`Case 5:19-cv-00036—RWS Document 343-12 Filed 06/03/20 Page 1 of 9 PageID #: 11503
`
`EXHIBIT 11
`
`EXHIBIT 11
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 2 of 9 PageID #: 11504
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`.<@3;:6:?A =8 2%1% 03?7<? /=% ’&$(’($*-+
`4A
`2%1% 03?7<? /=% +$-,’$&+) ?= 159:887> "B159:887> D&+)C#
`
`DPM M_KMYW[Z KQ[ML PMYMQU IYM M_MTWSIY‘& 9VY IU‘ KSIQT SQTQ[I[QVU$ 7MNMULIU[ TI‘ YMS‘ VU M_KMYW[Z KQ[ML NVY IU‘ V[PMY SQTQ[I[QVU IUL’VY
`ILLQ[QVUIS M_KMYW[Z UV[ ZM[ NVY[P N\SS‘ PMYMQU [V [PM M_[MU[ UMKMZZIY‘ [V WYV]QLM I TVYM KVTWYMPMUZQ]M M_WSIUI[QVU NVY I YMNMYMUKMgZ
`LQZKSVZ\YM VN I SQTQ[I[QVU& FPMYM IU M_KMYW[ YMNMYZ [V VY LQZK\ZZMZ I NQO\YM VY NQO\YM Q[MTZ$ [PI[ NQO\YM IUL IU‘ ILLQ[QVUIS LMZKYQW[QVUZ
`VN [PI[ NQO\YM ZPV\SL JM \ULMYZ[VVL [V JM QUKVYWVYI[ML J‘ YMNMYMUKM IZ QN ZM[ NVY[P N\SS‘ [PMYMQU&
`
`8_KMW[ ^PMYM ZWMKQNQKISS‘ UV[ML V[PMY^QZM$ [PQZ KPIY[ IWWSQMZ [PM IWWIYMU[ KVUZ[Y\K[QVUZ VN KSIQT [MYTZ IZ \ZML J‘ BSIQU[QNN QU Q[Z
`QUNYQUOMTMU[ KVU[MU[QVUZ3 Z\KP \ZM$ PV^M]MY$ LVMZ UV[ QTWS‘ [PI[ 7MNMULIU[ ILVW[Z VY IOYMMZ ^Q[P BSIQU[QNNgZ KVUZ[Y\K[QVUZ QU IU‘ ^I‘&
`
`E&C& BI[MU[ AV& )($*)*$-0. "d[PM g-0. BI[MU[e# KSIQTZ WYQVYQ[‘ [V =IWIUMZM 4WWSQKI[QVU AV& *()*%))/)(-$ NQSML @I‘ *+$ *()*& 9VY
`W\YWVZMZ VN [PMZM QU]ISQLQ[‘ KVU[MU[QVUZ$ 7MNMULIU[ IWWSQMZ [PM @I‘ *+$ *()*$ WYQVYQ[‘ LI[M NVY [PM g-0. BI[MU[& ;V^M]MY$ 7MNMULIU[
`YMZMY]MZ [PM YQOP[ [V KVU[MZ[ BSIQU[QNNgZ YMSQIUKM VU [PM @I‘ *+$ *()*$ WYQVYQ[‘ LI[M$ ZPV\SL [PM WYQVYQ[‘ LI[M JMKVTM IU QZZ\M QU [PQZ
`WYVKMMLQUO&
`
`CKPQNNMY g(.+ ^IZ NQSML VU =\UM +($ *((( IUL QZZ\ML VU @IYKP **$ *((-& 4Z Z\KP$ CKPQNNMY g(.+ X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM
`f-0. WI[MU[ \ULMY +- E&C&6& b )(*"I#$ )(*"J#$ IUL )(*"M#& 4S[MYUI[Q]MS‘$ ZPV\SL [PM KSIQTZ VN [PM f-0. WI[MU[ JM NV\UL [V UV[ JM MU[Q[SML
`[V WYQVYQ[‘ [V [PM NVYMQOU NQSQUO LI[M$ CKPQNNMY g(.+ X\ISQNQMZ IZ WYQVY IY[ \ULMY bb )(*"I#")# IUL )(*"I#"*# "WVZ[%4<4#& EZQUO BSIQU[QNNgZ
`QU[MYWYM[I[QVU VN [PM KSIQTZ$ CKPQNNMY g(.+ IU[QKQWI[MZ KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(*"I#$ "J# IUL "M#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ AV& /$1,)$-+, [V LM SI ;\MYOI "dLM SI ;\MYOI g-+,e# YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%
`/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#& 7M SI ;\MYOI g-+, ^IZ NQSML VU =\UM *.$ *((, IUL ^IZ W\JSQZPML VU 4WYQS *0$
`*((-& 4Z Z\KP$ LM SI ;\MYOI g-+, X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM f-0. WI[MU[ \ULMY +- E&C&6& bb )(*"I#$ )(*"J#$ IUL )(*"M#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ 4WWSQKI[QVU B\JSQKI[QVU AV& *((.’((,)/,. [V >QYR\W$ M[ IS& "d>QYR\W g/,.e# YMULMYZ
`VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#& >QYR\W g/,. ^IZ NQSML VU 4\O\Z[ )/$ *((, IUL W\JSQZPML VU
`9MJ *+$ *((.& 4Z Z\KP$ >QYR\W g/,. X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM f-0. WI[MU[ \ULMY +- E&C&6& bb )(*"I#$ )(*"J#$ IUL )(*"M#&
`
`)
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 3 of 9 PageID #: 11505
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ AV& 0$),1$(01 [V ?QU "d?QU g(01e# YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL
`).%)0 \ULMY +- E&C&6& b )(+"I#& ?QU g(01 ^IZ NQSML VU AV]MTJMY *)$ *((0 IUL QZZ\ML VU 4WYQS +$ *()*& 4Z Z\KP$ ?QU g(01 X\ISQNQMZ IZ
`WYQVY IY[ ^Q[P YMOIYL [V [PM g-0. BI[MU[ \ULMY +- E&C&6& b )(*"I# IUL )(*"M#&
`
`2%1% 03?7<? /=% ’&$(’($*-+
`Claim 1
`G)"WYM#H4 TVJQSM [MYTQUIS
`KVUNQO\YML [V Z^Q[KP JM[^MMU
`IU \USVKRML Z[I[M IUL I SVKRML
`Z[I[M QU ^PQKP I WYMLM[MYTQUML
`VWMYI[QVU QZ SQTQ[ML$
`KVTWYQZQUO2
`
`G)"I#H I [YIUZKMQ]MY ^PQKP
`WMYNVYTZ ZPVY[%YIUOM ^QYMSMZZ
`KVTT\UQKI[QVUZ3
`
`159:887> D&+)
`
`DV [PM M_[MU[ [PM WYMITJSM QZ SQTQ[QUO$ CKPQNNMY g(.+ [MIKPMZ dTVJQSM WPVUM )((e "TVJQSM [MYTQUIS#2
`
`Mobile phone 100 of FIG. 1 may be any mobile phone capable of long-range communication.
`For example, for one embodiment, mobile phone 100 is a cellular phone, in which case long-
`range transceiver circuit 102 may communicate with a cell base.
`CKPQNNMY g(.+ I[ *2+(%+,&
`
`CKPQNNMY g(.+gZ TVJQSM WPVUM )(( QZ KVUNQO\YML [V JM \USVKRML VY SVKRML "QU ^PQKP KIZM [PM IJQSQ[‘
`VN [PM WPVUM [V ZMUL IUL YMKMQ]M KISSZ QZ SQTQ[ML#2
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`CKPQNNMY g(.+ I[ +2*+%+/&
`CKPQNNMY g(.+ [MIKPMZ [PI[ TVJQSM WPVUM )(( QUKS\LMZ dZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ )(+&e See
`9<:& )$ infra. DPQZ ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ QZ KPIYIK[MYQaML IZ MZ[IJSQZPQUO I ZPVY[%YIUOM$
`^QYMSMZZ KVTT\UQKI[QVU SQUR2
`
`Consequently, a short-range, wireless communication link, 121, is established between
`computer system 110 and mobile phone 100, according to step 205. In accordance with one
`
`*
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 4 of 9 PageID #: 11506
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`>QYR\W g/,. I[ c G((,-H3 see also 9<:& +2
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V QUKVYWVYI[M >QYR\W g/,.gZ TQKYVWYVKMZZVY ^V\SL JM [V
`WYV]QLM I KVTWVUMU[ [V WMYNVYT [PM ]IYQV\Z N\UK[QVUZ LMZKYQJML J‘ CKPQNNMY g(.+gZ TVJQSM LM]QKM
`)((& C\JZ[Q[\[QUO ^PI[M]MY WMYNVYTZ [PM N\UK[QVUZ QU CKPQNNMY
`g(.+ ^Q[P >QYR\W g/,.gZ
`TQKYVWYVKMZZVY ^V\SL JM I ZQTWSM Z\JZ[Q[\[QVU VN VUM RUV^U MSMTMU[ NVY IUV[PMY [V VJ[IQU
`WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[$ ^PMU [PM KVULQ[QVUZ IYM TM[ "IZ LMZKYQJML JMSV^3 see MSMTMU[Z G)"M#H$
`G)"N#H$ IUL G)"O#H#$ TVJQSM WPVUM )(( [YIUZTQ[Z [PM IKKMZZ KVLM [V KVTW\[MY Z‘Z[MT ))(2
`
`G)"L#H ^PMYMQU$ ^PMU
`KVULQ[QVUZ IYM TM[$ [PM
`KVU[YVSSMY KVU[YVSZ [PM TVJQSM
`
`1
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 5 of 9 PageID #: 11507
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`[MYTQUIS [V [YIUZTQ[
`QUNVYTI[QVU [V [PM IUV[PMY
`TVJQSM [MYTQUIS NVY Z^Q[KPQUO
`I Z[I[M VN [PM IUV[PMY TVJQSM
`[MYTQUIS NYVT I SVKRML Z[I[M [V
`IU \USVKRML Z[I[M$ ^PMYMQU [PM
`KVULQ[QVUZ QUKS\LM2
`
`At step 210 of FIG. 2, an access code is transmitted from short-range transceiver circuit 103
`of mobile phone 100 to short-range transceiver circuit 111 of computer system 110 via link
`121 of FIG. 1.
`CKPQNNMY g(.+ I[ ,2)(%)+3 see also 9<:& *2
`
`DPQZ IKKMZZ KVLM KI\ZMZ KVTW\[MY Z‘Z[MT ))( [V OYIU[ [PM \ZMY IKKMZZ "Z^Q[KP Z[I[M NYVT I SVKRML
`Z[I[M [V IU \USVKRML Z[I[M#2
`Once the access code has been verified by computer system 110 of FIG. 1, the computer
`system grants the user access to the system at step 215 of FIG. 2. If the access code is not
`
`)(
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 6 of 9 PageID #: 11508
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`G)"M#H NQYZ[$ [PM TVJQSM [MYTQUIS
`QZ QU I SVKRML Z[I[M$ [PM IUV[PMY
`TVJQSM [MYTQUIS QZ QU I SVKRML
`Z[I[M$ IUL [PM IUV[PMY TVJQSM
`[MYTQUIS QZ ^Q[PQU
`KVTT\UQKI[QVU YIUOM VN [PM
`ZPVY[%YIUOM ^QYMSMZZ
`KVTT\UQKI[QVUZ VN [PM
`[YIUZKMQ]MY ^PQSM QU [PM SVKRML
`Z[I[M3
`
`verified, i.e. no access code is received or the wrong access code is received, access to the
`computer system remains limited.
`Id. I[ ,2-+%-03 see also 9<:& * I[ Z[MW *)- supra.
`CKPQNNMY g(.+ [MIKPMZ [PI[$ ^PMU [PM I\[PMU[QKI[QVU WYVKMZZ Z[IY[Z$ [PM TVJQSM WPVUM )(( QZ QU I
`SVKRML Z[I[M2
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`CKPQNNMY g(.+ I[ +2*+%+/&
`
`CKPQNNMY g(.+ N\Y[PMY LQZKSVZMZ [PI[$ ^PMU [PM I\[PMU[QKI[QVU WYVKMZZ Z[IY[Z$ KVTW\[MY Z‘Z[MT ))( QZ
`ISZV QU I SVKRML Z[I[M2
`
`In accordance with an embodiment of the present invention, the subscriber identity module
`(SIM) in a user's mobile phone is used to gain access to a locked computer system. Initially,
`access to the computer system is limited.
`Id. I[ .)%.,&
`
`9QUISS‘$ [PM I\[PMU[QKI[QVU WYVKMZZ JMOQUZ ^PMU ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ )(+ VN TVJQSM WPVUM
`)(( MU[MYZ KVTT\UQKI[QVUZ YIUOM VN ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ ))) VN KVTW\[MY Z‘Z[MT ))(2
`
`When a user with a mobile phone comes into short-range, wireless communication range of
`the computer system, a short-range, wireless communication link is automatically established
`(i.e. established without user intervention).
`Id. I[ )2.-%*2)3 see also 9<:& *$ I[ Z[MW *((2
`
`))
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 7 of 9 PageID #: 11509
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ LM SI ;\MYOI g-+,gZ KVULQ[QVUZ ^V\SL JM ZV [PI[
`[PM \ZMY KIU \USVKR [PMQY WPVUM WYQVY [V MU[MYQUO KVTT\UQKI[QVUZ YIUOM VN [PM KVTW\[MY Z‘Z[MT&
`DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU
`VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`
`4S[MYUI[Q]MS‘ >QYR\W g/,. [MIKPMZ [PQZ ZM[ VN KVULQ[QVUZ& >QYR\W g/,. [MIKPMZ [PI[ MU[MYQUO [PM B<A
`QU[V PIULPMSL MSMK[YVUQK LM]QKM )*( ZMY]MZ [V \USVKR JV[P Q[ IUL B6 ))( "[P\Z$ I[ [PM JMOQUUQUO VN
`[PM I\[PMU[QKI[QVU WYVKMZZ$ JV[P LM]QKMZ IYM UMKMZZIYQS‘ QU [PM SVKRML Z[I[M#2
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120.
`>QYR\W g/,. I[ c G((-+H&
`
`>QYR\W g/,. N\Y[PMY [MIKPMZ [PI[ [PM WYVKMZZ TI‘ JM QUQ[QI[ML ^PMU PIULPMSL MSMK[YVUQK LM]QKM )*(
`MU[MYZ ZPVY[%YIUOM ^QYMSMZZ KVTT\UQKI[QVUZ YIUOM VN B6 ))(2
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Id. I[ c G((.0H&
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ >QYR\W g/,.gZ KVULQ[QVUZ ^V\SL JM ZV [PI[ [PM
`\ZMY KIU \USVKR [PMQY WPVUM WYQVY [V MU[MYQUO KVTT\UQKI[QVUZ YIUOM VN [PM KVTW\[MY Z‘Z[MT& DPQZ
`^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I
`RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[$ \WVU MU[MYQUO ZPVY[%YIUOM ^QYMSMZZ KVTT\UQKI[QVUZ YIUOM$ [PM ^QYMSMZZ
`KVTT\UQKI[QVU SQUR )*) QZ dI\[VTI[QKISS‘ MZ[IJSQZPMLe2
`
`),
`
`G)"N#H ZMKVUL$ IN[MY [PM TVJQSM
`[MYTQUIS QZ QU [PM SVKRML Z[I[M$
`[PM IUV[PMY TVJQSM [MYTQUIS QZ
`QU [PM SVKRML Z[I[M$ IUL [PM
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 8 of 9 PageID #: 11510
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM
`YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`
`4S[MYUI[Q]MS‘$ >QYR\W g/,. [MIKPMZ [PQZ KVULQ[QVU& >QYR\W g/,. [MIKPMZ [PI[ ^QYMSMZZ KVTT\UQKI[QVU
`LM]QKM )*( I\[VTI[QKISS‘ KVTT\UQKI[MZ V]MY KVTT\UQKI[QVU SQUR ))- ^Q[P B6 )*( ^PMU JV[P
`LM]QKMZ IYM SVKRML ^PMU B6 )*( LM[MK[Z [PM WYMZMUKM VN ^QYMSMZZ KVTT\UQKI[QVU LM]QKM )*( IUL
`QUQ[QI[MZ [PM I\[PMU[QKI[QVU WYVKMZZ J‘ ZMMRQUO [PM I\[PMU[QKI[QVU KVLM2
`When the user wishes to use PC 110, he or she may perform an activation action, such as
`typing on the keyboard or moving the mouse, whereupon the user may be requested to provide
`a user identification code (either to the PC 110 or the handheld electronic device 120) to
`unlock the PC desktop and enable use thereof […] PC 110 is preferably configured to
`automatically seek the authentication code from handheld electronic device 120 over
`communication link 115 in response to activation.
`>QYR\W g/,. I[ cc G((,0H%G((,1H&
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ >QYR\W g/,.gZ KVULQ[QVU ^V\SL JM [V YML\KM [PM
`LMSI‘ QU \USVKRQUO KVTW\[MY Z‘Z[MT ))(& DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ
`Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY
`QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[ [PM \ZMY TI‘ JM YMX\QYML [V I\[PMU[QKI[M JMNVYM [PM IKKMZZ KVLM QZ
`[YIUZTQ[[ML NYVT TVJQSM LM]QKM )(( [V KVTW\[MY Z‘Z[MT ))(2
`
`Note that for one embodiment, the user may authenticate himself or herself to the mobile
`phone by, for example, entering a password into the mobile phone. In this manner, the SIM
`is used not only to identify the user during cellular phone calls (or other long-range, wireless
`communication) but also to authenticate the user to the computer system. Note that for one
`embodiment, the user may authenticate himself or herself to the mobile phone by, for example,
`entering a password into the mobile phone.
`CKPQNNMY g(.+ I[ *2),%)1&
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`
`)/
`
`G)"O#H [PQYL$ IN[MY [PM
`WMYNVYTQUO$ YMKMQ]QUO$ J‘ [PM
`KVU[YVSSMY$ [PM I\[PMU[QKI[QVU
`QUW\[ NVY Z^Q[KPQUO [PM TVJQSM
`[MYTQUIS NYVT [PM SVKRML Z[I[M
`[V [PM \USVKRML Z[I[M&
`
`
`
`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 9 of 9 PageID #: 11511
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`Id. I[ +2*+%+/& DP\Z$ QU YMZWVUZM [V [PM YMX\MZ[ NVY [PM IKKMZZ KVLM NYVT KVTW\[MY Z‘Z[MT ))($
`TVJQSM WPVUM )(( TI‘ YMX\QYM [PI[ [PM \ZMY I\[PMU[QKI[M "[P\Z \USVKRQUO TVJQSM WPVUM )((# WYQVY
`[V [YIUZTQ[[QUO [PM IKKMZZ KVLM&
`
`4S[MYUI[Q]MS‘$ >QYR\W g/,. [MIKPMZ [PQZ KVULQ[QVU& >QYR\W g/,. [MIKPMZ [PI[$ YMZWVUZQ]M [V [PM
`YMX\MZ[ NVY I\[PMU[QKI[QVU J‘ B6 )*($ TVJQSM LM]QKM ))( YMX\MZ[Z IUL YMKMQ]MZ IU I\[PMU[QKI[QVU
`KVLM NYVT [PM \ZMY2
`
`Depending on the configuration of the handheld electronic device 120, receipt of a
`communication from PC 110 […] may cause the handheld electronic device 120 to request
`user authentication before retrieving the authentication code and communicating it to PC
`110 (or authorization).
`>QYR\W g/,. I[ c G((,1H&
`
`DPM TV[Q]I[QVU NVY TVLQN‘QUO CKPQNNMY g(.+ [V QUKVYWVYI[M >QYR\W g/,.gZ [MIKPQUO VN I\[PMU[QKI[QVU
`IN[MY KVTT\UQKI[QVU PIZ JMMU QUQ[QI[ML ^V\SL JM [V YML\KM [PM LMSI‘ QU \USVKRQUO KVTW\[MY Z‘Z[MT
`))(& DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM
`IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM
`YMZ\S[Z&
`
`4S[MYUI[Q]MS‘$ LM SI ;\MYOI g-+, [MIKPMZ [PQZ KVULQ[QVU& 7M SI ;\MYOI g-+, [MIKPMZ [PI[ [PM \ZMY
`T\Z[ MU[MY I\[PMU[QKI[QVU QUNVYTI[QVU [V \USVKR MSMK[YVUQK ZMK\YQ[‘ LM]QKM )(2
`
`To improve the authentication process, the user may need to authenticate himself to security
`device 10 in order for device 10 to provide system authentication protocol information 1165
`to security server 168, which in turn authenticates the user 1380. The user must initially
`
`)0
`
`