Appeal 2007-0820 Application 09/734,808 1 12. Harada suggests that bioauthentication information, such as a 2 fingerprint, unambiguously and reliably ensures that a specific 3 authorized user is requesting the service. 4 13. We further note that use of a PIN code as an identifier is not as 5 desirable as bioauthentication information because the use of a 6 PIN requires the user to remember the PIN code. 7 14. Dethloff is directed to “plastic devices, comprising integrated 8 circuits, commonly called ‘smart cards’” (Dethloff, col. 1, 9 ll. 12-18). 10 15. Dethloff is specifically directed to modules or “M-cards” which 11 comprise a keyboard for entering, for example, identification 12 and transaction data, a memory for storing data, a logic means, 13 and a display (Dethloff, col. 9, ll. 57-68). 14 16. Dethloff’s M-card contains means to assign the card to a 15 number of sub-users (Dethloff, col. 5, ll. 19-20), each of which 16 can be designated a particular value (Dethloff, col. 5, ll. 20-28). 17 This is accomplished by the card-holder assigning each sub- 18 user a PIN and a transaction limit (see, e.g., Dethloff, col. 6, ll. 19 64- col. 7, l. 4; Fig. 9), which are stored in a memory means in 20 the card (PIN: Dethloff, col. 11, l. 10; transaction limit: 21 Dethloff, col. 13, ll. 17-21). 22 17. In operation, a sub-user will authenticate the M-card by 23 inputting a PIN which the card then internally checks for 24 correctness (Dethloff, col. 10, ll. 63-67; see also col. 13, ll. 35- 25 38). This then triggers a means within the card to open a 26 transaction account assigned to the sub-user (Dethloff, col. 12, 7Page: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next
Last modified: September 9, 2013