Ex Parte Ramsey Catan - Page 7

                Appeal 2007-0820                                                                               
                Application 09/734,808                                                                         
           1          12. Harada suggests that bioauthentication information, such as a                        
           2                 fingerprint, unambiguously and reliably ensures that a specific                   
           3                 authorized user is requesting the service.                                        
           4          13. We further note that use of a PIN code as an identifier is not as                    
           5                 desirable as bioauthentication information because the use of a                   
           6                 PIN requires the user to remember the PIN code.                                   
           7          14. Dethloff is directed to “plastic devices, comprising integrated                      
           8                 circuits, commonly called ‘smart cards’” (Dethloff, col. 1,                       
           9                 ll. 12-18).                                                                       
          10          15. Dethloff is specifically directed to modules or “M-cards” which                      
          11                 comprise a keyboard for entering, for example, identification                     
          12                 and transaction data, a memory for storing data, a logic means,                   
          13                 and a display (Dethloff, col. 9, ll. 57-68).                                      
          14          16. Dethloff’s M-card contains means to assign the card to a                             
          15                 number of sub-users (Dethloff, col. 5, ll. 19-20), each of which                  
          16                 can be designated a particular value (Dethloff, col. 5, ll. 20-28).               
          17                 This is accomplished by the card-holder assigning each sub-                       
          18                 user a PIN and a transaction limit (see, e.g., Dethloff, col. 6, ll.              
          19                 64- col. 7, l. 4; Fig. 9), which are stored in a memory means in                  
          20                 the card (PIN: Dethloff, col. 11, l. 10; transaction limit:                       
          21                 Dethloff, col. 13, ll. 17-21).                                                    
          22          17. In operation, a sub-user will authenticate the M-card by                             
          23                 inputting a PIN which the card then internally checks for                         
          24                 correctness (Dethloff, col. 10, ll. 63-67; see also col. 13, ll. 35-              
          25                 38).  This then triggers a means within the card to open a                        
          26                 transaction account assigned to the sub-user (Dethloff, col. 12,                  

                                                      7                                                        

Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next

Last modified: September 9, 2013