throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`v.
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`_________________________________________
`Case CBM2018-00024
`U.S. Patent No. 8,577,813
`________________________________________
`
`REPLY TO PATENT OWNER’S RESPONSE
`
`

`

`Contents
`
`Introduction .......................................................................................................... 1
`I.
`II. The Board Correctly Found The ’813 Patent To Be CBM Review Eligible. .. 1
`A. The ’813 Patent As A Whole Claims Subject Matter That Was Known And
`Obvious. .................................................................................................................. 1
`B. The Board Need Not Consider Whether The ’813 Patent Is A Technical
`Solution To A Technical Problem. ......................................................................... 2
`C. USR Misconstrues The Record In Its Attempt To Compare This Case To
`IBG v. Trading Technologies Int’l. ........................................................................ 3
`III. Maes In View Of The ’585 Reference Discloses A “Secure Registry.” .......... 4
`IV. Maes In View Of The ’585 Reference Discloses The Claimed “Encrypted
`Authentication Information.” ..................................................................................... 6
`V. A POSITA Would Have Applied The ’585 Reference’s Teachings To Maes
`Because Both References Include Secure Registries That Receive And Decrypt
`Information To Authenticate The User. ..................................................................... 7
`VI. Maes Only Suggests that Physical Components Should Remain Compatible
`With Existing Infrastructure, Not Server Software. .................................................. 9
`VII. Combining The ’585 Reference’s Authentication Codes With Maes’
`Authentication System Would Have Improved The Security Of Maes. ................. 12
`A. A POSITA Would Have Understood That The ’585 Reference’s Multi-
`factor Authentication Code Is More Secure Than The Encrypted Information Of
`Maes. ..................................................................................................................... 12
`B. The ’585 Reference’s Authentication Codes Would Have Added Security
`To Maes’ Digital Certificate System. ................................................................... 13
`VIII. Combination Function 230 Teaches That Inputs Can Be Combined,
`Including Secret Information And Identifying Information. ................................... 14
`IX. Maes Discloses Displaying Indicators For The Plurality Of Accounts. ........ 14
`X. Maes Discloses De-Activating The Electronic ID Device. ............................ 17
`XI. The ’585 Reference Discloses Generating The Claimed Seed. ..................... 17
`XII. Maes And The ’585 Reference Disclose The Claimed Act Of Generating
`Encrypted Authentication Information. ................................................................... 19
`XIII. Maes In View Of Maritzen Discloses Not Permitting The Entry Of User
`Input.
` ..................................................................................................................... 20
`
`i
`
`

`

`XIV. A POSITA Would Not Have Been Dissuaded From Applying Maritzen’s
`Teachings To Maes Based On Immaterial Design Differences............................... 21
`XV. Maes Discloses Displaying Options For Purchase. ........................................ 22
`XVI. A POSITA Would Not Have Been Dissuaded From Applying Labrou’s
`Teachings To Maes Based On Immaterial Design Differences............................... 23
`XVII. USR Failed To Demonstrate Secondary Considerations Of Non-
`Obviousness. ............................................................................................................ 24
`XVIII. Conclusion ................................................................................................... 26
`
`
`ii
`
`

`

`I.
`
`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`
`Introduction
`USR’s Patent Owner Response (“POR”) fails to rebut Petitioner’s showing
`
`that the challenged claims are unpatentable. First, USR’s assertion that the
`
`claimed invention is a “technological solution” fails because, as the Board already
`
`determined, “each [of the] steps uses a technological feature that was known in the
`
`art [and] the steps appear to be implemented in a conventional manner.” DI, 12-
`
`13. Second, USR mischaracterizes the prior art references and the creativity and
`
`technical ability of persons having ordinary skill in the art. Finally, USR fails to
`
`demonstrate any secondary considerations of non-obviousness whatsoever.
`
`II. The Board Correctly Found The ’813 Patent To Be CBM Review
`Eligible.
`A. The ’813 Patent As A Whole Claims Subject Matter That Was
`Known And Obvious.
`Despite the Board previously rejecting USR’s argument that the ’813 patent
`
`is ineligible for CBM review—finding that each claimed step uses a feature “that
`
`was known in the art” and that was “conventional”— USR wastes nearly half of its
`
`POR recycling its argument that the ’813 patent solves a technical problem with a
`
`technical solution. DI, 12-13; Ex-1201, ’813 patent, 43:54-44:7; Pet. 14.
`
`Unsurprisingly, even USR’s own expert, Dr. Jakobsson, admits that all the
`
`technology used by the ’813 patent—from the hardware components, to the
`
`communication interface, to the database and encryption techniques—was known.
`
`Ex-1227, Jakobsson-Dep., 307:11-17 (’813 patent uses conventional biometric
`
`1
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`sensors), 308:19-21 (’813 patent uses a conventional user interface), 308:25-309:2
`
`(’813 patent uses conventional fingerprint sensors), 309:16-18 (’813 patent uses
`
`conventional processors), 311:3-5 (’813 patent discloses no improvements to
`
`hardware), 312:3-5 (’813 patent discloses no new form of communication
`
`interface), 312:21-25 (’813 patent can be used with any form of database), 313:21-
`
`314:17 (’813 patent discloses no new form of encryption), 315:10-14 (temporary
`
`disabling of a device was prior art), 319:10-12 (point-of-sale terminals were prior
`
`art), 322:5-13 (multifactor authentication involving biometric information was
`
`prior art), 323:17-22 (authentication based on a time-varying token was prior art),
`
`330:10-15 (limiting functionality of a user device based on a failed authentication
`
`was prior art), 355:22-356:2 (PIN and biometric based authentication was prior
`
`art); 357:9-11 (local authentication was prior art), 460:20-461:2 (combining local
`
`and remote authentication was prior art).
`
`B.
`The Board Need Not Consider Whether The ’813 Patent Is A
`Technical Solution To A Technical Problem.
`Under 37 C.F.R. Section 42.401, CBM Review is inapplicable for patents
`
`directed toward “technological inventions” that either (1) claim subject matter that
`
`“as a whole recites a technological feature that is novel or unobvious over the prior
`
`art” or (2) “solves a technical problem using a technical solution.” 37 C.F.R. §
`
`42.401. The Board need not consider the second prong if, as here, the patent only
`
`recites technological features that were known or obvious. Final Written Decision,
`
`2
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`CBM2017-00023 Paper 48, 30-31 (PTAB June 11, 2018) (“We need only assess
`
`whether one of the prongs set forth in 37 C.F.R. § 42.301(b) is deficient to
`
`determine whether the claims…are not for a ‘technological invention.’”); Apple
`
`Inc. v. Ameranth, Inc., 842 F.3d 1229, 1240 (Fed. Cir. 2016). The Board’s
`
`conclusions here do not “conflate the two prongs” of this analysis as USR contends
`
`(POR, 21) because it already found that that the ’813 patent fails to meet the first
`
`prong necessary for avoiding CBM Review and need not assess the second prong.
`
`To the extent USR contends that the ’813 patent is directed to a technical solution
`
`to a technical problem, the Petition already shows that it is not. Pet., 16-18.
`
`C. USR Misconstrues The Record In Its Attempt To Compare This
`Case To IBG v. Trading Technologies Int’l.
`USR’s reliance on IBG LLC v. Trading Techs. Int’l, Inc., 2019 WL 581580
`
`(Fed. Cir. Feb 13, 2019), is misplaced because the ‘813 patent’s eligibility has not
`
`been upheld by any final district court or PTAB determination. The Board has not
`
`held the ’813 patent to be Section 101 eligible because it has—so far—only found
`
`that it was not “more likely than not” that Petitioner would prevail in its showing
`
`patent ineligibility based on the Petition. Institution Decision, CBM2018-00026,
`
`Paper 11, 14 (PTAB 2018). Similarly, no federal court has held—in final form—
`
`the ’813 patent to be eligible as USR argues (POR, 23) because Apple’s objection
`
`to the magistrate judge’s recommendation on this issue is currently pending before
`
`the district judge. So, unlike the patents in IBG, the ’813 patent’s eligibility has
`
`3
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`not been finally determined by any court. Thus, the Board finding of CBM
`
`eligibility here is not inconsistent with any final rulings.
`
`The Board reversing its finding regarding CBM eligibility will not promote
`
`consistency with other findings regarding Section 101. USR’s argument (POR, 23-
`
`25) ignores the fact that the USPTO has finally rejected the claims in each of the
`
`’813 patent’s five continuation applications as patent ineligible under Section 101.
`
`See Applications Nos. 14/071,125, 15/045,408, 15/661,943, 15/661,955, an
`
`15/685,813. The Board’s finding of CBM eligibility here is entirely consistent
`
`with the USPTO’s findings in the ’813 continuation applications, and no reversal
`
`on the issue of CBM eligibility is therefore warranted.
`
`III. Maes In View Of The ’585 Reference Discloses A “Secure Registry.”
`The Petition shows that Maes in view of the ’585 reference discloses a
`
`“secure registry” (Pet., 31-35 (limitation 1[c])) configured to receive “encrypted
`
`authentication information” (Pet., 50-52 (limitation 1[g])) that is generated “from
`
`the non-predictable value, information associated with at least a portion of the
`
`biometric input, and the secret information” (Pet., 42-47 (limitation 1[f])). USR’s
`
`rebuttal mischaracterizes the references and Petitioner’s mapping. Ex-1225,
`
`Shoup-Decl., ¶23.
`
`As the Petition demonstrates, Maes’ financial institution 70 is a “secure
`
`registry” (Pet., 31-32, 50; DI, 31-32), which, properly construed, means a database
`
`4
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`with access restrictions. Pet., 24. Financial institution 70 is a database with access
`
`restrictions because it restricts access to information and services provided by a
`
`database. Id., 32-33. USR argues that “there are any number of security
`
`methodologies that could be implemented without using access restrictions” (POR,
`
`41), but fails to identify even one. This is not even Petitioner’s position. Financial
`
`institution 70 is a database with access restrictions because it restricts database
`
`access to authorized users by authenticating encrypted information sent by the
`
`user. Pet., 32-33. Once authorized, the financial server provides access to an
`
`authorization number that can be used to conduct a financial transaction. Id. It is
`
`irrelevant what security methodology is used to restrict access, because the claim
`
`merely requires that access to the database is restricted. Ex-1225, Shoup-Decl.,
`
`¶24.
`
`The ’585 reference also discloses a secure registry because its verifier 105
`
`restricts database access to authorized users. Pet., 35. Dr. Jakobsson asserts, with
`
`no support or explanation, that “authentication is not an access restriction” (Ex-
`
`2011, Jakobsson-Decl., ¶64), but the plain meaning of the phrase “access
`
`restriction” is a mechanism that restricts access, and the ’585 reference’s
`
`authentication mechanism clearly restricts access to financial services. Ex-1214,
`
`’585 reference, [0050], [0058], [0118]. Ex-1225, Shoup-Decl., ¶25.
`
`5
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`IV. Maes In View Of The ’585 Reference Discloses The Claimed
`“Encrypted Authentication Information.”
`Maes discloses transmitting encrypted authentication information to
`
`financial institution 70. Pet., 50 (limitation 1[g]). Financial institution 70 is
`
`coupled to central server 60, which, as the Board found, is an example of a
`
`database used by financial institution 70. DI, 32. USR contends that “[n]either
`
`[financial institution 70 nor central server 60] deals with, considers or suggests the
`
`claimed ‘encrypted authentication information’” (POR, 41), but immediately
`
`contradicts itself by acknowledging that “financial server 70 does receive
`
`encrypted information.” POR, 42; Ex-1213, Maes, 13:19-38. Ex-1225, Shoup-
`
`Decl., ¶26.
`
`The ’585 reference discloses encrypted authentication information that is
`
`generated “from the non-predictable value, information associated with at least a
`
`portion of the biometric input, and the secret information” (Pet., 42-47 (limitation
`
`1[f])), and it would have been obvious to combine these teachings with Maes
`
`because the ’585 reference’s authentication codes provide a robust security
`
`alternative to Maes’ encrypted information message. Pet., 48-49. USR complains
`
`that Apple’s combination fails to identify a “precise database functionality” and an
`
`“exact architecture” (POR, 47), but cannot cite to any “precise database
`
`functionality” or “exact architecture” that the claims require. In fact, Dr.
`
`Jakobsson acknowledges that the ’813 patent can be used with “any form of
`
`6
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`database.” Ex-1227, Jakobsson-Dep., 213:17-25. The combination meets the
`
`claimed limitations and the Petition shows that a POSITA would have been
`
`motivated to combine the references. There is no additional database functionality
`
`or architecture necessary to show that the claims are invalid. Nonetheless, the
`
`functionality and architecture for generating and processing the ’585 reference’s
`
`authentication codes are provided in detail by the disclosure of the ’585 reference.
`
`See, e.g., Ex-1214, ’585 reference, Figs. 1-2, [0037]-[0039], [0073]. Ex-1225,
`
`Shoup-Decl., ¶27.
`
`V. A POSITA Would Have Applied The ’585 Reference’s Teachings To
`Maes Because Both References Include Secure Registries That Receive And
`Decrypt Information To Authenticate The User.
`The ’585 reference discloses various non-limiting embodiments for
`
`generating and verifying authentication codes including encryption techniques that
`
`produce an encrypted authentication information. USR’s arguments erroneously
`
`assume that the ’585 reference is limited to one method (POR, 47), and ignore
`
`embodiments in the ’585 reference that are based on the same encryption and
`
`decryption model used by Maes. Ex-1226, Juels-Decl., ¶¶37-40. Ex-1225, Shoup-
`
`Decl., ¶28.
`
`For example, the ’585 reference discloses an authentication code 292, which
`
`is generated by encrypting a non-predictable value 291 using a block cipher. Pet.,
`
`43-45; Ex-1214, ’585 reference, [0073]. Thus, the ’585 reference’s authentication
`
`7
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`code 292 is encrypted authentication information; USR’s argument that no
`
`“encryption process, [takes] ‘authentication information’ as input” (POR, 52-53) is
`
`incorrect because authentication code 291 is authentication information that is
`
`input into a block cipher to create encrypted authentication code 292. Ex-1225,
`
`Shoup-Decl., ¶29.
`
`USR’s argument that “there is no decryption” in the ’585 reference’s system
`
`(POR, 54) overlooks that the ’585 reference discloses that the encrypted
`
`authentication code is decrypted. Ex-1214, ’585 reference, [0058] (“In some
`
`embodiments the verifier 105 decrypts a value encrypted by the user authentication
`
`device 120 using symmetric key encryption or asymmetric encryption techniques,
`
`such as public key encryption”). Likewise, the proposed combination need not
`
`undertake the “needless computational overhead” in USR’s contrived examples
`
`(POR, 55) because the ’585 reference discloses an authentication code this is
`
`encrypted, transmitted to a “secure registry,” and decrypted – just like the system
`
`in Maes. Ex-1225, Shoup-Decl., ¶30. As Dr. Ari Juels (a named inventor of the
`
`’585 reference) confirms, the verifier 105 need not separately derive its own
`
`authentication code and therefore need not store private data for each user to verify
`
`that user. Ex-1226, Juels-Decl., ¶¶37-40.
`
`
`
`USR also argues that erroneous PINs would deter a POSITA from making
`
`the proposed combination (POR, 56), but completely ignores the ’585 reference’s
`
`8
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`disclosure that PINs are first authenticated in a local authentication before being
`
`sent to the remote verifier 105. Ex-1214, ’585 reference, [0059]. Ex-1225, Shoup-
`
`Decl., ¶31.
`
`VI. Maes Only Suggests that Physical Components Should Remain
`Compatible With Existing Infrastructure, Not Server Software.
`USR’s contentions about the “basic principles of Maes” (POR, 57) are
`
`wrong because Maes makes clear that “existing infrastructure” relates only to
`
`physical devices like ATMs and kiosks and does not relate to modification to
`
`software on servers, which is the only type of modification required to combine the
`
`’585 reference with Maes. Maes itself proposes many modifications to servers that
`
`only require modifications to software and backend system changes that would not
`
`impact any “existing infrastructure.” Ex-1225, Shoup-Decl., ¶32.
`
`For example, Maes discloses embodiments where financial institutions
`
`possess a “requisite key (provided by the service provider upon enrollment) to
`
`decode (i.e., decrypt) the transmitted information to verify the identity of the user.”
`
`Ex-1213, Maes, 13:51-55. Maes discloses an enrollment process for “providing
`
`the service provider with the user’s credit card or ATM card information so that
`
`such information can be verified with the financial institutions 70 that issued such
`
`cards.” Id., 6:71-7:1. Maes also describes an enrollment process that involves
`
`comparing voice prints (id., 8:50-65) or asking a series of questions (id., 8:12-26).
`
`The existing infrastructure at the time of the Maes reference did not include
`
`9
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`support for such an enrollment process. These embodiments would have required
`
`changes to server software that are analogous to the software changes needed to
`
`implement the combination function of the ’585 reference. None of these
`
`modifications would have been incompatible with then existing infrastructure. Ex-
`
`1225, Shoup-Decl., ¶33.
`
`USR also argues that the proposed combination would require “significant
`
`modifications” that are incompatible with existing infrastructure, but Maes makes
`
`clear that compatibility with existing infrastructure is meant to avoid costly
`
`overhauls to deployed physical systems like ATMs. Id., 4:12-18; 11:52-57. In
`
`contrast, modifications to servers like the financial institution 70 or the verifier 105
`
`would be inexpensive in comparison to an overhaul of physical systems. The
`
`modifications required to implement the ’585 reference’s combination function
`
`would require only simple changes to software, without any change to existing
`
`physical systems. Accordingly, the proposed combination of the ’585 reference’s
`
`combination function with Maes would not contradict Maes’s suggestion that new
`
`systems should be compatible with existing infrastructure. Ex-1225, Shoup-Decl.,
`
`¶34.
`
`USR also argues that “a user would have to provide their private data (i.e.,
`
`their biometric information) to each and every financial institution for which they
`
`have an account because [the ’585 reference’s] verifier authorizes upon a
`
`10
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`comparison of the transmitted code with a recreated code drawn from the stored
`
`private data” (POR, 58), but neither the claims nor Maes require the use of
`
`multiple financial institutions. A user could easily have multiple accounts (e.g.,
`
`cards) with the same financial institution. Moreover, even if multiple financial
`
`institutions were used, the secure data could be stored on a centralized server as
`
`taught by Maes. Thus, sensitive information need not be distributed across
`
`multiple financial institutions. Indeed, as the ’585 reference recognizes, the
`
`verifier can be implemented as a distributed system. See Ex-1214, ’585 reference,
`
`[0038], [0139]-[0140], [0141]. A POSITA would have understood that the secure
`
`data could be kept on a centralized server like central server 60 if there were
`
`concerns about keeping sensitive data safe. Ex-1225, Shoup-Decl., ¶35.
`
`Moreover, the claims do not require the use of biometric information to
`
`generate the authentication information and authenticate the user. For example,
`
`claim 1 requires authentication information that is generated from “information
`
`associated with at least a portion of the biometric input.” See Ex-1201, ’813
`
`patent, cl. 1 (emphasis added). Claim 1 does not require that the biometric input
`
`itself is verified at the secure registry and therefore does not require that the
`
`verifier knows or uses any actual biometric information to authenticate the user.
`
`Consistent with this requirement, the ’585 reference teaches that the “User Data
`
`(P)” value that represents the biometric input to an authentication code can simply
`
`11
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`be a preprocessed form of biometric data. Ex-1214, ’585 reference, [0072],
`
`[0077]. It need not be the user’s biometric information itself. Claims 10 and 19
`
`only require that two of several factors (which happen to include biometric
`
`information) are used to generate a seed. These claims list biometric information
`
`as one of several optional inputs to generate the seed, but do not require that
`
`biometric information be used. Thus, contrary to USR’s argument, the
`
`combination of the ’585 reference and Maes does not require that the user’s
`
`biometric information is stored at each and every financial institution. Ex-1225,
`
`Shoup-Decl., ¶36.
`
`VII. Combining The ’585 Reference’s Authentication Codes With Maes’
`Authentication System Would Have Improved The Security Of Maes.
`A. A POSITA Would Have Understood That The ’585 Reference’s
`Multi-factor Authentication Code Is More Secure Than The Encrypted
`Information Of Maes.
`A POSITA would have understood that the multi-factor authentication code
`
`of the ’585 reference is harder to replicate and would therefore improve Maes’
`
`encrypted information. Pet., 47-50. USR disputes the proposed combination
`
`(POR, 44-47), but the Petition identifies a specific combination of the ’585
`
`reference’s combination function with the authentication system of Maes. Pet., 47
`
`(“It would have been obvious to combine the authentication code derivation
`
`techniques disclosed in [the ’585 reference’s] combination function with the
`
`teachings of Maes to arrive at limitation 1[f].”). USR argues that Dr. Shoup did
`
`12
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`not consider whether adding “the claimed encrypted authentication information” to
`
`Maes would have been an improvement (POR, 59), but he did consider whether the
`
`’585 reference’s combination function would have been an improvement to the
`
`security of Maes and agreed that it would “provide a more robust security system.”
`
`Ex-1202, Shoup-Decl., ¶111. Ex-1225, Shoup-Decl., ¶37.
`
`B.
`The ’585 Reference’s Authentication Codes Would Have Added
`Security To Maes’ Digital Certificate System.
`The ’585 reference’s authentication codes would have supplemented the
`
`security provided by Maes’ digital certificate security feature. Ex-1213, Maes,
`
`13:19-24. USR argues that combining the ’585 reference’s teachings would
`
`“eviscerate[] the purpose of the digital certificate” because “one would have to
`
`again connect to the server” (POR 51), but USR completely ignores embodiments
`
`in Maes itself that combine the digital certificate with a remote authentication like
`
`the one disclosed in the ’585 reference. Ex-1225, Shoup-Decl., ¶38.
`
`
`
`For example, Maes discloses embodiments “whereby the financial institution
`
`(e.g., credit card company) can verify the identity of the consumer during a
`
`purchase transaction.” Ex-1213, Maes, 13:22-25. In addition to the digital
`
`certificate, this embodiment uses a remote authentication involving encryption and
`
`decryption that is the same as the system disclosed in the ’585 reference, where the
`
`verifier 105 verifies the identity of the user during a transaction. Ex-1213, Maes,
`
`13:35-39. As Maes recognizes, this additional remote authentication “afford[s] an
`
`13
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`additional level of security for user verification.” Ex-1213, Maes, 13:19-24. Thus,
`
`far from “eviscerat[ing] the purpose of the digital certificate” (POR, 51), the ’585
`
`reference’s authentication techniques would similarly afford an additional level of
`
`security for user verification. Ex-1225, Shoup-Decl., ¶39.
`
`VIII. Combination Function 230 Teaches That Inputs Can Be Combined,
`Including Secret Information And Identifying Information.
`As shown in the Petition, it would have been obvious to apply the ’585
`
`reference’s teachings to Maes to meet the claim limitation requiring secret
`
`information that “includes the identifying information,.” Pet., 54. USR complains
`
`that the Petition fails to provide a motivation to combine (POR, 60-61), but the
`
`’585 reference’s combination function 230 shows how any input can be combined
`
`with any other input, in any order (Pet., 55; Ex-1214, ’585 reference, [0073], Fig.
`
`2), and the Petition explains various motivations to combine the ’585 reference’s
`
`combination function 230 with the teachings of Maes. Pet., 47-50. Ex-1225,
`
`Shoup-Decl., ¶40.
`
`IX. Maes Discloses Displaying Indicators For The Plurality Of Accounts.
`The Petition demonstrates that Maes discloses a “processor is configured to
`
`display indicators for the plurality of accounts” and the “act of displaying, on the
`
`user interface indicators for the plurality of user accounts stored in a memory of
`
`the electronic ID device,” as claims 13 and 17 require. Pet., 62. For example,
`
`Maes discloses that the “user select[s] a pre-enrolled credit card that is stored in
`
`14
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`memory” and that the “desired card may be selected through the user
`
`interface/display 34.” Ex-1213, Maes, 10:30-44. Ex-1225, Shoup-Decl., ¶40.
`
`Maes also discloses that the user interface/display 34 is “preferably a liquid crystal
`
`display (LCD) touch screen display (or equivalent user interface), for displaying
`
`and/or inputting data.” Ex-1213, Maes, 5:36-40. Thus, contrary to USR’s
`
`contentions (POR, 61-63), Maes does expressly disclose displaying indicators for a
`
`plurality of user accounts. Ex-1225, Shoup-Decl., ¶41.
`
`USR argues that the claimed display of indicators is not necessarily present
`
`because Maes “discloses other methods such as voice” (POR, 62), but Maes makes
`
`clear that cards can be selected through interface/display 34, which, as illustrated
`
`below, is separate from the microphone 18 used to capture voice input. Ex-1213,
`
`Maes, 5:4-6. Ex-1225, Shoup-Decl., ¶41. Moreover, Maes discloses that the
`
`interface/display 34 has two functions: a first function as an interface for “inputting
`
`data” and a second function as a display for “displaying…data.” Ex-1213, Maes,
`
`5:36-40. USR’s argument appears to conclude that the ability of interface/display
`
`34 to receive an input proves that the accounts are not displayed, but one way to
`
`choose from a list of displayed accounts is simply to type in the desired choice.
`
`Moreover, while it may be possible to search for desired cards by inputting search
`
`criteria through interface 34, Maes also discloses that the desired cards may be
`
`15
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`displayed on the display 34 because one of its two functions is to display data. Ex-
`
`1225, Shoup-Decl., ¶42.
`
`Maes also discloses that the CPU 12 “searches the memory 14 for the
`
`desired information” after the desired card is “selected through the user
`
`interface/display 34.” Ex-1213, Maes, 10:43-48. Thus, for example, the user
`
`could select the desired card from a listing of cards on the display (e.g., American
`
`Express Card, Bank of America Card, etc.) and the CPU 12 would then retrieve
`
`desired information such as the actual card number or the address associated with
`
`the card. Maes further discloses that the user can be prompted to select another
`
`card if the card information was not previously stored in device 10. Thus, for
`
`example, if the user selects his or her American Express card, and the information
`
`associated with that card is missing, the user may be prompted to select a different
`
`card. In either case, Maes still discloses displaying indicators for the plurality of
`
`user accounts stored in a memory. Ex-1225, Shoup-Decl., ¶43.
`
`USR argues that Maes’s system can be implemented “by typing in the name
`
`of the card on the user interface” (POR, 62), but as Dr. Shoup explains, displaying
`
`indicators for accounts or providing a search option were both well known, easily
`
`within the skill of a POSITA to implement, and the only practical options for
`
`providing access to multiple accounts. The ubiquity of these options is further
`
`illustrated in the Maritzen reference, which (like Maes) discloses that accounts can
`
`16
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`be selected from a list or retrieved using a search tool. Ex-1215, Maritzen, 105
`
`(“the user may select a different account from a list of accounts displayed or enter
`
`an account number into I/O 260”). Ex-1225, Shoup-Decl., ¶44.
`
`X. Maes Discloses De-Activating The Electronic ID Device.
`Claim 18 recites, and Maes discloses, “an act of de-activating the electronic
`
`ID device without generating the encrypted authentication information if the
`
`identity of the user is not successfully authenticated to the electronic ID device.”
`
`Pet., 62. Maes discloses that “PDA device 10 will prohibit the selected card
`
`information from being retrieved and transmitted to the transaction terminal 80 if
`
`the user is not biometrically verified.” Ex-1213, Maes, 12:18-23. Thus, the PDA
`
`device 10 is de-activated without generating the encrypted authentication
`
`information when the user is not successfully authenticated. Pet., 62-63. USR
`
`argues that Maes fails to disclose the claimed de-activating (POR, 63), but even by
`
`Dr. Jakobsson’s own definition, Maes discloses de-activating the device because
`
`PDA device 10 is made “ineffective” for the relevant purpose: transmitting
`
`encrypted information to conduct a transaction. Ex-2011, Jakobsson-Decl., ¶96
`
`(“de-activate means to make inactive or ineffective”). Ex-1225, Shoup-Decl., ¶45.
`
`XI. The ’585 Reference Discloses Generating The Claimed Seed.
`Maes in view of the ’585 reference discloses claim 19, which requires
`
`“generating a seed from which the authentication information is generated.” Pet.,
`
`17
`
`

`

`U.S. Pat. No. 8,577,813
`Reply to Patent Owner’s Response
`63. USR complains that “[t]here is no other use of [authentication code 290] –
`
`ever” (POR, 65), but identifies no claim limitation, specification support, or
`
`definition that requires using claimed seed more than once. USR proposes no
`
`claim construction, and instead merely makes the bald assertion that a POSITA
`
`would not have understood the authentication code to be a seed. POR, 66.
`
`However, authentication code 290 of the ’585 reference matches the description of
`
`a “seed” presented by the ’813 patent itself because it is a value generated through
`
`various inputs that is then used to derive another value. See Ex-1201, ’813 patent,
`
`46:46-66 (“any two of the PIN, the biometric information, the electronic serial
`
`number, a discrete code associated with the device and the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket