throbber
EXHIBIT 2020
`
`EXHIBIT 2020
`
`Dynamics Inc. - Ex. 2020
`Page 1
`
`Dynamics Inc. - Ex. 2020
`Page 1
`
`

`

`(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2008/0126260 A1
`(43) Pub. Date:
`May 29, 2008
`Cox et al.
`
`US 2008O126260A1
`
`(54)
`
`(76)
`
`(21)
`(22)
`
`(63)
`
`(60)
`
`PONT OF SALE TRANSACTION DEVICE
`WITH MAGNETC STRIPE EMULATOR AND
`BOMETRICAUTHENTCATION
`
`Inventors:
`
`Mark A. Cox, West Chester, PA
`(US); John K. Bona, York, PA (US)
`Correspondence Address:
`FOX ROTHSCHILD, LLP
`625 LIBERTY AVENUE
`PITTSBURGH, PA 15222-3155
`Appl. No.:
`11/943,575
`
`Filed:
`
`Nov. 20, 2007
`
`Related U.S. Application Data
`Continuation-in-part of application No. 1 1/456,906,
`filed on Jul. 12, 2006.
`Provisional application No. 60/866,909, filed on Nov.
`22, 2006, provisional application No. 60/866,922,
`
`filed on Nov. 22, 2006, provisional application No.
`60/942,729, filed on Jun. 8, 2007.
`
`Publication Classification
`
`(51) Int. Cl.
`(2006.01)
`G06K 9/06
`(52) U.S. Cl. .......................................................... 705/67
`
`ABSTRACT
`(57)
`A handheld unit which is capable of emulating a plurality of
`Smartcards or magnetic stripe cards. The unit has the capabil
`ity of storing a plurality of data sets representing a plurality of
`accounts. The unit is equipped with an RF interface that can
`emulate a Smartcard interface that is capable of communicat
`ing with smartcard readers at POS or ATM terminals, or
`anywhere else a Smartcard may be utilized. The unit is also
`equipped with a programmable magnetic strip Such that it can
`be used anywhere a magnetic stripe card can be Swiped or
`inserted. The unit is equipped with a biometric sensor to
`positively verify an authenticated user.
`
`
`
`DISPLAY
`Ol
`
`ISSUERLOGO
`ACCOUNT INFO
`
`
`
`N
`
`
`
`LEFT/RIGHT
`UP/DOWN
`ENTER KEYS
`
`NUMERC
`KEYPAD
`lO3
`
`
`
`
`
`
`
`
`
`BEVELED
`AREA
`lO4
`
`
`
`BIOMETRIC
`INPUT
`O5
`
`Dynamics Inc. - Ex. 2020
`Page 2
`
`

`

`Patent Application Publication
`
`May 29, 2008 Sheet 1 of 18
`
`US 2008/O126260 A1
`
`
`
`
`
`
`
`d|HO OHN
`
`?OI
`
`
`
`N
`
`Dynamics Inc. - Ex. 2020
`Page 3
`
`

`

`Patent Application Publication
`
`May 29, 2008 Sheet 2 of 18
`
`US 2008/O126260 A1
`
`
`
`Dynamics Inc. - Ex. 2020
`Page 4
`
`

`

`Patent Application Publication May 29, 2008 Sheet 3 of 18
`
`US 2008/O126260 A1
`
`
`
`56
`
`155
`
`153
`
`154
`
`15
`
`152
`
`FIG. 3
`
`Dynamics Inc. - Ex. 2020
`Page 5
`
`

`

`Patent Application Publication May 29, 2008 Sheet 4 of 18
`
`US 2008/O126260 A1
`
`l62
`
`153
`
`150
`
`FIG. 4
`
`Dynamics Inc. - Ex. 2020
`Page 6
`
`

`

`Patent Application Publication May 29, 2008 Sheet 5 of 18
`
`US 2008/O126260 A1
`
`74
`
`75
`
`
`
`76
`
`150
`
`17
`
`Dynamics Inc. - Ex. 2020
`Page 7
`
`

`

`Patent Application Publication May 29, 2008 Sheet 6 of 18
`
`US 2008/O126260 A1
`
`
`
`704
`
`AR\ 4PA
`
`4PN
`ARA
`
`705
`
`702
`
`FIG. 6
`
`Dynamics Inc. - Ex. 2020
`Page 8
`
`

`

`Patent Application Publication May 29, 2008 Sheet 7 of 18
`
`US 2008/O126260 A1
`
`
`
`402
`ROM/RAM
`MEMORY
`
`403
`FLASH
`MEMORY
`
`404
`SMART CARD
`CONTROL
`
`405
`CONTACT
`SMART CARD
`READ/WRITE
`
`4Ol
`SYSTEM BOARD
`
`409
`DISPLAY
`CONTROL
`
`40
`o
`BIOMETRIC
`SENSOR
`CONTROL
`
`4O6
`POWER
`MANAGEMENT
`
`4O7
`MAGNETIC
`STRIPE
`CONTROL
`
`4ll
`PROGRAMMABLE
`SOFT KEY
`CONTROL
`
`FIG. 7
`
`Dynamics Inc. - Ex. 2020
`Page 9
`
`

`

`Patent Application Publication
`
`May 29
`
`9
`
`2008
`
`Sheet 8 of 18
`
`US 2008/O126260 A1
`
`
`
`109
`
`HOIABC]
`
`Dynamics Inc. - Ex. 2020
`Page 10
`
`

`

`Patent Application Publication May 29, 2008 Sheet 9 of 18
`
`US 2008/O126260 A1
`
`900
`
`INTIALIZE
`DEVICE
`
`DELETE
`ALL
`RECORDS
`
`DEFINE NUMBER OF
`BIOMETRIC MATCHES
`FOR AUTHENTICATION
`X = (1 OR 2)
`
`COUNTER - O
`
`
`
`
`
`
`
`
`
`BIOMETRIC
`CAPTURE ENCODE
`STORE PROCESS
`
`ADD TO COUNTER
`
`96
`
`ENROLL
`ANOTHER
`USER
`p
`
`END
`ENROLLMENT
`
`FIG. 9
`
`Dynamics Inc. - Ex. 2020
`Page 11
`
`

`

`Patent Application Publication May 29, 2008 Sheet 10 of 18
`
`US 2008/O126260 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`OOO
`
`? OO2
`
`OO3
`?
`
`BIOMETRIC
`SENSOR
`ORSCROLL KEY
`IS TOUCHED
`DISPLAY
`ACTIVATION
`ERROR
`WESSAGE
`
`BIOMETRIC
`
`CAPTURE
`ENCODE MATCH
`PROCESS
`
`DISPLAY
`NVALIDENTRY
`MESSAGE
`
`NO
`
`POSITIVE
`MATCH?
`
`UPDATE
`COUNTER
`
`COUNTER
`MATCH
`SETTINGS
`
`REACHED
`RETRY LIMIT?
`
`
`
`CLEAR
`ACTIVATION
`ERROR
`MESSAGES
`
`RETURN
`TRUE
`
`O8
`
`END
`ENROLLMENT
`
`O2
`
`FIG. O
`
`Dynamics Inc. - Ex. 2020
`Page 12
`
`

`

`Patent Application Publication
`
`May 29
`
`9
`
`2008 Sheet 11 Of 18
`
`US 2008/O126260 A1
`
`
`
`
`
`Dynamics Inc. - Ex. 2020
`Page 13
`
`

`

`Patent Application Publication May 29, 2008 Sheet 12 of 18
`
`US 2008/O126260 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEVICE
`ACTIVATION
`
`RECORD
`
`USE
`
`1212
`
`KEY
`PRESSED
`
`SELECT
`NEXT OR PREVIOUS
`
`RECORD
`
`FIG. 2A
`
`1208
`
`DEVICE
`
`Dynamics Inc. - Ex. 2020
`Page 14
`
`

`

`Patent Application Publication May 29, 2008 Sheet 13 of 18
`
`US 2008/O126260 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`l2OO
`
`12O2
`
`l2O4.
`
`DEVICE
`ACTIVATION
`
`1DISPLAYY
`ACTIVE
`ACCOUNT
`N RECORD
`
`ENABLE ACTIVE
`ACCOUNT FOR
`USE
`
`DEACTIVATE
`DEVICE
`
`l2O8
`
`12
`
`
`
`CONTROL
`KEY
`PRESSED
`
`SOFT
`KEY
`PRESSED
`
`
`
`YES "R"
`FIG. 13
`
`SELECT
`NEXT OR PREVIOUS
`ACCOUNT
`RECORD
`
`1213
`
`FIG. 2B
`
`Dynamics Inc. - Ex. 2020
`Page 15
`
`

`

`Patent Application Publication
`
`May 29, 2008 Sheet 14 of 18
`
`US 2008/O126260 A1
`
`
`
`dO|
`
`TE/NET
`
`[]NEW
`
`NO||OETES
`
`ÕÕ?I
`
`Dynamics Inc. - Ex. 2020
`Page 16
`
`

`

`Patent Application Publication
`
`May 29, 2008 Sheet 15 of 18
`
`US 2008/O126260 A1
`
`
`
`EN||HEO
`
`MEN
`
`INDOOOVÝ
`
`CÈHOOHèl
`
`GO?I
`
`Dynamics Inc. - Ex. 2020
`Page 17
`
`

`

`Patent Application Publication May 29, 2008 Sheet 16 of 18
`
`US 2008/O126260 A1
`
`
`
`DEVICE
`100
`
`DEVICE
`OO
`
`POS WITH
`MAGNETIC STRIPE
`READER OR
`CONTACTLESS
`SMARTCARD
`
`NFC
`ENABLED POS
`DEVICE
`
`APPLICATION
`TRANSACTION
`
`APPLICATION
`TRANSACTION
`
`FIG. 15
`
`FIG. 6
`
`Dynamics Inc. - Ex. 2020
`Page 18
`
`

`

`Patent Application Publication
`
`May 29, 2008 Sheet 17 of 18
`
`US 2008/O126260 A1
`
`CONSUMER PROVIDES
`ACCOUNT AND
`ONE-TIME PASSWORD
`TO MERCHANT
`
`MERCHANT INCLUDES
`ONE-TIME PASSWORD
`DURING PAYMENT
`AUTHORIZATION
`
`PAYMENT
`PROCESSOR OR
`GATEWAY SERVICE
`
`16O2
`
`1603
`
`604
`
`FINANCIAL INSTITUTION
`CARD ISSUERVERIFIES
`ONE-TIME PASSWORD
`AND AUTHORIZES
`THE CHARGE
`
`PAYMENT PROCESSING
`SERVICE VERIFIES
`ONE-TIME PASSWORD
`AND AUTHORIZES
`THE CHARGE
`
`1606
`
`1605
`
`
`
`
`
`ACGURING
`BANK
`
`PAYMENT CARD
`ASSOCATION
`
`FIG. 17
`
`Dynamics Inc. - Ex. 2020
`Page 19
`
`

`

`Patent Application Publication May 29, 2008 Sheet 18 of 18
`
`US 2008/O126260 A1
`
`
`
`804
`
`806
`
`808
`
`8O
`
`812
`
`ACCOUNT
`PROPERTIES
`
`DISPLAY
`ICON
`
`TRACKDATA
`
`TRACK 2 DATA
`
`ar
`
`SMART CARD FILE SYSTEM
`
`8OO
`
`FIG. 8
`
`Dynamics Inc. - Ex. 2020
`Page 20
`
`

`

`US 2008/O126260 A1
`
`May 29, 2008
`
`PONT OF SALE TRANSACTION DEVICE
`WITH MAGNETIC STRIPE EMULATOR AND
`BIOMETRICAUTHENTICATION
`
`RELATED APPLICATIONS
`0001. This application is a continuation-in-part of
`co-pending U.S. application Ser. No. 1 1/456,906, filed Jul.
`12, 2006, and claims the benefit of U.S. provisional applica
`tions 60/866,909, filed Nov. 22, 2006, entitled “Biometrically
`Secured Point Of Sale Transaction Device, 60,866,922, filed
`Nov. 22, 2006, entitled “Affinity Card With Biometric Secu
`rity”, and 60/942,729, filed Jun. 8, 2007, entitled “Smartcard
`and Magnetic Stripe Emulator Having Biometric Authentica
`tion With Enhanced Features.
`
`BACKGROUND OF THE INVENTION
`0002 Plastic credit card issuers lose billions of dollars
`worldwide each year to credit card fraud. These losses are
`often offset to Some degree by passing off to consumers and
`merchants in the form of higher transaction fees and interest
`rates. However, the losses to the credit card issuers are still
`Substantial.
`0003 Credit card information can be obtained for fraudu
`lent use in a number of different ways. Recent cases have
`shown employees or hackers obtaining unauthorized access
`to merchant or card processor databases, compromising mil
`lions of credit and debit card accounts. Frequently, the credit
`cards themselves are lost or stolen, making it possible for the
`thief to make unauthorized charges on the account until the
`account can be cancelled. Account information can also be
`illegally obtained through identity theft, whereinathief poses
`as an individual, or by what is know as "skimming or "clon
`ing', which are high-tech methods used by thieves to capture
`personal information or account information from the mag
`netic stripe on a credit card.
`0004. Because account information is static, once it has
`been compromised, it can be used to make fraudulent trans
`actions at multiple merchant sites, or by online transactions
`and other "card not present transactions, such as mail order
`or phone order. It would therefore be desirable to have a way
`of making the information required to complete a credit card
`transaction dynamic, that is, changing after every transaction,
`thereby greatly limiting the opportunities for fraudulent
`transactions to occur. The “chip and pin' initiative in the
`United Kingdom is a step in this direction. This program
`utilizes a Smartcard type of credit card and requires the user to
`enter a PIN number when making a transaction in lieu of a
`signature. The PIN number is matched with the number
`stored on the chip inside the Smartcard. Note that this arrange
`ment, while a step in the right direction, does not solve fraud
`in "card not present transactions.
`0005 Radio frequency identification devices (RFID) are
`well known in the art. A typical RFID device includes an
`antenna and a chip that is activated by RF energy emitted by
`a reading device. The antenna on the reading device induces
`a signal into an RFID chip which is in close proximity to the
`reading device, causing the RFID device it to transmit a small
`amount of data back to the reading device. An RFID tag can
`be thought of as similar in usefulness to a bar code.
`0006 RFID has found its way into many applications,
`including inventory control and tracking, as Substitutes for
`traditional magnetic strip cards for electronic payments at
`point of sale (POS) locations, devices for automatically pay
`
`ing tolls on highways, passports and personal identification
`cards. RFID devices have even been used as embedded
`devices within living beings Such as domesticated pets and
`children.
`0007. A “smartcard is a card that is embedded with either
`a microprocessor and a memory chip or a memory chip with
`non-programmable logic. The microprocessor can add,
`delete, and otherwise manipulate information on the card,
`while a memory-chip card can only undertake a pre-defined
`operation. Although Smartcards utilize radio frequency (RF)
`to transmit and receive data, they are unlike traditional RFID
`tags or magnetic strip cards in that all necessary functions and
`information necessary for the completion of a transaction can
`be carried on the card. Therefore, they do not require access to
`remote databases at the time of the transaction. Smartcards
`are governed by many standards, in particular, ISO/IEC stan
`dards 7816 and 14443. The previously mentioned “chip and
`pin' program in the UK utilizes this type of card.
`0008. The Smartcard is quickly replacing the traditional
`method of 'Swiping credit cards with data contained on mag
`netic stripes. At a point-of-sale (POS), the smart card is acti
`vated by a contactless reader attached to an external device
`required for the application, for example, an RFID reader
`attached to a cash register. The readers RF antenna induces a
`signal into the cards RF antenna, thereby activating the Smart
`card. The application can then communicate with the Smart
`card via the reader unit to transmit the cardholder's account
`databack to the point of sale application, utilizing a command
`set specified by the ISO 7816 standard.
`0009 While smart cards allow transactions to be per
`formed at a faster rate than traditional magnetic stripe cards,
`they only offer a small improvement in security to guard
`against account data theft than the conventional magnetic
`stripe credit cards they are replacing. A closer examination of
`this technology reveals several inadequacies that will allow
`fraudulent and illegal trends to emerge. First, owners making
`a purchase no longer enter PIN numbers or sign a printed copy
`of the credit card transaction. Therefore, if a smartcard is lost
`or stolen, it can be used to make unauthorized purchases.
`Also, there are new security threats that are technically pos
`sible against contactless Smart cards. A lost or stolen Smart
`card also contains all the required information thereon,
`including the account number, CCV and any other informa
`tion necessary to complete a transaction, that can be easily
`read and copied. Differential Power Analysis (DPA) and
`Simple Power Analysis (SPA) may be used to steal the secu
`rity keys for communication encryption and decryption. In
`addition, Smartcards are subject to certain types of attacks,
`known as "relay attacks, in which a Smartcard not in close
`proximity to a POS-based reader can be used by “relaying its
`information through another reader and Smartcard pair.
`0010. These deficiencies represent a dramatic financial
`threat to both the issuing institutions and the card owners.
`While credit card companies and insurance companies that
`underwrite fraud coverage usually absorb the losses associ
`ated with fraudulent activity, the long-term implications for
`victims and their credit ratings are very serious. Additionally,
`it is intuitive that any perceived security risk associated with
`Smartcard technology would represent an obstacle to wide
`spread market acceptance. Therefore, it would be advanta
`
`Dynamics Inc. - Ex. 2020
`Page 21
`
`

