throbber

`
`DOCKET NO.: 1033300-00303US1
`Filed on behalf of Apple Inc.
`By: Monica Grewal, Reg. No. 40,056 (Lead Counsel)
`Ben Fernandez Reg. No. 55,172 (Backup Counsel)
`Wilmer Cutler Pickering Hale and Dorr LLP
`60 State Street
`Boston, MA 02109
`Email: monica.grewal@wilmerhale.com
`
` ben.fernandez@wilmerhale.com
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`v.
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`_________________________________________
`Case CBM2018-00022
`
`U.S. Patent No. 9,530,137
`_________________________________________
`
`PETITION FOR COVERED BUSINESS METHOD REVIEW
`OF CLAIMS 1-12
`
`
`
`
`
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`TABLE OF CONTENTS
`
`Page
`
`A. 
`B. 
`C. 
`D. 
`
`A. 
`B. 
`C. 
`
`A. 
`
`B. 
`
`II. 
`
`III. 
`IV. 
`
`TABLE OF CONTENTS ............................................................................... ii 
`TABLE OF AUTHORITIES ......................................................................... iv 
`I. 
`MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1)) ..................... 3 
`Real Party-In-Interest ................................................................. 3 
`Related Matters .......................................................................... 3 
`Counsel ...................................................................................... 4 
`Service Information ................................................................... 5 
`BACKGROUND OF THE ’137 PATENT ...................................... 5 
`Priority ....................................................................................... 5 
`Brief Description of the ’137 Patent Disclosure ........................ 6 
`Prosecution History ................................................................... 8 
`LEVEL OF ORDINARY SKILL .................................................. 15 
`GROUNDS FOR STANDING (37 C.F.R. § 42.304(A)) .............. 16 
`Petitioner Has Standing And Is Not Estopped (37 C.F.R. §
`42.302) ..................................................................................... 16 
`The ’137 Patent Qualifies As A CBM Patent (37 C.F.R. §
`42.301) ..................................................................................... 17 
`1.  At Least One Claim Of The ’137 Patent Is A Method Or
`Corresponding System Used In The Practice,
`Administration, Or Management Of A Financial Product
`Or Service .......................................................................... 17 
`2.  The ’137 Patent Is Not Directed To A “Technological
`Invention” .......................................................................... 19 
`
`
`
`ii
`
`

`

`A. 
`
`B. 
`C. 
`
`A. 
`B. 
`C. 
`
`A. 
`
`B. 
`
`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`STATEMENT OF PRECISE RELIEF REQUESTED FOR EACH
`CHALLENGED CLAIM (37 C.F.R. § 42.304(b)) ........................ 25 
`Claims For Which Review Is Requested (37 C.F.R. §
`42.304(b)(1)) ............................................................................ 25 
`Statutory Grounds Of Challenge (37 C.F.R. § 42.304(b)(2)) 25 
`Standard For Granting A Petition For CBM Review .............. 26 
`PROPOSED CLAIM CONSTRUCTIONS FOR CBM REVIEW
`(37 C.F.R. § 42.304(b)(3)) ............................................................. 26 
`Biometric Information (All Challenged Claims) ..................... 27 
`Secret Information ................................................................... 29 
`Authentication Information ..................................................... 30 
`CLAIMS 1-12 OF THE ’137 PATENT ARE UNPATENTABLE
`UNDER 35 U.S.C. § 101 (37 C.F.R. § 42.304(b)(4)) ................... 32 
`Alice Step 1: The ’137 Patent Claims Are Directed to the
`Abstract Idea Of Verifying an Account Holder’s Identity
`Based On Codes And/Or Information Related to an Account
`Holder Before Enabling a Transaction .................................... 33 
`1. 
`Independent Claim 12 ....................................................... 34 
`2.  The Remaining Claims ...................................................... 40 
`Alice Step 2: The Remaining Limitations Of The ’137 Patent
`Claims Add Nothing Inventive To The Abstract Idea Of
`Verifying An Account Holder’s Identity Based On Codes
`And/Or Information Related To The Account Holder Before
`Enabling A Transaction ........................................................... 44 
`1. 
`Independent Claim 12 ....................................................... 46 
`2. 
`Independent Claim 1 ......................................................... 53 
`3.  Dependent Claims ............................................................. 54 
`CONCLUSION .............................................................................. 55 
`iii
`
`V. 
`
`VI. 
`
`VII. 
`
`VIII. 
`
`
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Federal Cases
`Alice Corp. v. CLS Bank Int’l,
`134 S. Ct. 2347 (2014) .................................................................................passim
`Apple Inc. v. Ameranth, Inc.,
`842 F.3d 1229 (Fed. Cir. 2016) .................................................................... 24, 55
`Bancorp Servs., L.L.C. v. Sun Life Assurance Co. of Can. (U.S.),
`687 F.3d 1266 (Fed. Cir. 2012) .......................................................................... 52
`Bilski v. Kappos,
`561 U.S. 593 (2010) .....................................................................................passim
`Blue Calypso, LLC v. Groupon, Inc.,
`815 F.3d 1331 (Fed. Cir. 2016) .......................................................................... 25
`Blue Spike, LLC v. Google Inc.,
`No. 14-CV-01650-YGR, 2015 WL 5260506 (N.D. Cal. Sept. 8,
`2015), aff’d, 669 F. App’x 575 (Fed. Cir. 2016), cert. denied, 137
`S. Ct. 2246 (2017) ............................................................................................... 38
`buySAFE, Inc. v. Google, Inc.,
`765 F.3d 1350 (Fed. Cir. 2014) .................................................................... 37, 46
`CLS Bank Int’l v. Alice Corp. Pty. Ltd.,
`717 F.3d 1269 (Fed. Cir. 2013), aff’d 134 S. Ct. 2347 (2014) ........................... 34
`CyberSource Corp. v. Retail Decisions, Inc.,
`654 F.3d 1366 (Fed. Cir. 2011) .................................................................... 38, 52
`Data Distrib. Tech., LLC v. BRER Affiliates, Inc.,
`No. 12-4878, 2014 WL 4162765 (D.N.J. Aug. 19, 2014) .................................. 56
`Dealersocket, Inc. v. Autoalert, LLC,
`CBM2014-00132, Paper No. 11 (P.T.A.B. Oct. 29, 2014) ................................ 18
`Dealertrack, Inc. v. Huber,
`674 F.3d 1315 (Fed. Cir. 2012) .......................................................................... 55
`
`
`
`iv
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`Digitech Image Tech., LLC v. Elecs. for Imaging, Inc.,
`758 F.3d 1344 (Fed. Cir. 2014) .......................................................................... 49
`Enfish, LLC v. Microsoft Corp.,
`822 F.3d 1327 (Fed. Cir. 2016) .......................................................................... 43
`Essociate, Inc. v. 4355768 Canada Inc.,
`No. 14-679, 2015 WL 4470139 (C.D. Cal. Feb. 11, 2015) ................................ 24
`In re Bilski,
`545 F.3d 943 (Fed. Cir. 2008) ............................................................................ 45
`
`
`In re ICON Health & Fitness, Inc.,
`496 F.3d 1374 (Fed. Cir. 2007) .......................................................................... 27
`In re TLI Comm’ns LLC Patent Lit.,
`823 F.3d 607 (Fed. Cir. 2016) ............................................................................ 43
`Intellectual Ventures I LLC v. Erie Indemnity Co.,
`850 F.3d 1315 (Fed. Cir. 2017) .............................................................. 46, 52, 54
`Intellectual Ventures I LLC v. Symantec Corp.,
`838 F.3d 1307 (Fed. Cir. 2016) ............................................................................ 1
`Interthinx, Inc. v. Corelogic Solutions, LLC,
`CBM2012-00007, Paper No. 15 (P.T.A.B. Jan. 31, 2013) ................................. 23
`IQS US Inc. v. Calsoft Labs Inc.,
`No. 16-7774, 2017 WL 3581162 (N.D. Ill. Aug. 18, 2017) ......................... 42, 43
`Jericho Sys. Corp. v. Axiomatics, Inc.,
`No. 14-cv-2281, 2015 WL 2165931 (N.D. Tex. May 7, 2015),
`aff’d, 642 Fed. App’x 979 (Fed. Cir. 2016) ........................................................ 37
`Joao Bock Transaction Sys., LLC v. Jack Henry & Assocs., Inc.,
`76 F. Supp. 3d 513 (D. Del. Dec. 15, 2014), aff’d, 803 F.3d 667
`(Fed. Cir. 2015) ................................................................................................... 38
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00003, Paper No. 15 (P.T.A.B. Feb. 12, 2013) .......................... 20, 23
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00004, Paper No. 10 (P.T.A.B. Jan. 25, 2013) ........................... 23-24
`v
`
`
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00004, Paper No. 60 (P.T.A.B. Jan. 23, 2014) ................................. 18
`LinkedIn Corp. v. AVMarkets Inc.,
`CBM2013-00025, Paper No. 30 (P.T.A.B. Nov. 10, 2014) ............................... 54
`Mayo Collaborative Services v. Prometheus Laboratories, Inc.,
`132 S. Ct. 1289 (2012) .................................................................................. 32, 44
`Mortgage Grader, Inc. v. First Choice Loan Servs. Inc.,
`811 F.3d 1314 (Fed. Cir. 2016) .......................................................................... 52
`OIP Tech. Inc., v. Amazon.com, Inc.,
`788 F.3d 1359 (Fed. Cir. 2015) .......................................................................... 50
`Salesforce.com v. Virtual Agility, Inc.,
`CBM2013-00024, Paper No. 16 (P.T.A.B. Nov. 19, 2013) ............................... 18
`Secured Mail Sols. v. Universal Wilde,
`873 F.3d (Fed. Cir. 2017) ............................................................. 2, 35, 36, 51, 52
`SiRF Tech., Inc. v. Int’l Trade Comm’n
`601 F.3d 1319 (Fed. Cir. 2010) .......................................................................... 53
`Smart Sys. Innovations, LLC v. Chi. Transit Auth.,
`873 F.3d 1364 (Fed. Cir. 2017) .................................................... 2, 36, 37, 51, 52
`Synopsys, Inc. v. Mentor Graphics Corp.,
`839 F.3d 1138 (Fed. Cir. 2016) .......................................................................... 37
`Tenon & Groove, LLC v. Plusgrade S.E.C.,
`No. 12-cv-1118, 2015 WL 82531 (D. Del. Jan. 6, 2015) ................................... 53
`Ultramercial, Inc., v. Hulu, LLC,
`772 F.3d 709 (Fed. Cir. 2014) ............................................................................ 51
`Vehicle Intelligence & Safety LLC v. Mercedes-Benz USA, LLC,
`635 F. App’x 914 (Fed. Cir. 2015) ..................................................................... 43
`Versata Dev. Grp., Inc. v. SAP Am., Inc.,
`793 F.3d 1306 (Fed. Cir. 2015) ...................................................................passim
`
`
`
`vi
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`
`Federal Statutes
`35 U.S.C. § 101 .................................................................................................passim
`35 U.S.C. § 102 .......................................................................................................... 4
`35 U.S.C. § 103 ...................................................................................................... 4, 9
`35 U.S.C. § 112(b) ..................................................................................................... 8
`35 U.S.C. § 321 .................................................................................................... 1, 26
`35 U.S.C. § 324 ........................................................................................................ 56
`35 U.S.C. § 324(a) ................................................................................................... 26
`AIA § 18 ............................................................................................................... 1, 26
`AIA § 18(a)(1)(B) .................................................................................................... 16
`AIA § 18(a)(1)(E) .................................................................................................... 17
`AIA § 18(d)(1) ......................................................................................................... 17
`Regulations
`37 C.F.R. § 1.102(e) ................................................................................................... 8
`37 C.F.R. § 42.6(d) .................................................................................................. 56
`37 C.F.R. § 42.8(A)(1) ............................................................................................... 3
`37 C.F.R. § 42.8(b)(1) ................................................................................................ 3
`37 C.F.R. § 42.8(b)(3) ................................................................................................ 4
`37 C.F.R. § 42.8(b)(4) ................................................................................................ 4
`37 C.F.R. § 42.10(b) ................................................................................................ 56
`37 C.F.R. § 42.63(e) ................................................................................................. 56
`37 C.F.R. § 42.300 et seq. .......................................................................................... 1
`37 C.F.R. § 42.300(b) .............................................................................................. 27
`
`
`
`vii
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`37 C.F.R. § 42.301 ................................................................................................... 17
`37 C.F.R. § 42.301(a) ............................................................................................... 17
`37 C.F.R. § 42.301(b) .............................................................................................. 20
`37 C.F.R. § 42.302 ................................................................................................... 16
`37 C.F.R. § 42.302(a) ............................................................................................... 16
`37 C.F.R. § 42.302(b) .............................................................................................. 17
`37 C.F.R. § 42.303 ................................................................................................... 17
`37 C.F.R. § 42.304(A).............................................................................................. 16
`37 C.F.R. § 42.304(b) .............................................................................................. 26
`37 C.F.R. § 42.304(b)(1) .......................................................................................... 26
`37 C.F.R. § 42.304(b)(2) .......................................................................................... 26
`37 C.F.R. § 42.304(b)(3) .......................................................................................... 27
`37 C.F.R. § 42.304(b)(4) .......................................................................................... 32
`77 Fed. Reg. 48734 (2012) ...................................................................................... 17
`77 Fed. Reg. 48735 (2012) ...................................................................................... 17
`77 Fed. Reg. 48764 (2012) ...................................................................................... 27
`
`
`
`
`
`viii
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`Pursuant to 35 U.S.C. § 321, Section 18 of the Leahy-Smith America
`
`Invents Act (“AIA”), and 37 C.F.R. § 42.300 et seq., the undersigned hereby
`
`requests covered business method (“CBM”) review of claims 1-12 (“challenged
`
`claims”) of U.S. Patent No. 9,530,137 (“’137 patent”).
`
`Verification of an account holder’s identity before allowing access to his or
`
`her account to enable a transaction is a practice as old as banking and commerce
`
`itself. Whether by use of confidential information, or simply by recognizing a
`
`person’s physical characteristics, financial institutions and merchants have always
`
`needed a way to confirm that the person seeking to access an account is entitled to
`
`do so. For example, financial institutions have long required customers to provide
`
`Social Security Numbers, birth dates, and other personal information before
`
`discussing account information over the telephone. Similarly, presentation of
`
`photo identification to the bank teller has long been a prerequisite for making an
`
`account withdrawal.
`
`The law is now well settled that the combination of such a longstanding and
`
`fundamental economic practice with nothing more than conventional computer,
`
`network, and database technology is ineligible for patent protection under 35
`
`U.S.C. § 101. See, e.g., Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347, 2356
`
`(2014) (computerized method for “exchanging financial obligations” found
`
`invalid); Intellectual Ventures I LLC v. Symantec Corp., 838 F.3d 1307, 1314 (Fed.
`
`
`
`1
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`Cir. 2016) (computerized method for classifying emails in a database invalid);
`
`Secured Mail Sols. v. Universal Wilde, 873 F.3d, 905 (Fed. Cir. 2017) (method for
`
`affixing a barcode to securely verify the contents of packages was an abstract
`
`idea); Smart Sys. Innovations, LLC v. Chi. Transit Auth., 873 F.3d 1364 (Fed. Cir.
`
`2017) (method for conducting localized bank card transactions at mass transit
`
`stations was an abstract fundamental economic practice).
`
`The claims of the ’137 patent do not describe a technological invention, a
`
`new or improved machine, or a patent-eligible subject matter. Instead, all claims
`
`are directed to the abstract concept of using an “identification system” called a
`
`“Universal Secure Registry” (“USR”) to verify an account holder’s identity
`
`based on codes and/or information related to the account holder before
`
`enabling a transaction. Indeed, the patent holder, Universal Secure Registry,
`
`LLC, characterized the alleged novelty similarly when it asserted that the ’137
`
`patent “provides an improved mobile transaction approval system providing both
`
`local and remote authentication while reducing the risk of interception of the user's
`
`sensitive information. Ex-1013, Plaintiff’s Answer Brief in Opposition to
`
`Defendants’ Motion to Dismiss (“Opp.”), 10.
`
` Rather than claim any technological improvement in the computer,
`
`database, or network for identifying an account holder, the claims implement this
`
`abstract concept using wholly conventional computer technology operating in
`
`
`
`2
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`conventional ways. The patent describes the USR, for example, as a generic
`
`“information system” (e.g., ’137 patent, 4:8-11) comprising “any kind of database”
`
`(e.g., ’137 patent, 12:1-3) that can contain data such as a user’s credit card number,
`
`medical records, and other sensitive information. Id., 13:42-52. The claims do not
`
`contain a single improvement to the functioning of any computer, database, or
`
`network component, or provide any inventive implementation details. Therefore,
`
`the claims do not recite any inventive concept sufficient to transform the abstract
`
`idea into patent eligible subject matter.
`
`Accordingly, for the reasons presented in this petition, the Board should
`
`review and cancel all claims of the ’137 patent as unpatentable under 35 U.S.C.
`
`§ 101.
`
`I. MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1))
`A. Real Party-In-Interest
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies that Apple Inc.
`
`(“Apple” or “Petitioner”) is the real party-in-interest.
`
`B. Related Matters
`The ’137 patent is owned by Universal Secure Registry, LLC (“USR” or
`
`“Patent Owner”). On May 21, 2017, USR sued Apple and Visa in the District of
`
`Delaware, asserting four patents, including the ’137 patent, against Apple’s Apple
`
`Pay functionality. See Ex-1003, Universal Secure Registry, LLC v. Apple Inc. et
`
`al., No. 17-585 (D. Del.), ECF No. 1, Complaint, ¶ 2. The complaint was served on
`3
`
`
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`July 5, 2017 on Petitioner. All four asserted patents are directed to verifying an
`
`account holder’s identity based on codes and/or information related to the account
`
`holder before enabling a transaction.
`
`On August 25, 2017, Apple filed a Motion to Dismiss for Failure to State a
`
`Claim, asserting that the asserted claims of the ’137 patent are unpatentable under
`
`35 U.S.C. § 101 because they are directed to the abstract idea of “verifying an
`
`account holder’s identity based on codes and/or information related to the account
`
`holder before enabling a transaction.” That motion remains pending.
`
`In addition to the Motion to Dismiss, Apple is filing the following petitions
`
`for CBM/IPR:
`
`Asserted Patent
`
`CBM/IPR
`
`Statutory Grounds
`
`U.S. 9,530,137
`
`
`U.S. 9,100,826
`
`U.S. 8,856,539
`
`
`U.S. 8,577,813
`
`
`CBM
`IPR
`IPR
`IPR
`IPR
`CBM
`IPR
`IPR
`CBM
`CBM
`CBM
`
`35 U.S.C. § 101
`35 U.S.C. § 103
`35 U.S.C. § 103
`35 U.S.C. § 103
`35 U.S.C. §§ 102, 103
`35 U.S.C. § 101
`35 U.S.C. § 103
`35 U.S.C. § 103
`35 U.S.C. § 101
`35 U.S.C. § 103
`35 U.S.C. § 103
`
`C. Counsel
`Pursuant to 37 C.F.R. §§ 42.8(b)(3)-(4), Petitioner identifies the following
`
`lead and backup counsels, to whom all correspondence should be directed.
`
`
`
`4
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`
`Lead Counsel: Monica Grewal (Reg. No. 40,056)
`
`Backup Counsel: Ben Fernandez (Reg. No. 55,172)
`
`D.
`Service Information
`Email: monica.grewal@wilmerhale.com; ben.fernandez@wilmerhale.com;
`
`Post and hand delivery address: Wilmer Cutler Pickering Hale and Dorr LLP, 60
`
`State Street, Boston, MA 02109.
`
`Telephone: (617) 526-6223; Facsimile: (617) 526-5000.
`
`Petitioner consents to electronic service.
`
`II. BACKGROUND OF THE ’137 PATENT
`A.
`Priority
`Entitled “Universal Secure Registry,” the ’137 patent issued on December
`
`27, 2016 from an application filed on February 9, 2016. The ’137 patent is a
`
`continuation of U.S. Application No. 14/814,740, which was filed on July 31, 2015
`
`(published as U.S. Pat. Pub. No. 20160155121A1 (Ex-1004), and is part of a long
`
`line of continuation applications including U.S. Application No. 14/027,860 (now
`
`Pat. No. 9,100,826), U.S. Application No. 13/621,609 (now Pat. No. 8,538, 881),
`
`U.S. Application No. 13/168,556 (No Pat. No. 8,271,397), and U.S. Application
`
`No. 11/677,490 (now Pat. No. 8,001,055). The patent also claims priority to three
`
`provisional applications: 60/775,046, filed on February 21, 2006 (Ex. 1016),
`
`60/812,279, filed on June 9, 2006 (Ex. 1017), and 60/859,235, filed on November
`
`15, 2006, (Ex. 1018).
`
`
`
`5
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`B.
`Brief Description of the ’137 Patent Disclosure
`The ’137 patent describes a secure database called a “Universal Secure
`
`Registry,” which is “a universal identification system … used to selectively
`
`provide personal, financial or other information about a person to authorized
`
`users.” ’137 patent, 4:8-11. The patent states that the USR database is designed to
`
`“take the place of multiple conventional forms of identification” when conducting
`
`financial transactions to minimize the incidence of fraud. E.g., id., 4:23-25. The
`
`patent states that various forms of information can be stored in the database to
`
`verify a user’s identity and prevent fraud: (1) algorithmically generated codes, such
`
`as a time-varying multicharacter code or an “uncounterfeitable token,” (2) “secret
`
`information” like a PIN or password, and/or (3) a user’s “biometric information,”
`
`such as fingerprints, voice prints, an iris or facial scan, DNA analysis, or even a
`
`photograph. See id., 14:1-7, 14:21-40, 44:54-61, Fig 3. The patent does not,
`
`however, describe any new technology for generating or combining such
`
`information. Ex-1002, Shoup-Decl., ¶ 22.
`
`Instead, the patent emphasizes that the USR database can be implemented in
`
`“a general-purpose computer system” using “a commercially available
`
`microprocessor” running “any commercially available operating system.” Id.,
`
`11:45-52. The alleged invention is also “not limited to a particular computer
`
`platform, particular processor, or particular high-level programming language.”
`
`
`
`6
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`Id., 12:34-36. The USR database itself “may be any kind of database” and
`
`communication with the database may take place over a generic “wide area
`
`network, such as the Internet.” Id., 12:1-3, 11:27-31, Fig. 1. Transactions to and
`
`from the database are encrypted using known methods, and access restrictions for
`
`users are implemented using known cryptographic methods. Id., 4:11-22; see also
`
`id., 13:4-11. The database itself is also encrypted. Id., 3:66-4:3; Ex-1002, Shoup-
`
`Decl., ¶ 23.
`
`In its complaint against Apple, USR identified ’137 patent claim 12 as
`
`exemplary of the other claims of the patent. Claim 12 is a “system for
`
`authenticating a user for enabling a transaction.” Id., 46:55-56. The claimed
`
`system comprises a first device including a biometric sensor, a first processor, and
`
`a wireless transceiver configured to perform the following operations: (1)
`
`authenticate a user based on secret information, (2) retrieve or receive biometric
`
`information from a user, (3) authenticate a user based on that biometric
`
`information, (4) in response to the biometric authentication, generate signals
`
`including first authentication information, an indicator of biometric authentication,
`
`and a time-varying value, (5) transmit the signals to a second device, and (6) if the
`
`second device confirms authentication, receive from the second device an
`
`enablement signal to enable or not enable a transaction. Id., 46:55-47:14; Ex-1002,
`
`Shoup-Decl., ¶ 24.
`
`
`
`7
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`In addition to the requirements of claim 12, Claim 1 affirmatively claims a
`
`second device including a second processor, which receives a signal from the first
`
`device that includes the indication of biometric information and the first
`
`authentication information. Ex-1002, Shoup-Decl., ¶ 25.
`
`C.
`Prosecution History
`The ’137 patent was filed as U.S. Application No. 15/019,660 (the ’137
`
`application) on February 9, 2016 claiming priority to three provisional
`
`applications, the earliest of which was filed on February 21, 2006. The patent
`
`owner filed a Request for Prioritized Examination under 37 C.F.R. § 1.102(e) with
`
`the application on February 9, 2016. See Ex-1005, ’137 Patent File History, Track
`
`One Request.
`
`The examiner granted the Request for Prioritized Examination under Track
`
`One on March 22, 2016. See Ex-1006, ’137 Patent File History, Track One
`
`Request Granted. All claims in the application issued as the same numbered claim
`
`in the application. (For example, reference to “application claim 1” corresponds
`
`with issued claim 1, “application claim 2” corresponds to issued claim 2, etc.) The
`
`examiner issued a Non-Final Rejection on April 15, 2016. See Ex-1007, ’137
`
`Patent File History, 04/15/2016 Non-Final Rejection. The examiner rejected
`
`claims 1-11 under 35 U.S.C. § 112(b) for indefiniteness based on the structure of
`
`the claims. Id., 4-5.
`
`
`
`8
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`The examiner also rejected claims 1-2 and 5-12 under 35 U.S.C. § 103 as
`
`obvious over U.S. Patent App. Pub. 20020178364 (“Weiss”) in view of U.S. Patent
`
`No. 6,819,219 (“Bolle”), explaining that Weiss “does not directly disclose a
`
`wireless transceiver and wireless signal; and a biometric sensor configured to
`
`capture a first biometric information of the user,” but it would have been obvious
`
`“to modify Weiss’ invention by incorporating the wireless technology as taught by
`
`Bolle.” Id., 6-14.
`
`The examiner also rejected claims under the non-statutory doctrine of double
`
`patenting. Id., 15. The examiner rejected application claims 1 and 12 as double
`
`patenting of claim 1 of U.S. Patent No. 8,001,055 (“Weiss ’055”) and rejected
`
`application claims 1-12 as double patenting of claims 21-40 of co-pending U.S.
`
`App. No. 14/814,740. Id.
`
`The examiner also noted two other prior art references in the conclusion of
`
`the Non-Final Rejection that were pertinent to the disclosure. Id., 17.
`
`Conclusion
`
` The prior art made of record and not relied upon is
`
`considered pertinent to applicant's disclosure.
`
`• US 20030139984 ("Seigel"): This invention is
`
`related to implementing a cashless and clerkless
`
`transaction comprises gathering product information,
`
`
`
`9
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`gathering personal information (e.g. a credit card
`
`number) and capturing biometric information from the
`
`individual seeking to purchase a product. The biometric
`
`information is used to authenticate the identity of the
`
`individual. Biometric information that is captured during
`
`the purchasing process is compared to stored biometric
`
`data about the customer. After a match is confirmed
`
`between the stored biometric data and the captured
`
`biometric data the sales transaction will be permitted.
`
`• US 20030074568 Al ("Kinsella"): This invention
`
`is related to biometric devices, and more particularly to
`
`stand-alone biometric devices that can be registered to
`
`operate with one or more remote computer systems. Even
`
`more particularly, the invention is related to biometric
`
`devices that internally authenticate the identity of a user
`
`using biometric information; once the user is
`
`authenticated, the device is allowed to securely interface
`
`with a remote computer system. No biometric
`
`information about the user need be passed to the remote
`
`
`
`10
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`computer system because the entire biometric
`
`authentication process may be done on the device itself.
`
`Patent Owner filed a Terminal Disclaimer Request on July 15, 2016. See
`
`Ex-1008, ’137 Patent File History, 07/15/2016 Terminal Disclaimer-Filed. The
`
`request limited the term of the ’137 application to both U.S. App. No. 14/814,740
`
`and U.S. Patent No. 8,001,055 (“Weiss ’055”). Id. The request was electronically
`
`granted automatically on the same day.
`
`Patent Owner responded to the Non-Final Office Action on July 15, 2016.
`
`See Ex-1009, ’137 Patent File History, 07/15/2016 Amendment/Req.
`
`Reconsideration After Non-Final Reject. Patent Owner amended application
`
`claims 1-4, 6-7, and 10-12. Id. The amendments to exemplary claim 12 are shown
`
`below.
`
`12. (Currently Amended) A system for
`
`authenticating a user for enabling a transaction, the
`
`system comprising:
`
`a first device including:
`
`a biometric sensor configured to capture a first
`
`biometric information of the user;
`
`a first processor programmed to: 1) authenticate a
`
`user of the first device based on secret information, 2)
`
`
`
`11
`
`

`

`Petition for Covered Business Method Review
`of U.S. Patent No. 9,530,137
`retrieve or receive first biometric information of the user
`
`of the first handheld device, 3) authenticate the user of
`
`the first device based on the first biometric, and 4)
`
`generate one or more signals including first
`
`authentication information, an indicator of biometric
`
`authentication of the user of the first handheld device,
`
`and a time varying value[,]; and
`
`wherein generating occurs responsive to valid
`
`authentication of the first biometric;
`
`a first wireless transceiver coupled to the first
`
`processor and programmed to wirelessly transmit the one
`
`or more signals to a second device for processing;
`
`wherein generating the one or more signals occurs
`
`responsive to valid authentication of the first

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket