throbber
Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 1 of 9 PageID #: 11503
`Case 5:19-cv-00036—RWS Document 343-12 Filed 06/03/20 Page 1 of 9 PageID #: 11503
`
`EXHIBIT 11
`
`EXHIBIT 11
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 2 of 9 PageID #: 11504
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`.<@3;:6:?A =8 2%1% 03?7<? /=% ’&$(’($*-+
`4A
`2%1% 03?7<? /=% +$-,’$&+) ?= 159:887> "B159:887> D&+)C#
`
`DPM M_KMYW[Z KQ[ML PMYMQU IYM M_MTWSIY‘& 9VY IU‘ KSIQT SQTQ[I[QVU$ 7MNMULIU[ TI‘ YMS‘ VU M_KMYW[Z KQ[ML NVY IU‘ V[PMY SQTQ[I[QVU IUL’VY
`ILLQ[QVUIS M_KMYW[Z UV[ ZM[ NVY[P N\SS‘ PMYMQU [V [PM M_[MU[ UMKMZZIY‘ [V WYV]QLM I TVYM KVTWYMPMUZQ]M M_WSIUI[QVU NVY I YMNMYMUKMgZ
`LQZKSVZ\YM VN I SQTQ[I[QVU& FPMYM IU M_KMYW[ YMNMYZ [V VY LQZK\ZZMZ I NQO\YM VY NQO\YM Q[MTZ$ [PI[ NQO\YM IUL IU‘ ILLQ[QVUIS LMZKYQW[QVUZ
`VN [PI[ NQO\YM ZPV\SL JM \ULMYZ[VVL [V JM QUKVYWVYI[ML J‘ YMNMYMUKM IZ QN ZM[ NVY[P N\SS‘ [PMYMQU&
`
`8_KMW[ ^PMYM ZWMKQNQKISS‘ UV[ML V[PMY^QZM$ [PQZ KPIY[ IWWSQMZ [PM IWWIYMU[ KVUZ[Y\K[QVUZ VN KSIQT [MYTZ IZ \ZML J‘ BSIQU[QNN QU Q[Z
`QUNYQUOMTMU[ KVU[MU[QVUZ3 Z\KP \ZM$ PV^M]MY$ LVMZ UV[ QTWS‘ [PI[ 7MNMULIU[ ILVW[Z VY IOYMMZ ^Q[P BSIQU[QNNgZ KVUZ[Y\K[QVUZ QU IU‘ ^I‘&
`
`E&C& BI[MU[ AV& )($*)*$-0. "d[PM g-0. BI[MU[e# KSIQTZ WYQVYQ[‘ [V =IWIUMZM 4WWSQKI[QVU AV& *()*%))/)(-$ NQSML @I‘ *+$ *()*& 9VY
`W\YWVZMZ VN [PMZM QU]ISQLQ[‘ KVU[MU[QVUZ$ 7MNMULIU[ IWWSQMZ [PM @I‘ *+$ *()*$ WYQVYQ[‘ LI[M NVY [PM g-0. BI[MU[& ;V^M]MY$ 7MNMULIU[
`YMZMY]MZ [PM YQOP[ [V KVU[MZ[ BSIQU[QNNgZ YMSQIUKM VU [PM @I‘ *+$ *()*$ WYQVYQ[‘ LI[M$ ZPV\SL [PM WYQVYQ[‘ LI[M JMKVTM IU QZZ\M QU [PQZ
`WYVKMMLQUO&
`
`CKPQNNMY g(.+ ^IZ NQSML VU =\UM +($ *((( IUL QZZ\ML VU @IYKP **$ *((-& 4Z Z\KP$ CKPQNNMY g(.+ X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM
`f-0. WI[MU[ \ULMY +- E&C&6& b )(*"I#$ )(*"J#$ IUL )(*"M#& 4S[MYUI[Q]MS‘$ ZPV\SL [PM KSIQTZ VN [PM f-0. WI[MU[ JM NV\UL [V UV[ JM MU[Q[SML
`[V WYQVYQ[‘ [V [PM NVYMQOU NQSQUO LI[M$ CKPQNNMY g(.+ X\ISQNQMZ IZ WYQVY IY[ \ULMY bb )(*"I#")# IUL )(*"I#"*# "WVZ[%4<4#& EZQUO BSIQU[QNNgZ
`QU[MYWYM[I[QVU VN [PM KSIQTZ$ CKPQNNMY g(.+ IU[QKQWI[MZ KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(*"I#$ "J# IUL "M#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ AV& /$1,)$-+, [V LM SI ;\MYOI "dLM SI ;\MYOI g-+,e# YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%
`/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#& 7M SI ;\MYOI g-+, ^IZ NQSML VU =\UM *.$ *((, IUL ^IZ W\JSQZPML VU 4WYQS *0$
`*((-& 4Z Z\KP$ LM SI ;\MYOI g-+, X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM f-0. WI[MU[ \ULMY +- E&C&6& bb )(*"I#$ )(*"J#$ IUL )(*"M#&
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ 4WWSQKI[QVU B\JSQKI[QVU AV& *((.’((,)/,. [V >QYR\W$ M[ IS& "d>QYR\W g/,.e# YMULMYZ
`VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL ).%)0 \ULMY +- E&C&6& b )(+"I#& >QYR\W g/,. ^IZ NQSML VU 4\O\Z[ )/$ *((, IUL W\JSQZPML VU
`9MJ *+$ *((.& 4Z Z\KP$ >QYR\W g/,. X\ISQNQMZ IZ WYQVY IY[ ^Q[P YMOIYL [V [PM f-0. WI[MU[ \ULMY +- E&C&6& bb )(*"I#$ )(*"J#$ IUL )(*"M#&
`
`)
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 3 of 9 PageID #: 11505
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`4S[MYUI[Q]MS‘$ CKPQNNMY g(.+ QU ]QM^ VN E&C& BI[MU[ AV& 0$),1$(01 [V ?QU "d?QU g(01e# YMULMYZ VJ]QV\Z KSIQTZ )%*$ .%/$ 1%)($ )+%),$ IUL
`).%)0 \ULMY +- E&C&6& b )(+"I#& ?QU g(01 ^IZ NQSML VU AV]MTJMY *)$ *((0 IUL QZZ\ML VU 4WYQS +$ *()*& 4Z Z\KP$ ?QU g(01 X\ISQNQMZ IZ
`WYQVY IY[ ^Q[P YMOIYL [V [PM g-0. BI[MU[ \ULMY +- E&C&6& b )(*"I# IUL )(*"M#&
`
`2%1% 03?7<? /=% ’&$(’($*-+
`Claim 1
`G)"WYM#H4 TVJQSM [MYTQUIS
`KVUNQO\YML [V Z^Q[KP JM[^MMU
`IU \USVKRML Z[I[M IUL I SVKRML
`Z[I[M QU ^PQKP I WYMLM[MYTQUML
`VWMYI[QVU QZ SQTQ[ML$
`KVTWYQZQUO2
`
`G)"I#H I [YIUZKMQ]MY ^PQKP
`WMYNVYTZ ZPVY[%YIUOM ^QYMSMZZ
`KVTT\UQKI[QVUZ3
`
`159:887> D&+)
`
`DV [PM M_[MU[ [PM WYMITJSM QZ SQTQ[QUO$ CKPQNNMY g(.+ [MIKPMZ dTVJQSM WPVUM )((e "TVJQSM [MYTQUIS#2
`
`Mobile phone 100 of FIG. 1 may be any mobile phone capable of long-range communication.
`For example, for one embodiment, mobile phone 100 is a cellular phone, in which case long-
`range transceiver circuit 102 may communicate with a cell base.
`CKPQNNMY g(.+ I[ *2+(%+,&
`
`CKPQNNMY g(.+gZ TVJQSM WPVUM )(( QZ KVUNQO\YML [V JM \USVKRML VY SVKRML "QU ^PQKP KIZM [PM IJQSQ[‘
`VN [PM WPVUM [V ZMUL IUL YMKMQ]M KISSZ QZ SQTQ[ML#2
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`CKPQNNMY g(.+ I[ +2*+%+/&
`CKPQNNMY g(.+ [MIKPMZ [PI[ TVJQSM WPVUM )(( QUKS\LMZ dZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ )(+&e See
`9<:& )$ infra. DPQZ ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ QZ KPIYIK[MYQaML IZ MZ[IJSQZPQUO I ZPVY[%YIUOM$
`^QYMSMZZ KVTT\UQKI[QVU SQUR2
`
`Consequently, a short-range, wireless communication link, 121, is established between
`computer system 110 and mobile phone 100, according to step 205. In accordance with one
`
`*
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 4 of 9 PageID #: 11506
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`>QYR\W g/,. I[ c G((,-H3 see also 9<:& +2
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V QUKVYWVYI[M >QYR\W g/,.gZ TQKYVWYVKMZZVY ^V\SL JM [V
`WYV]QLM I KVTWVUMU[ [V WMYNVYT [PM ]IYQV\Z N\UK[QVUZ LMZKYQJML J‘ CKPQNNMY g(.+gZ TVJQSM LM]QKM
`)((& C\JZ[Q[\[QUO ^PI[M]MY WMYNVYTZ [PM N\UK[QVUZ QU CKPQNNMY
`g(.+ ^Q[P >QYR\W g/,.gZ
`TQKYVWYVKMZZVY ^V\SL JM I ZQTWSM Z\JZ[Q[\[QVU VN VUM RUV^U MSMTMU[ NVY IUV[PMY [V VJ[IQU
`WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[$ ^PMU [PM KVULQ[QVUZ IYM TM[ "IZ LMZKYQJML JMSV^3 see MSMTMU[Z G)"M#H$
`G)"N#H$ IUL G)"O#H#$ TVJQSM WPVUM )(( [YIUZTQ[Z [PM IKKMZZ KVLM [V KVTW\[MY Z‘Z[MT ))(2
`
`G)"L#H ^PMYMQU$ ^PMU
`KVULQ[QVUZ IYM TM[$ [PM
`KVU[YVSSMY KVU[YVSZ [PM TVJQSM
`
`1
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 5 of 9 PageID #: 11507
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`[MYTQUIS [V [YIUZTQ[
`QUNVYTI[QVU [V [PM IUV[PMY
`TVJQSM [MYTQUIS NVY Z^Q[KPQUO
`I Z[I[M VN [PM IUV[PMY TVJQSM
`[MYTQUIS NYVT I SVKRML Z[I[M [V
`IU \USVKRML Z[I[M$ ^PMYMQU [PM
`KVULQ[QVUZ QUKS\LM2
`
`At step 210 of FIG. 2, an access code is transmitted from short-range transceiver circuit 103
`of mobile phone 100 to short-range transceiver circuit 111 of computer system 110 via link
`121 of FIG. 1.
`CKPQNNMY g(.+ I[ ,2)(%)+3 see also 9<:& *2
`
`DPQZ IKKMZZ KVLM KI\ZMZ KVTW\[MY Z‘Z[MT ))( [V OYIU[ [PM \ZMY IKKMZZ "Z^Q[KP Z[I[M NYVT I SVKRML
`Z[I[M [V IU \USVKRML Z[I[M#2
`Once the access code has been verified by computer system 110 of FIG. 1, the computer
`system grants the user access to the system at step 215 of FIG. 2. If the access code is not
`
`)(
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 6 of 9 PageID #: 11508
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`G)"M#H NQYZ[$ [PM TVJQSM [MYTQUIS
`QZ QU I SVKRML Z[I[M$ [PM IUV[PMY
`TVJQSM [MYTQUIS QZ QU I SVKRML
`Z[I[M$ IUL [PM IUV[PMY TVJQSM
`[MYTQUIS QZ ^Q[PQU
`KVTT\UQKI[QVU YIUOM VN [PM
`ZPVY[%YIUOM ^QYMSMZZ
`KVTT\UQKI[QVUZ VN [PM
`[YIUZKMQ]MY ^PQSM QU [PM SVKRML
`Z[I[M3
`
`verified, i.e. no access code is received or the wrong access code is received, access to the
`computer system remains limited.
`Id. I[ ,2-+%-03 see also 9<:& * I[ Z[MW *)- supra.
`CKPQNNMY g(.+ [MIKPMZ [PI[$ ^PMU [PM I\[PMU[QKI[QVU WYVKMZZ Z[IY[Z$ [PM TVJQSM WPVUM )(( QZ QU I
`SVKRML Z[I[M2
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`CKPQNNMY g(.+ I[ +2*+%+/&
`
`CKPQNNMY g(.+ N\Y[PMY LQZKSVZMZ [PI[$ ^PMU [PM I\[PMU[QKI[QVU WYVKMZZ Z[IY[Z$ KVTW\[MY Z‘Z[MT ))( QZ
`ISZV QU I SVKRML Z[I[M2
`
`In accordance with an embodiment of the present invention, the subscriber identity module
`(SIM) in a user's mobile phone is used to gain access to a locked computer system. Initially,
`access to the computer system is limited.
`Id. I[ .)%.,&
`
`9QUISS‘$ [PM I\[PMU[QKI[QVU WYVKMZZ JMOQUZ ^PMU ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ )(+ VN TVJQSM WPVUM
`)(( MU[MYZ KVTT\UQKI[QVUZ YIUOM VN ZPVY[%YIUOM [YIUZKMQ]MY KQYK\Q[ ))) VN KVTW\[MY Z‘Z[MT ))(2
`
`When a user with a mobile phone comes into short-range, wireless communication range of
`the computer system, a short-range, wireless communication link is automatically established
`(i.e. established without user intervention).
`Id. I[ )2.-%*2)3 see also 9<:& *$ I[ Z[MW *((2
`
`))
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 7 of 9 PageID #: 11509
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ LM SI ;\MYOI g-+,gZ KVULQ[QVUZ ^V\SL JM ZV [PI[
`[PM \ZMY KIU \USVKR [PMQY WPVUM WYQVY [V MU[MYQUO KVTT\UQKI[QVUZ YIUOM VN [PM KVTW\[MY Z‘Z[MT&
`DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU
`VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`
`4S[MYUI[Q]MS‘ >QYR\W g/,. [MIKPMZ [PQZ ZM[ VN KVULQ[QVUZ& >QYR\W g/,. [MIKPMZ [PI[ MU[MYQUO [PM B<A
`QU[V PIULPMSL MSMK[YVUQK LM]QKM )*( ZMY]MZ [V \USVKR JV[P Q[ IUL B6 ))( "[P\Z$ I[ [PM JMOQUUQUO VN
`[PM I\[PMU[QKI[QVU WYVKMZZ$ JV[P LM]QKMZ IYM UMKMZZIYQS‘ QU [PM SVKRML Z[I[M#2
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120.
`>QYR\W g/,. I[ c G((-+H&
`
`>QYR\W g/,. N\Y[PMY [MIKPMZ [PI[ [PM WYVKMZZ TI‘ JM QUQ[QI[ML ^PMU PIULPMSL MSMK[YVUQK LM]QKM )*(
`MU[MYZ ZPVY[%YIUOM ^QYMSMZZ KVTT\UQKI[QVUZ YIUOM VN B6 ))(2
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Id. I[ c G((.0H&
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ >QYR\W g/,.gZ KVULQ[QVUZ ^V\SL JM ZV [PI[ [PM
`\ZMY KIU \USVKR [PMQY WPVUM WYQVY [V MU[MYQUO KVTT\UQKI[QVUZ YIUOM VN [PM KVTW\[MY Z‘Z[MT& DPQZ
`^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I
`RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[$ \WVU MU[MYQUO ZPVY[%YIUOM ^QYMSMZZ KVTT\UQKI[QVUZ YIUOM$ [PM ^QYMSMZZ
`KVTT\UQKI[QVU SQUR )*) QZ dI\[VTI[QKISS‘ MZ[IJSQZPMLe2
`
`),
`
`G)"N#H ZMKVUL$ IN[MY [PM TVJQSM
`[MYTQUIS QZ QU [PM SVKRML Z[I[M$
`[PM IUV[PMY TVJQSM [MYTQUIS QZ
`QU [PM SVKRML Z[I[M$ IUL [PM
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 8 of 9 PageID #: 11510
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM
`YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`
`4S[MYUI[Q]MS‘$ >QYR\W g/,. [MIKPMZ [PQZ KVULQ[QVU& >QYR\W g/,. [MIKPMZ [PI[ ^QYMSMZZ KVTT\UQKI[QVU
`LM]QKM )*( I\[VTI[QKISS‘ KVTT\UQKI[MZ V]MY KVTT\UQKI[QVU SQUR ))- ^Q[P B6 )*( ^PMU JV[P
`LM]QKMZ IYM SVKRML ^PMU B6 )*( LM[MK[Z [PM WYMZMUKM VN ^QYMSMZZ KVTT\UQKI[QVU LM]QKM )*( IUL
`QUQ[QI[MZ [PM I\[PMU[QKI[QVU WYVKMZZ J‘ ZMMRQUO [PM I\[PMU[QKI[QVU KVLM2
`When the user wishes to use PC 110, he or she may perform an activation action, such as
`typing on the keyboard or moving the mouse, whereupon the user may be requested to provide
`a user identification code (either to the PC 110 or the handheld electronic device 120) to
`unlock the PC desktop and enable use thereof […] PC 110 is preferably configured to
`automatically seek the authentication code from handheld electronic device 120 over
`communication link 115 in response to activation.
`>QYR\W g/,. I[ cc G((,0H%G((,1H&
`
`DPM TV[Q]I[QVU [V TVLQN‘ CKPQNNMY g(.+ [V MTWSV‘ >QYR\W g/,.gZ KVULQ[QVU ^V\SL JM [V YML\KM [PM
`LMSI‘ QU \USVKRQUO KVTW\[MY Z‘Z[MT ))(& DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ
`Z‘Z[MT IUL ^V\SL JM I ZQTWSM IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY
`QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM YMZ\S[Z&
`CKPQNNMY g(.+ [MIKPMZ [PI[ [PM \ZMY TI‘ JM YMX\QYML [V I\[PMU[QKI[M JMNVYM [PM IKKMZZ KVLM QZ
`[YIUZTQ[[ML NYVT TVJQSM LM]QKM )(( [V KVTW\[MY Z‘Z[MT ))(2
`
`Note that for one embodiment, the user may authenticate himself or herself to the mobile
`phone by, for example, entering a password into the mobile phone. In this manner, the SIM
`is used not only to identify the user during cellular phone calls (or other long-range, wireless
`communication) but also to authenticate the user to the computer system. Note that for one
`embodiment, the user may authenticate himself or herself to the mobile phone by, for example,
`entering a password into the mobile phone.
`CKPQNNMY g(.+ I[ *2),%)1&
`
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`
`)/
`
`G)"O#H [PQYL$ IN[MY [PM
`WMYNVYTQUO$ YMKMQ]QUO$ J‘ [PM
`KVU[YVSSMY$ [PM I\[PMU[QKI[QVU
`QUW\[ NVY Z^Q[KPQUO [PM TVJQSM
`[MYTQUIS NYVT [PM SVKRML Z[I[M
`[V [PM \USVKRML Z[I[M&
`
`

`

`Case 5:19-cv-00036-RWS Document 343-12 Filed 06/03/20 Page 9 of 9 PageID #: 11511
`
`7MNMULIU[gZ <U]ISQLQ[‘ 6VU[MU[QVUZ
`8_PQJQ[ ;)
`
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`Id. I[ +2*+%+/& DP\Z$ QU YMZWVUZM [V [PM YMX\MZ[ NVY [PM IKKMZZ KVLM NYVT KVTW\[MY Z‘Z[MT ))($
`TVJQSM WPVUM )(( TI‘ YMX\QYM [PI[ [PM \ZMY I\[PMU[QKI[M "[P\Z \USVKRQUO TVJQSM WPVUM )((# WYQVY
`[V [YIUZTQ[[QUO [PM IKKMZZ KVLM&
`
`4S[MYUI[Q]MS‘$ >QYR\W g/,. [MIKPMZ [PQZ KVULQ[QVU& >QYR\W g/,. [MIKPMZ [PI[$ YMZWVUZQ]M [V [PM
`YMX\MZ[ NVY I\[PMU[QKI[QVU J‘ B6 )*($ TVJQSM LM]QKM ))( YMX\MZ[Z IUL YMKMQ]MZ IU I\[PMU[QKI[QVU
`KVLM NYVT [PM \ZMY2
`
`Depending on the configuration of the handheld electronic device 120, receipt of a
`communication from PC 110 […] may cause the handheld electronic device 120 to request
`user authentication before retrieving the authentication code and communicating it to PC
`110 (or authorization).
`>QYR\W g/,. I[ c G((,1H&
`
`DPM TV[Q]I[QVU NVY TVLQN‘QUO CKPQNNMY g(.+ [V QUKVYWVYI[M >QYR\W g/,.gZ [MIKPQUO VN I\[PMU[QKI[QVU
`IN[MY KVTT\UQKI[QVU PIZ JMMU QUQ[QI[ML ^V\SL JM [V YML\KM [PM LMSI‘ QU \USVKRQUO KVTW\[MY Z‘Z[MT
`))(& DPQZ ^V\SL QUKYMIZM [PM KVU]MUQMUKM VN CKPQNNMY g(.+gZ Z‘Z[MT IUL ^V\SL JM I ZQTWSM
`IWWSQKI[QVU VN I RUV^U [MKPUQX\M [V I RUV^U LM]QKM YMIL‘ NVY QTWYV]MTMU[ [V ‘QMSL WYMLQK[IJSM
`YMZ\S[Z&
`
`4S[MYUI[Q]MS‘$ LM SI ;\MYOI g-+, [MIKPMZ [PQZ KVULQ[QVU& 7M SI ;\MYOI g-+, [MIKPMZ [PI[ [PM \ZMY
`T\Z[ MU[MY I\[PMU[QKI[QVU QUNVYTI[QVU [V \USVKR MSMK[YVUQK ZMK\YQ[‘ LM]QKM )(2
`
`To improve the authentication process, the user may need to authenticate himself to security
`device 10 in order for device 10 to provide system authentication protocol information 1165
`to security server 168, which in turn authenticates the user 1380. The user must initially
`
`)0
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket