throbber
DOCKET NO.: 1033300-00303US1
`Filed on behalf of Apple Inc.
`By: Monica Grewal, Reg. No. 40,056 (Lead Counsel)
`Ben Fernandez Reg. No. 55,172 (Backup Counsel)
`Wilmer Cutler Pickering Hale and Dorr LLP
`60 State Street
`Boston, MA 02109
`Email: monica.grewal@wilmerhale.com
`ben.fernandez@wilmerhale.com
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`v.
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`_________________________________________
`Case CBM2018-00022
`U.S. Patent No. 9,530,137
`_________________________________________
`
`DECLARATION OF DR. VICTOR SHOUP IN SUPPORT OF PETITION
`FOR COVERED BUSINESS METHOD REVIEW
`
`(cid:36)(cid:83)(cid:83)(cid:79)(cid:72)(cid:3)(cid:20)(cid:19)(cid:19)(cid:21)
`
`

`

`TABLE OF CONTENTS
`
`Page
`
`I.
`II.
`III.
`
`IV.
`
`BACKGROUND .....................................................................................1
`LEGAL PRINCIPLES.............................................................................3
`DESCRIPTION OF THE RELEVANT FIELD AND THE RELEVANT
`TIMEFRAME..........................................................................................5
`The ’137 Patent........................................................................................6
`
`V.
`VI.
`
`Specification and Claims .............................................................. 6
`A.
`Prosecution History....................................................................... 8
`B.
`LEVEL OF ORDINARY SKILL...........................................................13
`GROUNDS FOR STANDING (37 C.F.R. § 42.304(A))........................14
`A.
`The ’137 Patent Qualifies As A CBM Patent (37 C.F.R. § 42.301)
`.....................................................................................................14
`1.
`At Least One Claim Of The ’137 Patent Is A Method Or
`Corresponding System Used In The Practice,
`Administration, Or Management Of A Financial Product Or
`Service...............................................................................15
`The ’137 Patent Is Not Directed To A “Technological
`Invention”..........................................................................16
`VII. PROPOSED CLAIM CONSTRUCTIONS FOR CBM REVIEW ........21
`
`2.
`
`Biometric Information (All Challenged Claims) ..........................22
`A.
`Secret Information .......................................................................24
`B.
`Authentication Information..........................................................25
`C.
`CLAIMS 1-12 OF THE ’137 PATENT ARE UNPATENTABLE
`VIII.
`UNDER 35 U.S.C. § 101 (37 C.F.R. § 42.304(b)(4)).............................27
`
`ii
`
`

`

`B.
`
`A. Alice Step 1: The ’137 Patent Claims Are Directed to the Abstract
`Idea Of Verifying an Account Holder’s Identity Based On Codes
`And/Or Information Related to an Account Holder Before
`Enabling a Transaction ................................................................28
`1.
`Independent Claim 12 ........................................................28
`2.
`The Remaining Claims ......................................................31
`Alice Step 2: The Remaining Limitations Of The ’137 Patent
`Claims Add Nothing Inventive To The Abstract Idea Of Verifying
`An Account Holder’s Identity Based on Codes And/Or Information
`Related To The Account Holder Before Enabling A Transaction.33
`1.
`Independent Claim 12 ........................................................35
`2.
`Independent Claim 1..........................................................39
`3.
`Dependent Claims..............................................................40
`AVAILABILITY FOR CROSS-EXAMINATION ................................42
`RIGHT TO SUPPLEMENT ..................................................................42
`JURAT ....................................................................................................1
`
`IX.
`X.
`XI.
`
`iii
`
`

`

`I, Victor Shoup, Ph.D., declare as follows:
`
`1.
`
`2.
`
`My name is Victor Shoup.
`
`I have been retained by Apple to provide opinions in this proceeding
`
`relating to U.S. Patent 9,530,137 (“’137 patent”).
`
`I. BACKGROUND
`3.
`I received a Bachelor of Science in Computer Science and
`
`Mathematics from the University of Wisconsin at Eau Claire in 1983. I received
`
`my Doctorate in Computer Science from the University of Wisconsin at Madison
`
`in 1989. I worked as a research scientist at Bellcore from 1995 to 1997 and at IBM
`
`Research Zurich from 1997 to 2002. My work included design of cryptographic
`
`protocols such as a new public key cryptosystem (now called the Cramer-Shoup
`
`cryptosystem) that achieved higher levels of security than were previously thought
`
`possible in a practical scheme.
`
`4.
`
`I have been Professor of Computer Science at the Courant Institute of
`
`Mathematical Sciences at New York University since 2002 (initially as an
`
`Associate Professor, and as a Professor since 2007). I teach a variety of graduate
`
`and undergraduate courses on cryptography. Since 2012, I have also been a part-
`
`time visiting researcher at the IBM T. J. Watson Research Center in Yorktown,
`
`New York, where I collaborate with the Cryptography Research Group, which
`
`does work on a range of projects from the theoretical foundations of cryptography
`
`1
`
`

`

`to the design and implementation of cryptographic protocols, such as
`
`homomorphic encryption.
`
`5.
`
`My areas of research include cryptography and number-theoretic
`
`algorithms, and I have published over 60 papers in these areas. In the area of
`
`cryptography, I have made substantial contributions in the sub-areas of digital
`
`signatures, public key encryption, hash functions, distributed computation, session
`
`key exchange, and secure anonymous transactions.
`
`6.
`
`I was also an editor of the ISO18033-2 standard for public-key
`
`encryption, which was published in 2006.
`
`7.
`
`I have been on the program committee of numerous international
`
`conferences on cryptography, and was the Program Chair at Crypto 2005 (Crypto
`
`is the premier international conference on cryptography). I have also acted as a
`
`consultant on cryptographic protocols for several companies.
`
`8.
`
`In recognition of my contributions to the field of cryptography, I was
`
`named a Fellow of the International Association for Cryptographic Research
`
`(IACR) in 2016, for fundamental contributions to public-key cryptography and
`
`cryptographic security proofs, and for educational leadership.
`
`9.
`
`I have given a number of invited lectures on my research in
`
`cryptographic protocol design. In 2005, I published a textbook on the
`
`mathematical underpinnings of cryptography titled A Computational Introduction
`
`2
`
`

`

`to Number Theory and Algebra, which I have made available online for free at
`
`http://www.shoup.net/ntb. I am also currently writing a textbook on applied
`
`cryptography. It is available in draft form at http://toc.cryptobook.us.
`
`10.
`
`I am listed as an inventor on six U.S. patents, several related to
`
`authenticated key exchange, one related to secure multi-party computation, and
`
`one related to public-key encryption.
`
`11. A copy of my curriculum vitae is attached as Appendix A.
`
`12.
`
`I am being compensated at my normal consulting rate for my work.
`
`My compensation is not dependent on the outcome of this IPR proceeding or the
`
`related litigation, and does not affect the substance of my statements in this
`
`Declaration.
`
`13.
`
`I have no financial interest in Petitioner. I have no financial interest in
`
`the ’137 patent.
`
`II. LEGAL PRINCIPLES
`14.
`I am not an attorney. For purposes of this declaration, I have been
`
`informed about certain aspects of the law that are relevant to my analysis and
`
`opinions.
`
`15.
`
`I have been informed that the claim terms in a CBM review should be
`
`given their broadest reasonable construction in light of the specification as
`
`commonly understood by a person of ordinary skill in the art.
`
`3
`
`

`

`16.
`
`I have been informed that laws of nature, abstract ideas, and natural
`
`phenomena are not patent eligible.
`
`17.
`
`I have been informed that an application of an abstract idea, such as a
`
`mathematical formula, may be patent eligible if the patent claims add significantly
`
`more than routine, conventional activity to the underlying concept.
`
`18.
`
`I have been informed that an important and useful clue to patent
`
`eligibility is whether a claim is tied to a particular machine or apparatus or
`
`transforms a particular article into a different state or thing, according to the so
`
`called “machine-or-transformation test.” I have been informed that the machine-or-
`
`transformation test is not the only test for patent eligibility.
`
`19.
`
`I have been informed that the Supreme Court’s decision in the Alice
`
`Corp. case in 2014 articulates a two-step framework for distinguishing patents that
`
`claim ineligible abstract ideas from those that claim eligible applications of those
`
`ideas. In step one, the court must determine whether the claims at issue are
`
`directed to a patent-ineligible abstract concept. If the claim is directed to an
`
`abstract idea, the analysis proceeds to step two. In step two, I understand that the
`
`elements of the claim must be searched, both individually and as an “ordered
`
`combination,” for an “inventive concept”—i.e., an element or combination of
`
`elements that is ‘sufficient to ensure that the patent in practice amounts to
`
`significantly more than a patent upon the ineligible concept itself. I am informed
`
`4
`
`

`

`that a patentee cannot circumvent the prohibition on patenting abstract ideas by
`
`limiting the idea to “a particular technological environment,” nor by adding
`
`insignificant postsolution activity, or well-understood, routine, conventional
`
`features.
`
`III. DESCRIPTION OF THE RELEVANT FIELD AND THE RELEVANT
`TIMEFRAME
`20.
`I have reviewed and understand the specification, claims, and file
`
`history of the ’137 patent. I have also reviewed the list of exhibits attached hereto
`
`as Appendix B. Based on my review of these materials, I believe that the relevant
`
`field for purposes of my analysis is computer science, including the areas of data
`
`security, encryption, and security algorithms. As described above, I have extensive
`
`experience in the relevant technology.
`
`21.
`
`The ’137 patent issued on December 27, 2016 from an application
`
`filed on February 9, 2016. The ’137 patent is a continuation of numerous U.S.
`
`Applications, the earliest of which, App. No. 11/677,490 (now U.S. Patent No.
`
`8,001,055 (Ex. 1004)) was filed on February 21, 2007. The patent also claims
`
`priority to three provisional applications: 60/775,046 filed on February 21, 2006
`
`(Ex.1016), 60/812,279, filed on June 9, 2006 (Ex. 1017), and 60/859,235, filed on
`
`November 15, 2006 (Ex. 1018).
`
`5
`
`

`

`IV. The ’137 Patent
`A.
`Specification and Claims
`22.
`The ’137 patent describes a secure database called a “Universal
`
`Secure Registry,” (“USR”) which is “a universal identification system…used to
`
`selectively provide information about a person to authorized users.” Ex-1001, ’137
`
`patent, 4:8-11. The patent states that the USR database is designed to “take the
`
`place of multiple conventional forms of identification” when conducting financial
`
`transactions to minimize the incidence of fraud. E.g., Ex-1001, ’137 patent, 4:23-
`
`25. The patent states that various forms of information can be stored in the
`
`database to verify a user’s identity and prevent fraud: (1) algorithmically generated
`
`codes, such as a time-varying multicharacter code or an “uncounterfeitable token,”
`
`(2) “secret information” like a PIN or password, and/or (3) a user’s “biometric
`
`information,” such as fingerprints, voice prints, an iris or facial scan, DNA
`
`analysis, or a photograph. See Ex-1001, ’137 patent, 14:1-7, 14:21-40, 44:54-61,
`
`Fig 3. The patent does not, however, describe any new technology for generating,
`
`capturing or combining such information.
`
`23.
`
`Instead, the patent emphasizes that the USR database can be
`
`implemented in “a general-purpose computer system” using “a commercially
`
`available microprocessor” running “any … commercially available operating
`
`system.” Id., 11:53-59. The alleged invention is also “not limited to a particular
`
`6
`
`

`

`computer platform, particular processor, or particular high-level programming
`
`language.” Id., 12:34-36. The USR database itself “may be any kind of database”
`
`and communication with the database may take place over “any [network]
`
`protocol.” Id., 12:1-3, 13:1-4, Fig. 1. Transactions to and from the database are
`
`encrypted using known methods, and access restrictions for users are implemented
`
`using known cryptographic methods. Id., 4:11-22. The database itself is also
`
`encrypted. See Id., 3:66-4:3.
`
`24.
`
`In its complaint against Apple, USR identified ’137 patent claim 12 as
`
`exemplary of the other claims of the patent. Ex-1003, Universal Secure Registry,
`
`LLC v. Apple Inc. et al., No. 17-585-VAC-MPT (D. Del.), ECF No. 1, Complaint,
`
`¶106. Claim 12 is a “system for authenticating a user for enabling a transaction.”
`
`Ex-1001, ’137 patent, 46:55-56. The claimed system comprises a first device
`
`including a biometric sensor, a first processor, and a wireless transceiver. The first
`
`processor is programmed to (1) authenticate a user based on secret information, (2)
`
`retrieve or receive biometric information from a user, (3) authenticate a user based
`
`on that biometric information, (4) in response to the biometric authentication,
`
`generate signals including first authentication information, an indicator of
`
`biometric authentication, and a time-varying value, (5) transmit the signals to a
`
`second device, and (6) if the second device confirms authentication, receive from
`
`7
`
`

`

`the second device an enablement signal to enable or not enable a transaction. Id.,
`
`46:55-47:14.
`
`25.
`
`In addition to the requirements of claim 12, Claim 1 affirmatively
`
`claims a second device including a second processor, which receives a signal from
`
`the first device that includes the indication of biometric information and the first
`
`authentication information.
`
`B.
`26.
`
`Prosecution History
`I have been informed that the ’137 patent was filed as U.S.
`
`Application No. 15/019,660 (the ’137 application) on February 9, 2016. The ’137
`
`application claims priority back to the three original provisional applications, the
`
`earliest of which was filed on February 21, 2006. Provisional Application Nos.
`
`60/859,235, 60/812,279, and 60/775,046. The patent owner filed a Request for
`
`Prioritized Examination under 37 CFR § 1.102(e) with the application on February
`
`9, 2016. See Ex. 1005, ’137 Patent File History, Track One Request.
`
`27.
`
`I have been informed that the examiner granted the Request for
`
`Prioritized Examination under Track One on March 22, 2016. See Ex. 1006, ’137
`
`Patent File History, Track One Request Granted. All claims in the application
`
`issued as the same numbered claim in the application. (For example, reference to
`
`“application claim 1” corresponds with issued claim 1, “application claim 2”
`
`corresponds to issued claim 2, etc.) The examiner issued a Non-Final Rejection on
`
`8
`
`

`

`April 15, 2016. See Ex. 1007, ‘137 Patent File History, 04/15/2016 Non-Final
`
`Rejection. The examiner rejected claims 1-11 under 35 U.S.C. § 112(b) for
`
`indefiniteness based on the structure of the claims. Id., 4-5.
`
`28.
`
`I have been informed that the examiner also rejected claims 1-2 and 5-
`
`12 under 35 U.S.C. § 103 as obvious over U.S. Patent App. Pub. 20020178364
`
`(“Weiss”) in view of U.S. Patent No. 6,819,219 (“Bolle”), explaining that Weiss
`
`“does not directly disclose a wireless transceiver and wireless signal; and a
`
`biometric sensor configured to capture a first biometric information of the user,”
`
`but it would have been obvious “to modify Weiss’ invention by incorporating the
`
`wireless technology as taught by Bolle.” Id., 6-14.
`
`29.
`
`I have been informed that the examiner also rejected claims under the
`
`non-statutory doctrine of double patenting. Id., 15. The examiner rejected
`
`application claims 1 and 12 as double patenting of claim 1 of U.S. Patent No.
`
`8,001,055 (“Weiss ’055”) and rejected application claims 1-12 as double patenting
`
`of claims 21-40 of co-pending U.S. App. No. 14/814,740. Id.
`
`30.
`
`I have been informed that the examiner also noted two other prior art
`
`references in the conclusion of the Non-Final Rejection that were pertinent to the
`
`9
`
`

`

`disclosure. Id., 17.
`
`31.
`
`I have been informed that the Patent Owner filed a Terminal
`
`Disclaimer Request on July 15, 2016. See Ex. 1008, ’137 Patent File History,
`
`07/15/2016 Terminal Disclaimer-Filed. The request limited the term of the ’137
`
`application to both U.S. App. No. 14/814,740 and U.S. Patent No. 8,001,055
`
`(“Weiss ’055”). Id. The request was electronically granted automatically on the
`
`same day.
`
`32.
`
`I have been informed that the Patent Owner responded to the Non-
`
`Final Office Action on July 15, 2016. See Ex. 1009, ’137 Patent File History,
`
`10
`
`

`

`07/15/2016 Amendment/Req. Reconsideration After Non-Final Reject. Patent
`
`Owner amended application claims 1-4, 6-7, and 10-12. Id. The amendments to
`
`exemplary claim 12 are shown below.
`
`33.
`
`I have been informed that the Patent Owner explained that the
`
`amendments to application claim 1 were made “to make it clear that both the first
`
`device and the second device are being positively recited,” and therefore traverse
`
`the indefiniteness rejection under § 112. Id., 7. Patent Owner also explained that
`
`“the Examiner has indicated the subject matter of dependent claims 3-4 is
`
`allowable if incorporated into independent claim 1” so Patent Owner “incorporated
`
`11
`
`

`

`the common subject matter of dependent claims 3-4 into independent claim 1.” Id.
`
`Patent Owner indicated that application claim 12 recited the same limitations as
`
`application claim 1 and should be allowable for the same reason. Id., 8.
`
`34.
`
`I have been informed that the examiner issued a Notice of Allowance
`
`on August 10, 2016. See Ex. 1010, ’137 Patent File History, 08/10/2016 Notice of
`
`Allowance and Fees Due. The examiner did not provide specific reasoning for why
`
`the claims were allowable over the prior art. Id., 4.
`
`35.
`
`I have been informed that the Patent Owner filed an Amendment after
`
`the Notice of Allowance on November 10, 2016. See Ex. 1011, ’137 Patent File
`
`History, 11/10/2016 Amendment after Notice of Allowance. Patent Owner
`
`amended application claims 1, 3, 4, 7, 10, and 12. Id. Dependent application
`
`claims 3, 4, 7, and 10 were amended to remove the “handheld” device limitation,
`
`mimicking the amendments to independent application claims 1 and 12.
`
`12
`
`

`

`36.
`
`I have been informed that the examiner entered the proposed
`
`amendments on November 18, 2016. See Ex. 1012, ’137 Patent File History,
`
`11/18/2016 Response to Amendment under Rule 312. The ’137 patent
`
`subsequently issued on December 27, 2016.
`
`V. LEVEL OF ORDINARY SKILL
`37.
`I understand that a person of ordinary skill in the relevant field is a
`
`hypothetical person to whom an expert in the relevant field could assign a routine
`
`task with reasonable confidence that the task would be successfully carried out. I
`
`further understand that the level of skill in the art is evidenced by prior art
`
`references.
`
`13
`
`

`

`38.
`
`The prior art demonstrates that a person of ordinary skill, at the time
`
`the ’137 patent was effectively filed, would have a Bachelor’s Degree in electrical
`
`engineering, computer science, or a related scientific field, and approximately two
`
`years of work experience in the computer science field including, for example,
`
`operating systems, database management, encryption, security algorithms, and
`
`secure transaction systems, though additional education can substitute for less
`
`work experience and vice versa.
`
`39.
`
`Based on my experience, I have an understanding of the capabilities
`
`of a person of ordinary skill in the relevant field. I have supervised and directed
`
`many such persons over the course of my career. Further, I had at least those
`
`capabilities myself at the time the patent was filed.
`
`VI. GROUNDS FOR STANDING (37 C.F.R. § 42.304(A))
`A.
`The ’137 Patent Qualifies As A CBM Patent
`(37 C.F.R. § 42.301)
`I have been informed that under Section 18 of the AIA, the Board may
`
`40.
`
`institute a CBM review proceeding for any patent that qualifies as a CBM patent. I
`
`have been informed that section 18 of the AIA defines a “covered business
`
`method” as a claim that both (1) claims a method or corresponding apparatus for
`
`performing data processing or other operations used in the practice, administration,
`
`or management of a financial product or service; and (2) is not directed to a
`
`14
`
`

`

`technological invention. In my opinion, the ’137 patent satisfies both requirements
`
`for at least the reasons set forth below.
`
`1.
`
`At Least One Claim Of The ’137 Patent Is A Method Or
`Corresponding System Used In The Practice,
`Administration, Or Management Of A Financial Product
`Or Service
`I have been informed that a patent qualifies for CBM review as long
`
`41.
`
`as “the subject matter of at least one claim is directed to a covered business
`
`method.” I have been informed that the definition of ‘covered business method
`
`patent’ is not limited to products and services of only the financial industry, or to
`
`patents owned by or directly affecting the activities of financial institutions such as
`
`banks and brokerage houses. I have also been informed that the plain text of the
`
`statutory definition contained in § 18(d)(1) . . . on its face covers a wide range of
`
`finance-related activities. I have been informed that the correct inquiry is not
`
`whether the claimed invention only has application in business contexts, but
`
`whether the claimed invention is a method or apparatus for performing data
`
`processing or other operations used in the practice, administration, or management
`
`of a financial product or service. I have been informed that the claims should be
`
`read in light of the specification when making this determination.
`
`42. All claims of the ’137 patent meet these requirements. For example,
`
`independent claims 1 and 12 disclose systems for “authenticating a user for
`
`enabling a transaction” and contemplate the transmission and receipt of an
`
`15
`
`

`

`“enablement signal” that allows or denies the transaction. ’137 patent, claims 1
`
`and 12. Similarly, claims 3, 4, 10, and 11 explicitly recite a “transaction” or
`
`“financial transaction.” And claim 8 expressly claims using “a multidigit public ID
`
`code for a credit card account, which a credit card issuer can map to a usable credit
`
`card number.”
`
`43. Moreover, the patent specification makes clear that the “transactions”
`
`recited in all patent claims can be financial in nature. See, e.g., id., 6:57-61 (“In
`
`various embodiments, the event that is enabled or prevented may be a transaction
`
`(e.g., a financial transaction), access control (e.g., physical or electronic access) or
`
`other action that is either enabled or prevented.”); 8:25-28 (“In one embodiment
`
`the system further comprises a networked credit card validation-information entity
`
`configured to approve and deny financial transactions based on authentication of
`
`the user.”); Figs. 7-10 (illustrating transmission of credit card and/or bank account
`
`information).
`
`2.
`
`The ’137 Patent Is Not Directed To A “Technological
`Invention”
`I have been informed that a patent that otherwise qualifies as a CBM
`
`44.
`
`patent is nevertheless excluded from CBM review if it is directed to a
`
`“technological invention”—i.e., if “the claimed subject matter as a whole”
`
`(1) “recites a technological feature that is novel and unobvious over the prior art”
`
`and (2) “solves a technical problem using a technical solution.” In my opinion, the
`
`16
`
`

`

`claims of the ’137 patent do not meet either prong of the technological invention
`
`exclusion.
`
`i.
`
`The ’137 patent claims include only generic technology
`components that were well known in the art.
`I have been informed that the first prong of the test analyzes whether
`
`45.
`
`the differences between the claimed invention and the prior art are technological
`
`features. The Federal Circuit has affirmed the USPTO’s listed characteristics that,
`
`if found, would preclude a finding of a “technological invention”: 1) mere
`
`“recitation of known technologies”; 2) “reciting the use of known prior art
`
`technology”; and 3) “combining prior art structures to achieve the normal,
`
`expected, or predictable result of that combination.”
`
`46.
`
`The only arguably technological elements of the challenged claims are
`
`as follows:
`
`’137 Patent Claim Well-Known Technological Features
`Independent Claim 1
`Processors, wireless transceiver,
`biometric sensor
`No additional technological features
`
`Dependent Claim 2
`
`Dependent Claim 3
`
`Communication Interface
`
`Dependent Claim 4
`
`No additional technological features
`
`Dependent Claim 5
`
`No additional technological features
`
`Dependent Claim 6
`
`No additional technological features
`
`17
`
`

`

`Dependent Claim 7
`
`Memory
`
`Dependent Claim 8
`
`No additional technological features
`
`Dependent Claim 9
`
`No additional technological features
`
`Dependent Claim 10
`
`User interface
`
`Dependent Claim 11
`
`No additional technological features
`
`Independent Claim 12 Biometric sensor, processor, wireless
`transceiver
`
`47. Under these guidelines, the ’137 patent fails to disclose a
`
`“technological feature” because the claimed features—processors, wireless
`
`transceivers, memory, user interfaces, and a biometric sensor implementing an
`
`identity verification system—were indisputably well known as of the patent’s
`
`November 15, 2006 priority date and are implemented in a conventional manner.
`
`That is, the processor performs standard data operations such as comparing data,
`
`performing calculations, and executing commands, the transceivers transmit and
`
`receive signals, the memory stores information, the user interface receives input,
`
`and the biometric sensor gathers biometric information. See, e.g., ’137 patent, Cl.
`
`12 (“biometric sensor configured to capture a first biometric information of the
`
`user . . .a first processor programmed to . . . authenticate . . . retrieve . . .
`
`authenticate . . . generate . . . a first wireless transceiver . . . programmed to
`
`wirelessly transmit . . . wherein the first processor is further programmed to
`
`receive an enablement signal”).
`
`18
`
`

`

`48.
`
`The named inventor did not claim to have invented a new computer,
`
`processor, database, transceiver or Internet system. Instead, he leveraged known
`
`technology to claim a system and method for verifying an account holder’s identity
`
`based on codes and/or information related to the account holder before enabling a
`
`transaction. Indeed, the ’137 patent repeatedly touts the generic nature of its
`
`components and implementation, emphasizing that the claimed invention is not
`
`tied to any particular technology, instead explicitly states that it can be
`
`implemented in “a general-purpose computer system” using “a commercially
`
`available microprocessor” running “any commercially available operating system.”
`
`’137 patent, 11:45-64. Furthermore, the USR itself is not a special database; rather
`
`the USR database itself “may be any kind of database” that can communicate using
`
`“any [network] protocol.” ’137 patent, 12:1-3, 11:27-31, Fig 1.
`
`49.
`
`The ’137 prosecution history provides further evidence that the ’137
`
`claims are not technically distinguishable from the prior art. For example, the
`
`amendments made to overcome prior art during prosecution were all non-technical
`
`in nature, and the claims were ultimately allowed based on a non-technical
`
`distinction over the prior art. See Ex. 1009, ’137 Patent File History, 07/15/2016
`
`Amendment/Req. Reconsideration After Non-Final Reject. (adding limitations
`
`requiring generation of a signal in response to authentication of biometric
`
`19
`
`

`

`information and authentication based on a second piece of authentication
`
`information).
`
`ii. The ’137 patent does not solve a technical problem with
`a technical solution.
`The ’137 patent also fails the second prong of the technological
`
`50.
`
`invention test because it does not solve a technical problem with a technical
`
`solution. I understand that this prong requires a review of the patent’s
`
`specification to determine what problem the claimed invention purportedly solves.
`
`If the problem is nontechnical, the patent does not meet the technological invention
`
`exception. Moreover, I understand that where the specification recognizes that
`
`technology known in the art could be used to reach the desired result, the patent
`
`does not solve a technical problem with a technical solution.
`
`51.
`
`The ’137 patent states at the outset that it is directed to a system for
`
`“authenticating identity or verifying the identity of individuals and other entities
`
`seeking access to certain privileges and for selectively granting privileges and
`
`providing other services in response to such identifications/verifications.” ’137
`
`patent, 1:46-50 (describing the “field of invention”). How to control access to
`
`information stored in a particular location is a problem as old as society itself.
`
`Although humans have more recently employed computers to make identity
`
`verification more precise and transactions more secure, the underlying problem of
`
`20
`
`

`

`ensuring that people conducting a transaction are who they claim to be is
`
`inherently non-technical.
`
`52. Moreover, the patent does not provide a “technical solution” to this
`
`purported problem. Instead, it merely claims using wholly conventional and
`
`generic computers to perform common functions like comparing received values to
`
`stored values and controlling access to stored information based on the result. See,
`
`e.g., ’137 patent, 11:45-52, 12:61-13:11, Figs 1 & 2. This does not constitute a
`
`technical solution to the problem identified above. Moreover, as explained above,
`
`all amendments made during prosecution were nontechnical in nature. See supra,
`
`¶63. Thus, the claimed subject matter of the ’137 patent, taken as a whole, does
`
`not solve a technical problem using a technical solution.
`
`VII.
`
`PROPOSED CLAIM CONSTRUCTIONS FOR CBM REVIEW (37
`C.F.R. § 42.304(b)(3))
`53.
`I understand that for purposes of this Covered Business Method
`
`review proceeding, in comparing the claim language to the prior art, I am to
`
`construe that claim language as a person of ordinary skill in the art at the time of
`
`the alleged invention would do in light of the specification. I also understand that
`
`in proceedings before the Board, patent claims are to be given their broadest
`
`reasonable interpretation, consistent with the teachings of the specification and file
`
`history.
`
`21
`
`

`

`54.
`
`I have reviewed the claim constructions explicitly set forth in the
`
`Petition from that perspective and believe the constructions are consistent with the
`
`broadest reasonable interpretation in light of the specification. At this time, I have
`
`no opinion as to whether these constructions would be the proper constructions for
`
`any district court litigation involving the ’137 patent.
`
`A.
`55.
`
`Biometric Information (All Challenged Claims)
`I understand that Apple’s proposed construction for “biometric
`
`information” as used in the ’137 patent means “information about a user’s physical
`
`characteristics, such as fingerprint, voice print, signature, iris or facial scan, DNA
`
`analysis, or personal photograph.”
`
`56.
`
`This construction is consistent with the plain meaning of the term, and
`
`is further supported by the specification, which describes biometric information
`
`using substantially identical language.1 ’137 patent, 4:40-47 (“The identity of the
`
`1 The ’137 patent specification includes one passage that describes a
`
`“personal identification number (PIN)” as an example of biometric information.
`
`Ex-1001, ’137 Patent, 14:57-60. That passage is inconsistent with other statements
`
`in the intrinsic record that describe biometric information as information that
`
`relates to a user’s physical characteristics and distinct from a PIN. For example,
`
`the specification elsewhere distinguishes PIN numbers from biometric information.
`
`22
`
`

`

`user possessing the identifying device may be verified at the point of use via . . .
`
`biometric identification such as a fingerprint, voice print, signature, iris or facial
`
`scan, or DNA analysis, or any other me

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket