Apex Standards Claim Construction


Patent: US6928166B2
Filed: 2000-04-28
Issued: 2005-08-09
Patent Holder: (Original Assignee) Toshiba Corp     (Current Assignee) 2bcom LLC
Inventor(s): Junichi Yoshizawa

Title: Radio communication device and user authentication method for use therewith

Abstract: To allow flexible security level switching according communication situations, a password holding section holds a plurality of device authentication passwords, for example, a temporary password and a private password. The temporary password is valid only under a certain situation and the private password has a high level of confidentiality to increase the device security. A password management section allows the user to add a new password to the password holding section and delete an existing password therefrom. A password selecting section selects the most suitable password for current connection from among passwords in the password holding section according to a user event, information acquired by an external factor acquisition section, and information from a time control section. The selected password is output to a password checking section.

The First Claim: 1. An authentication processing apparatus of a radio communication which authenticates a device, the apparatus comprising: means for acquiring an external factor which is associated with a security level; means for selecting a security level from a plurality of security levels in accordance with the external factor; means for receiving a request for an authentication and authentication information from the device; means for checking whether the received information from the device is valid or not depending on the selected security level; and means for sending a response of the check result which authenticates or rejects the device thereto.


Disclaimer: The promise of Apex Standards Claim Construction (CC) is that it will conduct the Broadest Reasonable, Ordinary, or Customary Interpretation for the claim elements of a target patent or the technical specification languages of an industrial standard. Therefore, a top-down, apriori evaluation is enabled, allowing stakeholders to swiftly and effectively analyze the relevance and scope of terms and phrases under consideration prior to making complex, high-value judgments. CC is intended to alleviate the initial burden of evidence by providing an exhaustive list of contextual semantic understandings that can be used as building blocks in the development of a prosecution-ready, licensing-ready, or litigation-ready work product. Stakeholders can then utilize the CC to revise the original claim or technical languages, as well as to find more relevant arts in order to build strategy and accomplish additional goals.



Reference Claim Element / Subject Matter Feature Meaning Claim Construction & Interpretation
[1] 1 .

An authentication processing apparatus [1]
authentication processing apparatus [1] [Meaning 1] apparatus
[Meaning 2] equipment
[Meaning 3] device
[Meaning 4] method
[Meaning 5] system
[Meaning 6] authentication apparatus
[Meaning 7] access apparatus
[Meaning 8] apparatus capable
[Meaning 9] information processing apparatus
[Meaning 10] apparatus for control
[Meaning 11] access control apparatus capable
[Meaning 12] apparatus for controlling an authentication
[Meaning 13] access control apparatus for controlling an access right
[Meaning 14] information processing apparatus which is used in execution
[2] of a radio communication [2] radio communication [2] [Meaning 1] system
[Meaning 2] network
[Meaning 3] server
[Meaning 4] device
[Meaning 5] computer
[Meaning 6] communication system
[Meaning 7] computer system
[Meaning 8] network system
[Meaning 9] server system
[Meaning 10] data processing system
[Meaning 11] device authentication system
[Meaning 12] network management system
[Meaning 13] computer or the like
[Meaning 14] multi level security system
[Interpretation 1] network system for performing an authentication processing of devices connected to the network system in accordance with security levels of the devices and an external factor
[Interpretation 2] server which is connected to an authentication processing apparatus of the client which is connected to the server network and
[Interpretation 3] computer system which is connected to an external network and which is capable of executing an authentication processing program and
[3] which authenticates (performs an authentication of, is wirelessly connected to, can be connected to, authenticate or rejects to, carries out radio communication with, communicate in radio communication with, execute an authentication processing to authenticate) a device [3] device [3] [Meaning 1] user
[Meaning 2] devices
[Meaning 3] communication
[Meaning 4] terminal
[Meaning 5] connected device
[Meaning 6] device thereto
[Meaning 7] radio device
[Meaning 8] wireless device
[Meaning 9] device by radio
[Meaning 10] portable terminal device
[Meaning 11] device to be authenticated
[Meaning 12] request from the device
[Meaning 13] user of the device
[Meaning 14] device of the radio communication
[4] , the apparatus [4] apparatus [4] [Meaning 1] device
[Meaning 2] method
[Meaning 3] system
[Meaning 4] processor
[Meaning 5] processing apparatus
[Meaning 6] authentication apparatus
[Meaning 7] said apparatus
[Meaning 8] radio communication
[Meaning 9] apparatus further
[Meaning 10] apparatus characterized by
[Meaning 11] apparatus of the radio communication
[Meaning 12] method comprising the steps of
[Meaning 13] device being wirelessly connected thereto
[Meaning 14] device being connected to the apparatus
[Interpretation 1] radio communication being performed by radio communication between the device and an apparatus which is different from the device and
[Interpretation 2] device being connected to the radio communication apparatus via an interface which is different from the radio communication apparatus and
[5] comprising (being characterized by comprising, comprising the following elements, characterized in that it comprises, of the radio communication comprising, comprising at least one of, of the radio communication characterized by, having the following functions or means) : means for acquiring (receiving an input of, detecting an occurrence of, obtaining an information of, detecting from the radio communication, notify of the device of, receiving an external information indicating, sending an inquiry which includes) an external factor [5] factor [5] [Meaning 1] condition
[Meaning 2] factors
[Meaning 3] parameter
[Meaning 4] information
[Meaning 5] external factor
[Meaning 6] authentication factor
[Meaning 7] environment factor
[Meaning 8] factor information
[Meaning 9] factor each of
[Meaning 10] one of factors
[Meaning 11] factor of the device
[Meaning 12] condition of the device
[Meaning 13] factor of the radio communication
[Meaning 14] factor which is related to the device and
[Interpretation 1] parameter which is associated with an external factor which is an external factor of the device from the device and means for acquiring security level information
[Interpretation 2] factor which is associated with an external environment of the apparatus from the device and from an external factor table
[6] which is associated (set up in accordance, an external factor associated, the factor of changing, set in advance in accordance, an external factor in accordance, used to associate the device, used to select or be associated) with a security level [6] security level [6] [Meaning 1] device
[Meaning 2] user
[Meaning 3] communication
[Meaning 4] network
[Meaning 5] terminal
[Meaning 6] communication environment
[Meaning 7] predetermined device
[Meaning 8] device authentication
[Meaning 9] predetermined security level
[Meaning 10] user of the device
[Meaning 11] location of the device
[Meaning 12] communication with the device
[Meaning 13] device of the radio communication
[Meaning 14] device and which affects the device
[Interpretation 1] device and which is used to determine whether or not the device is to be authenticated by the radio communication
[7] ; means for selecting (determining whether to select, making an selection of, receiving an input selecting, performing selection processing of, selecting and output of, receiving an instruction to select, selecting an external factor and) a security level [6] from a plurality of security levels [7] security levels [7] [Meaning 1] levels
[Meaning 2] options
[Meaning 3] types
[Meaning 4] security
[Meaning 5] stages
[Meaning 6] safety levels
[Meaning 7] secure levels
[Meaning 8] predetermined levels
[Meaning 9] the levels
[Meaning 10] the security levels
[Meaning 11] security levels prepared
[Meaning 12] levels which are pre set therein
[Meaning 13] levels which are associated with the external factor
[Interpretation 1] external factors which are associated with different security levels and which are acquired by the means for acquiring external factor
[Interpretation 2] different security levels which are associated with different external factors by the external factor acquired by the acquiring means and
[8] in accordance [8] accordance [8] [Meaning 1] association
[Meaning 2] correspondence
[Meaning 3] compliance
[Meaning 4] conformity
[Meaning 5] being associated
[Meaning 6] advance associated
[Meaning 7] accordance with
[Meaning 8] advance in accordance
[Meaning 9] order to comply
[Meaning 10] accordance with association
[Meaning 11] which are associated
[Meaning 12] the apparatus associated
[Meaning 13] the apparatus in accordance
[Meaning 14] order to be associated
[9] with the external factor [5] ; means for receiving (sending to the device, accepting from the device, receiving information which includes, receiving at least one of, sending to the selected security level, accepting from the device information including, sending to the device an information of) a request [9] request [9] [Meaning 1] command
[Meaning 2] demand
[Meaning 3] requirement
[Meaning 4] challenge
[Meaning 5] radio signal
[Meaning 6] request signal
[Meaning 7] start request
[Meaning 8] control signal
[Meaning 9] challenge signal
[Meaning 10] random number used
[Meaning 11] radio wave used
[Meaning 12] response to request
[Meaning 13] request for information
[Meaning 14] transmission request signal
[10] for an authentication [10] authentication [10] [Meaning 1] access
[Meaning 2] information
[Meaning 3] identification
[Meaning 4] inquiry
[Meaning 5] authentication processing
[Meaning 6] identification information
[Meaning 7] initial authentication
[Meaning 8] access right
[Meaning 9] information transmission
[Meaning 10] access control list
[Meaning 11] information check result
[Meaning 12] authentic authentication information
[Meaning 13] authentication of the device
[Meaning 14] access to the device
[11] and authentication information [11] authentication information [11] [Meaning 1] information
[Meaning 2] rejection
[Meaning 3] authentication
[Meaning 4] acceptance
[Meaning 5] data
[Meaning 6] device information
[Meaning 7] the like
[Meaning 8] receiving an information
[Meaning 9] an authentication result
[Meaning 10] information for authentication
[Meaning 11] the selected security level
[Meaning 12] information of the device
[Meaning 13] response to the request sent
[Meaning 14] for the rejection of the authentication
[12] from the device [3] ; means for checking (performing check as to, making an authentication check, executing check as to, checking in real time, sending an inquiry of, sending an instruction to check, checking the information to determine) whether the received (request and the authentication, requested authentication and authentication, information of the request and authentication, authentication information received with the request and authentication, information received by the receiving means and the) information [12] information [12] [Meaning 1] request
[Meaning 2] response
[Meaning 3] authentication
[Meaning 4] data
[Meaning 5] authentication information
[Meaning 6] information received
[Meaning 7] registration information
[Meaning 8] request received
[Meaning 9] information and request
[Meaning 10] information and the information received
[Meaning 11] means for receiving the request for the authentication
[Interpretation 1] request for an authentication from the device is valid or not and checking whether the received information of an authentication
[13] from the device [3] is valid or not depending (for the device based, by performing authentication based, in the apparatus based, based on the information, using the information based, in accordance with the information, according to the authentication information) on the selected (external factor and the, means for selecting the, selection result of the, factor and the selected, received request and the, security level and the selected, selected security level and the) security level [6] ; and means for sending (sending to the device, making the device transmit, output to the device as, output of an authentication result as, reply to the received request with, transmitting the request for the authentication and, performing an authentication processing in accordance with) a response [13] response [13] [Meaning 1] notification
[Meaning 2] notice
[Meaning 3] message
[Meaning 4] report
[Meaning 5] response indicative
[Meaning 6] control signal
[Meaning 7] transmission request
[Meaning 8] response in accordance
[Meaning 9] control signal indicative
[Meaning 10] result of determination
[Meaning 11] response to the device
[Meaning 12] control signal in accordance
[Meaning 13] control signal on the basis
[Meaning 14] control signal to the device depending
[14] of the check result [14] check result [14] [Meaning 1] authentication
[Meaning 2] checking
[Meaning 3] device
[Meaning 4] request
[Meaning 5] radio communication
[Meaning 6] checked result
[Meaning 7] received information
[Meaning 8] checking means
[Meaning 9] checked information validity
[Meaning 10] checking to the device
[Meaning 11] authentication to the device
[Meaning 12] device to the radio communication
[Meaning 13] validity or invalidity to the device
[Meaning 14] checking to the device via the radio communication
[15] which authenticates or rejects (rejects the authentication of, not authenticate and connects, invalidate the received information from, rejects the request received from, not authenticate the device to, authenticate information is received from, rejects the device and the authentication information of) the device [3] thereto .