`

`US 2008/O126260 A1
`
`May 29, 2008
`
`geous to provide a means of securing the data stored within
`Smartcards from being covertly and illegally harvested.
`
`SUMMARY OF THE INVENTION
`
`0011. The present invention is a cost effective device
`capable of storing the information from multiple Smartcards
`and data from multiple conventional magnetic stripe cards for
`use either through a magnetic stripe emulator or as a virtual
`contactless Smartcard, and preventing both unauthorized use
`of the device and outright theft of the information on the
`device via a biometric recognition technology, Such as, for
`example, fingerprint verification or Voice recognition. In this
`capacity, the theft of account data via relay attack, as well as
`crimes associated with lost or stolen Smartcards, will be vir
`tually eliminated.
`0012. In the preferred embodiment, the present invention
`is comprised of two components, a Software application run
`ning on a personal computer and a handheld portable data
`storage and transmission device. Optionally, an associated
`base unit may also be provided.
`0013 The handheld device, in the preferred embodiment,
`is the size of a credit card, and conforms to the ISO 7813
`standard of 0.76 mm in thickness. It contains a display and a
`keypad, as well as several navigation buttons to navigate
`through the accounts and applications and to make appropri
`ate selections. Optionally, a portion of the device also con
`tains a programmable magnetic stripe. The device is equipped
`With a main processor capable of executing simple applica
`tions, as well as a Smartcard chip set and related antenna.
`0014. The device may also incorporate a near field com
`munications (NFC) capability which is compatible with the
`ISO 14443 standard. NFC is a peer-to-peer connection that
`allows the transfer of larger amounts of data than a simple
`query and reply smartcard. The NFC capability can therefore
`emulate a smartcard. The NFC capability may also be used for
`downloading various data to device, such as electronic
`receipts, coupons, advertising content, electronic tickets, etc.
`Additionally, the device is capable of communicating with
`NFC-enabled POS terminals, for purposes of transmitting
`account information, coupon information, and other types of
`information to the POS terminal, and can also receive infor
`mation, such as an electronic receipts, from the POS terminal.
`Additionally, the device will be able to communicate with
`other NFC-enabled devices, such as kiosks, where discount
`coupons may be available, and ticketing agents, where event
`tickets may be purchased and stored electronically until their
`US
`00.15 Most importantly, the device incorporates a biomet
`ric sensor for performing fingerprint or other biometric iden
`tification to positively identify the user as the owner of the
`device. This provides the means to ensure that only the autho
`rized card owner is actually performing the transaction. In the
`preferred embodiment, fingerprint verification is used to bio
`metrically identify the authorized user, however, other means
`of identifying the users, both biometric and non-biometric
`may also be used. Authentication is required for each trans
`action, and the identity of the authorized user must be verified
`before the device's programmable magnetic stripe, Smartcard
`circuitry or NFC circuitry is activated, and its signal trans
`mitted to an RFID reader or NFC-enabled POS terminal.
`Authentication may not be required for all functions of
`device. For example, it may not be desirable to require
`authentication for the downloading of coupons.
`
`(0016 Preferably, one embodiment of the device will have
`standard Smartcard contacts. The optional base unit will con
`tain mating connectors which will allow data transfer
`between the device and an application program running on a
`standard personal computer, and which will also allow charg
`ing of the device's rechargeable batteries through the Smart
`card contacts. In addition, the base unit may optionally con
`tain an NFC or smartcard reader, such that the base can act as
`a POS terminal for on-line purchases.
`0017. The handheld device will communicate with an
`application running on a personal computer, and will prefer
`ably be connected to the personal computer via a base unit, or,
`alternatively, directly via a wireless connection, Such as Blue
`tooth. The personal computer application allows the down
`loading of account information from multiple credit or other
`type cards into the device, and can be synchronized with the
`handheld device when they are connected, such that the data
`on the personal computer mirrors the data on the handheld
`device. The personal computer application will also provide
`other functionality which will be discussed in detail herein.
`The device contains ample memory to store account informa
`tion from multiple conventional magnetic stripe cards and
`Smartcards.
`0018. The handheld device can also emulate a magnetic
`stripe card by utilizing a programmable magnetic stripe
`which can be re-programmed on the fly and which can be
`erased after a pre-determined period of time or number of
`uses for security purposes. Account information from cards
`having a magnetic stripe may also be transmitted via an RF
`signal, in the event that an RF reader is available at the POS
`terminal. In this fashion, conventional magnetic stripe card
`owners will be able to perform transactions at venues utilizing
`the more desirable contactless, RF technology.
`0019. The handheld device must be initialized prior to the
`downloading of account information. The initialization pro
`cess begins with a user enrollment step, in which the user is
`prompted to place one or more fingertips on the biometric
`sensor. The fingerprints are then Scanned, converted into digi
`tal templates, and stored in the memory of the handheld
`device. The fingerprint templates can then be used for the
`authentication and activation process prior to the program
`ming of the magnetic stripe or any RF signal transmission.
`Optionally, multiple users may be enrolled to use the various
`accounts stored on the card.
`0020. Use of an account stored on the device depends upon
`the user biometrically establishing his or her identity and then
`selecting a particular account, which becomes the “active'
`account. To authenticate, the user places a finger on the bio
`metric sensor and the fingerprint is scanned and matched
`against one of the fingerprint templates stored on the device.
`Optionally, multiple fingerprints from different fingers may
`be required to unlock the device. In this capacity, any unau
`thorized use of the card is prohibited, thereby adding a new
`level of security to transactions with both conventional and
`Smartcards.
`0021 One shortcoming offingerprint recognition is that a
`Small percentage of the population lacks a usable fingerprint
`pattern for this purpose. In such cases, the users may option
`ally have the ability to enter a personal identification number
`(PIN) as an alternate method of authentication. During ini
`tialization, the user will be prompted to select either finger
`print or PIN for authentication. Once the PIN is entered the
`device will store the selected application data set in memory.
`
`Dynamics Inc. - Ex. 2020
`Page 22
`
`

`

`US 2008/O126260 A1
`
`May 29, 2008
`
`0022. For security purposes and to prevent certain types of
`security attacks on the device. The RF antenna in the device is
`disabled after a single use. Without an enabled antenna, an
`interrogating RF signal will not be received and the device
`will not be able to transmit a response signal. When a subse
`quent transaction is desired, and the authentication process is
`completed, the antenna is re-enabled for a time sufficient to
`complete the transaction, then automatically disabled. Alter
`natively, the device could be enabled for a single transmission
`of the account data. For transactions involving a magnetic
`stripe, the programmable magnetic stripe on the device is
`erased after a predetermined period of time to prevent re-use.
`The device may also contain circuitry to record and time
`stamp all attempts at retrieving data, including both authen
`ticated attempts and attempts to use the device without
`authentication.
`0023 The device may optionally be equipped with a cam
`era of the type frequently found on cellular telephones. The
`camera may be used to capture information from coupons by
`taking a photo of the coupon's barcode. In such cases, the
`device is also equipped with barcode reading Software which
`is able to read the bar code from the captured photograph and
`display the information to the user in plain-text.
`0024. The inventors envision other types of biometric
`methods used with the device for authentication, including
`but not limited to, Voice recognition, skin resistance and skin
`capacitance, and any other type of biometric verification now
`known or later invented.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`0025 FIGS. 1a through 1d show front, back, side and
`bottom views of the device of a first embodiment of the
`device.
`0026 FIG. 2 shows the optional base unit of the invention
`to be used with the first embodiment.
`0027 FIG. 3 shows the front face of a preferred embodi
`ment of the device having a credit card or Smartcard form
`factor.
`0028 FIG. 4 shows the back face of the preferred embodi
`ment of the device, showing the magnetic stripe emulator.
`0029 FIG. 5 is an internal view of the preferred embodi
`ment of the device, showing components in schematic form.
`0030 FIG. 6 is a system diagram of the preferred embodi
`ment of the device, showing the interconnection of the Vari
`ous components.
`0031
`FIG. 7 is a schematic of an exemplary configuration
`of the hardware architecture of the preferred embodiment of
`the device.
`0032 FIG. 8 is an exemplary configuration of the high
`level software architecture of the device.
`0033 FIG. 9 is a flow chart showing the enrollment of a
`user on the device.
`0034 FIG. 10 is a flow chart showing the biometric
`authentication of a user.
`0035 FIG. 11 is a flow chart showing the device provi
`Sioning process wherein electronic account records are down
`loaded from account issuers.
`0.036 FIG.12a is a first embodiment of a flow chart show
`ing the selection and activation process of an account.
`0037 FIG. 12b is a flow chart showing an alternative
`embodiment of the process by which accounts are selected
`and activated.
`
`0038 FIG. 13 is a functional diagram of the menu struc
`ture of the software application which may optionally be
`present on the handheld device.
`0039 FIG. 14 is a functional diagram of the supporting
`application running on the personal computer.
`0040 FIG. 15 is a first example of a device and reader
`application utilizing a magnetic Swipe or a contactless Smart
`card model as a communications medium.
`0041
`FIG. 16 is a second example of a device and reader
`application utilizing NFC as the communications medium.
`0042 FIG. 17 is a flow chart of a transaction using the
`device of the present invention wherein a dynamic security
`code is generated on a per-transaction basis.
`0043 FIG. 18 is a diagram showing the general structure
`of a data record for an account downloaded into the device.
`
`DETAILED DESCRIPTION OF THE INVENTION
`0044) The device of the present invention is contemplated
`to be produced in one of two embodiments. In one embodi
`ment, shown in FIGS. 1a through 1d, the device has two
`portions having different thicknesses. One portion of the
`device is the thickness of a typical credit card, while a second
`portion is thicker, allowing more room for physical compo
`nents. In a second, and preferred embodiment, shown in
`FIGS. 3 and 4, the entire device is the thickness of a typical
`credit card, and is able to be used in all places that a credit card
`is able to be used, including those, such at ATMs and gas
`pumps, that require full insertion of the card.
`0045 FIG.1a-1c shows front, back and side views respec
`tively of the exterior of the first embodiment of device 100,
`which contains two portions, thinner portion 100a and thicker
`portion 100b. Thicker portion 100b preferably is about 10
`mm or less in thickness and may be composed of any material
`commonly used for housing electronic devices, but is prefer
`ably composed of a material that will not interfere with the
`transmission or reception of RF signals. The front of device
`100 contains display 101, which may be an LCD display, as
`well as menu selection keys 102 and numeric keypad 103.
`Menu selection keys 102 facilitate navigation through a series
`of menus displayed on display 101. Menu selection keys 102
`consist of directional keys, which may be used move a cursor
`up, down, left or right, while a central ENTER key may be
`used to select menu items. The directional keys and ENTER
`key may be of any configuration.
`0046. Thinner portion 100a of device 100 contains a pro
`grammable magnetic stripe 107 of the rear side thereof and is
`preferably approximately 0.76 mm in thickness, in accor
`dance with ISO standard 7813. The thickness of portion 100a
`of device 100 is such that it can be passed through a typical
`magnetic stripe card reader. Between sections 100a and 100b
`is a beveled area 104 which makes the transition from the thin
`portion of device 100 to the thick portion. The thinner portion
`100a of device 100 and magnetic stripe 107 are optional. It is
`envisioned that future versions of the device will be made
`without the programmable magnetic stripe 107, as magnetic
`stripe credit cards and readers are phased out in favor of
`contactless transaction devices. In Such cases, thinner portion
`100a of device 100 may be absent.
`0047. Also located on the front of device 100 is biometric
`input sensor 105 which, in the preferred embodiment, con
`sists of a fingerprint Scanner. In other embodiments of the
`invention, other biometric authentication devices may also be
`used. Such as Voice recognition, skin pH analysis, or any other
`means of identifying the user, now known or later invented. In
`
`Dynamics Inc. - Ex. 2020
`Page 23
`
`

`

`US 2008/O126260 A1
`
`May 29, 2008
`
`addition, the biometric authentication may be replaced an
`alphanumeric password or PIN that the user may enter into
`device 100 using numeric keypad 103.
`0048. The rear of the device contains programmable mag
`netic stripe 107 situated on the thin portion 100a of device
`100. Also located on the back of the device is optional camera
`106, which is used primarily in the preferred embodiment for
`taking photographs of barcodes which can be read through
`barcode recognition Software, however, any images may be
`captured and stored on the device for display or transmission.
`In addition, NFC chip 108 and Bluetooth chip 109 are shown
`on the rear of device 100, however, these chips are actually
`internal to the device. Also located on the back of device 100
`may be system reset button 110.
`0049. The side view of device 100 in FIG.1c shows device
`soft key 109, which is used by the user to interact with the
`Software application programmed into the device.
`0050 FIG. 1d shows the bottom of device 100 showing
`thin area 100a having the magnetic stripe 107 disposed
`thereon, thicker area 100b and the beveled transition 104
`therebetween. Also present on the bottom of device 100 is
`connector 201 which may be used to transfer data to and from
`PC application 1002, shown in FIG. 15, via a direct cable
`connection or via base unit 200, shown in FIG. 3.
`0051 Optional base unit 200, contains connector 202
`which mates with connector 201 on the bottom of device 100
`to provide the aforementioned functions. Base unit 205 may
`also contain an NFC chip 205, or other wireless means of
`communication, which will allow base unit 200 to act as an
`contactless point-of-sale (POS) terminal for purchases made
`on-line. Also present on base 200 is PC interface 204, which
`allows device 100 to communicate with PC application 1002.
`The means for allowing device 100 to communicate with PC
`application 1002 may also be any one of a number of wireless
`transfer protocols well known in the art, such as Bluetooth or
`may be a wired connection, such as a serial line or a USB
`connection.
`0052 Connector 201 may be used to charge rechargeable
`battery 405 within device 100, either via a connection to base
`unit 200 or via a direct cable connection to a PC. AC adapter
`203 for base unit 200 may provide power for re-charging
`battery 405. Alternatively, battery 405 may be inductively
`charged via Voltages induced on the RF antenna of the device
`through interaction with an electromagnetic field.
`0053 FIGS. 3 through 5 show the physical configuration
`of the preferred embodiment of the invention. In this embodi
`ment, device 150 has the dimensions and thickness of a typi
`cal credit card. The face of device 150 is shown in FIG.3 and
`includes display area 152 for displaying the active account
`information, which can be selected using buttons 153 and
`154. Although two buttons are shown in the exemplar pre
`ferred embodiment, it is obvious that any number of buttons
`could be used for the user interface of the device.
`0054) Note that the display area 152 is not meant to be
`limited to the size and shape shown, but may be of any
`convenient size and shape. Preferably, display 152 is an LCD
`display, but may be of any type well known in the art, includ
`ing specifically electrophoretic displays capable of retaining
`an image after device 150 is powered down. The device may
`be capable of displaying color pictures as well as video, in
`anticipation of uses of device 150 for other than financial
`transactions. In the preferred embodiment, display 152 will
`be used primarily for the display of the currently active
`account and for prompts for the user. The account information
`
`displayed may include a graphic, preferably representing a
`logo or trademark of the account issuer, as well as any other
`information necessary to complete the transaction, such as
`CCV codes or dynamically generated PIN numbers.
`0055. The account information which is displayed on dis
`play 152 will be the “active' account. The information
`required for transactions using the active account will be
`programmed into programmable magnetic stripe 161, shown
`in FIG. 4, or transmitted via an RF capability, after the user
`has authenticated himself utilizing biometric sensor 151.
`Preferably, biometric sensor 151 is a fingerprint scanning
`device capable of scanning the fingerprints of one or more
`fingers of a typical user and matching them against stored
`templates, however, any other biometric sensor, now known
`or later develop, may be used. Additionally, a PIN number
`may be utilized.
`0056 Area 156 on the front of device 150 is a printable
`area which allows logos or other information to be printed on
`the card. Preferably, the card will not be embossed an

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket