`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`PLAID TECHNOLOGIES, INC.
`Petitioner
`
`v.
`
`YODLEE, INC.
`Patent Owner
`_________________________
`Case No. CBM2016-______
`U.S. Patent No. 6,317,783
`_________________________
`
`DECLARATION OF TODD C. MOWRY IN SUPPORT OF PETITION FOR
`COVERED BUSINESS METHOD REVIEW OF U.S. PATENT NO. 6,317,783
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Plaid Technolgies Inc.
`Exhibit 1002
`
`
`
`
`
`TABLE OF CONTENTS
`
`Page
`INTRODUCTION AND QUALIFICATIONS ........................................... 1
`I.
`PROFESSIONAL QUALIFICATIONS ...................................................... 1
`II.
`III. LEVEL OF ORDINARY SKILL IN THE ART ........................................ 5
`IV. APPLICABLE LEGAL STANDARD ......................................................... 7
`A. Claim Construction................................................................................ 7
`B. Eligibility ............................................................................................... 7
`V. OVERVIEW OF THE ACCUSED TECHNOLOGY ................................ 8
`VI. THE ’783 PATENT .....................................................................................12
`A. Description of the ’783 Patent .............................................................12
`B. Prosecution History .............................................................................17
`VII. CLAIM CONSTRUCTION ........................................................................20
`VIII. CLAIMS 1–36 ARE DIRECTED TO AN ABSTRACT IDEA
`AND LACK AN INVENTIVE CONCEPT ...............................................27
`A. Claims 1–36 Are Directed to an Abstract Idea ...................................27
`B. Claims 1–36 Lack an Inventive Concept ............................................30
`C. Alternative CashEdge and Block Financial Claim
`Constructions .......................................................................................37
`IX. CONCLUSION ............................................................................................40
`
`
`i
`
`
`
`
`I.
`
`INTRODUCTION AND QUALIFICATIONS
`
`1.
`
`I have been retained on behalf of the Petitioner, Plaid Technologies,
`
`Inc., to provide this Declaration concerning technical subject matter relevant to the
`
`post-grant review of a covered business method patent, 6,317,783 (“the ’783
`
`Patent,” Ex. 1001).
`
`2.
`
`I am over 18 years of age. I have personal knowledge of the facts
`
`stated in this Declaration and could testify competently to them if asked to do so.
`
`II.
`
`PROFESSIONAL QUALIFICATIONS
`
`3.
`
`I am a Professor in the Department of Computer Science at Carnegie
`
`Mellon University. I also have a courtesy appointment in the Department of
`
`Electrical and Computer Engineering. I have served on the faculty of Carnegie
`
`Mellon University for nineteen (19) years starting in 1997 through the present
`
`(2016).
`
`4.
`
`I also served on the faculty of the University of Toronto for four (4)
`
`years between 1993 and 1997, in the Department of Electrical and Computer
`
`Engineering, and with a courtesy appointment in the Department of Computer
`
`Science. Prior to that appointment, I served as a Graduate Research Assistant in
`
`the Department of Electrical Engineering at Stanford University for four (4) years
`
`between 1989 and 1993.
`
`5.
`
`As a faculty member, I have taught and continue to teach courses and
`
`1
`
`
`
`
`
`directed research in computer systems and software, operating systems, distributed
`
`and network systems, object-oriented programming and design, and mobile
`
`computing.
`
`6.
`
`I received a B.S. degree in Electrical Engineering with Highest
`
`Distinction from the University of Virginia in May 1988. I received an M.S. in
`
`Electrical Engineering from Stanford University in June 1989, and a Ph.D. in
`
`Electrical Engineering from Stanford University in March 1994.
`
`7.
`
`I have worked in the computer industry in various capacities. I was a
`
`part-time Computer Architect and then a Computer Architecture Consultant at
`
`Silicon Graphics, Inc. in Mountain View, California (formerly MIPS Computer
`
`Systems in Sunnyvale, California) from 1989 to 1993 and 1993 to 1996,
`
`respectively. I was a Visiting Scientist at IBM in Toronto from 1996 to 2004.
`
`During that same time period (1996 to 2004), I was also a Member of the
`
`Technical Advisory Board of SandCraft, Inc. in Santa Clara, California. I was the
`
`Director of the Intel Research Pittsburgh Lab at Intel Corporation in Pittsburgh,
`
`Pennsylvania from 2004 to 2007.
`
`8.
`
`I have authored 19 journal articles and 55 conference papers. I am
`
`also an inventor on five patents.
`
`9.
`
`I have published a number of papers in the top research conferences in
`
`the fields of operating systems and data storage and retrieval (including the paper
`
`2
`
`
`
`
`
`that won the Best Paper Award at the USENIX 2nd Symposium on Operating
`
`Systems Design and Implementation (OSDI ’96)). I have also been an active
`
`member of the Parallel Data Lab at Carnegie Mellon University since 1997,
`
`described as “academia’s premiere storage systems research center.”1
`
`10.
`
`I am the recipient of several honors and awards: the Arthur Samuel
`
`Thesis Award (awarded by the Stanford Computer Science department to the top
`
`two Ph.D. theses in a given year), several IBM Faculty Development Awards
`
`(1996, 1997, 1998, 2000, 2001, 2002, and 2003), several Best Paper Awards (the
`
`Second Symposium on Operating Systems Design and Implementation in 1996;
`
`the 20th International Conference on Data Engineering (ICDE) in 2004), the
`
`Alfred P. Sloan Research Fellowship (awarded to researchers in recognition of
`
`distinguished performance and a unique potential to make substantial contributions
`
`to their field), the Most Thought-Provoking Idea Award (awarded by the
`
`Architectural Support for Programming Languages and Operating Systems
`
`(ASPLOS), in 2004), and the TR100 Award (awarded by MIT’s Technology
`
`Review magazine to the top 100 most promising young innovators in science and
`
`technology, in 1999).
`
`11.
`
`I am a member of the Institute of Electrical and Electronics Engineers
`
`
`1 See the Parallel Data Lab website at http://www.pdl.cmu.edu/.
`
`3
`
`
`
`
`
`(IEEE) and the Association of Computing Machinery (ACM). I am the Editor-in-
`
`Chief of ACM Transactions on Computer Systems (since 2013), which is the
`
`premier journal for computer systems research. I was an Associate Editor for the
`
`journal prior to that, beginning in 2001. I was the Program Chair of the
`
`International Conference on Architectural Support for Programming Languages
`
`and Operating Systems (ASPLOS) in 2010. I was the Co-Program Chair of the
`
`International Conference on Parallel Architectures and Compilation Techniques
`
`(PACT) in 2001. I have been on the programming committee in various years for
`
`ASPLOS, the International Symposium on Computer Architecture (ISCA), the
`
`International Symposium on Microarchitectures, and
`
`the Workshop on
`
`Architectural and System Support for Improving Format.
`
`12. Overall, I have over twenty-three (23) years of experience in the field
`
`of computer science and, specifically, computer architecture, compiler
`
`optimizations, operating systems, and parallel processing. A copy of my
`
`curriculum vitae, including references to the publications I authored, is attached to
`
`this Declaration as Appendix A.
`
`13.
`
`In light of the foregoing, I consider myself to be an expert in the field
`
`of computer science, and believe that I am qualified to provide an opinion as to
`
`what a person of ordinary skill in the art would have understood, known, or
`
`concluded regarding the subject matter of the ’783 Patent at the time of its alleged
`
`4
`
`
`
`
`
`invention.
`
`14.
`
`I am being compensated for the time I have spent on this action at my
`
`customary rate of $600 per hour, plus reimbursement for expenses. My
`
`compensation does not depend in any way upon the opinions or testimony that I
`
`provide or the outcome of this action.
`
`15. My opinions expressed herein are based on review and analysis of
`
`certain information obtained in connection with my work on this matter, together
`
`with my training, education, and experience. The opinions expressed herein are
`
`my own.
`
`16.
`
`In my analysis, I considered the ’783 Patent and its file history, as
`
`well as the prior art and other documentation discussed below.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`17. Throughout
`
`this Declaration, I consider
`
`the
`
`issues from
`
`the
`
`perspective of a person having ordinary skill in the art in or around October 1998,
`
`the earliest date to which the ’783 Patent could claim priority.
`
`18. The ’783 Patent is titled “Apparatus and methods for automated
`
`aggregation and delivery of and transactions involving electronic personal
`
`information or data” and describes a process for automated aggregation, retrieval
`
`and delivery of personal information. Generally categorized, the ’783 Patent deals
`
`with methods for logging into websites and gathering personal data from them.
`
`5
`
`
`
`
`
`19.
`
`In determining the characteristics of a hypothetical person of ordinary
`
`skill in the art around October 1998 for the technology described in the ’783
`
`Patent, I considered a number of factors, including how web-based information
`
`retrieval systems were designed and implemented at and before that time, the
`
`nature of problems encountered in this field, and the pace at which innovations
`
`were made at that time. I also considered the educational background and
`
`experience of those actively working in the field.
`
`20.
`
`It is my opinion that for the purposes of the ’783 Patent, a person of
`
`ordinary skill in the art, at the time the patent was filed, would be one having a
`
`Bachelor’s Degree in electrical engineering, computer science, or a related
`
`scientific field, and some work experience in the computer science field, which
`
`could include programming experience. Alternatively, a person of ordinary skill in
`
`the art would possess a combination of education and experience in certain
`
`relevant fields of computer science, such as graphical user interface design, and
`
`knowledge of software design, data structures, operating systems, archiving
`
`systems, and client-server computing. I recognize that someone with less technical
`
`education but more practical experience, or more technical education but less
`
`practical experience, could also have been considered a personal of ordinary skill
`
`in the art.
`
`6
`
`
`
`
`IV. APPLICABLE LEGAL STANDARD
`
`A. Claim Construction
`
`21.
`
`I have been informed by counsel and therefore understand that the
`
`first step in determining the validity of an asserted claim is for the claim to be
`
`properly construed.
`
`22.
`
`I understand that in proceedings before the Board, patent claims are to
`
`be given their broadest reasonable interpretation, consistent with the teachings of
`
`the specification and file history.
`
`23.
`
`I have reviewed Petitioner’s proposed constructions as explicitly
`
`identified in the Petition, and I agree that those constructions reflect the broadest
`
`reasonable interpretation of those claims. I understand that the Board has not yet
`
`construed the terms in this proceeding, and I reserve the right to supplement this
`
`Declaration based on alternative constructions proposed by the Patent Owner and
`
`the constructions adopted by the Board to the extent that these constructions differ
`
`from those proposed by Petitioner.
`
`B.
`
`24.
`
`Eligibility
`
`I understand that patent claims must be directed to patent-eligible
`
`subject matter under 35 U.S.C. § 101. I am informed that determining patent
`
`eligibility is a two-step process. I understand the first step is determining whether
`
`patent claims are directed to a patent-ineligible concept, such as laws of nature,
`
`7
`
`
`
`
`
`natural phenomena, and abstract ideas. I understand that a claim is not patent-
`
`eligible merely because it uses technical language and language from the art.
`
`Rather, subject matter is patent-eligible if the claims, properly construed,
`
`incorporate enough meaningful limitations to ensure that what is claimed is more
`
`than just an abstract idea.
`
`25.
`
`I understand that if the claims are in fact directed to an abstract idea,
`
`then the second step in determining patent eligibility is to ask whether the claims
`
`do significantly more than describe that abstract idea. I am informed that a claim
`
`that recites an abstract idea must contain an inventive concept to transform the
`
`abstract idea into patent-eligible subject matter. It is my understanding that
`
`appending conventional steps specified at a high level of generality is not enough
`
`to supply an inventive concept, nor does limiting the use of an abstract idea to a
`
`particular technological environment, such as a generic computer, alter this
`
`analysis. I am also informed that a computer’s basic functions, such as electronic
`
`recordkeeping, obtaining data, adjusting account balances, and issuing automated
`
`instructions, cannot provide the inventive concept.
`
`V. OVERVIEW OF THE ACCUSED TECHNOLOGY
`
`26. By the early-to-mid 1990s, computers had started to become
`
`household items, and the world saw an explosion of content become available to
`
`individuals using the World Wide Web. As people’s connectivity increased, so too
`
`8
`
`
`
`
`
`did their ability to “access various types of information, disseminate information,
`
`and be exposed to electronic commerce activities, all with a great degree of
`
`freedom.” U.S. Patent No. 6,401,118 (“Thomas”) (Ex. 1008) at 1:18–29.
`
`27. While the proliferation of web-based content increased access to
`
`information, it also brought with it the problem of finding efficient, user-friendly
`
`methods for accessing that data. General purpose computers were being
`
`programmed to collect data from the Web and aggregate the collected data. As a
`
`result, software solutions that provided for the collection and delivery of data on
`
`the Web had become well known to those of ordinary skill in the art before
`
`October 1998.
`
`28.
`
`In one example, in describing the state of the art, the specification of
`
`the ’783 Patent explains that “the portal strategy was successfully adopted as an
`
`efficient way for consumers to easily access a variety of content sources in a
`
`single, easy to use format.” ’783 Patent at 1:50–53. However, “[a]s the volume of
`
`available online content continues to grow exponentially, portals are now
`
`confronted with the need to make different types of content available to different
`
`consumers based upon their particular preferences and tastes.” Id. at 1:53–57.
`
`“Acquiring online [personal information]” from websites using a computer was
`
`already well known in the art, as the ’783 Patent admits. See id. at 2:3–4, Figs. 1,
`
`4. Portal sites, such as Yahoo and Excite, were already able to “aggregate”
`
`9
`
`
`
`
`
`personal information. Id. at 2:42–63.
`
`29.
`
`In another example, U.S. Patent No. 6,278,449 (“Sugiarto”) (Ex.
`
`1004) describes a system that “collect[s] information from various web pages from
`
`the worldwide web internet, configure[s] this various information in accordance
`
`with a predefined user configuration file, defined by a particular user, and
`
`transmit[s] the configured various information to a highly portable internet access
`
`device.” Sugiarto, Ex. 1004, at 2:10–17. Sugiarto teaches a system that provides a
`
`user with a customized Web page that includes data sourced from one or more
`
`Web sites of the user’s choosing, e.g., CNN, ESPN, and/or Nasdaq. Id. at 4:36–53.
`
`30. As new aggregation and delivery services developed, those of
`
`ordinary skill in the art further recognized that much of the personal information
`
`available on the Web is protected by well-known computer techniques like
`
`requiring the provision of credentials (username and password) —a process often
`
`called authentication. In order to automate and streamline this process, skilled
`
`artisans developed simulated web clients that imitated the user providing his or her
`
`credentials. Just as personal information at a bank is often protected by requiring
`
`the user to show credentials, online personal information is protected. To retrieve
`
`personal information from places where authentication was required, the idea of a
`
`proxy or agent in the real world was applied so that the computer acted as a proxy
`
`or agent for the user by providing the user’s credentials on his or her behalf.
`
`10
`
`
`
`
`
`31.
`
`In one example, U.S. Patent No. 5,892,905 (“Brandt”) (Ex. 1005)
`
`describes “the capability to easily access many different application programs over
`
`the WWW via a standardized [graphical user interface].” Brandt, Ex. 1005, at
`
`3:57–60. In Brandt, an application (also called a “gateway”) accesses a user
`
`library to obtain authentication data needed to access software applications for the
`
`user. Id. at 12:15–17. The application then logs the user onto a requested service
`
`using normal security procedures. Id. at 12:15–28.
`
`32. Using some sort of verification or access, such as a log in or
`
`password, and even automating that process, was extremely well known in the art.
`
`For example, U.S. Patent No. 6,006,333 (“Nielsen”) (Ex. 1006) discloses a
`
`password helper that automatically presents stored passwords to access a plurality
`
`of remote servers by employing a master password. E.g., Nielsen, Ex. 1006, at
`
`[57]; 1:12–16 (“Many remotely accessible computer systems require user
`
`authentication. The user, presumably operating a client system, must be registered
`
`with the remote system and must type in his or her user ID and a password for that
`
`remote system every time it is accessed”); 1:31–52, 4:9–25, 4:54-56, Figs. 2–4.
`
`33. Likewise, in 1998, end users often could not determine if server
`
`information changed given the Web’s client-server model. U.S. Patent No.
`
`6,029,175 (“Chow”) (Ex. 1007) sought to address this problem within the existing
`
`client-server architecture, disclosing a software agent, termed a “Revision
`
`11
`
`
`
`
`
`Manager” to monitor content at a server. Chow, Ex. 1007, at 3:60–64. The
`
`Revision Manager accepts user input indicating the user’s interest in monitoring a
`
`document. Id. at 5:32–34. In response, the Revision Manager “spontaneously
`
`monitors the server to notice if the document has been modified.” Id. at 6:2–4.
`
`Other references at the time also disclosed methods for computers that perform
`
`online monitoring activities. Thomas, Ex. 1008 at [57], 2:36–51. Thus,
`
`monitoring for changes was also well known in the art.
`
`34. Systems and methods for data aggregation and storage underwent
`
`significant developments during this time period. Thus, those of skill in the art
`
`would have been aware of the teachings of the above disclosures.
`
`VI. THE ’783 PATENT
`
`A. Description of the ’783 Patent
`
`35. The ’783 Patent relates to “an apparatus and process for automated
`
`aggregation and delivery of electronic personal information or data (PI)” and
`
`“automation of transactions involving electronic PI.” ’783 Patent at 1:23–26, as
`
`shown in Figure 2 (below). The “present invention” is facilitating the “end user
`
`access of, manipulation of and transactions involving electronic PI” such as “stock
`
`portfolio, local weather, sports scores, bank account balances or other pertinent
`
`information or data” and “a variety of electronic transactions involving PI such as
`
`stock trading, retail purchases, bill payment, bank account fund transfers or other
`
`12
`
`
`
`
`
`transactions.” Id. at 3:5–9, 15–19.
`
`36. Personal information is “all of the data that companies, information
`
`providers, have that is specific or unique to each person such as monthly bills,
`
`bank account balances, investments information, health care benefits, email, voice
`
`and fax messages, 401(k) holdings or potentially any other information pertinent to
`
`a particular end user.” Id. at 4:12–21, 4:65–67.
`
`37. A number of sources for this information are discussed in the
`
`specification, including various websites for “Banking & Investments,” “Phone
`
`Bill[s],” “Power Bill[s],” “Cable Bill[s],” “Health and Employee Benefits,” “Credit
`
`Cards & Mortgages,” “Communications & Messages (Email, Fax, Voice),” and
`
`other portal generic content. See id. at 2:31–34, Fig. 4; see also id. Fig. 5.
`
`38. The specification of the ’783 Patent discloses a system for delivering
`
`personal information wherein the system includes “a user store including end user
`
`data, a provider store including information provider data, a personal information
`
`store including personal information and a processor that communicates with these
`
`data stores.” Id. at 3:20–24. The processor “retrieve[s] personal information for
`
`the selected end user from the connected information providers.” Id. at 3:28–31.
`
`39. Figure 2, reproduced below, provides a visual of the basic components
`
`used to implement the alleged invention:
`
`13
`
`
`
`
`
`
`
`Id., Fig. 2. According to the specification, an end user 210 accesses a client
`
`computer 220 that connects to the Internet 230 to access a PI engine 240 running
`
`on a PI host 290. Id. at 4:29–34. The ’783 Patent further discloses that client
`
`software 270 “could be a general Web browser such as Navigator or
`
`Communicator (Netscape).” Id. at 4:29–34, 4:39–46.
`
`40. The PI engine 240 (shown in Fig. 3 below) running on PI host 290
`
`examines stored PI 280 and refreshes it by directly reacquiring the PI from the
`
`particular information provider’s Web site 250 running on the provider’s computer
`
`system 260. Id. at 4:33–39. For example, “the end user’s checking account
`
`balance would be updated through his bank’s Web site” and “his portfolio
`
`14
`
`
`
`
`
`information from his broker’s site and his electricity bill from his electricity
`
`company’s site.” Id. at 4:47–51. PI engine 240 accesses multiple provider web
`
`sites for a single end user. Id., Fig. 5; id. at 4:60–62, 6:55–67. The components of
`
`the PI engine are illustrated in more detail in Figure 3:
`
`
`
`Id., Fig. 3; see id. at 4:52–5:8.
`
`41. The PI Engine includes a “PI access/transact component,” which
`
`“supports the update, acquisition and transaction functionality of the PI engine.”
`
`Id. at 9:30–32. “For each piece of PI requiring access or update,” the PI
`
`access/transact component “looks up the access procedure and information needed
`
`for the particular personal information in the Provider store” as well as
`
`“verification and access data,” which is found in the user store. Id. at 9:38–41. “A
`
`15
`
`
`
`
`
`simulated Web client could perform access or transaction processes automatically
`
`supplying access and verification data as necessary.” Id. at 9:59–61.
`
`42. The PI engine 240 also stores the aggregated personal information in
`
`its store 280 and delivers the PI to a selected destination, for example across the
`
`Internet 230 to the client computer 220 which displays the information to the end
`
`user 210 using the client software 270. Id. at 4:39–46.
`
`43.
`
`“The present invention also contemplates indirect access of PI by the
`
`end user utilizing a Web site as an intermediary.” Id. at 9:15–21. The ’783 Patent
`
`further discloses delivery of “an access point directly to the provider’s page
`
`supplying that PI. The access point may take the form of a link, a form button or
`
`some other interactive access mechanism.” Id. at 14:24–67. A “novel transaction
`
`model” is also disclosed, using that “intermediary website,” that allows the PI
`
`engine administrator to levy a fee, which “subsidizes” or “fully compensates” the
`
`“PI engine administrator for services provided.” Id. at 14:3–15, Fig. 11. That
`
`“fee”—which can be “per user,” “per transaction,” or “per access”—is “directly
`
`charged” or “debited from a minimum monthly fee.” Id. at 14:3–24.
`
`44.
`
`In addition, the ’783 Patent describes “automated or semi-automated
`
`account management by providing trigger events to automatically initiate a
`
`transaction.” Id. at 16:8–10; see id. at 16:11–24 (adding automation of
`
`“payments,” notification of bills due, and notification of payments), 16:31–38,
`
`16
`
`
`
`
`
`Figs. 2–3. The PI access/transaction component 340 in Figure 3 uses “standard e-
`
`commerce bill-paying methods to pay the user’s bill/s to the provider if he/she
`
`chooses.” Id. at 16:25–31.
`
`45. A person of ordinary skill in the art at the relevant time would have
`
`appreciated that the end user in the ’783 Patent is a specific natural person because
`
`the end user is the operator of desktop computer 220. To access his or her PI, an
`
`end user may be required to “login” to the system, i.e., request access to his or her
`
`PI. Id. at 7:16–18, 10:30–44 (“[T]he act of logging into the system by an end user
`
`effectively selects that end user for immediate PI update.”). Moreover, the PI that
`
`is aggregated and sent to the end user is “specific to the end user requiring identity
`
`verification for access.” Id. at 4:22–26.
`
`46. At bottom, the ’783 Patent is directed toward retrieving and storing
`
`personal information from multiple sources and executing a transaction that is
`
`financial in nature based on that information.
`
`B.
`
`47.
`
`Prosecution History
`
`I understand that Application No. 09/428,511 (“the ’511 Application”)
`
`was filed on October 27, 1999 with claims 1–28. Ex. 1003, ’783 Patent File
`
`History at 32. I also understand that the ’511 Application claimed the benefit of
`
`Provisional Application Nos. 60/105,917 and 60/134,395, filed October 28, 1998
`
`and May 17, 1999, respectively. Id. at 35.
`
`17
`
`
`
`
`
`48.
`
`I understand that, during prosecution of the ’511 Application, the
`
`USPTO issued an Office Action in October 2000 in the ’511 Application, rejecting
`
`all of pending claims 1–28. Id. at 148. Specifically, claims 1–28 were rejected
`
`under nonstatutory, obviousness-type double patenting over
`
`then-pending
`
`Application No. 09/427,602 (“the ’602 Application”) and under 35 U.S.C. § 103(a)
`
`as being obvious over U.S. Patent No. 5,995,965 (“Experton”), in view of U.S.
`
`Patent No. 5,862,325 (“Reed”). Id. at 149–53.
`
`49.
`
`I understand that the Applicant filed a Reply to the Office Action,
`
`which included a Terminal Disclaimer over the ’602 Application to overcome the
`
`double patenting rejection, and added claims 29–36. Id. at 168. The Reply also
`
`included amendments to then-pending independent claims 1, 14, and 27 to
`
`overcome the obviousness rejection. For example, the Applicant amended
`
`independent claim 14 (which was renumbered as claim 1 in the ’783 Patent) as
`
`follows:
`
`14. (Once amended) A method for delivering non-public personal
`information relating to an end user via a computer network to [at least
`one] an end user from at least one of a plurality of information providers
`securely storing the personal information, the method comprising the
`steps of:
`(a) the processor connecting with at least one information provider;
`(b) for a selected end user, the processor retrieving personal information for
`the selected end user from the connected at least one information
`
`18
`
`
`
`
`
`provider based on end user data associated with the selected end user and
`information provider data associated with the connected one or more
`information providers,
`the end user data
`including
`information
`identifying the plurality of information providers securely storing the
`personal information relating to the end user, the provider data including
`a protocol for instructing the processor how to access the securely stored
`personal information via the network, the information accessible to the
`processor using the protocol also being accessible by the end user via the
`network independently of the system for delivering personal information;
`and
`(c) the processor storing the retrieved personal information in a personal
`information store for access by the selected end user.
`Id. at 164–65.
`
`50.
`
`I understand that the Applicant amended then-pending independent
`
`claims 1 and 27 in a similar manner. Id. at 164–66. Moreover, in its Remarks, the
`
`Applicant argued that, as amended, then-pending claims 1, 14, and 27 were
`
`patentable over Experton and Reed because, “[i]n Applicant’s invention, the
`
`information providers are those that an end user could alternatively choose to
`
`access in a conventional manner, i.e., independently of using the inventive
`
`system. . . . Neither Experton nor Reed addresses the issue of making access to
`
`multiple ones of such personal information providers more convenient by
`
`obviating a user contacting each provider individually.” Id. at 169 (italics
`
`removed). Thereafter, the Examiner allowed the ’511 Application, concluding that
`
`19
`
`
`
`
`
`prior art of record did not disclose or render obvious “an end user data including
`
`identifying the plurality of information providers securely storing the personal
`
`information relating to the end user, the provider data including a protocol for
`
`instructing the processor how to access
`
`the securely stored personal
`
`information.” Id. at 175 (emphases in the original). But as described below, the
`
`concept that the Examiner found to be novel and non-obvious—automatic
`
`authentication and gathering—was well known by the priority date of the ’783
`
`Patent.
`
`VII. CLAIM CONSTRUCTION
`
`51.
`
`I understand that for purposes of this covered business method review
`
`proceeding, in comparing the claim language to the prior art, I am to construe that
`
`claim language as a person of ordinary skill in the art at the time of the alleged
`
`invention would do in light of the specification. I also understand that in
`
`proceedings before the Board, patent claims are to be given their broadest
`
`reasonable interpretation, consistent with the teachings of the specification and file
`
`history.
`
`52.
`
`I have reviewed the claim constructions explicitly set forth in the
`
`Petition from that perspective and, in my opinion, believe the constructions are
`
`consistent with the broadest reasonable interpretations in light of the specification.
`
`At this time, I have no opinion as to whether these constructions would be the
`
`20
`
`
`
`
`
`proper constructions for any district court litigation involving the ’783 Patent.
`
`53. Moreover, for terms where a district court has adopted a different
`
`construction—for example in the Plaid Claim Construction (Ex. 1012), the
`
`CashEdge Claim Construction (Ex. 1009), or the Block Financial Claim
`
`Construction (Ex. 1010)—than that put forth by Petitioner, it is my opinion that the
`
`proposed ground of invalidity renders the claims not eligible for patenting under
`
`any of those constructions.
`
`54. To one of skill in the art at the time of the alleged invention, under the
`
`broadest reasonable interpretation standard, the term “non-public personal
`
`information” is primarily directed to financial information and covers “information
`
`that is personal to a specific end user, such as monthly bills, bank account
`
`balances, investments information, health care benefits, email, voice and fax
`
`messages, and 401(k) holdings or potentially any other information pertinent to a
`
`particular end user” that is secured by websites that require user log on (e.g., with a
`
`user name and password). See ’783 Patent at 4:12–21, 4:65–67; see also id. at
`
`2:58–63 (“stock portfolio or bank balance”); 4:47–51 (“checking account balance,”
`
`“portfolio information,” and “electricity bill”); see id. at 2:31–34, Figs. 4, 5; Ex.
`
`1003 at 168 (Applicant’s description of “non-public personal information” in the
`
`file history of the ’783 Patent ). “Non-public personal information” also includes
`
`“stock portfolio, local weather, sports scores.” Id. at 3:4–8. This construction is
`
`21
`
`
`
`
`
`consistent with the specification, the file history of the ’783 Patent, and the Block
`
`Financial and CashEdge Claim Constructions, as laid out in the Petition. See Ex.
`
`1009, CashEdge Claim Construction at 15 (“[I]nformation that is personal to a
`
`specific end user and not accessible to the general public”); Ex. 1010, Block
`
`Financial Claim Construction at 6–7 (“Information/data that is specific to an end
`
`user and requires verification and access data for retrieval.”).
`
`55. To one of skill i