throbber
.
`e
`.
`.
`.
`.
`.
`.
`t
`.
`......
`.
`.
`.
`UNI 1 i-J) S 1A1 1:3 PA I am AND TRADEMARK OH—sct;
`
`
`
`IFN i'i‘lil) STATES DEPARTMENT OF COMMERCE-I
`Ifnilcd Stalcs- Patent and Trademark Office
`Address: COMMISSIONER I'UR 1’;\'l'l£N'i'S
`PO. flux l-t-SIJ
`Alexandria. Virginia 221“ 3- I450
`wu-u'.LISPlo.gor
`
`APPLICA'I'ION NO.
`FILING llfl'i'li
`I‘IRS'i' NAMI'LD INVii-N'I'OR
`.-\'l"l'()1{Nl£Y IXJI‘KIE'I‘ NO.
`CONFERMA'I'IOX NU.
`
`13231184
`UWEUIZUII
`Kenneth P. Weiss
`WUfiBT-TUIFIZU
`i352
`
`T3463
`
`75‘”)
`‘
`.. .
`IANDO & ANAS I A51. U .1)
`ON 1i MAIN S'l‘lflziifll‘, SUITE 1 I00
`CAMBRIDGE. MA 02 I42
`
`EJJIITIEHIF
`
`.
`.
`.
`l-.X.J\Mif\l'.R
`
`CHEF-VG- <'-‘AJ-\’IN K
`
` 366?
`
`NOTIFICATION DATE
`
`DELIVERY MODE
`
`UIIITQUIS
`
`liIJLC'I‘RO-Nli’.‘
`
`Please find below andr'or attached an Office communication concerning this application or proceeding.
`
`The time period for reply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above—indicated "Notification Date" to the
`following e-mail add1‘ess(es):
`
`dockeling @I A] .aw.com
`gengclson @ I A] .aw.com
`
`PTOL—00A (Rev. 04M?)
`
`i
`
`VISA - EXHIBIT 1109
`
`VISA - EXHIBIT 1109
`
`

`

`
`
`Office Action Summary
`
`Application No.
`
`Applicant{s)
`
`13i237.184
`
`Examine,
`
`WEISS. KENNETH P.
`
`A“ Unit
`
`-- The MAiLiNG DA TE of this communication appears on the cover sheet with the correspondence address --
`Period tor Reply
`
`A SHORTENED STATUTORY PERIOD FOR REPLY IS SET TO EXPIRE 3 MONTH(S) OR THIRTY (30) DAYS,
`WHICH EVER IS LONGER FROM THE MAILING DATE OF THIS COMMUNICATION
`Extensions of time may be available under the provisions of 3? CFR 1.136(a).
`In no event however. may a reply be timely tiled
`after SIX (6} MONTHS from the mailing date of this communication.
`It NO period [or reply is specified above. the maximum statutory period will apply and will expire SIX {6) MONTHS from the mailing date of this communication.
`-
`- Failure to reply within the set or extended period for reply will. by statute. cause the application to become ABANDONED (35 U.S.C. § 133}.
`Any reply received by the Ottice later than three months after the mailing date of this communication. even it timely tiled. may reduce any
`earned patent term adjustment. See 37 CFR 1.704(b‘1.
`
`Status
`
`1)} Responsive to ccmmunicationjs) filed on t7December 2012.
`
`2am This action is FINAL.
`
`2b)I:I This action is non—final.
`
`8)I:I An election was made by the applicant in response to a restriction requirement set forth during the interview on
`
`
`; the restriction requirement and election have been incorporated into this action.
`
`4)I:I Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`
`closed in accordance with the practice under Ex parte Quayle, 1935 CD. 11,453 QG. 213.
`
`Disposition of Claims
`
`5). Ciairn(s) l 2and 4-28 isiare pending in the application.
`
`
`5a) Of the above claim(s)
`
`isiare withdrawn from consideration.
`
`6)|:l Ciaim(s) _ isiare allowed.
`
`7)) Ciaim(s) l 2and 4-28 isiare rejected
`
`8)I:l Claim(s) _ isiare objected to.
`
`
`9)|:I Claim(s)
`
`are subject to restriction andior election requirement.
`
`* If any claims have been determined allowable, you may be eligible to benefit from the Patent Prosecution Highway
`program at a participating intellectual property office for the corresponding application. For more information, please see
`
`htt :iiwww.tis to.oovi;atentsiinlt eventsipbhiinder—x 's or send an inquiry toPPeredbacirc user.
`
`
`
`
`
`
`‘-.-
`
`Application Papers
`
`10)I:I The specification is objected to by the Examiner.
`
`11”] The drawing(s) filed on _ isiare: a)I:| accepted or b)l:] objected to by the Examiner.
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 135(3).
`
`Replacement drawing sheet(s) including the correction is required if the drawingls) is objected to. See 37 CFR 1.121(d).
`
`Priority under 35 U.S.C. § 119
`
`12”] Acknowledgment is made of a claim for foreign priority under 35 U.S.C. § 119(al-(d) or (t).
`
`a)|j All
`
`b)I:I Some * c)I:I None of:
`
`1.|:I Certified copies of the priority documents have been received.
`
`21:! Certified copies of the priority documents have been received in Application No.
`
`
`
`3.I:I Copies of the certified copies of the priority documents have been received in this National Stage
`
`application from the International Bureau (PCT Rule 17.2(a)).
`
`* See the attached detailed Office action for a list of the certified copies not received.
`
`Attachmenfls}
`
`1) E Notice of References Cited (PTO-892)
`
`3) El Interview Summary (PTO-413)
`Paper No(5)iMaiI Date.
`4) El Other:
`2) El Iniorrnation Disclosure Statementls) (PTOr’SBiOS)
`Paper No(5)iMail Date
`
`US. Patent and Trademark O‘Hice
`
`PTOL-326 (Rev. 09-12)
`
`Office Action Summary
`
`1
`
`1
`
`Fan of Paper No.iMail Date 20130101
`
`

`

`ApplicationfControl Number: i3r’237",184
`
`Paper No. 20130103 - Page 2
`
`Art Unit: 3662
`
`DETAILED ACTION
`
`1.
`
`This office action is given an identifier, Paper No. 20130103, for reference purposes
`
`only.
`
`Status of Claims
`
`2.
`
`Claim 3 is cancelled; claims 21—28 are newly added by claim amendments filed 17
`
`December 2012. Therefore, claims 1-2 and 4-28 are examined in this office action.
`
`3.
`
`Applicant’s arguments filed 1? December 2012 have been fully considered but they are
`
`Response to Arguments
`
`not persuasive.
`
`Specification Objection
`
`This objection is withdrawn.
`
`Claim Objection
`
`This objection is withdrawn.
`
`§ 102 Rejection
`
`Applicant argues the Weiss reference “does not teach or suggest the generation of
`
`authentication information from the non—predictable value, information derived from at least a
`
`portion of the biometric input. and the secret information.” The Examiner respectfully disagrees.
`
`

`

`ApplicationfControl Number: 13f23?,184
`
`Paper No. 20130103 - Page 3
`
`Art Unit: 3662
`
`Weiss discloses “In one embodiment, ...to access the USR database, ... retrieves a secret user
`
`code andfor time-varying value. . .obtains from the user a secret personal identification code.
`
`... mathematically combines these three numbers using a predetermined algorithm to
`
`generate a one—time “Unpredictable code. . .” from 1| 51. This passage clearly shows that Weiss
`
`discloses generating a non-predictable value, information derived from at least a portion of the
`
`biometric input. and the secret information. Weiss then discusses about generating authentication
`
`information from the nonpredictable value by transmitting the nonpredictable value to another
`
`computer, where the nonpredictable code is utilized as authentication information to determine
`
`whether a user is granted access (‘11 51).
`
`Appiicant repeats the arguments above for claims 15 and 20 and the Examiner traverses
`
`these repeated arguments with the same rationale.
`
`§ 103 Rejection
`
`With respect to ciaim 3, arguments are moot because Applicant has cancelled this claim.
`
`Applicant argues the Weiss reference “does not teach or suggest the generation of
`
`authentication information from the non-predictable value, information derived from at least a
`
`portion of the biometric input, and the secret information” and includes “Neither Wcichert nor
`
`Boile cure this deficiency.” In response, Appiicant repeats the arguments above for claim 1 and
`
`the Examiner traverses these repeated arguments with the same rationale.
`
`

`

`ApplicationiControl Number: l3i23'i,184
`
`Paper No. 20130103 - Page 4
`
`Art Unit: 3662
`
`Applicant argues the Official Notice used in the rejection of claims 8- 12 and requests for
`
`documentation to support what is well—known in the alt. As requested, the Examiner is now
`
`providing the Drexler reference as evidence to support his position for rejecting claims 8 and 9;
`
`the Flitcroft reference as evidence to support his position for rejecting claims it) and I l; and the
`
`Krasinski reference as evidence to support his position for rejecting claim 12.
`
`Double Patenting Rejection
`
`This rejection is withdrawn because The Office has approved the Terminal Disclaimer on
`
`21 December 2012.
`
`4.
`
`Claim 2] is objected to because of the following informalities:
`
`Claim Objections
`
`Regarding Claim 21, line 3 rccitcs “wherein the of” which is grammatically incorrect.
`
`Appropriate correction is required.
`
`Claim Rejections - 35 USC § 112
`
`5.
`
`The following is a quotation of 35 U.S.C. ll2(b):
`
`(B) CONCLUSION. -—The specification shall conclude with one or more claims particularly pointing out and
`distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention.
`
`The following is a quotation of35 U.S.C. ll2 {pre-AIA), second paragraph:
`
`The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject
`matter which the applicant regards as his invention.
`
`

`

`ApplicationfControl Number: i3f23?,184
`
`Paper No. 20130103 - Page 5
`
`Art Unit: 3662
`
`6.
`
`Claims 1-2 and 4-28 are rejected under 35 U.S.C. 112th) or 35 U.S.C. 112 (pre-AIA),
`
`second paragraph, as being indefinite for failing to particularly point out and distinctly claim the
`
`subject matter which the inventor or a joint inventor, or for pre-AIA the applicant regards as the
`
`invention.
`
`Claim 1 recites an indefinite limitation, “information derived from at least a portion of
`
`the biometric input” from lines 14-15. It is unclear whether this limitation is (l) a new limitation
`
`or (2) making reference to the existing “encrypted authentication information” in line 13.
`
`Furtheimore, claims 2, 4-14 and 22-24 are rejected based on dependency.
`
`Claims 2, 4-6, 13-14 and 22-24 recite the limitation “The device” in line 1 only. There is
`
`insufficient antecedent basis for this limitation in the claim.
`
`Claim 7 recites the limitation “The device” in lines 1 and “the device” in line 2. There is
`
`insufficient antecedent basis for this limitation in the claim.
`
`Claim 8 recites the limitation “The device” and “the device” in line i and “the device” in
`
`line 3. There is insufficient antecedent basis for this limitation in the claim.
`
`Claim 9 recites the limitation “The device” in line 1 and “the device” in line 3. There is
`
`insufficient antecedent basis for this limitation in the claim.
`
`

`

`ApplicationfControl Number: 13931184
`
`Paper No. 20130103 - Page 6
`
`Art Unit: 3662
`
`Claim 10 recites the limitation “the device” in lines I and 2. There is insufficient
`
`antecedent basis for this limitation in the claim.
`
`Claim 1 l recites the limitation “The device” in lines I and “the device” in line 2. There
`
`is insufficient antecedent basis for this limitation in the claim.
`
`Claim 12 recites the limitation “The device” in lines 1 and “the device” in line 2. There
`
`is insufficient antecedent basis for this limitation in the claim.
`
`Claim 15 recites an indefinite limitation, “information derived from at least a portion ofa
`
`biometric data” from lines 10- ll. It is unclear whether this limitation is (l) a new limitation or
`
`(2) making reference to the existing “encrypted authentication information” in line 9.
`
`Furthermore, claims 16-19, 21 and 25-26 are rejected based on dependency.
`
`Claim 15 recites the limitation “the device” in lines 3 and 4. There is insufficient
`
`antecedent basis for this limitation in the claim.
`
`Claim 16 recites the limitation “the device” in line 4. There is insufficient antecedent
`
`basis for this limitation in the claim.
`
`Claim 1? recites the limitation “the device” in lines I and 3. There is insufficient
`
`antecedent basis for this limitation in the claim.
`
`

`

`ApplicationfControl Number: 13931184
`
`Paper No. 20130103 - Page T"
`
`Art Unit: 3662
`
`Claim 18 recites the limitation “the device” in line 3. There is insufficient antecedent
`
`basis for this limitation in the claim.
`
`Claim 20 recites an indefinite limitation, “information derived from at least a portion of a
`
`biometric of the user received by the device“ from lines 5—6. It is unclear whether this limitation
`
`is (l) a new limitation or (2) making reference to the existing “encrypted authentication
`
`information“ in line 3. Furthermore, claims 27 and 28 are rejected based on dependency.
`
`Claim Rejections - 35 USC § 1'02
`
`7".
`
`The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that form the
`
`basis for the rejections under this section made in this Office action:
`
`A person shall be entitled to a patent unless
`
`[b] the invention was patented or described in a printed publication in this or a foreign country or in public use or
`on sale in this country. more than one year prior to the date of application for patent in the United States.
`
`Claims [—2, 4—6 and 13—28 are rejected under 35 U.S.C. 102(1)) as being anticipated by US
`
`20020128364 AI (“Weiss”) from IDS.
`
`Regarding Claim 1, Weiss discloses an electronic 1D device (e.g., electronic 1D device, ‘11
`
`52) configured to allow a user (cg, person) to select any one ofa plurality of accounts (e.g.,
`
`“Credit Card and other financial information” in FIG. 1) associated with the user to employ in a
`
`financial transaction, comprising (Abstract, ‘jl 17, 52, FIG. 1, 3—4 with associated text}:
`
`

`

`ApplicationfControl Number: l3r23?,184
`
`Paper No. 20130103 - Page 8
`
`Art Unit: 3662
`
`o
`
`a biometric sensor (e.g., data input devices, such as voice and other audio and video
`
`capture devices) configured to receive a biometric input provided by the user (‘fl 1?,
`
`42);
`
`o
`
`a user interface (e. g., user interface 26) configured to receive:
`
`0
`
`a user input including secret information (e.g., personal identification number)
`
`known to the user (‘I[ 42, 53) and
`
`0
`
`identifying information (e.g., biometric information) concerning an account
`
`selected by the user from the plurality of accounts (Abstract, ‘I[ 43, 47, 57",
`
`FIG. 1, 3—4 with associated text);
`
`0
`
`a communication interface (cg, Internet) configured to communicate with a secure
`
`registry (e.g., database 24) (‘fi 38, 41); and
`
`I
`
`a processor (e.g., CPU 16) coupled to the biometric sensor to receive information
`
`concerning the biometric input (‘11 38-42, 48-53, FIG. 1, 3 with associated text), the
`
`user interface and the communication interface,
`
`a
`
`the processor being programmed to activate (e.g., obtain access) based on successful
`
`authentication by the electronic ID device of at least one of the biometric input and
`
`the secret information, the processor also being programmed such that once the
`
`electronic ID device is activated the processor is configured (‘][ 38-42, 51-53; 58-59.
`
`From 1| 52, “the term, ‘clcctronic [D device” will be used generically to refer to any of
`
`electronic device that may be used to obtain access to the USR database”):
`
`0
`
`to generate a non—predictable value (cg, non—predictable singie use codes, ‘il
`
`52) and
`
`

`

`ApplicationfControl Number: i3f23?,184
`
`Paper No. 20130103 - Page 9
`
`Art Unit: 3662
`
`o
`
`to generate encrypted authentication information from the non-predictable
`
`value, information derived from at least at a portion the biometric input and
`
`the secret information (‘][ 12, 45, 51-53, T4, 98, 100. Weiss discloses (I)
`
`“transactions to and from the database may take place using a public
`
`keyx'private key security system” from 1| 12 and (2) “a secret user code andfor
`
`time varying valuc...and persona! identification code... combines these three
`
`numbers using a predetermined algorithm to generate a one-time
`
`nonprcdictabic code” from 1| 51 is used to authenticate the user.), and
`
`o
`
`to communicate the encrypted authentication information via the
`
`communication interface to the secure registIy ("H 12, 45, 51, 100).
`
`Regarding Claim 2, Weiss discloses:
`
`I wherein the communication interface is configured to wirelessly transmit the
`
`encrypted authentication information to a point-of—sale (POS) device (‘11 1?, 51-52, 3'4
`
`and FIG. 10, I? with associated text), and
`
`0 wherein the secure registry is configured to receive at least a portion of the encrypted
`
`authentication information from the POS device (FIG. 8—10 with associated text, see
`
`Elements 804, 904, 1002. Observe information flows according to “Merchant
`
`transmits to USR”.).
`
`Regarding Claim 4, Weiss discloses wherein the device comprises a discrete code
`
`associated with the electronic ID device (‘][ 74).
`
`

`

`ApplicationfControl Number: i3t23?,184
`
`Paper No. 20130103 - Page 10
`
`Art Unit: 3662
`
`Regarding Claim 5, Weiss discloses wherein at least a portion of the biometric received
`
`by the biometric sensor is communicated to the secure registry for authentication prior to
`
`generation of the encrypted authentication information ("fl 12—13, 16—17, 41—42, 47—48).
`
`Regarding Claim 6, Weiss discloses wherein the secret information includes the
`
`identifying Information (‘ii 53).
`
`Regarding Claim 13, Weiss discloses wherein the biometric sensor is configured to
`
`receive and process at least one (Only one option is required to satisfy the claimed limitation of
`
`‘at least one‘) of a fingerprint (e.g., fingerprint), a speechr’voice input (e.g., voice print), an iris
`
`scan (e.g., iris), a retina scan, a facial scan (e.g., facial), written information (e.g., signature) and
`
`a DNA input (e.g., DNA analysis) ("fl 1?).
`
`Regarding Claim 14, Weiss discloses:
`
`0 wherein the processor is configured to generate account identifying information for
`
`the respective one of the plurality of accounts (‘ii 51—53),
`
`0 wherein the account identifying information does not identify an account number of
`
`the respective one of the plurality of accounts (‘II 67—68, 8?).
`
`Regarding Claim 15, Weiss discloses a method of generating authentication information
`
`comprising acts of (Abstract, ‘fl 1?, 4148, 54):
`
`

`

`ApplicationfControl Number: 13i’237",184
`
`Paper No. 20130103 - Page 11
`
`Art Unit: 3662
`
`o
`
`authenticating an identity of a user to an electronic ID device (e.g., electronic [D
`
`device, ‘1! 52) based on at teas! one (Only one option is required to satisfy the ‘at least
`
`one’ limitation) of biometric data received by the device from the user and secret
`
`information known to the user and provided to the device (‘11 17", 51-53);
`
`0
`
`activating (e.g., obtain access) the electronic ID device based on successful
`
`authentication (‘fl 51-53, 58-59; in particular‘fl 52);
`
`a
`
`generating, responsive to activating, a non-predictable value with the device (51 51-53,
`
`53. 74)“,
`
`a
`
`receiving, in a user interface (e.g., user interface 26 from FIG. 1), identifying
`
`information from the user concerning a selected one of a plurality of user accounts
`
`(Abstract, (ll 7’4, FIG.
`
`1 with associated text);
`
`0
`
`generating encrypted authentication information from the non—predictable value,
`
`information derived from at least a portion of the biometric data, and the secret
`
`information (‘11 12, 45, 51-53, 74, 98, 100. Weiss discloses (l) “transactions to and
`
`from the database may take place using a pubiie kcyr’privatc key security system”
`
`from 1| 12 and (2) “a secret user code andfor time varying value...and personal
`
`identification code... combines these three numbers using a predetermined aigorithm
`
`to generate a one-time nonpredictabie code” from 1] 51 is used to authenticate the
`
`user.); and
`
`-
`
`communicating, by a communication interface (e.g., Internet). the encrypted
`
`authentication information to a secure registry (e.g., database 24) (‘ii 12, 34, 41, 45,
`
`51,100).
`
`

`

`ApplicationfControl Number: 131231184
`
`Paper No. 20130103 - Page 12
`
`Art Unit: 3662
`
`Regarding Claim 161 Weiss discloses an act of displaying, on the user interface indicators
`
`for the plurality of user accounts stored in a memory of the device (“. . .the verifying section of
`
`the database may contain a picture to be transmitted back to the person seeking to validate the
`
`device to ensure the person using the device is the correct person. Optionally, the identifying
`
`device itself may also be provided with a picture of the person authorized to use the card to
`
`provide facial confirmation of the person’s right to use the card”, 1] 53).
`
`Regarding Claim 1?, Weiss discloses tie-activating the device without generating the
`
`encrypted authentication information ifthe identity of the user is not successfully authenticated
`
`to the device (‘H 108).
`
`Regarding Claim 18, Weiss discloses generating a seed from which the authentication
`
`information is generated by employing the biometric data and the secret information known to
`
`the user ("ll 17, 51—53, 74. Two options satisfy the “at least two” limitation which are listed by
`
`Weiss).
`
`Regarding Claim 19, Weiss discloses generating encrypted authentication information in
`
`a manner that allows the identification of the user and the selected one of the plurality of user
`
`accounts by a secure registry (FIG. 3, 6-10, 13 with associated text).
`
`

`

`ApplicationfControl Number: l3i’23?,184
`
`Paper No. 20130103 - Page 13
`
`Art Unit: 3662
`
`Regarding Claim 20, Weiss discloses a method of controlling access to a plurality of
`
`accounts, the method comprising acts of (Abstract, ‘1[ 17, 473—48, 54):
`
`0
`
`generating, with a device, enc1ypted authentication information ("ll 12, 45, 98) from a
`
`non- predictable value generated by the device (‘][ 51-53),
`
`0
`
`information derived from at least a portion of a biometric of the user received
`
`by the device {‘fl 1?, 51-53) and
`
`0
`
`secret information provided to the device by the user {‘I[ IT, 53);
`
`o
`
`communicating the encrypted authentication information from the device to a secure
`
`registIy via a point—of—sale (POS) device to authenticate or not authenticate the device
`
`with the secure registry (‘11 12, 45, 51-53, 74, 100);
`
`I
`
`authorizing the POS device to initiate a financial transaction involving a transfer of
`
`funds to or from the account selected by the user when the encrypted authentication
`
`information is successfully authenticated (‘11 74-?6. ‘][ 76 provides the results of a
`
`transaction); and
`
`I
`
`denying the POS device from initiation of the financial transaction invoiving a
`
`transfer of funds to or from the account selected by the user when the encrypted
`
`authentication information is not successfully authenticated (‘11 74-?6. ‘fl T6 provides
`
`the results of a transaction).
`
`Regarding Claim 2 l, Weiss discloses:
`
`a
`
`an act of generating an account identifier (e.g., user’s private key) for the selected one
`
`of the piurality of user accounts that does not include an account number (‘K 12), and
`
`

`

`ApplicationfControl Number: l3i’237",184
`
`Paper No. 20130103 - Page 14
`
`Art Unit: 3662
`
`0 Wherein the of generating encrypted authentication information includes using the
`
`account identifier for the identifying information (‘11 12-13).
`
`Regarding Claim 22, Weiss discloses wherein (from FIG. 1):
`
`o
`
`the processor (e.g., CPU 16 from FIG. l) is configured to display indicators (c.g.,
`
`person, financial or other information) for the plurality of accounts in the user
`
`interface (FIG.
`
`1 with associated text), and
`
`I
`
`the user interface (e.g., user interface 26 from FIG. 1) is configured to accept user
`
`selection of a respective one of the plurality of accounts (Weiss discloses his
`
`invention may be “used to selectively provide personal, financial or other information
`
`about a person”, 1] 12 and handles unlimited amount of accounts according to FIG. 1).
`
`Regarding Claim 23, Weiss discloses wherein the user interface is configured to display
`
`options for purchase (‘H 53, 99—100. Buyer must authenticate age and identity before purchasing
`
`alcohol because alcohol is an age-restricted product. Weiss” invention transmits back “user’s
`
`photograph, age information" of buyer to merchant’s user interface.)
`
`Regarding Claim 24, Weiss discloses wherein the user interface is configured to accept
`
`selection of at least one product or service (‘i[ 53, 99-100. Weiss“ invention demonstrates a buyer
`
`of legal age will be accepted to buy alcohol.)
`
`

`

`ApplicationfControl Number: l3i’237’,184
`
`Paper No. 20130103 - Page 15
`
`Art Unit: 3662
`
`Regarding Claim 25. Weiss discloses displaying options for purchase on the user
`
`interface {‘H 53, 99—100. Buyer must authenticate age and identity before purchasing alcohol
`
`because alcohol is an age-restricted product. Weiss” invention transmits back “user’s photograph,
`
`agc information” of buyer to merchant‘s user interface.).
`
`Regarding Claim 26. Weiss discloses selecting with the user interface at least one product
`
`or service for purchase (‘11 53, 99-100. Weiss’ invention demonstrates a buyer of legal age will be
`
`accepted to buy alcohol).
`
`Regarding Claim 2?, Weiss discloses displaying options for purchase on the user
`
`interface {‘H 53, 99-100. Buyer must authenticate age and identity before purchasing alcohol
`
`because alcohol is an age—rcstrictcd product. Weiss’ invention transmits back “user‘s photograph.
`
`age information” of buyer to merchant’s- user interface).
`
`Regarding Claim 28, Weiss discloses selecting with the user interface at least one product
`
`or service for purchase (‘1[ 53, 99-100. Weiss‘ invention demonstrates a buyer of legal age will be
`
`accepted to buy alcohol).
`
`8.
`
`Claim 7 is rejected under 35 U.S.C. 103(a) as being unpatentable over Weiss and further
`
`in view of US 6819219 (“Bolle”) from IDS.
`
`

`

`ApplicationfControl Number: l3i’237",184
`
`Paper No. 20130103 - Page 16
`
`Art Unit: 3662
`
`Regarding Claim 7, Weiss discloses a memoly coupled to the processor (‘11 1?, 52, FIG. 1
`
`with associated text.).
`
`Weiss does not directly disclose wherein the memory stores information employed by the
`
`device to authenticate the biometric received by the biometric sensor ("fl IT, 52, FIG.
`
`I with
`
`associated text).
`
`However. Bolle teaches a memory stores information employed by the device to
`
`authenticate the biometric received by the biometric sensor (Figure l, 7’ and 10 with associated
`
`text. Observe Figure l0, Element 1004). It would have been obvious to one of ordinary skill in
`
`the art at the time of the invention was made to modify the devices as disclosed by Weiss by
`
`incorporating biometric readers on portable devices as taught by Bolle in order to capture
`
`biometric information on a portable device.
`
`9.
`
`Claims 8- l2 are rejected under 35 U.S.C. 103(a) as being unpatentable over Weiss in
`
`view of Bolle and further in view of Official Notice (as evidenced by prior art references listed in
`
`PTO—892).
`
`Regarding Claim 8, Weisszolle Combination does not directly disciose wherein the
`
`device does not permit the entry of the user input if the biometric input received by the biometric
`
`sensor is determined to not belong to an authorized user of the device.
`
`The Examiner takes Official Notice it is well known in the art a mismatch or non-
`
`matched biometric reading not belonging to the rightful user provides a negative result which
`
`prevents access (As evidenced by Drexler (US 5457747). (37:64-C8127" and FIG. 3 with
`
`

`

`ApplicationfControl Number: l3r’237",184
`
`Paper No. 20130103 - Page 17
`
`Art Unit: 3662
`
`associated text). It would have been obvious to one of ordinary skill in the art at the time of the
`
`invention was made to modify the devices as disclosed by Weisszolle Combination by
`
`incorporating a measure which prevents access when biometric readings do not match as taught
`
`by Official Notice (as evidenced by Drexler) in order to increase security to personal equipment
`
`and information.
`
`Regarding Claim 9, Weiss discloses:
`
`I wherein the secret information known to the user includes a PIN (‘11 1?, 53), and
`
`I wherein the authentication of both the secret information and the biometric input
`
`activate the device for a financial transaction (“The identity of the user possessing the
`
`identifying device may be verified at the point of use via any mmbination...”,1 W,
`
`73, 100).
`
`Regarding Claim 10, Weiss discioses a memory coupled to the processor (‘fl 1?, 52, FIG.
`
`I with associated text).
`
`Weissr’Bolle Combination does not directly disclose wherein data stored in the memory is
`
`unavailable to an individual in possession of the device until the device is activated.
`
`The Examiner takes Official Notice it is well known in the art credit card holders call a
`
`telephone number associated with the credit card number to activate their credit cards before they
`
`are allowed to make purchases (As evidenced by Fiitcroft (US 2003002848!) which states,
`
`“...whcn a new credit card is presently issued, it is commonly required that the card holder
`
`activate the card. Specifically, the card holder may be required to communicate with the credit
`
`

`

`ApplicationtControl Number: 13,032,184
`
`Paper No. 20130103 - Page 18
`
`Art Unit: 3662
`
`card issuer to activate the card before it can be used”, 1] 200). It would have been obvious to one
`
`of ordinary skill in the art at the time of the invention was made to modify the devices as
`
`disclosed by WeisstBolle Combination by incorporating an activation step as taught by Official
`
`Notice {as evidenced by Flitcroft) in order to verify the rightful credit card holder has obtained
`
`their card.
`
`Regarding Claim 1 l, Weisszolle Combination does not directly disclose wherein the
`
`data is subject to a mathematical operation that acts to modify the data such that it is
`
`unintelligible until the device is activated.
`
`The Examiner takes Official Notice it is well known in the art the credit card data is
`
`blocked from making purchases until activated (As evidenced by Flitcroft (US 20030028481)
`
`which states, “when a new credit card is presently issued, it is commonly required that the card
`
`holder activate the ram“ 1] 200. Thus the card is not yet active to make any purchase).
`
`It would
`
`have been obvious to one of ordinary skill in the art at the time of the invention was made to
`
`modify the electronic ID devices as disclosed by WeisstBolle Combination by incorporating a
`
`protection step of preventing access to credit card usage as taught by Official Notice (as
`
`evidenced by Flitcroft) in order to protect the credit card holder in the event the card is obtained
`
`by someone other than the intended credit card holder.
`
`Regarding Claim 12, Weiss discloses
`
`I
`
`a memory:
`
`0
`
`coupled to the processor (‘fl 1?, 52, FIG. 1 with associated text) and
`
`

`

`ApplicationfControl Number: l3f23?,184
`
`Paper No. 20130103 - Page 19
`
`Art Unit: 3662
`
`o
`
`configured to the device (‘]I 1?, 52, FIG. 1 with associated text),
`
`0 wherein the processor is configured to generate a seed using at feast two (Only two
`
`option are required to satisfy the ‘at least two” limitation) of the electronic serial
`
`number, a discrete code associated with the device (3% 7"4), the PIN {‘fl 1?, 53), a time
`
`value {‘I[ 51), and the biometric input ("fl 1?) to generate the encrypted authentication
`
`information (‘fl 51-53, 74), and
`
`0 wherein the seed is employed by the processor to generate the non—pi‘edictabie value
`
`(‘][ 51-53. 74).
`
`Weisszolle Combination does not directly disclose store an electronic serial number.
`
`The Examiner takes Official Notice it is well known in the art electronic devices that
`
`operate an operating system have unique registration number (As evidenced by Krasinski (US
`
`20030084332 ) which states, “several unique or distinct identifiers exits” one of which is an
`
`“operating system registration number“, 1| 17.). It would have been obvious to one of ordina1y
`
`skill in the art at the time of the invention was made to modify the devices as disclosed by
`
`Weissi’Bolle combination by incorporating a unique digital number as taught by Official Notice
`
`( as evidenced by Krasinski) in order to identify the device.
`
`Conclusion
`
`l0.
`
`THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time
`
`policy as set forth in 3? CFR l.l36(a).
`
`A shonened statutory period for reply to this final action is set to expire THREE
`
`MONTHS from the mailing date of this action. In the event a first reply is filed within TWO
`
`

`

`ApplicationfControl Number: l3r’23?,184
`
`Paper No. 20130103 - Page 20
`
`Art Unit: 3662
`
`MONTHS of the mailing date of this final action and the advisory action is not mailed until after
`
`the end of the THREE—MONTH shortened statut01y period, then the shortened statutory period
`
`will expire on the date the advisory action is mailed, and any extension fee pursuant to 3?
`
`CFR 1.136(a) will be calculated from the mailing date of the advisory action.
`
`In no event,
`
`however, will the statutory period for reply expire later than SIX MONTHS from the mailing
`
`date of this final action.
`
`Contact Information
`
`11.
`
`Examiner Calvin Cheung’s direct telephone number is (571) 270-?041 and direct fax is
`
`(571) 270—804! and can normally be reached Monday — Friday, 8:00am. — 5:00pm., EST.
`
`If attempts to reach the Examiner are unsuccessful, Primary Patent Examiner Tuan To‘s
`
`telephone number is {5?1) 27’2—6985. The fax phone number for the organization where this
`
`application or proceeding is assigned is 5? 1-23-8300.
`
`Information regarding the status of an application may be obtained from the Patent
`
`Application Information Retrieval (PAIR)

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket