throbber
USAA 1045
`USAA v. Asghari-Kamrani et al.
`CBM2016-00063
`CBM2016-00064
`
`

`
`In the Claims:
`
`Please amend the claims as follows:
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`1. (Currently Amended) A method for authenticating a user during an electronic
`
`transaction between the user and an EXtemal—Entity, the method comprising:
`
`receiving electronically a request for a dynamic SecureCode for the user by a Central-
`
`Entity during the transaction between the user and the EXternal—Entity;
`
`generating during the transaction a dynamic SecureCode for the user in response to the
`
`request, wherein the dynamic SecureCode is valid for a predefined time and becomes invalid
`
`after being used;
`
`providing said generated SecureCode to the user during the transaction;
`
`receiving electronicallyb% by the Central—Entity a request for
`
`authenticating the user based on a digital identity during the transaction, which digital identity
`
`includes the SecureCode; and
`
`authenticating by the Central—Entity the user during the transaction if the digital identity is
`
`valid.
`
`Please cancel claims 2-3 without disclaimer of or prejudice to the subject matter
`
`contained therein.
`
`2. (Cancelled) A method as recited in claim 1, wherein said user has a pre—eXisting
`
`relationship with the EXternal—Entity.
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`3. (Cancelled) A method as recited in claim 1, wherein said user has no pre—eXisting
`
`relationship with the EXternal—Entity.
`
`4. (Currently Amended) A method as recited in claim 1, further comprising:
`
`combining said generated SecureCode with a user—specific information using a
`
`predetermined algorithm to form a combined Secure—Code and user specific information;
`
`maintaining the combined Secure—Code and user specific information at the Central-
`
`Entity;
`
`
`
`comparing the combined Secure—Code and user specific information with a received
`
`combined Secure—Code and user specific informationm%%
`
`to validate the user.
`
`5-1 1. (Cancelled)
`
`12. (Previously Presented) A method as recited in claim 1, wherein said EXternal—Entity
`
`receives the user’s digital identity.
`
`13. (Previously Presented) A method as recited in claim 1, wherein said EXternal—Entity
`
`submits a digital identity to the Central—Entity.
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`14. (Previously Presented) The method of claim 1, wherein said digital identity includes a
`
`user—specific information.
`
`15. (Previously Presented) The method of claim 14, wherein the user specific information
`
`comprises one or more of the following: an alphanumeric name, an ID, a login name, and an
`
`identification phrase.
`
`16. (Original) The method of claim 1, wherein the transaction corresponds to a financial
`
`transaction.
`
`17. (Original) The method of claim 1, wherein the transaction corresponds to a non-
`
`financial transaction.
`
`18. (Previously Presented) The method of claim 1, wherein the transaction corresponds to
`
`access to restricted web—site or restricted computer/server.
`
`19. (Previously Presented) The method of claim 1, wherein said transaction occurs over a
`
`communication network, wherein said communication network comprises one or more of the
`
`following: an Internet, a wireless network, a mobile network, a satellite network, and a private
`
`network.
`
`20. (Previously Presented) The method of claim 1, wherein said transaction occurs over a
`
`communication network to which is coupled said user, said Central—Entity, and said EXtemal—
`
`

`
`Entity.
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`21. (Previously Presented) An apparatus for authenticating a user during an electronic
`
`transaction with an EXternal—Entity, the apparatus comprising:
`
`a first Central—Entity computer adapted to:
`
`generate a dynamic SecureCode for the user in response to a request during the
`
`transaction, wherein the dynamic SecureCode is Valid for a predefined time and becomes
`
`invalid after being used; and
`
`provide said SecureCode to the user;
`
`a second Central—Entity computer adapted to validate a digital identity, which includes
`
`said SecureCode, and authenticate the user if the digital identity is valid.
`
`22. (Previously Presented) The apparatus as recited in claim 21, wherein said user has a
`
`pre—eXisting relationship with the EXternal—Entity.
`
`23. (Previously Presented) The apparatus as recited in claim 21, wherein said user has no
`
`pre—eXisting relationship with the EXternal—Entity.
`
`24. (Previously Presented) The apparatus as recited in claim 21, wherein said EXtemal—
`
`Entity and said Central—Entity use a SecureCode that is algorithmically combined with said user-
`
`specific information.
`
`25-31. (Cancelled)
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`32. (Previously Presented) The apparatus as recited in claim 21, wherein the user submits
`
`a digital identity to the EXternal—Entity.
`
`33. (Previously Presented) The apparatus as recited in claim 21, wherein the External-
`
`Entity submits a digital identity to the Central—Entity.
`
`34. (Previously Presented) The apparatus of claim 21, wherein the digital identity
`
`includes a user—specific information.
`
`35. (Previously Presented) The apparatus of claim 34, wherein the user specific
`
`information comprises one or more of the following; an alphanumeric name, an ID, a login name,
`
`and an identification phrase.
`
`36. (Previously Presented) The apparatus of claim 21, wherein the transaction
`
`corresponds to a financial transaction.
`
`37. (Previously Presented) The apparatus of claim 21, wherein the transaction
`
`corresponds to a non—financial transaction.
`
`38. (Previously Presented) The apparatus of claim 21, wherein the transaction
`
`corresponds to access to restricted web—site or restricted computer/server.
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`39. (Previously Presented) The apparatus of claim 21, wherein said transaction occurs
`
`over a communication network and wherein said communication network comprises one or more
`
`of the following; an Internet, a wireless network, a mobile network, a satellite network, and a
`
`private network.
`
`40. (Previously Presented) The apparatus of claim 21, wherein said transaction occurs
`
`over a communication network to which is coupled said user, said Central—Entity, and said
`
`EXtemal—Entity.
`
`41. (Currently Amended) A method as recited in claim 4, wherein said%H
`
`uesi-nAg—s-aid algorithmically combined SecureCode and user specific information is used to
`
`authenticate a user’s identity.
`
`42. (Cancelled)
`
`43. (Previously Presented) A method as recited in claim 4, wherein said Central—Entity is
`
`using said algorithmically combined SecureCode to authenticate a user’s identity.
`
`44. (Original) A method as recited in claim 1, wherein said EXternal—Entity and said
`
`Central—Entity are the same entity.
`
`45. (Previously Presented) The method as recited in claim 1, wherein said Central—Entity
`
`invalidates the SecureCode after authenticating the user.
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`46. (Previously Presented) The method as recited in claim 1, wherein the Central—Entity
`
`invalidates the SecureCode after a predefined period of time passes from when the SecureCode
`
`was generated.
`
`47. (Previously Presented ) The method as recited in claim 1, wherein said Central—Entity
`
`generates the SecureCode with dependence on the user information.
`
`48. (Previously Presented) The method as recited in claim 47, wherein said user
`
`information comprises one or more of the following: an alphanumeric name, an ID, a login name,
`
`and an identification phrase.
`
`49. (Cancelled)
`
`50. (Previously Presented) A method for authenticating a user during an electronic
`
`transaction between the user and an EXtemal—Entity, the method comprising:
`
`receiving electronically a request for a dynamic SecureCode for the user by a Central-
`
`Entity during the transaction between the user and the EXternal—Entity;
`
`generating during the transaction a dynamic SecureCode for the user in response to the
`
`request, wherein the dynamic SecureCode is valid for a predefined time and becomes invalid
`
`after being used;
`
`providing said generated SecureCode to the user during the transaction;
`
`receiving electronically by a Central—Entity a request for authenticating the user based on
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`a digital identity during the transaction, which digital identity includes the SecureCode; and
`
`authenticating by the Central—Entity the user during the transaction if the digital identity is
`
`valid, wherein said SecureCode is alphanumeric.
`
`51. (Original) The method as recited in claim 1, wherein said user communicates with
`
`said Central—Entity over a communication network.
`
`52. (Previously Presented) An apparatus for authenticating a user during an electronic
`
`transaction with an EXternal—Entity, the apparatus comprising:
`
`a first Central—Entity computer adapted to:
`
`generate a dynamic SecureCode for the user in response to a request during the
`
`transaction, wherein the dynamic SecureCode is valid for a predefined time and becomes
`
`invalid after being used; and
`
`provide said SecureCode to the user;
`
`a second Central—Entity computer adapted to validate a digital identity, which includes
`
`said SecureCode, and authenticate the user if the digital identity is valid, wherein said
`
`SecureCode is alphanumeric.
`
`53. (Original) The method as recited in claim 1, wherein said user communicates with
`
`said EXtemal—Entity over a communication network.
`
`54. (Previously Presented) The apparatus as recited in claim 21, wherein said user
`
`communicates with said Central—Entity over a communication network.
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`55. (Previously Presented) The apparatus as recited in claim 21, wherein said user
`
`communicates with said EXternal—Entity over a communication network.
`
`56-57. (Cancelled)
`
`58. (Previously Presented) The method as recited in claim 1, wherein said SecureCode is
`
`generated based on a request submitted by said user over a communication network.
`
`59. (Cancelled)
`
`60. (Previously Presented) The method as recited in claim 58, wherein said request is
`
`initiated by said user through a standard interface provided to said user.
`
`6 l -62. (Cancelled)
`
`63. (Previously Presented) The apparatus according to claim 21, wherein said first
`
`Central—Entity computer and said second Central—Entity computer are the same.
`
`64. (Previously Presented) The apparatus according to claim 21, wherein said first
`
`Central—Entity computer and said second Central—Entity computer are different.
`
`65. (Previously Presented) A method as recited in claim 1, wherein said digital identity
`
`-10-
`
`

`
`comprises the SecureCode and a user—specific information.
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`66. (Previously Presented) A method as recited in claim 1, wherein said digital identity
`
`comprises the SecureCode.
`
`67. (Previously Presented) A method as recited in claim 1, wherein said digital identity is
`
`invalid if the SecureCode is invalid.
`
`68. (Previously Presented) A method as recited in claim 1, wherein said digital identity is
`
`valid if at least the SecureCode is valid.
`
`69. (Previously Presented) A method as recited in claim 1, wherein said EXternal—Entity
`
`authenticates the user upon receiving an affirmation authentication message from the Central-
`
`Entity.
`
`70. (Previously Presented) A method as recited in claim 1, wherein said EXternal—Entity
`
`authenticates the user if said Central—Entity authenticates the user based on the SecureCode.
`
`71. (Previously Presented) The apparatus of claim 21, wherein said digital identity is
`
`invalid if the SecureCode is invalid.
`
`72. (Previously Presented) The apparatus of claim 21, wherein said digital identity is
`
`valid if at least the SecureCode is valid.
`
`-11-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`73. (Previously Presented) The apparatus of claim 21, wherein said EXternal—Entity
`
`authenticates the user upon receiving an affirmation authentication message from the Central-
`
`Entity.
`
`74. (Previously Presented) The apparatus of claim 21, wherein said digital identity
`
`comprises the SecureCode.
`
`75. (Previously Presented) The apparatus of claim 21, wherein said Central—Entity
`
`invalidates the SecureCode after authenticating the user.
`
`76. (Previously Presented) The apparatus of claim 21, wherein the Central—Entity
`
`invalidates the SecureCode after a predefined period of time passes after the SecureCode was
`
`generated.
`
`77. (Previously Presented) The apparatus of claim 21, wherein said Central—Entity
`
`generates the SecureCode based on said user information.
`
`78. (Previously Presented) The apparatus of claim 77, wherein said user information
`
`comprises one or more of the following: an alphanumeric name, an ID, a login name, a password,
`
`and an identification phrase.
`
`79. (Previously Presented) The method of claim 65, wherein the user specific information
`
`-12-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`comprises one or more of the following: an alphanumeric name, an ID, a login name, and an
`
`identification phrase.
`
`80. (Previously Presented) The apparatus of claim 21, wherein said EXternal—Entity
`
`authenticates the user if said Central—Entity authenticates the user based on the SecureCode.
`
`8 1. (Previously Presented) The apparatus of claim 21, wherein said EXternal—Entity and
`
`Central—Entity are the same entity.
`
`82. (Previously Presented) A method as recited in claim 50, wherein said EXternal—Entity
`
`and Central—Entity are the same entity.
`
`83. (Previously Presented) The method of claim 50, wherein said digital identity includes
`
`a user—specific information.
`
`84. (Previously Presented) The method of claim 83, wherein the user—specific information
`
`includes user—identifying information.
`
`85. (Previously Presented) The method of claim 83, wherein the user—specific information
`
`comprises one or more of the following: an alphanumeric name, an ID, a login name, and an
`
`identification phrase.
`
`86. (Previously Presented) The apparatus of claim 52, wherein said EXternal—Entity and
`
`-13-
`
`

`
`Central—Entity are the same entity.
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`87. (Previously Presented) The apparatus of claim 52, wherein said digital identity
`
`includes an user—specific information.
`
`88. (Previously Presented) The apparatus of claim 87, wherein the user—specific
`
`information includes user—identifying information.
`
`89. (Previously Presented) The method of claim 87, wherein the user—specific information
`
`comprises one or more of the following: an alphanumeric name, an ID, a login name, and an
`
`identification phrase.
`
`90. (Previously Presented) The method of claim 14, wherein the user—specific information
`
`includes user—identifying information.
`
`91. (Previously Presented) The apparatus of claim 34, wherein the user—specific
`
`information includes user—identifying information.
`
`-14-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`REMARKS
`
`Claims 1-4, 12-24, 32-41, 43-48, 50-55, 58, 60 and 63-91Were previously pending.
`
`Claims 5-11, 25-31, 42, 49, 56-57, 59 and 61-62 have been previously cancelled without
`
`disclaimer of or prejudice to the subject matter contained therein. Claims 2-3 have been cancelled
`
`without disclaimer of or prejudice to the subject matter contained therein. Claims 1, 4 and 41
`
`have been amended as indicated below. Claims 1, 4, 12-24, 32-41, 43-48, 50-55, 58, 60 and 63-
`
`91 remain pending.
`
`OBJECTION TO THE SPECIFICATION
`
`The Examiner objected to the specification for failing to provide proper antecedent basis
`
`for the claimed subject matter citing 37 C.F.R. § 1.74(d) and MPEP § 608.01(o). Specifically,
`
`the Examiner contends claims 2 and 3 lack support for whether the user has a pre-existing
`
`relationship with the External Entity or not. While the Applicants respectfully disagree with the
`
`Examiner’s contentions, to expedite issuance of a notice of allowance, claims 2-3 have been
`
`cancelled without disclaimer of or prejudice to the subject matter contained therein.
`
`With regard to claim 4, the Examiner contends this claim remains unclear. The
`
`Applicants have amended claim 4 to be consistent with the specification, at page 14, first full
`
`paragraph.
`
`With regard to claim 41, the Examiner contends this claim is not supported in the
`
`specification. The Applicants have amended claim 41 to be consistent with the specification at
`
`page 14, first full paragraph.
`
`In light of the foregoing amendments, the Applicants respectfully request reconsideration
`
`and withdrawal of the objection to the specification and claims 2-4, and 41.
`
`-15-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`CLAIM OBJECTIONS
`
`The Examiner objected to claim 1 based on a certain informality, which has been
`
`corrected. In light of the correction, the Applicants respectfully request reconsideration and
`
`withdrawal of the objection to claiml.
`
`CLAIMS REMAIN PATENTABLE OVER KALISKI, JR. AND HILL
`EITHER TAKEN ALONE OR IN COMBINATION
`
`The Office Action rejected claims 1-4, 12-20, 22-24, 32-41, 43-48, 50-55, 58, 60, 63 and
`
`65-91 under 35 U.S.C. § l03(a) as being unpatentable over U.S. Patent Publication No.
`
`2010/0100724 Al by Kaliski, Jr. [hereinafter “Kaliski, Jr.”] in View of U.S. Patent No. 6,236,981
`
`by Hill [hereinafter “Hill”]. Generally, the Office Action contends that Kaliski, Jr. discloses all
`
`of the elements of the claims, except for certain missing features that it contends can be found in
`
`Hill, and further contends that it would have been obvious to one of ordinary skill in the art to
`
`modify the system of Kaliski, Jr. using these certain missing features from Hill for various
`
`specified reasons. For example with regard to claim 1, the Office Action asserts that Kaliski, Jr.
`
`discloses all of the elements of the claim at issue, except for “that the dynamic SecureCode
`
`becomes invalid after being used.” The Applicants respectfully disagree with the Office Action’ s
`
`characterization of these references vis-a-vis the claims at issue and respectfully request
`
`reconsideration and withdrawal of the rejection in light of the following remarks.
`
`Factual Inquiries Set Forth in Graham v. John Deere Show Non-Obviousness
`
`1. Determining Scope of Prior Art
`
`Kaliski, Jr. teaches a technique for developing a hardened password that is then used to
`
`derive a decryption key or as the decryption key, which decryption key is then used to
`
`-16-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`successfully decrypt user information thereby Verifying the authenticity of the user. Thus, the
`
`hardened password is not used to authenticate the user, but rather successful decryption is the
`
`basis for authenticating the user. Afi‘. N. Kamrani filed 030112, WW13-15; Afi‘. K. Kamrani filed
`
`030112, WW14-16; Afi‘. Hewittfiled 030112, WW1 7-19; and Afi‘. Hosseinzadelz filed 030112, WW13-
`
`15.
`
`Hill teaches the use of digital tokens as a payment mechanism. The digital tokens are not
`
`used to authenticate the user. The issuer merely authenticates the digital tokens as Valid payment
`
`but not as authentication of the user. Afi‘. N. Kamrani filed 03 01 1 2, WW16-19; Afi‘. K. Kamrani
`
`filed 030112, WW17-20; Afi‘. Hewitt filed 030112, WW21 -23; and Afi‘. Hosseinzadelz filed 030112,
`
`WW16-19.
`
`2. Ascertaining the Dififerences Between the Prior Art and Claims at Issue
`
`The Claims at issue include the limitations that the dynamic SecureCode is generated
`
`during the transaction between the user and the Extemal-Entity and that the so generated
`
`dynamic SecureCode is then used by a Central Entity to authenticate the user to an External
`
`Entity. Kaliski, Jr. does not authenticate a user based on any code generated during the
`
`transaction between the user and the merchant because successful decryption forms the basis of
`
`authentication in Kaliski, Jr. Afi”. N. Kamrani filed 030112, WW13—15;Afi”. K. Kamrani filed
`
`030112, WW14-16; Afi‘. Hewittfiled 030112, WW1 7-19; and Afi‘. Hosseinzadelz filed 030112, WW13-
`
`15.
`
`Hill also does not authenticate a user based on a code generated during the transaction. In
`
`fact, Hill fails to teach any authentication of the user but merely authentication of payment
`
`tokens, which are not used for authentication of the user. Afi‘. N. Kamrani filed 03 01 1 2, WW16-
`
`-17-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`19; Afi‘. K. Kamranifiled 030112, WW17—20; Afi”. Hewittfiled 030112, WW21—23; and Afi‘.
`
`Hosseinzadeh filed 03 01 1 2, WW16—19. Hill is merely cited for the claim element that the
`
`SecureCode becomes invalid after use.
`
`Nonce Is Not Recited SecureCode
`
`The Examiner equates the nonce of Kaliski, Jr. to the SecureCode of the present application
`
`(“wherein the nonce corresponds to the recited dynamic SecureCode.” Office Action, p. 4). But
`
`the Applicants respectfully submit that the nonce is not equivalent to the recited dynamic
`
`SecureCode. Afi”. N. Kamranifiled 030112, WW58; Afi”. K. Kamranifiled 030112, WW6—9; Afi”.
`
`Hewitt filed 030112, WW9—12; and Afi‘. Hosseinzadeh filed 030112, WW5—8. A nonce is merely a
`
`session identifier that is associated with each user’s session in a client server arrangement. Id.
`
`Authentication Not Based on SecureCode
`
`Next, the Office Action contends that Kaliski, Jr. teaches the claim element
`
`“authenticating
`
`the user during the transaction if the digital identity is valid.” For this claim
`
`element, the Examiner refers to paragraph [Ol 12] of Kaliski, Jr. However, in Kaliski, Jr.
`
`authentication is not based on the digital identity that includes the nonce, but rather
`
`authentication is based on successful decryption of an electronic signature. Afi”. N. Kamrani filed
`
`030112, WW13—15;Afi‘. K. Kamranifiled 030112, WW14—16;Afi‘. Hewittfiled 030112, WW1 7-19;
`
`and Afi‘. Hosseinzadeh filed 030112, WW13—15.
`
`In Kaliski, Jr. authentication is not based on the nonce, rather the nonce is merely an
`
`identifier used to indicate “whether or not the authentication attempt associated with the nonce
`
`was successful.” Kaliski, Jr., W[0112]. Afi”. N. Kamranifiled 030112, WW58; Afi”. K. Kamrani
`
`-18-
`
`

`
`filed 030112, WW6—9; Afi”. Hewittfiled 030112, WW9—12; and Afi”. Hosseinzadelzfiled 030112, WW5-
`
`8.
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`Authentication Server Equated with the Central Entity by the Office Action Does Not
`Authenticate the User as Recited in the Claims
`
`The Office Action equates the recited Central Entity with the Authentication Server 730
`
`of FIG. 7 from Kaliski, Jr. Oflice Action, p. 4. Claim 1 specifically states “authenticating by the
`
`Central Entity the user during the transaction...” However, the Authentication Server 730 of
`
`Kaliski, Jr. does not authenticate the user, but rather the web server 710 authenticates the user
`
`based on successful decryption of the user’s digital signature. Afi‘. N. Kamrani filed 03 01 1 2,
`
`WW10—12;Afi‘. K. Kamranifiled 030112, WW11—13;Afi‘. Hewittfiled 030112, WW14—16; and Afi‘.
`
`Hosseinzadelz filed 030112, WW1 0-12.
`
`Authentication Server Equated with the Central Entity by the Office Action Does Not
`
`Receive Authentication Request as Recited in the Claims
`
`Claim 1 also recites “receiving electronically by the Central Entity a request for
`
`authenticating the user based on a digital identity during the transaction, which digital identity
`
`includes the SecureCode.” However, the Authentication Server 730 of Kaliski, Jr. does not
`
`receive a request for authenticating the user because the web server 710 authenticates the user
`
`based on successful decryption of the user’s digital signature. Afi‘. N. Kamrani filed 03 01 1 2, W9;
`
`Afi‘. K. Kamrani filed 030112, W10; Afi‘. Hewitt filed 030112, W13; and Afi‘. Hosseinzadeh filed
`
`03 01 1 2, W9. Thus, neither reference includes the recited claim elements of: (l) authenticating
`
`the user based on a SecureCode; (2) receiving an authentication request message by a Central
`
`Entity, which message includes a SecureCode generated by the Central Entity; (3) authenticating
`
`-19-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`the user by the Central Entity that generated the SecureCode. Without these features, the
`
`suggested combination fails to state a primafacie case of obviousness. Reconsideration and
`
`withdrawal of the rejection of these claims is therefore respectfully requested.
`
`CLAIMS REMAIN PATENTABLE OVER KALISKI, JR. AND HILL TAKEN ALONE
`OR IN COMBINATION WITH CERTAIN OFFICIAL NOTICE
`
`The Office Action rejected claims 23, 66, 68, 70 and 71 under 35 U.S.C. § l03(a) as
`
`being unpatentable over the combination of Kaliski, Jr. and Hill and further in View of certain
`
`Official Notice. The Office Action contends that the above mentioned combination of Kaliski,
`
`Jr. and Hill discloses all of the elements of the claim at issue, except for “wherein the request for
`
`the dynamic code is received by a computer associated with a first trusted authenticator and the
`
`authentication request is received by a computer associated with a second trusted authenticator
`
`that is different than the first trusted authenticator,” for which the Office Action provides certain
`
`Official Notice. The Office Action takes Official Notice for this teaching absent from Kaliski,
`
`Jr. and Hill. Specifically, the Office Action states:
`
`Official Notice is taken that it is old and well—known practice in the
`
`art that in some system or arrangement more than one computer is
`
`used to provide services to their clients (i.e., different computers
`
`for different purposes and services). Therefore, it would have been
`
`obvious to a person of ordinary skill in the art at the time of the
`
`invention was made [sic] to modify the system of Kaliski—Hill to
`
`deploy one computer for providing a dynamic code to a client and
`
`another computer for authenticating the dynamic code (i.e.,
`
`verifying the identity of the user) whenever the user request [sic] a
`
`service because this arrangement would make the system of
`
`Kaliski—Hill capable of handling cases such as when the entity and
`the user have their own different trusted authenticators.
`
`Office Action, p. 9.
`
`-20-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`The Applicants respectfully submit that the Official Notice does not encompass the claimed
`
`subject matter. The cited claim element states that there are different trusted authenticators for
`
`the request for a dynamic code and the authentication request based on the dynamic code. The
`
`Official Notice taken does not state that it is old and well—known in the art to use different trusted
`
`authenticators, but merely that different computers are used for different purposes. There is a
`
`missing feature in the Official Notice — that different trusted authenticators are used for these
`
`specific different purposes. Therefore, the Applicants respectfully submit that splitting up the
`
`functions of receiving a request for a dynamic code and receiving an authentication request
`
`between different trusted authenticators is not a well—known practice, and if the Examiner is
`
`assuming so, then the Applicants respectfully request that the Examiner provide support for this
`
`contention from the prior art.
`
`According to the M.P.E.P. § 2144.03(C), “If Applicant Challenges a Factual Assertion as
`
`Not Properly Officially Noticed or Not Properly Based Upon Common Knowledge, the Examiner
`
`Must Support the Finding With Adequate Evidence.” In this instance, the Applicants have
`
`shown that the recited Official Notice is different than the claim element at issue. Therefore, the
`
`Applicants respectfully submit they have adequately traversed the finding of Official Notice.
`
`To adequately traverse [a finding of Official Notice], an applicant
`
`must specifically point out the supposed errors in the examiner’ s
`
`action, which would include stating why the noticed fact is not
`
`considered to be common knowledge or well—known in the art. See
`37 CFR I.III(b). See also Chevenard, 139 F.2d at 713, 60 USPQ
`
`at 241 (“[I]n the absence of any demand by appellant for the
`
`examiner to produce authority for his statement, we will not
`consider this contention.”).
`
`M.P.E.P § 2l44.03(C).
`
`The Applicants contend that merely knowing that “more than one computer [can be] used
`
`to provide services to their clients (i.e., different computers for different purposes and services)”
`
`-21-
`
`

`
`does not lead one to the conclusion that one should use different trusted authenticators for the
`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`different recited purposes.
`
`If applicant adequately traverses the examiner’s assertion of
`
`official notice, the examiner must provide documentary evidence
`
`in the next Office action if the rejection is to be maintained. See 37
`CFR I.I04(c)(2). See also Zurko, 258 F.3d at 1386, 59 USPQ2d at
`
`1697 (“[T]he Board [or examiner] must point to some concrete
`
`evidence in the record in support of these findings” to satisfy the
`
`substantial evidence test). If the examiner is relying on personal
`
`knowledge to support the finding of what is known in the art, the
`
`examiner must provide an affidavit or declaration setting forth
`
`specific factual statements and explanation to support the finding.
`See 37 CFR I.I04(d)(2).
`
`M.P.E.P § 2144.03(C).
`
`The Applicants therefore specifically request that the Examiner provide documentary evidence
`
`in the next Office action that different trusted authenticators are used for receiving a request for a
`
`dynamic code and receiving an authentication request based on the dynamic code, if this rejection
`
`is to be maintained.
`
`Moreover, these claims remain patentable for at least the reasons set forth above with
`
`respect to the combination of Kaliski, Jr. and Hill. The Applicants therefore respectfully request
`
`reconsideration and withdrawal of the rejection of claims 23, 66, 68, 70 and 71.
`
`CONCLUSION
`
`The Applicant respectfully submits this application is in condition for allowance and
`
`requests issuance of a Notice of Allowance.
`
`Although not believed necessary, the Office is hereby authorized to charge any fees
`
`required under 37 C.F.R. § 1.16 or § 1.17 or credit any overpayments to the deposit account of
`
`MICHAEL P FORTKORT PC, Deposit Account No. 50-3776.
`
`-22-
`
`

`
`U.S. Patent Application No. 12/210,926
`
`Attorney Docket No. KAMR002USO
`
`In the event the prosecution of this Application can be efficiently advanced by a phone
`
`discussion, it is requested that the undersigned attorney be called at (703) 435-9390.
`
`Respectfully submitted,
`
`By
`
`/Michael P. Fortkort/
`
`Michael P. Fortkort
`
`(Reg. No. 35,141)
`
`
`Date: March 1 2012
`
`MICHAEL P FORTKORT PC
`
`The International Law Center
`
`13164 Lazy Glen Lane
`
`Oak Hill, Virginia 20171
`
`Please direct telephone calls to:
`Michael P. Fortkort
`
`703-435-9390
`
`703-435-8857 (facsimile)
`
`-23-
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. IQAMR002USO
`
`Certification Under 37 C.F.R.
`
`1.8
`
`I hereby certify that on March 1, 2012 this correspondence is being: (a) deposited with the
`United States Postal Service in an envelope addressed to Commissioner for Patents, P.O.
`Box 1450, Alexandria, Virginia 22313-1450; or (b) transmitted via facsimile to facsimile
`number 571-273-8300; or (c) electronically filed with the U.S. Patent Office.
`
`
`Date: March 1 2012
`
`Signature:
`
`/Michael P. Fortkort/
`Michael P. Fortkort
`
`(Reg. No. 35,141)
`
`IN THE UNITED STATES PATENT & TRADEMARK OFFICE
`
`APPLICANT: NADER ASGHARI-KAMRANI and IQAMRAN ASGHARI-KAMRANI
`
`SERIAL NO.: 12/210,926
`
`FILING DATE: September 15, 2008
`
`EXAMINER: Mr. Abdulhakim Nobahar
`
`ART UNIT: 2432
`
`TITLE: CENTRALIZED IDENTIFICATION AND AUTHENTICATION SYSTEM AND
`METHOD
`
`ATTORNEY DOCKET: KAMR002USO
`
`CONFIRMATION NO.: 7516
`
`VIA ELECTRONIC FILING SYSTEM
`ASSISTANT COMMISSIONER FOR PATENTS
`
`WASHINGTON, D.C. 20231
`
`AFFIDAVIT UNDER RULE 132
`
`Applicants hereby submit this affidavit in support of their response to the Office
`
`Action mailed January 6, 2012 which rejected the pending claims.
`
`This affidavit is being provided as testimony in the prosecution of U.S. Serial No.
`
`12/210,926, and pursuant to the provisions of 37 C.F.R. § 1.132. The witness hereby avers
`
`and testifies as follows:
`
`- 24 -
`
`

`
`B2/2Elf‘2B12
`
`13:52
`
`73322763285
`
`CGI FED 523A
`
`PAGE B3/1B
`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROOZUSO
`
`1.
`
`I am Nader Asghaxi—Kamrani, one of the inventors listed in US. patent
`
`Application, whi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket