throbber
Paper No. 33
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`________________
`
`APPLE INC.,
`VISA INC., and VISA U.S.A. INC.,
`
`Petitioners,
`
`v.
`
`UNIVERSAL SECURE REGISTRY LLC
`
`Patent Owner
`________________
`
`Case CBM2018-000251
`U.S. Patent No. 8,577,813
`________________
`
`PATENT OWNER’S SUR-REPLY
`
`1 Visa Inc. and Visa U.S.A. Inc., which filed a petition in CBM2019-00026
`have been joined as a party to this proceeding.
`
`

`

`TABLE OF CONTENTS
`
`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Page
`
`2.
`
`2.
`
`THE ‘813 PATENT IS NOT CBM ELIGIBLE .............................................. 1
`IBG LLC v. Trading Technologies Int’l, Inc. Requires Dismissal ........ 1
`A.
`B.
`Petitioner Fails To Prove The Claimed Subject Matter As A
`Whole Does Not Recite A Technological Feature That Is Novel
`And Unobvious ...................................................................................... 2
`Petitioner Fails To Prove The Claimed Subject Matter As A
`Whole Does Not Solve A Technological Problem Using A
`Technical Solution ................................................................................. 3
`PETITIONER FAILS TO PROVE THAT THE INDEPENDENT
`CLAIMS WOULD HAVE BEEN OBVIOUS ................................................ 4
`A.
`The Petition Fails to Show the Recited “Secure Registry” (all
`Claims) .................................................................................................. 4
`1.
`The Board Should Reject Petitioner’s Construction As
`Inconsistent with the Intrinsic Evidence. .................................... 5
`The Petition Failed to Show a Secure Registry Because
`the Verification Device Cannot Store Information for
`Multiple Entities. ......................................................................... 6
`The Petition Fails to Show the “Electronic ID Device” (All
`Claims) .................................................................................................. 8
`1.
`Jakobsson Does not Render Obvious the Electronic ID
`Limitation .................................................................................... 9
`Jakobsson in View of Maritzen Does Not Render
`Obvious the Electronic ID Limitation ...................................... 12
`The Petition Fails to Show the “Point-of-Sale Terminal” (All
`Claims) ................................................................................................ 16
`THE PETITION FAILS TO PROVE THAT MANY DEPENDENT
`CLAIMS WOULD HAVE BEEN OBVIOUS .............................................. 18
`A.
`The Petition Fails to Show That Dependent Claims 10 and 19
`Would Have Been Obvious ................................................................. 18
`The Petition Fails to Show That Dependent Claims 6 and 18
`Would Have Been Obvious ................................................................. 21
`
`I.
`
`II.
`
`III.
`
`C.
`
`B.
`
`C.
`
`B.
`
`i
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`C.
`
`D.
`
`The Petition Fails to Show That Dependent Claims 4 and 20
`Would Have Been Obvious ................................................................. 23
`The Petition Fails to Show That Dependent Claims 14-15, 22-
`23, and 25-26 Would Have Been Obvious.......................................... 23
`PETITIONER FAILED TO REBUT EVIDENCE OF SECONDARY
`CONSIDERATIONS OF NON-OBVIOUSNESS ........................................ 24
`CONCLUSION .............................................................................................. 25
`
`IV.
`
`V.
`
`ii
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`TABLE OF AUTHORITIES
`
`Cases
`Apple, Inc. v. Universal Secure Registry LLC,
`CBM2018-00026, (Paper 11), slip op., 24 (PTAB Dec. 10, 2018) ....................... 1
`
`Page
`
`Arendi S.A.R.L. v. Apple Inc.,
`832 F.3d 1355 (Fed. Cir. 2016) ...........................................................................22
`
`Cisco v. C-Cation Techs.,
`IPR2014-00454, Paper, 12 at 7-11 (Aug. 29, 2014) ............................................20
`
`Experian Mktg. Sol’ns, Inc. v. RPost Commc’ns Ltd.,
`CBM2014-0010 (Paper 20) slip op., 9 (PTAB Apr. 22, 2014) ............................. 3
`
`IBG LLC v. Trading Technologies Int’l, Inc.,
`2019 WL 581580 (Fed Cir., Feb. 13, 2019) ................................................. 1, 2, 3
`
`Kaneka Corp. v. Xiamen Kingdomway Grp. Co.,
`790 F.3d 1290 (Fed. Cir. 2015) ...........................................................................14
`
`Microsoft Corp. v. Proxyconn, Inc.,
`789 F.3d 1292 (Fed. Cir. 2015) ............................................................................. 5
`
`Universal Secure Registry, LLC v. Apple, Inc.,
`No. 1:17-cv-00585-CFC-SRF, Doc. 137 (D. Del., 2018) ..................................... 1
`
`Rules and Regulations
`
`37 C.F.R. § 42.6(e) ...................................................................................................28
`
`37 C.F.R. § 42.24 .....................................................................................................27
`
`37 C.F.R. § 42.24(b) ................................................................................................27
`
`37 C.F.R. § 42.301(b) ................................................................................................ 3
`
`Additional Authorities
`
` “A Practical Secure Physical Random Bit Generator” at Introduction,
`http://www.arijuels.com/wp-content/uploads/2013/09/JSHJ98.pdf ....................20
`
`iii
`
`

`

`“A Proposal for an ISO Standard for Public Key Encryption (version 2.1)”,
`p. 17, https://www.shoup.net/papers/iso-2_1.pdf ................................................19
`
`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`iv
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`PATENT OWNER’S LIST OF EXHIBITS
`
`Exhibit
`#
`2001 Declaration of Markus Jakobsson in Support of Patent Owner’s
`Preliminary Response
`
`Description
`
`2002
`
`Curriculum Vitae of Markus Jakobsson
`
`2003 Declaration of Alan Schiffman in Support of Patent Owner’s
`Preliminary Response
`
`2004
`
`Curriculum Vitae of Alan Schiffman
`
`2005
`
`1-1-2014 Unified website
`
`2006
`
`3-2-2016 Unified website
`
`2007
`
`Brief of Amici Curiae Unified Patents
`
`2008 Declaration ISO of Unopposed Motion for Admission Pro Hac Vice
`of Harold A. Barza.
`
`2009 Declaration ISO of Unopposed Motion for Admission Pro Hac Vice
`of Jordan B. Kaericher.
`
`2010 U.S. Application No. 13/237,184.
`
`2011 U.S. Application No. 12/393,586.
`
`2012 Declaration by Dr. Markus Jakobsson Ph.D. in Support of Motion to
`Amend.
`
`2013 Declaration of Markus Jakobsson in Support of Patent Owner’s
`Response
`
`2014 N. Asokan, et. al, The State of the Art in Electronic Payment
`Systems, IEEE Computer, Vol. 30, No. 9, pp. 28-35 (IEEE Computer
`Society Press, Sept. 1997)
`
`v
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`2015 M. Baddeley, Using E-Cash in the New Economy: An Economic
`Analysis of Micropayment Systems, J. Electronic Commerce
`Research, Vol. 5, No. 4, pp. 239-253 (Nov. 2004)
`
`2016 Deposition Transcript of Dr. Victor John Shoup
`
`2017 Universal Secure Registry, LLC v. Apple Inc., No. 1:17-cv-00585-
`CFC-SRF, Doc. 137 (D. Del., Sept. 19, 2018)
`
`2018
`
`2019
`
`2020
`
`2021
`
`2022
`
`IT World Publication, RSA offers token, smart-card reader combo,
`dated January 15, 2002, available at
`https://www.itworld.com/article/2793082/rsa-offers-token-smartcard-
`reader-combo.html
`
`IT Web Publication, RSA SecurID token beefed up with smart card
`reader, dated January 22, 2002, available at
`https://www.itweb.co.za/content/PmxVEMKX8QAqQY85
`
`Practical Unix & Internet Security, Chapter 8, available at
`http://web.deu.edu.tr/doc/oreily/networking/puis/ch08_07.htm
`
`IBM Knowledge Center, SecurID Token authentication,
`https://www.ibm.com/support/knowledgecenter/en/SSPREK_9.0.6/co
`m.ibm.isam.doc/wrp_config/concept/con_securid_token_authe.html
`
`Smart Card Integration Into Physical Access Control Systems,
`available at
`https://www.securetechalliance.org/secure/events/20030715/Technolo
`gyTrack/WT02d_Pfeiffer.pdf
`
`2023
`
`Concise Oxford English Dictionary (11th Ed. 2008)
`
`2024 American Heritage Desk Dictionary (2005)
`
`2025 U.S. Patent No. 6,985,583
`
`vi
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Universal Secure Registry, L.L.C. (“PO”) submits this Sur-Reply in
`
`opposition to Apple Inc.’s (“Petitioner”) Reply (Paper 26, “Reply”) to PO’s
`
`Response (Paper 20, “Response”). Despite ignoring the Board’s rules against the
`
`submission of new evidence and arguments, the Reply still fails to prove invalidity
`
`of the challenged claims.
`
`I.
`
`THE ‘813 PATENT IS NOT CBM ELIGIBLE
`IBG LLC v. Trading Technologies Int’l, Inc. Requires Dismissal
`
`A.
`
`As set forth in the Response, the Federal Circuit recently clarified the
`
`“technological invention” exception to CBM review. IBG LLC v. Trading
`
`Technologies Int’l, Inc., 2019 WL 581580, *1 (Fed Cir., Feb. 13, 2019) (“IBG”).
`
`Specifically, the Court vacated Board decisions holding four patents with the same
`
`specification were not “technological inventions” where both the Board and Federal
`
`courts had found two patents in the family to be eligible under Section 101 because
`
`they were directed to an improvement in computer systems. Id., *1-*3. The present
`
`proceeding presents identical facts: Both the Board and a federal court have found
`
`the ‘813 patent to be eligible because they are directed to an improvement in the
`
`security of mobile devices. See Apple, Inc. v. Universal Secure Registry LLC,
`
`CBM2018-00026 (Paper 11), slip op., 24 (PTAB Dec. 10, 2018); Universal Secure
`
`Registry, LLC v. Apple, Inc., No. 1:17-cv-00585-CFC-SRF, Doc. 137 (D. Del.,
`
`2018).
`
`1
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`While the Reply attempts to distinguish IBG on grounds that eligibility has
`
`not been “upheld by any final…determination,” that distinction is inapposite. See
`
`Reply, 3-4. The gravamen of IBG is that eligible patents directed to an improvement
`
`in computer systems are also “technological inventions.” IBG, *2. The decisions of
`
`the Board and a district court—holding the ‘813 patent to be eligible because it is
`
`directed to an improvement in the security of mobile devices—are “instructive to the
`
`technological invention question;” indeed, according to IBG, it would be “internally
`
`inconsistent” to conclude the ‘813 patent to not be a “technological invention.” See
`
`IBG, *1-*3.
`
`Petitioner further argues that IBG is distinguishable because the USPTO has
`
`rejected other claims in other pending applications as ineligible. Reply, 4. This
`
`alleged distinction is misplaced because both the Board and a district court have
`
`addressed the identical patent and claims presented here and found them to be
`
`eligible.
`
`B.
`
`Petitioner Fails To Prove The Claimed Subject Matter As A
`Whole Does Not Recite A Technological Feature That Is Novel
`And Unobvious
`
`As explained in the Response, the Petition should also be dismissed because
`
`the claims solve a “technical problem using a technical solution.” The Reply argues
`
`PO’s expert admits “that all the technology used by the ‘813 patent—from hardware
`
`2
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`components, to the communication interface, to the database and encryption
`
`techniques—was known.” Reply, 1-2. However, this argument is inapposite.
`
`It is insufficient to simply conclude that the claims use “known” features. 37
`
`C.F.R. §42.301(b) requires consideration of “the claimed subject matter as a
`
`whole”—not hardware/software implementation of individual steps. See, e.g.,
`
`Experian Mktg. Sol’ns, Inc. v. RPost Commc’ns Ltd., CBM2014-0010 (Paper 20)
`
`slip op., 9 (PTAB Apr. 22, 2014) (petitioner incorrectly analyzed steps instead of
`
`examining each claim as a whole). Here, the specification and claims make clear
`
`that neither the individual recited components nor individual claimed steps are the
`
`invention; rather, the claims as a whole were the revolutionary advancement for
`
`which the USPTO granted the ‘813 patent. As in IBG, the claims are not subject to
`
`CBM review because they address a specific technical problem and set forth a
`
`“specific implementation of a solution to a problem in the software arts.” IBG, *2.
`
`C.
`
`Petitioner Fails To Prove The Claimed Subject Matter As A
`Whole Does Not Solve A Technological Problem Using A
`Technical Solution
`
`Petitioner also fails to prove the claimed subject matter does not provide
`
`technical solutions to solve technical problems.
`
`In its Reply, Petitioner failed to adequately address PO’s explanations, set
`
`forth in its Response, that Petitioner (1) ignores the software contribution in the
`
`claims, (2) fails to address the claimed invention as a whole, (3) fails to address any
`
`3
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`of the claim language, or (4) mischaracterized the problem to be solved and the
`
`claimed solution. Instead, Petitioner merely recycled arguments from pages 16 to
`
`18 of its Petition. See Reply, 2-3. For the reasons set forth in the Response, the
`
`Petition should be denied because Petitioner has failed to prove the claimed subject
`
`matter does not provide technical solutions to solve technical problems.
`
`II.
`
`PETITIONER FAILS TO PROVE THAT THE INDEPENDENT
`CLAIMS WOULD HAVE BEEN OBVIOUS
`
`A.
`
`The Petition Fails to Show the Recited “Secure Registry” (all
`Claims)
`
`The Petition asserts that Jakobsson’s “verifier 105” is the claimed “secure
`
`registry.” See, e.g., Pet. at 26, 38-39, 51-52, 72. The Petition does not rely upon
`
`Maritzen for any aspect of the “secure registry” and cannot do so now. Id.
`
`PO shows in its Response that under the correct construction a “secure
`
`registry” must be capable of storing “user account information associated with
`
`different entities” (e.g., the different entities associated with the “plurality of
`
`accounts”). Response at 13. PO establishes that verifier 105 cannot store account
`
`information associated with different entities, and thus is not the “secure registry.”
`
`Id. at 63-65.
`
`The Reply argues that (1) verifier 105 can be a “secure registry” even if it is
`
`not capable of storing information associated with different entities, and (2) verifier
`
`4
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`105 can store information for different financial institutions. Reply at 17-19.
`
`Petitioner is wrong on both accounts.
`
`1.
`
`The Board Should Reject Petitioner’s Construction As
`Inconsistent with the Intrinsic Evidence.
`
`The Reply argues the term “secure registry” should be construed to include a
`
`database that “only ha[s] data relating to a single credit card company,” but fails to
`
`identify any disclosure in the ‘813 patent of such a secure registry (or of any secure
`
`registry storing information associated with only one entity).. Reply at 16-17.2 Nor
`
`does the Reply cite to any other disclosure that supports its position. The “Summary
`
`of the Invention” explains that an object of the secure registry database is to
`
`eliminate the need for “the person to carry multiple forms of identification.” ‘813
`
`patent at 3:57-4:20 (“database of the invention may be used…[to] take the place of
`
`multiple conventional forms of identification.”) A secure registry that only stores
`
`data for a single entity is contrary to this purpose because it could require users to
`
`carry separate electronic ID devices for each account entity (American Express,
`
`Chase, Citibank, etc.). And as explained in PO’s Response, the ‘813 patent
`
`consistently teaches that the secure registry must be able to store data associated with
`
`2 Apple contends that “USR uses the term ‘entities’ to refer to ‘credit card
`companies.’” Id. To be clear, “entities” are not limited to credit card companies.
`A secure registry could also, for example, contain user account information
`associated with different entities constituting banks or other financial institutions.
`
`5
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`different entities. Response at 13-14. Petitioner cannot rely on a legally incorrect
`
`interpretation. Microsoft Corp. v. Proxyconn, Inc., 789 F.3d 1292, 1298 (Fed. Cir.
`
`2015) (“giving claims their broadest reasonable interpretation…does not include
`
`giving claims a legally incorrect interpretation” that is “divorced from the
`
`specification.”)
`
`2.
`
`The Petition Failed to Show a Secure Registry Because the
`Verification Device Cannot Store Information for Multiple
`Entities.
`
`Citing Paragraph 76 of Jakobsson, the Reply contends the disclosure suggests
`
`that limiting the verifier to a single entity is “only one potential embodiment.” Pet.
`
`at 17-18; see also Ex. 1128, ¶¶39-40 (expert declaration repeating same arguments
`
`verbatim). The Reply also states that “[n]othing in the ‘585 reference mandates that
`
`each financial institution have a separate verifier” and that having different verifiers
`
`for each institution “is merely an option.” Id.3
`
`Petitioner did not rely upon Paragraph 76 in the Petition and should not be
`
`permitted to do so now. Moreover, Petitioner is wrong. Jakobsson teaches the
`
`verifier cannot “store user account information associated with different entities;”
`
`the verifier is specific to a single entity. Response at 13, 63-65.
`
`3 Petitioner refers to the Jakobsson reference as “the ‘585 reference.”
`
`6
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Petitioner’s assertion that Jakobsson discloses a “secure registry” relies upon
`
`a fundamental misunderstanding of the verifier, as Paragraph 76 does not suggest a
`
`verifier can be associated with more than a single entity. Paragraph 76 incorporates
`
`by reference “co-pending United States Patent Application Serial No. 09/304,775”
`
`(the ‘775 Application). Ex. 1115 (Jakobsson), ¶76. This application (which was
`
`also assigned to RSA Security, Inc. and shares an inventor with Jakobsson) states
`
`that the authentication device is limited to communicating with a single verifier that
`
`is specific to a single service entity:
`
`[A] single device presently cannot be used to access
`
`multiple independent services. For example, the same
`
`device cannot be used to access an enterprise’s computer
`
`system and a financial institution’s web page. Even if each
`
`independent service trusts the user and the device, the
`
`services do not trust each other. In the example just
`
`mentioned, a bank does not trust the user’s employer. If
`
`each of the services share the same secret with the device,
`
`then each service has information that can compromise the
`
`others. This prevents use of a single device from being
`
`used with verifiers associated with independent services.
`
`7
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Ex. 2025 (U.S. Patent No. 6,985,583) at 2:41-51.4 A POSITA would understand
`
`that Jakobsson’s verifier cannot be used to access services provided by independent
`
`entities.
`
`Petitioner attempts to circumvent Jakobsson’s limited disclosure by now
`
`arguing “the secure registry can comprise ‘multiple computers connected over a
`
`computer network.’” Reply at 18 (citing ‘813 patent at 10:60-63). Again, this
`
`improper new argument, relying on a ‘813 patent citation not appearing in the
`
`Petition, should not be considered. And this argument is without merit in any event;
`
`there is no disclosure of verifiers being connected over a “computer network.”
`
`Finally, Petitioner’s unsupported interpretation, encompassing a distributed system
`
`of independent secure registries each storing information for a different entity,
`
`contradicts the patent’s disclosure of a secure registry as a “centralized system to
`
`control access to a plurality of secure networks.” ‘813 patent at 22:58-60, 24:11-15,
`
`24:36-37 (“USR 10 can also provide centralized administration….”), 24:17-24
`
`(“centralized approach”).
`
`B.
`
`The Petition Fails to Show the “Electronic ID Device” (All
`Claims)
`
`The “electronic ID device” of the ‘813 patent claims is in communication with
`
`a “secure registry,” and allows a user to “select any one of a plurality of accounts
`
`4 The ‘775 Application issued as U.S. Patent No. 6,985,583.
`
`8
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`associated with the user to employ in a financial transaction.” ‘813 patent at 51:65-
`
`67, 52:7-10. The Petition alleges that Jakobsson’s “authentication device 120”
`
`discloses the claimed “electronic ID device,” or that in view of Maritzen it would
`
`have been obvious to modify Jakobsson’s system in some undisclosed manner to
`
`arrive at the electronic ID device. Pet. at 27-35. PO showed in its Response that
`
`Jakobsson’s authentication device does not allow a user to select “any one of a
`
`plurality of accounts associated with the user to employ in a financial transaction,”
`
`and the addition of Maritzen does not cure this deficiency. Response at 36-54.
`
`Although Petitioner’s Reply introduces improper new arguments and
`
`evidence, including a declaration from a new declarant (Ari Juels, Ex. 1126; see
`
`Paper 30 (PO’s Motion to Strike), Petitioner is still unable to show the “electronic
`
`ID device.”
`
`1.
`
`Jakobsson Does not Render Obvious the Electronic ID
`Limitation
`
`Relying on Jakobsson’s statement that the combination function can employ
`
`“unique names and numbers, or other information,” Petitioner newly asserts a
`
`“POSITA would have understood” the “authentication device 120 [electronic ID
`
`device]” could be used to select “a particular account” for use in a financial
`
`transaction. Reply at 5-6 (citing Ex. 1128, ¶23). The Board should decline to
`
`consider this new argument.
`
`9
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Further, this argument highlights Petitioner’s inability to identify any
`
`disclosure in Jakobsson for this limitation. Jakobsson’s mention of names, numbers,
`
`and “other information” is silent about selecting an account from a plurality of
`
`accounts. Ex. 1115 (Jakobsson), ¶61. And, it is undisputed that the patent makes
`
`clear that the claimed “plurality of accounts” can be associated with different entities
`
`and services (e.g., American Express, Chase, Citibank, etc.). ‘813 patent at 44:39-
`
`53 (“accounts” can be “credit card accounts” such as those “serviced by Visa,
`
`Mastercard, Discover and American Express” or they can be “debit accounts
`
`associated with the various bank accounts held by the user.”). In contrast,
`
`Jakobsson’s authentication device “cannot be used to access multiple independent
`
`services” (e.g., American Express, Chase, Citibank, etc.) because Jakobsson’s
`
`verifier is specific to a single entity and service. See Section 0.
`
`The Reply also attacks as “lacking in objectivity” Dr. Jakobsson’s testimony
`
`that the reference to a credit card in the Jakobsson reference describes the “form
`
`factor” of the authentication device, and not that the authentication system, including
`
`its authentication code, is used to conduct credit card transactions. Reply at 6-7. But
`
`Dr. Jakobsson’s testimony is correct. First, the Petitioner previously characterized
`
`these disclosures as teaching that the authentication device can be a “credit card sized
`
`and shaped device” in the Petition. Pet. at 27-28 (stating disclosure teaches “credit
`
`card sized shaped device” and “credit card sized embodiment”). The Petition never
`
`10
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`argued that Jakobsson discloses an actual credit card that uses Jakobsson’s
`
`authentication system and authentication code. Id. Second, credit cards are
`
`mentioned in a paragraph that begins with “[t]he user authentication device 120 can
`
`take various forms in various embodiments of the invention,” and then proceeds to
`
`describe the device form factor (e.g., that the device can be incorporated into a “key
`
`fob” or a “USB dongle”). Ex. 1114 (Jakobsson), ¶41. Tellingly, Petitioner fails to
`
`identify any discussion in Jakobsson describing how an alleged credit card
`
`embodiment would work. Third, the Jakobsson reference teaches that the
`
`authenticate device can be from the patent’s assignee, RSA SecurID. SecurID
`
`offered credit card shaped devices (shown below), but there is no evidence that
`
`SecureID offered devices for credit card transactions:
`
`Response at 45; Ex. 2013 (Markus Decl.), ¶65.
`
`11
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
` The Reply also relies upon new arguments from new declarant Ari Juels to
`
`allege that the authentication device can be a credit card for use in financial
`
`transactions. First, this new argument and evidence should not be considered
`
`because the Petition does not include any assertion that the authentication device is
`
`an actual credit card for use in a financial transaction. Second, the mention of credit
`
`cards refers to the authentication device’s form factor, as mentioned above. Ex. 1115
`
`(Jakobsson), ¶41. At 65 pages in length (not including its figures) and over sixty
`
`claims, if the Jakobsson reference disclosed a credit card embodiment for financial
`
`transactions, Petitioner would have been able to point to a clear discussion of such
`
`an embodiment. Third, a credit card does not permit a user to select one of a plurality
`
`of accounts. Thus, even if Jakobsson taught using its authentication code in a credit
`
`card transaction (and it does not), that would not satisfy the claims.
`
`2.
`
`Jakobsson in View of Maritzen Does Not Render Obvious the
`Electronic ID Limitation
`
`The Petition also asserts it would have been obvious to modify Jakobsson in
`
`view of Maritzen to arrive at the claimed electronic ID device because Maritzen
`
`discloses a “personal transaction device” (PTD) that “allows a user selection of an
`
`account from a ‘list’ prior to executing a financial transaction.” Pet. at 8. But PO
`
`showed in its Response that the Petition was misrepresenting Maritzen. Pet. at 44,
`
`n.4. Martizen discloses its PTD may use a pre-funded cash account that “is pre-
`
`12
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`established by the user prior to conducting a financial transaction with PTD 100.”
`
`Petitioner’s citation to Maritzen’s statement that “[t]he user may select a different
`
`account from a list of accounts displayed” without including the disclosure’s prior
`
`sentence that a selection only occurs if the pre-established account is first rejected
`
`for “insufficient funds,” mischaracterizes the disclosure. Response at 43-44; Pet. at
`
`29; Ex. 1116 (Maritzen), ¶105.
`
`The Reply does not dispute PO’s description of Maritzen, but instead changes
`
`course to argue the claims do not require selecting an account prior to generating the
`
`authentication information. Reply at 8-9. This new argument is meritless. The
`
`claims make clear that account selection must occur prior to generating the
`
`authentication information. For example, claim 24 recites that the “encrypted
`
`authentication information” is “authenticated” to “authoriz[e]” or “deny[]” a
`
`“transfer of funds to or from the account selected.” Ex. 1101 at 54:39-46. To use
`
`encrypted authentication information to authorize or deny transfer from a selected
`
`account, the account selection must be completed before generating the
`
`authentication information. Similarly, a POSITA would also understand that in
`
`claims 1 and 16 an account is selected from a plurality of accounts, and the encrypted
`
`authentication information is generated and used to authenticate the user and
`
`complete the transaction involving the selected account. Petitioner’s new arguments
`
`to the contrary lack merit. See, e.g., Kaneka Corp. v. Xiamen Kingdomway Grp.
`
`13
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`Co., 790 F.3d 1290, 1306 (Fed. Cir. 2015) (“Where the steps of a method claim
`
`actually recite an order, we ordinarily construe the claim to require order. A method
`
`claim can also be construed to require that steps be performed in order where the
`
`claim implicitly requires order, for example, if the language of a claimed step refers
`
`to the completed results of the prior step.”) (internal citations omitted).
`
`The Reply also incorrectly argues that Maritzen discloses selecting an account
`
`before generating encrypted authentication information, abandoning the citations
`
`relied upon in the Petition for this limitation in favor of two new paragraphs. Reply
`
`at 9 (citing Maritzen, ¶¶48-49). Not only is Petitioner’s new evidence and argument
`
`improper, Petitioner’s arguments again misrepresent Maritzen’s disclosures. While
`
`Petitioner argues Maritzen’s paragraphs 48 and 49 disclose that “the user may select
`
`a transaction key (associated with a specific account) on the user interface prior to
`
`conducting a transaction” (Reply at 9), nothing in these paragraphs teaches that a
`
`user selects an account or transaction key on the user interface of the PTD. Indeed,
`
`neither paragraph mentions the PTD. Ex. 1116, ¶¶48-49. Rather, the paragraphs
`
`discuss the “clearing house 130,” and explain that the “clear house 130 selects a pre-
`
`existing account” if it determines a transaction key is valid. Id.
`
`Relatedly, Petitioner now argues that Maritzen’s PTD 100 can “store a
`
`transaction key 340 that corresponds to a specific account,” and that it would have
`
`therefore been obvious “to incorporate Maritzen’s storage of account information to
`
`14
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`the ‘585 reference.” Reply at 10. Petitioner’s reliance on the transaction key and its
`
`relationship to an account, in addition to being a new argument, is also wrong.
`
`Maritzen’s PTD generates “transaction key 340” if the biometric key is valid, and
`
`its “transaction key information” is only stored temporarily. Ex. 1116 (Maritzen),
`
`¶¶68, 89. Further, Maritzen discloses that the transaction key includes either (1) “a
`
`biometric key 350 and a PTD identifier,” or (2) “only a biometric key.” Id., ¶89.
`
`Maritzen’s temporary storage of a PTD identifier and/or biometric key is not a
`
`disclosure of storing account information for a plurality of accounts, nor is it a
`
`disclosure of selecting an account from a plurality of accounts stored on the
`
`electronic ID device. Maritzen does not include any such teaching because it
`
`expressly states that account information is stored on the remote clearing house
`
`server, not the PTD. Response at 43, 52.
`
`PO also demonstrated in its Response that the Petition fails to explain how a
`
`POSITA would modify Jakobsson in view of Maritzen to arrive at the claimed
`
`limitation. In Response, the Reply asserts that “[a]n account selection is a simple
`
`user interface feature” that “would have been obvious to implement to improve the
`
`user experience.” Reply at 9. This conclusory assertion highlights the problem with
`
`Petitioner’s analysis. Petitioner fails to consider the complexities of the claims and
`
`its proposed combination. For example, even if it were obvious to modify the user
`
`interface to allow selection of multiple accounts (it is not), Petitioner has failed to
`
`15
`
`

`

`Case No. CBM2018-00025
`U.S. Patent No. 8,577,813
`
`show how other components, for instance Jakobsson’s verifier, would be modified
`
`to work with multiple accounts. As explained in Section 0, Jakobsson’s verifier is
`
`specific to a single entity and cannot handle accounts associated with different
`
`entities.5
`
`C.
`
`The Petition Fails to Show the “Point-of-Sale Terminal” (All
`Claims)
`
`The Reply introduces new expert testimony (including from a new declarant,
`
`Dr. Juels) to argue that “communication terminal 140 could be a POS terminal
`
`capable of receiving a swipe from a user’s credit card.” Reply at 14. But Petitioner
`
`remains unable to cite to any portion of Jakobsson that teaches the communication
`
`terminal is located at a point-of-sale or that it is a POS terminal.
`
`Petitioner points to Jakobsson’s disclosure that the communication terminal
`
`can be a smart card reader and that the authentication device can have a credit card
`
`5 Further, Petitioner’s reliance on the ‘813 patent’s mention of the SecureID token
`
`is misplaced. The disclosure does not teach or suggest that a SecureID token
`
`performs the claimed invention or that it is used to select a financial account for
`
`conducting a financial transaction. At best, the disclosure only teaches that the
`
`claimed invention is more than just a SecureID token like the one disclosed in
`
`Jakobsson.
`
`16
`
`

`

`Case No. CBM201

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket