throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_________________________
`
`PLAID TECHNOLOGIES, INC.
`Petitioner
`
`v.
`
`YODLEE, INC.
`Patent Owner
`_________________________
`Case No. CBM2016-______
`U.S. Patent No. 6,317,783
`_________________________
`
`DECLARATION OF TODD C. MOWRY IN SUPPORT OF PETITION FOR
`COVERED BUSINESS METHOD REVIEW OF U.S. PATENT NO. 6,317,783
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Plaid Technolgies Inc.
`Exhibit 1002
`
`

`
`
`
`TABLE OF CONTENTS
`
`Page
`INTRODUCTION AND QUALIFICATIONS ........................................... 1
`I.
`PROFESSIONAL QUALIFICATIONS ...................................................... 1
`II.
`III. LEVEL OF ORDINARY SKILL IN THE ART ........................................ 5
`IV. APPLICABLE LEGAL STANDARD ......................................................... 7
`A. Claim Construction................................................................................ 7
`B. Eligibility ............................................................................................... 7
`V. OVERVIEW OF THE ACCUSED TECHNOLOGY ................................ 8
`VI. THE ’783 PATENT .....................................................................................12
`A. Description of the ’783 Patent .............................................................12
`B. Prosecution History .............................................................................17
`VII. CLAIM CONSTRUCTION ........................................................................20
`VIII. CLAIMS 1–36 ARE DIRECTED TO AN ABSTRACT IDEA
`AND LACK AN INVENTIVE CONCEPT ...............................................27
`A. Claims 1–36 Are Directed to an Abstract Idea ...................................27
`B. Claims 1–36 Lack an Inventive Concept ............................................30
`C. Alternative CashEdge and Block Financial Claim
`Constructions .......................................................................................37
`IX. CONCLUSION ............................................................................................40
`
`
`i
`
`

`
`
`I.
`
`INTRODUCTION AND QUALIFICATIONS
`
`1.
`
`I have been retained on behalf of the Petitioner, Plaid Technologies,
`
`Inc., to provide this Declaration concerning technical subject matter relevant to the
`
`post-grant review of a covered business method patent, 6,317,783 (“the ’783
`
`Patent,” Ex. 1001).
`
`2.
`
`I am over 18 years of age. I have personal knowledge of the facts
`
`stated in this Declaration and could testify competently to them if asked to do so.
`
`II.
`
`PROFESSIONAL QUALIFICATIONS
`
`3.
`
`I am a Professor in the Department of Computer Science at Carnegie
`
`Mellon University. I also have a courtesy appointment in the Department of
`
`Electrical and Computer Engineering. I have served on the faculty of Carnegie
`
`Mellon University for nineteen (19) years starting in 1997 through the present
`
`(2016).
`
`4.
`
`I also served on the faculty of the University of Toronto for four (4)
`
`years between 1993 and 1997, in the Department of Electrical and Computer
`
`Engineering, and with a courtesy appointment in the Department of Computer
`
`Science. Prior to that appointment, I served as a Graduate Research Assistant in
`
`the Department of Electrical Engineering at Stanford University for four (4) years
`
`between 1989 and 1993.
`
`5.
`
`As a faculty member, I have taught and continue to teach courses and
`
`1
`
`

`
`
`
`directed research in computer systems and software, operating systems, distributed
`
`and network systems, object-oriented programming and design, and mobile
`
`computing.
`
`6.
`
`I received a B.S. degree in Electrical Engineering with Highest
`
`Distinction from the University of Virginia in May 1988. I received an M.S. in
`
`Electrical Engineering from Stanford University in June 1989, and a Ph.D. in
`
`Electrical Engineering from Stanford University in March 1994.
`
`7.
`
`I have worked in the computer industry in various capacities. I was a
`
`part-time Computer Architect and then a Computer Architecture Consultant at
`
`Silicon Graphics, Inc. in Mountain View, California (formerly MIPS Computer
`
`Systems in Sunnyvale, California) from 1989 to 1993 and 1993 to 1996,
`
`respectively. I was a Visiting Scientist at IBM in Toronto from 1996 to 2004.
`
`During that same time period (1996 to 2004), I was also a Member of the
`
`Technical Advisory Board of SandCraft, Inc. in Santa Clara, California. I was the
`
`Director of the Intel Research Pittsburgh Lab at Intel Corporation in Pittsburgh,
`
`Pennsylvania from 2004 to 2007.
`
`8.
`
`I have authored 19 journal articles and 55 conference papers. I am
`
`also an inventor on five patents.
`
`9.
`
`I have published a number of papers in the top research conferences in
`
`the fields of operating systems and data storage and retrieval (including the paper
`
`2
`
`

`
`
`
`that won the Best Paper Award at the USENIX 2nd Symposium on Operating
`
`Systems Design and Implementation (OSDI ’96)). I have also been an active
`
`member of the Parallel Data Lab at Carnegie Mellon University since 1997,
`
`described as “academia’s premiere storage systems research center.”1
`
`10.
`
`I am the recipient of several honors and awards: the Arthur Samuel
`
`Thesis Award (awarded by the Stanford Computer Science department to the top
`
`two Ph.D. theses in a given year), several IBM Faculty Development Awards
`
`(1996, 1997, 1998, 2000, 2001, 2002, and 2003), several Best Paper Awards (the
`
`Second Symposium on Operating Systems Design and Implementation in 1996;
`
`the 20th International Conference on Data Engineering (ICDE) in 2004), the
`
`Alfred P. Sloan Research Fellowship (awarded to researchers in recognition of
`
`distinguished performance and a unique potential to make substantial contributions
`
`to their field), the Most Thought-Provoking Idea Award (awarded by the
`
`Architectural Support for Programming Languages and Operating Systems
`
`(ASPLOS), in 2004), and the TR100 Award (awarded by MIT’s Technology
`
`Review magazine to the top 100 most promising young innovators in science and
`
`technology, in 1999).
`
`11.
`
`I am a member of the Institute of Electrical and Electronics Engineers
`
`
`1 See the Parallel Data Lab website at http://www.pdl.cmu.edu/.
`
`3
`
`

`
`
`
`(IEEE) and the Association of Computing Machinery (ACM). I am the Editor-in-
`
`Chief of ACM Transactions on Computer Systems (since 2013), which is the
`
`premier journal for computer systems research. I was an Associate Editor for the
`
`journal prior to that, beginning in 2001. I was the Program Chair of the
`
`International Conference on Architectural Support for Programming Languages
`
`and Operating Systems (ASPLOS) in 2010. I was the Co-Program Chair of the
`
`International Conference on Parallel Architectures and Compilation Techniques
`
`(PACT) in 2001. I have been on the programming committee in various years for
`
`ASPLOS, the International Symposium on Computer Architecture (ISCA), the
`
`International Symposium on Microarchitectures, and
`
`the Workshop on
`
`Architectural and System Support for Improving Format.
`
`12. Overall, I have over twenty-three (23) years of experience in the field
`
`of computer science and, specifically, computer architecture, compiler
`
`optimizations, operating systems, and parallel processing. A copy of my
`
`curriculum vitae, including references to the publications I authored, is attached to
`
`this Declaration as Appendix A.
`
`13.
`
`In light of the foregoing, I consider myself to be an expert in the field
`
`of computer science, and believe that I am qualified to provide an opinion as to
`
`what a person of ordinary skill in the art would have understood, known, or
`
`concluded regarding the subject matter of the ’783 Patent at the time of its alleged
`
`4
`
`

`
`
`
`invention.
`
`14.
`
`I am being compensated for the time I have spent on this action at my
`
`customary rate of $600 per hour, plus reimbursement for expenses. My
`
`compensation does not depend in any way upon the opinions or testimony that I
`
`provide or the outcome of this action.
`
`15. My opinions expressed herein are based on review and analysis of
`
`certain information obtained in connection with my work on this matter, together
`
`with my training, education, and experience. The opinions expressed herein are
`
`my own.
`
`16.
`
`In my analysis, I considered the ’783 Patent and its file history, as
`
`well as the prior art and other documentation discussed below.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`17. Throughout
`
`this Declaration, I consider
`
`the
`
`issues from
`
`the
`
`perspective of a person having ordinary skill in the art in or around October 1998,
`
`the earliest date to which the ’783 Patent could claim priority.
`
`18. The ’783 Patent is titled “Apparatus and methods for automated
`
`aggregation and delivery of and transactions involving electronic personal
`
`information or data” and describes a process for automated aggregation, retrieval
`
`and delivery of personal information. Generally categorized, the ’783 Patent deals
`
`with methods for logging into websites and gathering personal data from them.
`
`5
`
`

`
`
`
`19.
`
`In determining the characteristics of a hypothetical person of ordinary
`
`skill in the art around October 1998 for the technology described in the ’783
`
`Patent, I considered a number of factors, including how web-based information
`
`retrieval systems were designed and implemented at and before that time, the
`
`nature of problems encountered in this field, and the pace at which innovations
`
`were made at that time. I also considered the educational background and
`
`experience of those actively working in the field.
`
`20.
`
`It is my opinion that for the purposes of the ’783 Patent, a person of
`
`ordinary skill in the art, at the time the patent was filed, would be one having a
`
`Bachelor’s Degree in electrical engineering, computer science, or a related
`
`scientific field, and some work experience in the computer science field, which
`
`could include programming experience. Alternatively, a person of ordinary skill in
`
`the art would possess a combination of education and experience in certain
`
`relevant fields of computer science, such as graphical user interface design, and
`
`knowledge of software design, data structures, operating systems, archiving
`
`systems, and client-server computing. I recognize that someone with less technical
`
`education but more practical experience, or more technical education but less
`
`practical experience, could also have been considered a personal of ordinary skill
`
`in the art.
`
`6
`
`

`
`
`IV. APPLICABLE LEGAL STANDARD
`
`A. Claim Construction
`
`21.
`
`I have been informed by counsel and therefore understand that the
`
`first step in determining the validity of an asserted claim is for the claim to be
`
`properly construed.
`
`22.
`
`I understand that in proceedings before the Board, patent claims are to
`
`be given their broadest reasonable interpretation, consistent with the teachings of
`
`the specification and file history.
`
`23.
`
`I have reviewed Petitioner’s proposed constructions as explicitly
`
`identified in the Petition, and I agree that those constructions reflect the broadest
`
`reasonable interpretation of those claims. I understand that the Board has not yet
`
`construed the terms in this proceeding, and I reserve the right to supplement this
`
`Declaration based on alternative constructions proposed by the Patent Owner and
`
`the constructions adopted by the Board to the extent that these constructions differ
`
`from those proposed by Petitioner.
`
`B.
`
`24.
`
`Eligibility
`
`I understand that patent claims must be directed to patent-eligible
`
`subject matter under 35 U.S.C. § 101. I am informed that determining patent
`
`eligibility is a two-step process. I understand the first step is determining whether
`
`patent claims are directed to a patent-ineligible concept, such as laws of nature,
`
`7
`
`

`
`
`
`natural phenomena, and abstract ideas. I understand that a claim is not patent-
`
`eligible merely because it uses technical language and language from the art.
`
`Rather, subject matter is patent-eligible if the claims, properly construed,
`
`incorporate enough meaningful limitations to ensure that what is claimed is more
`
`than just an abstract idea.
`
`25.
`
`I understand that if the claims are in fact directed to an abstract idea,
`
`then the second step in determining patent eligibility is to ask whether the claims
`
`do significantly more than describe that abstract idea. I am informed that a claim
`
`that recites an abstract idea must contain an inventive concept to transform the
`
`abstract idea into patent-eligible subject matter. It is my understanding that
`
`appending conventional steps specified at a high level of generality is not enough
`
`to supply an inventive concept, nor does limiting the use of an abstract idea to a
`
`particular technological environment, such as a generic computer, alter this
`
`analysis. I am also informed that a computer’s basic functions, such as electronic
`
`recordkeeping, obtaining data, adjusting account balances, and issuing automated
`
`instructions, cannot provide the inventive concept.
`
`V. OVERVIEW OF THE ACCUSED TECHNOLOGY
`
`26. By the early-to-mid 1990s, computers had started to become
`
`household items, and the world saw an explosion of content become available to
`
`individuals using the World Wide Web. As people’s connectivity increased, so too
`
`8
`
`

`
`
`
`did their ability to “access various types of information, disseminate information,
`
`and be exposed to electronic commerce activities, all with a great degree of
`
`freedom.” U.S. Patent No. 6,401,118 (“Thomas”) (Ex. 1008) at 1:18–29.
`
`27. While the proliferation of web-based content increased access to
`
`information, it also brought with it the problem of finding efficient, user-friendly
`
`methods for accessing that data. General purpose computers were being
`
`programmed to collect data from the Web and aggregate the collected data. As a
`
`result, software solutions that provided for the collection and delivery of data on
`
`the Web had become well known to those of ordinary skill in the art before
`
`October 1998.
`
`28.
`
`In one example, in describing the state of the art, the specification of
`
`the ’783 Patent explains that “the portal strategy was successfully adopted as an
`
`efficient way for consumers to easily access a variety of content sources in a
`
`single, easy to use format.” ’783 Patent at 1:50–53. However, “[a]s the volume of
`
`available online content continues to grow exponentially, portals are now
`
`confronted with the need to make different types of content available to different
`
`consumers based upon their particular preferences and tastes.” Id. at 1:53–57.
`
`“Acquiring online [personal information]” from websites using a computer was
`
`already well known in the art, as the ’783 Patent admits. See id. at 2:3–4, Figs. 1,
`
`4. Portal sites, such as Yahoo and Excite, were already able to “aggregate”
`
`9
`
`

`
`
`
`personal information. Id. at 2:42–63.
`
`29.
`
`In another example, U.S. Patent No. 6,278,449 (“Sugiarto”) (Ex.
`
`1004) describes a system that “collect[s] information from various web pages from
`
`the worldwide web internet, configure[s] this various information in accordance
`
`with a predefined user configuration file, defined by a particular user, and
`
`transmit[s] the configured various information to a highly portable internet access
`
`device.” Sugiarto, Ex. 1004, at 2:10–17. Sugiarto teaches a system that provides a
`
`user with a customized Web page that includes data sourced from one or more
`
`Web sites of the user’s choosing, e.g., CNN, ESPN, and/or Nasdaq. Id. at 4:36–53.
`
`30. As new aggregation and delivery services developed, those of
`
`ordinary skill in the art further recognized that much of the personal information
`
`available on the Web is protected by well-known computer techniques like
`
`requiring the provision of credentials (username and password) —a process often
`
`called authentication. In order to automate and streamline this process, skilled
`
`artisans developed simulated web clients that imitated the user providing his or her
`
`credentials. Just as personal information at a bank is often protected by requiring
`
`the user to show credentials, online personal information is protected. To retrieve
`
`personal information from places where authentication was required, the idea of a
`
`proxy or agent in the real world was applied so that the computer acted as a proxy
`
`or agent for the user by providing the user’s credentials on his or her behalf.
`
`10
`
`

`
`
`
`31.
`
`In one example, U.S. Patent No. 5,892,905 (“Brandt”) (Ex. 1005)
`
`describes “the capability to easily access many different application programs over
`
`the WWW via a standardized [graphical user interface].” Brandt, Ex. 1005, at
`
`3:57–60. In Brandt, an application (also called a “gateway”) accesses a user
`
`library to obtain authentication data needed to access software applications for the
`
`user. Id. at 12:15–17. The application then logs the user onto a requested service
`
`using normal security procedures. Id. at 12:15–28.
`
`32. Using some sort of verification or access, such as a log in or
`
`password, and even automating that process, was extremely well known in the art.
`
`For example, U.S. Patent No. 6,006,333 (“Nielsen”) (Ex. 1006) discloses a
`
`password helper that automatically presents stored passwords to access a plurality
`
`of remote servers by employing a master password. E.g., Nielsen, Ex. 1006, at
`
`[57]; 1:12–16 (“Many remotely accessible computer systems require user
`
`authentication. The user, presumably operating a client system, must be registered
`
`with the remote system and must type in his or her user ID and a password for that
`
`remote system every time it is accessed”); 1:31–52, 4:9–25, 4:54-56, Figs. 2–4.
`
`33. Likewise, in 1998, end users often could not determine if server
`
`information changed given the Web’s client-server model. U.S. Patent No.
`
`6,029,175 (“Chow”) (Ex. 1007) sought to address this problem within the existing
`
`client-server architecture, disclosing a software agent, termed a “Revision
`
`11
`
`

`
`
`
`Manager” to monitor content at a server. Chow, Ex. 1007, at 3:60–64. The
`
`Revision Manager accepts user input indicating the user’s interest in monitoring a
`
`document. Id. at 5:32–34. In response, the Revision Manager “spontaneously
`
`monitors the server to notice if the document has been modified.” Id. at 6:2–4.
`
`Other references at the time also disclosed methods for computers that perform
`
`online monitoring activities. Thomas, Ex. 1008 at [57], 2:36–51. Thus,
`
`monitoring for changes was also well known in the art.
`
`34. Systems and methods for data aggregation and storage underwent
`
`significant developments during this time period. Thus, those of skill in the art
`
`would have been aware of the teachings of the above disclosures.
`
`VI. THE ’783 PATENT
`
`A. Description of the ’783 Patent
`
`35. The ’783 Patent relates to “an apparatus and process for automated
`
`aggregation and delivery of electronic personal information or data (PI)” and
`
`“automation of transactions involving electronic PI.” ’783 Patent at 1:23–26, as
`
`shown in Figure 2 (below). The “present invention” is facilitating the “end user
`
`access of, manipulation of and transactions involving electronic PI” such as “stock
`
`portfolio, local weather, sports scores, bank account balances or other pertinent
`
`information or data” and “a variety of electronic transactions involving PI such as
`
`stock trading, retail purchases, bill payment, bank account fund transfers or other
`
`12
`
`

`
`
`
`transactions.” Id. at 3:5–9, 15–19.
`
`36. Personal information is “all of the data that companies, information
`
`providers, have that is specific or unique to each person such as monthly bills,
`
`bank account balances, investments information, health care benefits, email, voice
`
`and fax messages, 401(k) holdings or potentially any other information pertinent to
`
`a particular end user.” Id. at 4:12–21, 4:65–67.
`
`37. A number of sources for this information are discussed in the
`
`specification, including various websites for “Banking & Investments,” “Phone
`
`Bill[s],” “Power Bill[s],” “Cable Bill[s],” “Health and Employee Benefits,” “Credit
`
`Cards & Mortgages,” “Communications & Messages (Email, Fax, Voice),” and
`
`other portal generic content. See id. at 2:31–34, Fig. 4; see also id. Fig. 5.
`
`38. The specification of the ’783 Patent discloses a system for delivering
`
`personal information wherein the system includes “a user store including end user
`
`data, a provider store including information provider data, a personal information
`
`store including personal information and a processor that communicates with these
`
`data stores.” Id. at 3:20–24. The processor “retrieve[s] personal information for
`
`the selected end user from the connected information providers.” Id. at 3:28–31.
`
`39. Figure 2, reproduced below, provides a visual of the basic components
`
`used to implement the alleged invention:
`
`13
`
`

`
`
`
`
`
`Id., Fig. 2. According to the specification, an end user 210 accesses a client
`
`computer 220 that connects to the Internet 230 to access a PI engine 240 running
`
`on a PI host 290. Id. at 4:29–34. The ’783 Patent further discloses that client
`
`software 270 “could be a general Web browser such as Navigator or
`
`Communicator (Netscape).” Id. at 4:29–34, 4:39–46.
`
`40. The PI engine 240 (shown in Fig. 3 below) running on PI host 290
`
`examines stored PI 280 and refreshes it by directly reacquiring the PI from the
`
`particular information provider’s Web site 250 running on the provider’s computer
`
`system 260. Id. at 4:33–39. For example, “the end user’s checking account
`
`balance would be updated through his bank’s Web site” and “his portfolio
`
`14
`
`

`
`
`
`information from his broker’s site and his electricity bill from his electricity
`
`company’s site.” Id. at 4:47–51. PI engine 240 accesses multiple provider web
`
`sites for a single end user. Id., Fig. 5; id. at 4:60–62, 6:55–67. The components of
`
`the PI engine are illustrated in more detail in Figure 3:
`
`
`
`Id., Fig. 3; see id. at 4:52–5:8.
`
`41. The PI Engine includes a “PI access/transact component,” which
`
`“supports the update, acquisition and transaction functionality of the PI engine.”
`
`Id. at 9:30–32. “For each piece of PI requiring access or update,” the PI
`
`access/transact component “looks up the access procedure and information needed
`
`for the particular personal information in the Provider store” as well as
`
`“verification and access data,” which is found in the user store. Id. at 9:38–41. “A
`
`15
`
`

`
`
`
`simulated Web client could perform access or transaction processes automatically
`
`supplying access and verification data as necessary.” Id. at 9:59–61.
`
`42. The PI engine 240 also stores the aggregated personal information in
`
`its store 280 and delivers the PI to a selected destination, for example across the
`
`Internet 230 to the client computer 220 which displays the information to the end
`
`user 210 using the client software 270. Id. at 4:39–46.
`
`43.
`
`“The present invention also contemplates indirect access of PI by the
`
`end user utilizing a Web site as an intermediary.” Id. at 9:15–21. The ’783 Patent
`
`further discloses delivery of “an access point directly to the provider’s page
`
`supplying that PI. The access point may take the form of a link, a form button or
`
`some other interactive access mechanism.” Id. at 14:24–67. A “novel transaction
`
`model” is also disclosed, using that “intermediary website,” that allows the PI
`
`engine administrator to levy a fee, which “subsidizes” or “fully compensates” the
`
`“PI engine administrator for services provided.” Id. at 14:3–15, Fig. 11. That
`
`“fee”—which can be “per user,” “per transaction,” or “per access”—is “directly
`
`charged” or “debited from a minimum monthly fee.” Id. at 14:3–24.
`
`44.
`
`In addition, the ’783 Patent describes “automated or semi-automated
`
`account management by providing trigger events to automatically initiate a
`
`transaction.” Id. at 16:8–10; see id. at 16:11–24 (adding automation of
`
`“payments,” notification of bills due, and notification of payments), 16:31–38,
`
`16
`
`

`
`
`
`Figs. 2–3. The PI access/transaction component 340 in Figure 3 uses “standard e-
`
`commerce bill-paying methods to pay the user’s bill/s to the provider if he/she
`
`chooses.” Id. at 16:25–31.
`
`45. A person of ordinary skill in the art at the relevant time would have
`
`appreciated that the end user in the ’783 Patent is a specific natural person because
`
`the end user is the operator of desktop computer 220. To access his or her PI, an
`
`end user may be required to “login” to the system, i.e., request access to his or her
`
`PI. Id. at 7:16–18, 10:30–44 (“[T]he act of logging into the system by an end user
`
`effectively selects that end user for immediate PI update.”). Moreover, the PI that
`
`is aggregated and sent to the end user is “specific to the end user requiring identity
`
`verification for access.” Id. at 4:22–26.
`
`46. At bottom, the ’783 Patent is directed toward retrieving and storing
`
`personal information from multiple sources and executing a transaction that is
`
`financial in nature based on that information.
`
`B.
`
`47.
`
`Prosecution History
`
`I understand that Application No. 09/428,511 (“the ’511 Application”)
`
`was filed on October 27, 1999 with claims 1–28. Ex. 1003, ’783 Patent File
`
`History at 32. I also understand that the ’511 Application claimed the benefit of
`
`Provisional Application Nos. 60/105,917 and 60/134,395, filed October 28, 1998
`
`and May 17, 1999, respectively. Id. at 35.
`
`17
`
`

`
`
`
`48.
`
`I understand that, during prosecution of the ’511 Application, the
`
`USPTO issued an Office Action in October 2000 in the ’511 Application, rejecting
`
`all of pending claims 1–28. Id. at 148. Specifically, claims 1–28 were rejected
`
`under nonstatutory, obviousness-type double patenting over
`
`then-pending
`
`Application No. 09/427,602 (“the ’602 Application”) and under 35 U.S.C. § 103(a)
`
`as being obvious over U.S. Patent No. 5,995,965 (“Experton”), in view of U.S.
`
`Patent No. 5,862,325 (“Reed”). Id. at 149–53.
`
`49.
`
`I understand that the Applicant filed a Reply to the Office Action,
`
`which included a Terminal Disclaimer over the ’602 Application to overcome the
`
`double patenting rejection, and added claims 29–36. Id. at 168. The Reply also
`
`included amendments to then-pending independent claims 1, 14, and 27 to
`
`overcome the obviousness rejection. For example, the Applicant amended
`
`independent claim 14 (which was renumbered as claim 1 in the ’783 Patent) as
`
`follows:
`
`14. (Once amended) A method for delivering non-public personal
`information relating to an end user via a computer network to [at least
`one] an end user from at least one of a plurality of information providers
`securely storing the personal information, the method comprising the
`steps of:
`(a) the processor connecting with at least one information provider;
`(b) for a selected end user, the processor retrieving personal information for
`the selected end user from the connected at least one information
`
`18
`
`

`
`
`
`provider based on end user data associated with the selected end user and
`information provider data associated with the connected one or more
`information providers,
`the end user data
`including
`information
`identifying the plurality of information providers securely storing the
`personal information relating to the end user, the provider data including
`a protocol for instructing the processor how to access the securely stored
`personal information via the network, the information accessible to the
`processor using the protocol also being accessible by the end user via the
`network independently of the system for delivering personal information;
`and
`(c) the processor storing the retrieved personal information in a personal
`information store for access by the selected end user.
`Id. at 164–65.
`
`50.
`
`I understand that the Applicant amended then-pending independent
`
`claims 1 and 27 in a similar manner. Id. at 164–66. Moreover, in its Remarks, the
`
`Applicant argued that, as amended, then-pending claims 1, 14, and 27 were
`
`patentable over Experton and Reed because, “[i]n Applicant’s invention, the
`
`information providers are those that an end user could alternatively choose to
`
`access in a conventional manner, i.e., independently of using the inventive
`
`system. . . . Neither Experton nor Reed addresses the issue of making access to
`
`multiple ones of such personal information providers more convenient by
`
`obviating a user contacting each provider individually.” Id. at 169 (italics
`
`removed). Thereafter, the Examiner allowed the ’511 Application, concluding that
`
`19
`
`

`
`
`
`prior art of record did not disclose or render obvious “an end user data including
`
`identifying the plurality of information providers securely storing the personal
`
`information relating to the end user, the provider data including a protocol for
`
`instructing the processor how to access
`
`the securely stored personal
`
`information.” Id. at 175 (emphases in the original). But as described below, the
`
`concept that the Examiner found to be novel and non-obvious—automatic
`
`authentication and gathering—was well known by the priority date of the ’783
`
`Patent.
`
`VII. CLAIM CONSTRUCTION
`
`51.
`
`I understand that for purposes of this covered business method review
`
`proceeding, in comparing the claim language to the prior art, I am to construe that
`
`claim language as a person of ordinary skill in the art at the time of the alleged
`
`invention would do in light of the specification. I also understand that in
`
`proceedings before the Board, patent claims are to be given their broadest
`
`reasonable interpretation, consistent with the teachings of the specification and file
`
`history.
`
`52.
`
`I have reviewed the claim constructions explicitly set forth in the
`
`Petition from that perspective and, in my opinion, believe the constructions are
`
`consistent with the broadest reasonable interpretations in light of the specification.
`
`At this time, I have no opinion as to whether these constructions would be the
`
`20
`
`

`
`
`
`proper constructions for any district court litigation involving the ’783 Patent.
`
`53. Moreover, for terms where a district court has adopted a different
`
`construction—for example in the Plaid Claim Construction (Ex. 1012), the
`
`CashEdge Claim Construction (Ex. 1009), or the Block Financial Claim
`
`Construction (Ex. 1010)—than that put forth by Petitioner, it is my opinion that the
`
`proposed ground of invalidity renders the claims not eligible for patenting under
`
`any of those constructions.
`
`54. To one of skill in the art at the time of the alleged invention, under the
`
`broadest reasonable interpretation standard, the term “non-public personal
`
`information” is primarily directed to financial information and covers “information
`
`that is personal to a specific end user, such as monthly bills, bank account
`
`balances, investments information, health care benefits, email, voice and fax
`
`messages, and 401(k) holdings or potentially any other information pertinent to a
`
`particular end user” that is secured by websites that require user log on (e.g., with a
`
`user name and password). See ’783 Patent at 4:12–21, 4:65–67; see also id. at
`
`2:58–63 (“stock portfolio or bank balance”); 4:47–51 (“checking account balance,”
`
`“portfolio information,” and “electricity bill”); see id. at 2:31–34, Figs. 4, 5; Ex.
`
`1003 at 168 (Applicant’s description of “non-public personal information” in the
`
`file history of the ’783 Patent ). “Non-public personal information” also includes
`
`“stock portfolio, local weather, sports scores.” Id. at 3:4–8. This construction is
`
`21
`
`

`
`
`
`consistent with the specification, the file history of the ’783 Patent, and the Block
`
`Financial and CashEdge Claim Constructions, as laid out in the Petition. See Ex.
`
`1009, CashEdge Claim Construction at 15 (“[I]nformation that is personal to a
`
`specific end user and not accessible to the general public”); Ex. 1010, Block
`
`Financial Claim Construction at 6–7 (“Information/data that is specific to an end
`
`user and requires verification and access data for retrieval.”).
`
`55. To one of skill i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket