`arrangements
`are specifically
`contemplated.
`In one
`embodiment, 1/0 bridge 222 is a chip that provides connec(cid:173)
`tion and control to one or more independent IDE connectors
`224-225, to a USE (Universal Serial Bus) port 226, and to
`ISA (Industry Standard Architecture) bus 230. In this
`embodiment, IDE connector 224 provides connectivity for
`up to two standard IDE-type devices such as hard disk drives
`or CD-ROM (Compact Disk-Read-Only Memory) drives,
`and similarly IDE connector 225 provides connectivity for
`up to two IDE-type devices. In one such embodiment, IDE
`connectors 224 and 225 each provide the EIDE (Enhanced
`IDE) architecture. In one embodiment, 1/0 bridge 222
`provides ISA bus 230 having one or more ISA connectors
`231 (in one embodiment, three connectors are provided). In
`one embodiment, ISA bus 230 is coupled to 1/0 controller
`252, which in turn provides connections to two serial ports
`
`DETAILED DESCRIPTION OF IBE
`INVENTION
`
`Reference will now be made in detail to the presently
`preferred embodiments of the invention, examples of which
`are illustrated in the accompanying drawings.
`Referring now to FIG. 1, an exemplary
`information
`handling system employing the method of the present inven(cid:173)
`tion is shown. In this embodiment, the information handling
`system is comprised of a portable computer 100, commonly
`referred to in the art as a laptop or notebook computer. As
`shown in FIG. 1, portable computer 100 includes a processor
`portion 112 having a keyboard 116, and a lid portion 114
`including a display 118. The lid portion 114 is pivotally
`hinged to the processor portion 112 so that the lid portion
`114 and processor portion 112 may be folded together for
`storage and transport of the computer 100.
`An exemplary hardware architecture 200 of an informa(cid:173)
`tion handling system such as portable computer 100 of FIG.
`1 is shown in FIG. 2. In this embodiment, processor 204,
`system controller 212, cache 214, and data-path chip 218 are
`each coupled to host bus 210. Processor 204 is a micropro(cid:173)
`cessor such as a 486-type chip, a Pentium 7, Pentium 117,
`Pentium II17, or the like suitable microprocessor. Cache 214
`provides
`high-speed
`local-memory
`data
`(in one
`embodiment, for example, 512 KB of data) for processor
`204, and is controlled by system controller 212, which loads
`cache 214 with data that is expected to be used soon after the
`data is placed in cache 212 (i.e. in the near future). Main
`memory 216 is coupled between system controller 212 and
`data-path chip 218, and in one embodiment, provides
`random-access memory of between 16 MB and 128 MB of
`data. In one embodiment, main memory 216 is provided on
`SIMMs (Single In-line Memory Modules), while in another
`embodiment, main memory 216 is provided on DIMMs
`(Dual In-line Memory Modules), each of which plugs into
`suitable sockets provided on a motherboard holding these
`components and many of the other components shown in 50
`FIG. 2. Main memory 216 includes standard DRAM
`(Dynamic Random-Access Memory), EDO (Extended Data
`Out) DRAM, SDRAM (Synchronous DRAM), or the like
`suitable memory technology. System controller 212 controls
`PCI (Peripheral Component Interconnect) bus 220, a local 55
`bus for system 200 that provides a high-speed data path
`between processor 204 and various peripheral devices, such
`as video, disk, network, etc. Data-path chip 218 is also
`controlled by system controller 212 to assist in routing data
`between main memory 216, host bus 210, and PCI bus 220. 60
`In one embodiment, PCI bus 220 provides a 32-bit-wide
`data path that runs at 33 MHz. In another embodiment, PCI
`bus 220 provides a 64-bit-wide data path that runs at 33
`MHz. In yet other embodiments, PCI bus 220 provides
`32-bit-wide or 64-bit-wide data paths that run at higher 65
`speeds. In one embodiment, PCI bus 220 provides connec(cid:173)
`tivity to 1/0 bridge 222, graphics controller 227, and one or
`
`IPR2022-00602
`Apple EX1006 Page 11
`
`
`
`US 6,509,847 Bl
`
`5
`254 and 255, parallel port 256, and FDD (Floppy-Disk
`Drive) connector 257. In one embodiment, ISA bus 230 is
`connected to buffer 232, which is connected to X bus 240,
`to real-time clock 242,
`which provides connections
`keyboard/mouse controller 244 and keyboard BIOS ROM
`(Basic Input/Output System Read Only Memory) 245, and
`to system BIOS ROM 246. It should be appreciated that
`modification or reconfiguration of information handling
`system 200 of FIG. 2 by one having ordinary skill in the art
`would not depart from the scope or the spirit of the present 10
`invention.
`Referring again to FIG. 1, portable computer 100 includes
`a cursor control device comprised of a touch sensitive
`digitizer pad 120 mounted to the processor portion 112 of
`portable computer 100 adjacent to keyboard 116. Such
`digitizer pads 120 ( often referred to in the art as touch pads,
`track pads, etc.) sense motion of the user's fingertip 122 to
`control the position of a cursor or pointer on a graphical user
`interface (GUI) displayed on the display 118 by providing
`position indications corresponding to positions on the dis(cid:173)
`play 118.
`In accordance with the present invention, digitizer pad
`120 may further sense variations in pressure applied along
`an axis generally perpendicular to its surface. For example,
`in an exemplary embodiment, digitizer pad 120 comprises a
`resistive touch pad capable of generating an analog signal
`proportional to the amount of pressure applied by the user's
`fingertip 122. This analog signal may be converted to a
`digital signal via an analog to digital converter (ADC) for
`processing by the system's processor 202 (FIG. 2). Such
`resistive touch pads have conventionally been utilized to
`allow the user to select a point on the display 118 by either
`tapping or applying an added downward pressure to the
`surface of the touch pad. Alternately, digitizer pad 120 may
`be a capacitive touch pad capable of sensing variations in
`applied pressure by measuring the area of the user's finger
`tip in contact with the surface of the pad. Such capacitive
`touch pads are conventionally used to control "edge motion"
`velocity wherein a displayed cursor will continue to move
`when the user's fingertip is dragged to the edge of the touch
`pad, and the velocity of movement is controlled by the
`amount of pressure applied to the touch pad by the user.
`The method of the present invention utilizes the digitizer
`pad 120 as a touch interface to provide a means for inputting
`an access code or password via temporal variations in the
`amount of pressure applied to the surface of the pad 120 by
`the user. In this way, the present invention facilitates entry
`of access codes in a manner that is substantially indiscern(cid:173)
`ible (via either sight or sound) to third parties, reducing the
`possibility that the access code may be stolen and used for
`access to a system or function by unauthorized persons. In
`an exemplary embodiment, the method of the present inven(cid:173)
`tion may be implemented
`in an information handling
`system, such as portable computer 100, as a program of
`instructions storable on a medium readable by the informa-
`tion handling system for causing the information handling
`system to execute the steps of the method.
`Turning now to FIGS. 3A and 3B, a method 300 in
`accordance with an exemplary embodiment of the present
`invention is shown. The method 300 is initiated, at step 312, 60
`wherein a user attempts to access a function requiring an
`access code such as a password or personal identification
`number (PIN). For example, the user may power on an
`information handling system such as portable computer 100
`(FIG. 1) wherein the computer's operating system is pass-
`word protected. Similarly, the user of portable computer 100
`may attempt to access a network such as a local area network
`
`6
`(LAN). The network may require entry of the user's pass(cid:173)
`word for access to network resources. Likewise, the user
`may attempt to access the Internet via an Internet service
`provider, online information service, etc wherein a legiti-
`5 mate user name and password is required to receive access
`to the network.
`A request may be provided to the user to enter the access
`code, at step 314. This request may, for example, be dis(cid:173)
`played via display 118 of portable
`computer 100.
`Alternately, step 314 may be omitted, and the user may
`simply enter the access code without a prompt. The user
`enters the access code by temporally varying the amount of
`pressure applied
`to the touch interface. For example,
`wherein the touch interface is comprised of a digitizer pad
`120 as shown in FIG. 1, the user would rest one or more
`15 fingers ( or alternatively the point of a stylus) on the surface
`of digitizer pad 120 and would apply pressure in a temporal
`pattern. Preferably, the user would not move (e.g., flex, lift,
`tap, etc.) his finger while varying the amount of pressure
`applied to the digitizer pad 120. In this manner, entry of the
`20 access code would be essentially invisible to third parties
`since no motion of the user's hand could be detected.
`The temporal pattern of pressure applications applied by
`the user is sensed by the touch interface ( e.g., the digitizer
`pad 120), at step 316, and utilized to generate an access
`25 code, at step 318. The generated access code is then
`compared, at step 320, with a code template created by the
`user at an earlier time. In one embodiment, the user's access
`code itself will simply have been previously stored as the
`code template by the information handling system. In more
`30 general embodiments, the code template may, for example,
`be data structure created from the generated access code
`during a prior use of the information handling system.
`Similarly, a network server may allow a new user to choose
`a password the first time that user accesses the network. The
`35 password chosen would be saved by the server as the stored
`code template.
`As shown in FIG. 3B, the entered access code may then
`be utilized to allow the information handling system to
`enable the function requested at step 312. It should be
`40 appreciated that a user may be unable to exactly duplicate
`the previously entered temporal pressure pattern of the code
`template when inputting the access code pattern. Thus, it
`may be necessary to allow some variation, within a prede(cid:173)
`termined tolerance, between the inputted access code and the
`45 code template. For example, wherein the access code is
`entered by the user as a series of pressure pulses having
`varying durations, a predetermined tolerance may be pro(cid:173)
`vided for variations in the lengths of the pulses. A determi(cid:173)
`nation may then be made at step 322 whether the entered
`50 access code and the stored code template match to within the
`predetermined tolerance. Wherein the inputted access code
`and the code template are a close match (i.e., they match to
`within the predetermined tolerance), the function is enabled
`at step 324.
`the user may be allowed more than one
`Preferably,
`opportunity to correctly enter the access code. For example,
`a counter (COUNTER) may be initialized to a value (N),
`representing the allowable number of access code requests
`that may be made to the user, when the access code it first
`requested from the user, at step 314. A determination may
`then be made at step 326 whether the counter is greater than
`zero (0), wherein all allowed access code requests have been
`made. Wherein the counter (COUNTER) is greater than zero
`(0), the counter (COUNTER) is decremented (COUNTERn+
`l=COUNTERn_ 1), at step 328, and entry of the access code
`is again requested at step 314. Otherwise, the function is
`disabled at step 330.
`
`55
`
`65
`
`IPR2022-00602
`Apple EX1006 Page 12
`
`
`
`US 6,509,847 Bl
`
`10
`
`7
`The entered access code may be utilized in conjunction
`with other security measures. For example, the access code
`may be utilized to verify identifying information ( e.g., a user
`name) entered by the user via keyboard 116. Similarly, in an
`exemplary embodiment, digitizer pad 120 may include an 5
`optical scanner or thermal sensor for collecting an image of
`the user's fingerprint as the pressure access code is entered
`and verified against a stored fingerprint template. Verifica(cid:173)
`tion of both the collected fingerprint image and the access
`code may then be required before the user is allowed access
`to the system or information.
`FIGS. 4A and 4B illustrate graphically access codes 400
`& 420 entered by the user as a temporal series of pressure
`applications to a touch interface such as digitizer pad 120
`(FIG.I). As they are entered, the pressure applications are 15
`sensed by the touch interface as variations
`in pressure
`relative
`to a baseline pressure
`( e.g., no application of
`pressure), and encoded for comparison with a stored code
`template. For example, digitizer pad 120, functioning as the
`touch interface, may generate an analog signal 412 & 422 20
`proportional to the pressure applied to its surface by the user.
`The analog signal 412 & 422 may then be converted to a
`digital signal 414 & 424 via an analog to digital converter
`(ADC) or the like for comparison to a stored code template.
`Known rounding techniques for analog to digital conversion 25
`may be utilized to eliminate inconsistencies in entry of the
`access code by the user.
`As shown in FIG. 4A, the touch interface may sense only
`temporal applications of pressure relying on timing of the
`pressure applications for entry of the access code. In such an 30
`embodiment, the touch interface would not detect variations
`in pressure magnitude or intensity. Thus, the access code
`would be entered as a series of alternating pressure appli(cid:173)
`cations of varying duration. Alternately, as shown in FIG.
`4B, the touch interface may sense both temporal applica-
`tions of pressure and variations in pressure magnitude or
`intensity. Thus, the access code would be entered as a series
`of alternating short and long pressure applications that vary
`both in duration and magnitude.
`A known code key (e.g., Morse code) or a memory 40
`nemonic ( e.g., the melody of a favorite song) may be utilized
`to aid the user in selecting, remembering, and entering the
`access code. Further, by using a code key such as Morse
`code, a conventional alphanumeric password previously
`entered via a keyboard or keypad may be converted into a 45
`pressure password consisting of a series of long and short
`pressure applications for use with the present invention.
`Referring now to FIGS. 5 and 6, it should be appreciated
`that the present invention, when implemented in an infor(cid:173)
`mation handling system, may utilize cursor control devices 50
`other than digitizer pad 120 (FIG. 1) as a touch interface. For
`example, as shown in FIG. 5, an information handling
`system is shown which is comprised of a portable computer
`500 having a keyboard 512 employing a cursor control stick
`514. In accordance with the present invention, cursor control 55
`stick 514 may sense variations in force or pressure applied
`to keyboard 512. In this
`along a "Z" axis perpendicular
`manner, cursor control stick 514 may be utilized as a touch
`interface to facilitate entry of access codes in accordance
`with the method of the present invention. For instance, in an 60
`cursor control stick 514 may
`exemplary embodiment,
`include a force sensitive resister (not shown) suitable for
`generating an analog signal proportional to the force applied
`by the user. The user would rest a finger on the cursor control
`stick 514 and apply a downward pressure in a temporal 65
`pattern. Preferably, cursor control stick, while being capable
`of sensing variations in force along the "Z" axis, would not
`
`35
`
`8
`itself move along the "Z" axis so that the user's finger would
`not move while entering the access, and entry of the access
`code would thus not be discernable to third parties.
`Similarly, as shown in FIG. 6, an information handling
`system such as a desktop personal computer, convergence
`system, etc., may employ a mouse 600 having a mouse body
`612 and at least one key 614 including a force sensitive
`element ( e.g., a force sensitive resister, etc.) functioning as
`a touch interface for implementation of the method of the
`present invention. The user, to input a pressure access code
`via such a mouse, would rest a finger on key 614, fully
`depress key 614, and apply downward pressure in a temporal
`pattern. Preferably, once key 614 is fully depressed, the
`force sensitive element would be capable of sensing varia(cid:173)
`tions in pressure applied to the key without additional
`movement of the key 614 by the user's finger tip. In an
`alternative embodiment,
`the mouse may employ a sensor
`disposed in the cavity receiving the mouse ball, operable to
`detect, by the receipt of upward pressure of the mouse ball,
`downward pressure upon the mouse by the user. In either of
`these embodiments using the system mouse, entry of the
`access code would not be discernable to third parties.
`Referring now to FIG. 7, it should further be appreciated
`that