Ex Parte Ramsey Catan - Page 20

                Appeal 2007-0820                                                                               
                Application 09/734,808                                                                         
           1    the art at the time of the invention to substitute a PIN authentication with                   
           2    bioauthentication to enable a user to access credit (FF 10, 20).                               
           3          Further, Harada provides sufficient motivation for one skilled in the                    
           4    art to use this bioauthentication information, such as a voice print or                        
           5    fingerprint, in lieu of a PIN in order “to prevent unauthorized tampering with                 
           6    [certain terminal setting] data by persons who may have access to the remote                   
           7    control apparatus,” “to ensure that the type of service which is provided by a                 
           8    terminal apparatus to the users of its remote control apparatuses is                           
           9    selectively controlled in accordance with various different categories of                      
          10    uses, e.g.[,] adults and children,” and “to reliably ensure that certain services              
          11    which should be available only to a specific individual user … and which                       
          12    can be requested by operation of a remote control apparatus, will in fact be                   
          13    made available only to the appropriate individual, when a number of                            
          14    different individuals can use remote control apparatus to communicate with                     
          15    that same terminal apparatus” (FF 10).  The use of a PIN code is not as                        
          16    reliable an identifier as bioauthentication information because the PIN can                    
          17    be stolen and used without the authorized user’s knowledge (FF 11).  On the                    
          18    contrary, bioauthentication information, such as a fingerprint,                                
          19    unambiguously and reliably ensures that a specific authorized user is                          
          20    requesting the service (FF12).  Further, use of a PIN code as an identifier is                 
          21    not as desirable as bioauthentication information because the use of a PIN                     
          22    requires the user to remember the PIN code (FF 13).                                            
          23          Thus, one of ordinary skill in the art would have been motivated to                      
          24    combine the bioauthentication device of Harada with the system of Nakano                       
          25    because Dethloff teaches that one can substitute bioauthentication                             
          26    information for PIN information, and Harada teaches that it was a common                       

                                                      20                                                       

Page:  Previous  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  Next

Last modified: September 9, 2013