`
`Paper No. ____
`Filed: December 20, 2018
`
`
`Filed on behalf of: Visa Inc. and Visa U.S.A. Inc.
`By: Matthew A. Argenti (margenti@wsgr.com)
`Michael T. Rosato (mrosato@wsgr.com)
`WILSON SONSINI GOODRICH & ROSATI
`650 Page Mill Road
`Palo Alto, CA 94304
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`_____________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________________________
`
`VISA INC. and VISA U.S.A. INC.,
`Petitioners,
`
`v.
`
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`
`Case CBM2019-00026
`Patent No. 8,577,813
`
`
`
`
`
`
`PETITION FOR COVERED BUSINESS METHOD REVIEW
`OF CLAIMS 1-2, 4-11, 13-20, AND 22-26
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`
`
`Page
`TABLE OF CONTENTS ................................................................................ i
`I.
`MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1)) .................... 2
`Real Party-In-Interest ................................................................. 2
`Related Matters .......................................................................... 2
`Counsel ....................................................................................... 5
`Service Information.................................................................... 5
`BACKGROUND OF THE ’813 PATENT ..................................... 5
`Priority ....................................................................................... 5
`Brief Description of the ’813 Patent Disclosure ........................ 6
`Prosecution History .................................................................... 9
`LEVEL OF ORDINARY SKILL ................................................... 9
`GROUNDS FOR STANDING (37 C.F.R. § 42.304(A)) ............. 10
`Petitioner Has Standing And Is Not Estopped (37 C.F.R.
`§ 42.302) .................................................................................. 10
`The ’813 Patent Qualifies As A CBM Patent (37 C.F.R.
`§ 42.301) .................................................................................. 10
`
`II.
`
`III.
`IV.
`
`A.
`B.
`C.
`D.
`
`A.
`B.
`C.
`
`A.
`
`B.
`
`1. At least one claim of the ’813 patent is a method or
`corresponding system used in the practice, administration,
`or management of a financial product or service ............. 11
`
`2. The ’813 patent is not directed to a “technological
`invention” ......................................................................... 13
`STATEMENT OF PRECISE RELIEF REQUESTED FOR EACH
`CHALLENGED CLAIM (37 C.F.R. § 42.304(b)) ....................... 20
`
`- i -
`
`
`
`V.
`
`
`
`
`
`VI.
`
`VII.
`
`A.
`
`B.
`
`C.
`
`A.
`B.
`C.
`D.
`E.
`
`A.
`
`Claims For Which Review Is Requested (37 C.F.R.
`§ 42.304(b)(1)) ......................................................................... 20
`Statutory Grounds Of Challenge (37 C.F.R.
`§ 42.304(b)(2)) ......................................................................... 20
`Standard For Granting A Petition For CBM Review .............. 20
`PROPOSED CLAIM CONSTRUCTIONS FOR CBM REVIEW
`(37 C.F.R. § 42.304(b)(3)) ............................................................ 21
`Biometric Input ........................................................................ 21
`Secret Information .................................................................... 23
`Authentication Information ...................................................... 23
`Point-of-Sale Device ................................................................ 24
`Secure Registry ........................................................................ 25
`CLAIMS 1-2, 4-11, 13-20, AND 22-26 OF THE ’813 PATENT
`ARE UNPATENTABLE UNDER 35 U.S.C. § 103 (37 C.F.R.
`§ 42.304(b)(4)) .............................................................................. 26
`Prior Art Patents and Printed Publications .............................. 26
`
`1. Ex-1115 - Jakobsson ........................................................ 26
`
`2. Ex-1116 - Maritzen .......................................................... 27
`
`3. Ex-1117 - Labrou ............................................................. 27
`Ground 1: Claims 1, 2, 4-11, 13, 16-20, and 24 Are
`Obvious in View of Jakobsson and Maritzen .......................... 28
`
`B.
`
`1.
`
`Independent Claim 1 ........................................................ 28
`
`2. Dependent Claim 2 ........................................................... 56
`
`3. Dependent Claim 4 ........................................................... 57
`
`4. Dependent Claim 5 ........................................................... 59
`
`
`
`- ii -
`
`
`
`
`
`5. Dependent Claim 6 ........................................................... 60
`
`6. Dependent Claim 7 ........................................................... 63
`
`7. Dependent Claim 8 ........................................................... 64
`
`8. Dependent Claim 9 ........................................................... 65
`
`9. Dependent Claim 10 ......................................................... 66
`
`10. Dependent Claim 11 ......................................................... 69
`
`11. Dependent Claim 13 ......................................................... 70
`
`12. Independent Claim 16 ...................................................... 71
`
`13. Dependent Claim 17 ......................................................... 74
`
`14. Dependent Claim 18 ......................................................... 75
`
`15. Dependent Claim 19 ......................................................... 80
`
`16. DependentClaim 20 .......................................................... 82
`
`17. Independent Claim 24 ...................................................... 83
`Ground 2: Claims 14, 15, 22, 23, 25, and 26 Are Obvious
`in View of Jakobsson, Maritzen, and Labrou .......................... 87
`
`C.
`
`1. Dependent Claims 14, 15, 22, 23, 25, and 26 .................. 87
`
`2. Reasons to Combine Jakobsson, Maritzen, and Labrou .. 89
`CONCLUSION ............................................................................. 93
`VIII.
`TABLE OF EXHIBITS ................................................................................. 1
`
`
`
`
`- iii -
`
`
`
`
`
`TABLE OF AUTHORITIES
`
`
`
`Page(s)
`
`CASES
`Apple Inc. v. Ameranth, Inc.,
`842 F.3d 1229 (Fed. Cir. 2016) ..................................................................... 18
`Blue Calypso, LLC v. Groupon, Inc.,
`815 F.3d 1331 (Fed. Cir. 2016) ..................................................................... 19
`Dealersocket, Inc. v. Autoalert, LLC,
`CBM2014-00132, Paper No. 11 (P.T.A.B. Oct. 29, 2014) ........................... 12
`Essociate, Inc. v. 4355768 Canada Inc.,
`No. 14-CV-0679-JVS, 2015 WL 4470139 (C.D. Cal. Feb. 11,
`2015) ........................................................................................................ 18, 19
`Interthinx, Inc. v. Corelogic Solutions, LLC,
`CBM2012-00007, Paper No. 15 (P.T.A.B. Jan. 31, 2013)............................ 17
`Liberty Mut., v. Progressive Cas. Ins. Co.,
`CBM2012-00004, Paper No. 10 (P.T.A.B. Jan. 25, 2013)............................ 18
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00003, Paper No. 15 (P.T.A.B. Feb. 12, 2013) ..................... 14, 17
`Liberty Mut. Ins. Co. v. Progressive Cas. Ins. Co.,
`CBM2012-00004, Paper No. 60 (P.T.A.B. Jan. 23, 2014)............................ 11
`Salesforce.com, Inc. v. Virtual Agility, Inc.,
`CBM2013-00024, Paper No. 16 (P.T.A.B. Nov. 19, 2013) .......................... 12
`SAS Institute Inc. v. Iancu, __ U.S. ___, No. 16-969, slip op. (Apr. 24,
`2018) .............................................................................................................. 20
`Universal Secure Registry LLC v. Apple Inc. et al., No. 17-585-VAC-
`MPT (D. Del.), ECF No. 1 ........................................................................ 2, 10
`Versata Development Group, Inc. v. SAP America, Inc.,
`793 F.3d 1306 (Fed. Cir. 2015) ...................................... 10, 11, 13, 14, 19, 21
`
`
`
`- i -
`
`
`
`
`
`STATUTES
`35 U.S.C. § 101 ...................................................................................................... 3, 4
`35 U.S.C. § 102 .............................................................................................. 4, 26, 27
`35 U.S.C. § 103 ...................................................................................... 4, 5, 20, 26, 4
`35 U.S.C. § 321 .................................................................................................... 1, 20
`35 U.S.C. § 324 .................................................................................................. 20, 94
`REGULATIONS
`37 C.F.R. § 42.8 ..................................................................................................... 2, 5
`37 C.F.R. § 42.300 ............................................................................................... 1, 21
`37 C.F.R. § 42.301 ............................................................................................. 11, 13
`37 C.F.R. § 42.302 ................................................................................................... 10
`37 C.F.R. § 42.303 ................................................................................................... 10
`37 C.F.R. § 42.304 ................................................................................. 10, 20, 21, 26
`77 Fed. Reg. 48,734 (Aug. 14, 2012) ...................................................................... 10
`77 Fed. Reg. 48,735 (Aug. 14, 2012) ...................................................................... 10
`77 Fed. Reg. 48,764 (Aug. 14, 2012) ...................................................................... 21
`OTHER AUTHORITIES
`157 Cong. Rec. S1360 (daily ed. Mar. 8, 2011) (Statement of Sen.
`Schumer) ........................................................................................................ 13
`
`
`
`
`- ii -
`
`
`
`
`
`Pursuant to 35 U.S.C. § 321, Section 18 of the Leahy-Smith America
`
`Invents Act (“AIA”), and 37 C.F.R. § 42.300 et seq., the undersigned hereby
`
`requests covered business method (“CBM”) review of claims 1-2, 4-11, 13-20, and
`
`22-26 (“challenged claims”) of U.S. Patent No. 8,577,813 (“’813 patent”).
`
`The ’813 patent is generally directed to system and methods for verifying an
`
`account holder’s identity before allowing access to his or her account to enable a
`
`transaction using a Point-of-Sale (“POS”) device. Indeed, the patent holder,
`
`Universal Secure Registry LLC, has described its patent in similar terms,
`
`purporting that the claimed system “can both securely identify the user, and
`
`separately authenticate and approve the user’s financial transaction requests made
`
`through a POS device.” Ex-1118, Plaintiff’s Answering Brief in Opposition to
`
`Defendants’ Motion to Dismiss (“Opp.”), 3-4 (“To prevent unauthorized use of the
`
`Electronic ID Device, a user must first authenticate herself to the device to
`
`activate it for a financial transaction. The ’813 patent describes multiple ways to
`
`do this, including using a biometric input (e.g., fingerprint) and/or secret
`
`information (e.g., a PIN).”).
`
`When the ’813 patent was filed, however, systems and methods that could
`
`both securely identify the user, and separately authenticate and approve the user’s
`
`financial transaction requests made through a POS device, were well known in the
`
`
`
`- 1 -
`
`
`
`
`
`art. In fact, the prior art is replete with disclosures of systems that perform user
`
`authentication and approve financial transactions in this manner.
`
`As further explained in this Petition, the device and methods claimed in the
`
`’813 patent were known in the art or obvious at the time the ’813 patent was filed.
`
`This petition is filed with a motion for joinder with CBM2018-00025, in
`
`which Apple Inc. (“Apple”) filed a petition on May 3, 2018, requesting
`
`cancellation of the challenged claims of the ’813 patent. The Board instituted trial
`
`in CBM2018-00025 on December 3, 2018. Here, Visa proposes the same grounds
`
`of unpatentability as in CBM2018-00025 and relies on the same analysis and
`
`evidence.
`
`I. MANDATORY NOTICES (37 C.F.R. § 42.8(A)(1))
`
`A. Real Party-In-Interest
`
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies that Visa Inc. and
`
`Visa U.S.A. Inc. (together, “Visa” or “Petitioner”) are the real party-in-interest.
`
`B. Related Matters
`
`The ’813 patent is owned by Universal Secure Registry, LLC (“USR” or
`
`“Patent Owner”). On May 21, 2017, USR sued Apple and Visa in the District of
`
`Delaware, asserting four patents, including the ’813 patent, against Apple’s Apple
`
`Pay functionality. See Ex-1103, Universal Secure Registry LLC v. Apple Inc. et
`
`
`
`- 2 -
`
`
`
`
`
`al., No. 17-585-VAC-MPT (D. Del.), ECF No. 1, Complaint ¶2. The complaint
`
`was served on Petitioner on July 5, 2017.
`
`On August 25, 2017, Apple filed a Motion to Dismiss for Failure to State a
`
`Claim, asserting that the claims of the ’813 patent are unpatentable under 35
`
`U.S.C. § 101 because they are directed to the abstract idea of verifying an account
`
`holder’s identity based on codes and/or information related to the account holder
`
`before enabling a transaction. That motion remains pending.
`
`In addition to the Motion to Dismiss, Apple is filing the following petitions
`
`for CBM/IPR:
`
`
`
`- 3 -
`
`
`
`
`
`Asserted Patent
`
`CBM/IPR
`
`Statutory Grounds
`
`CBM2018-00022
`
`35 U.S.C. § 101
`
`U.S. 9,530,137
`
`IPR2018-00808
`
`35 U.S.C. § 103
`
`U.S. 9,100,826
`
`IPR2018-00809
`
`35 U.S.C. § 103
`
`IPR2018-00810
`
`35 U.S.C. § 103
`
`IPR2018-00813
`
`35 U.S.C. §§ 102, 103
`
`CBM2018-00023
`
`35 U.S.C. § 101
`
`U.S. 8,856,539
`
`IPR2018-00811
`
`35 U.S.C. § 103
`
`IPR2018-00812
`
`35 U.S.C. § 103
`
`CBM2018-00024
`
`35 U.S.C. § 101
`
`U.S. 8,577,813
`
`CBM2018-00025
`
`35 U.S.C. § 103
`
`CBM2018-00026
`
`35 U.S.C. § 103
`
`Additionally, Visa has filed the following petitions for IPR:
`
`Asserted Patent
`
`CBM/IPR
`
`Statutory Grounds
`
`U.S. 8,856,539
`
`U.S. 9,530,137
`
`IPR2018-01350
`
`35 U.S.C. § 103
`
`IPR2018-01351
`
`35 U.S.C. § 103
`
`IPR2019-00174
`(Requesting joinder to
`IPR2018-00809)
`
`35 U.S.C. § 103
`
`
`
`- 4 -
`
`
`
`
`
`IPR2019-00175
`(Requesting joinder to
`IPR2018-00810)
`
`IPR2019-00176
`(Requesting joinder to
`IPR2018-00813)
`
`35 U.S.C. § 103
`
`35 U.S.C. §§ 102, 103
`
`U.S. 9,100,826
`
`
`C. Counsel
`
`Pursuant to 37 C.F.R. § 42.8(b)(3)-(4), Petitioner identifies the following
`
`lead and backup counsel, to whom all correspondence should be directed. Lead
`
`Counsel: Matthew A. Argenti (Reg. No. 61,836), Backup Counsel: Michael T.
`
`Rosato (Reg. No. 52,182).
`
`D.
`
`Service Information
`
`Email: margenti@wsgr.com; mrosato@wsgr.com
`
`Post and hand delivery address: WILSON SONSINI GOODRICH & ROSATI PC, 650
`
`Page Mill Road, Palo Alto, CA 94304-1050.
`
`Telephone: 650-493-9300; Facsimile: 650-493-6811.
`
`Petitioner consents to electronic service.
`
`II. BACKGROUND OF THE ’813 PATENT
`
`A.
`
`Priority
`
`Entitled “Universal Secure Registry,” the ’813 patent issued on November 5,
`
`2013 from an application filed on September 20, 2011. The ’813 patent is a
`
`
`
`- 5 -
`
`
`
`
`
`continuation and a continuation-in-part of numerous U.S. applications, the earliest
`
`of which, App. No. 11/677,490 (now U.S. Patent No. 8,001,055 (Ex-1104)) was
`
`filed on February 21, 2007. The patent also claims priority to four provisional
`
`applications: Application Nos. 60/775,046 (Ex-1121), 60/812,279 (Ex-1122),
`
`60/859,235 (Ex-1123) and 61/031,529 (Ex-1124), the earliest of which was filed
`
`on February 21, 2006. The latest provisional application was filed on February 26,
`
`2008, and is the first application to disclose Figure 31.
`
`B.
`
`Brief Description of the ’813 Patent Disclosure
`
`The ’813 patent describes a secure database called a “Universal Secure
`
`Registry” (“secure registry”), which is “a universal identification system ... used to
`
`selectively provide information about a person to authorized users.” Ex-1101, ’813
`
`patent, 3:66-4:1. The patent states that the secure registry database is designed to
`
`“take the place of multiple conventional forms of identification” when conducting
`
`financial transactions to minimize the incidence of fraud. E.g., id., 4:12-15. The
`
`patent states that various forms of information can be stored in the database to
`
`verify a user’s identity and prevent fraud: (1) algorithmically generated codes, such
`
`as a time-varying multicharacter code or an “uncounterfeitable token,” (2) “secret
`
`information” like a PIN or password, and/or (3) a user’s “biometric information,”
`
`such as fingerprints, voice prints, an iris or facial scan, DNA analysis, or a
`
`photograph. See id., 42:29-36, 12:19-31, Fig. 3. The patent does not, however,
`
`
`
`- 6 -
`
`
`
`
`
`describe any new technology for generating, capturing, or combining such
`
`information. Ex-1102, Shoup-Decl. ¶24.
`
`Instead, the patent repeatedly emphasizes the generic nature of the secure
`
`registry database and its manner of implementation. The patent states that the
`
`secure registry database can be implemented in “a general-purpose computer
`
`system” using “a commercially available microprocessor” running “any ...
`
`commercially available operating system.” Ex-1101, ’813 patent, 10:9-15. The
`
`alleged invention is also “not limited to a particular computer platform, particular
`
`processor, or particular high-level programming language.” Id., 10:58-60. The
`
`secure registry database itself “may be any kind of database” and communication
`
`with the database may take place over “any [network] protocol.” Id., 10:24-26,
`
`11:24-28, Fig. 1. This generic database is encrypted using known methods and
`
`may be accessed by providing information sufficient to verify the user’s identity.
`
`Id., 4:1-11; Ex-1102, Shoup-Decl. ¶25.
`
`In its complaint against Apple and Visa, USR identified ’813 patent claim 1
`
`as “exemplary.” Claim 1, elements of which are included in, for example,
`
`Figure 31 (shown below), claims “[a]n electronic ID device configured to allow a
`
`user to select any one of a plurality of accounts associated with the user to employ
`
`in a financial transaction.” Ex-1101, ’813 patent, 51:65-67. The claimed
`
`electronic ID device contains several generic components: (1) a biometric sensor
`
`
`
`- 7 -
`
`
`
`
`
`that receives a biometric input from the user (367); (2) a user interface whereby a
`
`user can input secret information (such as a PIN code) and select the account he or
`
`she wants to access (364); (3) a communication interface that can communicate
`
`with the secure registry (366) and with a point of sale device (354) capable of
`
`communicating with the secure registry; and (4) a processor (not shown) that can
`
`grant access to the electronic ID device via authentication by biometric and/or
`
`secret information and generate encrypted authentication information from some
`
`combination of a nonpredictable value and the biometric and/or secret information
`
`to send to the secure registry. Id., 12:19-54; Ex-1102, Shoup-Decl. ¶26.
`
`
`
`- 8 -
`
`
`
`
`
`
`
`Ex-1101, ’813 patent, Fig. 31.
`
`C.
`
`Prosecution History
`
`The ’813 patent was filed as U.S. Application No. 13/237,184 (“‘813
`
`application”) on September 20, 2011.
`
`After several rejections over prior art, the examiner issued a Notice of
`
`Allowance on March 19, 2013. See Ex-1212, Notice of Allowance. The ’813
`
`patent subsequently issued on November 5, 2013.
`
`III. LEVEL OF ORDINARY SKILL
`
`A person of ordinary skill in the relevant field or art is a hypothetical person
`
`to whom an expert in the relevant field could assign a routine task with reasonable
`
`confidence that the task would be successfully carried out. The level of skill in the
`
`art is evidenced by prior art references. The prior art demonstrates that a person of
`
`ordinary skill in the relevant field or art, at the time the ’813 patent was effectively
`
`filed, would have a Bachelor’s Degree in electrical engineering, computer science,
`
`or a related scientific field, and approximately two years of work experience in the
`
`computer science field including, for example, operating systems, database
`
`management, encryption, security algorithms, and secure transaction systems,
`
`though additional education can substitute for less work experience and vice versa.
`
`See Ex-1102, Shoup-Decl. ¶¶37-38.
`
`
`
`- 9 -
`
`
`
`
`
`IV. GROUNDS FOR STANDING (37 C.F.R. § 42.304(A))
`
`A.
`
`Petitioner Has Standing And Is Not Estopped
`(37 C.F.R. § 42.302)
`
` party has standing to bring a CBM review proceeding against a patent if
`
` A
`
`the party has been sued for infringement of the patent. AIA § 18(a)(1)(B); 37
`
`C.F.R. § 42.302(a). Visa satisfies the standing requirement because USR sued Visa
`
`for infringement of the ’813 patent on May 21, 2017. See Ex-1103, Universal
`
`Secure Registry, LLC v. Apple Inc., No. 17-585-VAC-MPT (D. Del.), ECF No. 1,
`
`Compl.
`
`Further, Visa is not estopped from challenging the claims on the grounds
`
`identified in this petition, and has not been party to any other post-grant review of
`
`the challenged claims. See 37 C.F.R. § 42.302(b). Additionally, Visa certifies that
`
`it complies with the timing requirements set forth in 37 C.F.R. § 42.303.
`
`B.
`
`The ’813 Patent Qualifies As A CBM Patent
`(37 C.F.R. § 42.301)
`
`
`Section 18(d)(1) of the AIA “on its face covers a wide range of finance-
`
`related activities,” Versata Development Group, Inc. v. SAP America, Inc., 793
`
`F.3d 1306, 1325 (Fed. Cir. 2015), including “activities that are financial in nature,
`
`incidental to a financial activity or complementary to a financial activity,”
`
`Transitional Program for Covered Business Method Patents—Definitions of
`
`Covered Business Method Patent and Technological Invention, 77 Fed. Reg.
`
`
`
`- 10 -
`
`
`
`
`
`48,734, 48,735 (Aug. 14, 2012). Under Section 18 of the AIA, the Board may
`
`institute a CBM review proceeding for any patent that qualifies as a CBM patent.
`
`See AIA § 18(a)(1)(E). Section 18 of the AIA defines a “covered business
`
`method” as a claim that both (1) claims a method or corresponding apparatus for
`
`performing data processing or other operations used in the practice, administration,
`
`or management of a financial product or service; and (2) is not directed to a
`
`technological invention. See id. § 18(d)(1); see also 37 C.F.R. § 42.301(a). The
`
`’813 patent satisfies both requirements for at least the reasons set forth below.
`
`1.
`
`At least one claim of the ’813 patent is a method or
`corresponding system used in the practice, administration,
`or management of a financial product or service
`
` patent qualifies for CBM review as long as “the subject matter of at least
`
` A
`
`one claim is directed to a covered business method.” Liberty Mut. Ins. Co. v.
`
`Progressive Cas. Ins. Co., CBM2012-00004, Paper No. 60 at 6 (P.T.A.B. Jan. 23,
`
`2014). As the Federal Circuit explained in Versata, “the definition of ‘covered
`
`business method patent’ is not limited to products and services of only the financial
`
`industry, or to patents owned by or directly affecting the activities of financial
`
`institutions such as banks and brokerage houses. The plain text of the statutory
`
`definition contained in § 18(d)(1) ... on its face covers a wide range of finance-
`
`related activities.” Versata, 793 F.3d at 1325. As such, the correct inquiry “is not
`
`whether the claimed invention only has application in business contexts, but
`
`
`
`- 11 -
`
`
`
`
`
`whether the claimed invention is a method or apparatus for performing data
`
`processing or other operations used in the practice, administration, or management
`
`of a financial product or service.” Salesforce.com, Inc. v. Virtual Agility, Inc.,
`
`CBM2013-00024, Paper No. 16 at 14-15 (P.T.A.B. Nov. 19, 2013) (emphasis
`
`added). The claims should be read in light of the specification when making this
`
`determination. See Dealersocket, Inc. v. Autoalert, LLC, CBM2014-00132, Paper
`
`No. 11 at 11-12 (P.T.A.B. Oct. 29, 2014).
`
`All claims of the ’813 patent meet these requirements. For example,
`
`independent claims 1 and 24 (and those that depend from them) disclose a device
`
`and method for providing or denying access to information related to a user stored
`
`in a secure database in the context of a “financial transaction.” Ex-1101, ’813
`
`patent, claims 1 and 24. The specification defines a financial transaction as
`
`including “transactions conducted on-line or at a point of sale using credit or debit
`
`accounts, banking transactions, purchases or sales of investments and financial
`
`instruments or generally the transfer of funds from a first account to a second
`
`account.” Id., 43:6-12. Similarly, dependent claims 7, 13-14, 17, 20, 22-23, and
`
`25-26 all explicitly recite financial transactions, user account numbers, purchases,
`
`and/or selection of products or services. See id., claims 7, 13-14, 17, 20, 22-23,
`
`and 25-26. And all independent claims recite a “point of sale” device. See id.,
`
`claims 1-2, 4-11, 13-20, and 22-26.
`
`
`
`- 12 -
`
`
`
`
`
`Moreover, the patent specification makes clear that the “accounts” recited in
`
`all patent claims can be financial in nature. See, e.g., id., 6:66-7:1 (“In still another
`
`aspect, a user device is configured to allow a user to select any one of a plurality of
`
`accounts associated with the user to employ in a financial transaction.”); 7:47-50
`
`(“authorizing the POS device to initiate a financial transaction involving a transfer
`
`of funds to or from the account selected by the user when the encrypted
`
`authentication information is successfully authenticated”).
`
`2.
`
`The ’813 patent is not directed to a “technological
`invention”
`A patent that otherwise qualifies as a CBM patent is nevertheless excluded
`
`from CBM review if it is directed to a “technological invention”—i.e., if “the
`
`claimed subject matter as a whole” (1) “recites a technological feature that is novel
`
`and unobvious over the prior art” and (2) “solves a technical problem using a
`
`technical solution.” 37 C.F.R. § 42.301(b); Versata, 793 F.3d at 1326. Only
`
`“those patents whose novelty turns on a technological innovation over the prior art
`
`and are concerned with a technical problem which is solved with a technical
`
`solution and which requires the claims to state the technical features which the
`
`inventor desires to protect” should be excluded from CBM review. 157 Cong.
`
`Rec. S1360, S1364 (daily ed. Mar. 8, 2011) (Statement of Sen. Schumer). The
`
`claims of the ’813 patent do not meet either prong of the technological invention
`
`exclusion.
`
`
`
`- 13 -
`
`
`
`
`
`i.
`
`The ’813 patent claims include only conventional
`technology components that were well known in the
`art.
`
`The first prong of the test analyzes whether the differences between the
`
`claimed invention and the prior art are technological features. See Liberty Mut.
`
`Ins. Co. v. Progressive Cas. Ins. Co., CBM2012-00003, Paper No. 15 at 12-13
`
`(P.T.A.B. Feb. 12, 2013). The Federal Circuit has affirmed the USPTO’s listed
`
`characteristics that, if found, would preclude a finding of a “technological
`
`invention”: (1) mere “recitation of known technologies”; (2) “reciting the use of
`
`known prior art technology”; and (3) “combining prior art structures to achieve the
`
`normal, expected, or predictable result of that combination.” Versata, 793 F.3d at
`
`1326.
`
`The only arguably technological elements of the challenged claims are as
`
`follows:
`
`’813 Patent Claim Well-Known Technological Features
`
`Independent Claim 1
`
`Electronic ID device, biometric
`
`sensor, user interface, communication
`
`interface, processor, POS terminal,
`
`secure registry.
`
`
`
`- 14 -
`
`
`
`
`
`Dependent Claims 2, 4
`
`No additional technological features
`
`Dependent Claim 5
`
`Memory
`
`Dependent Claims 6-
`
`No additional technological features
`
`11, 13-15
`Independent Claim 16
`
`User interface, communication interface,
`
`interface with POS terminal, processor
`
`(implied), secure registry
`
`Dependent Claim 17
`
`Memory
`
`Dependent Claims 18-
`
`No additional technological features
`
`20, 22-23
`Independent Claim 24
`
`Electronic ID device, POS terminal,
`
`processor (implied), secure registry
`
`Dependent Claim 25
`
`User interface
`
`Dependent Claim 26
`
`No additional technological features
`
`Under these guidelines, the ’813 patent fails to disclose a “technological
`
`feature” because the claimed features—an electronic ID device (comprising a user
`
`interface, communication interface, and processor), database implementing an
`
`identity verification system and a POS device/terminal—were well known as of the
`
`patent’s February 26, 2008 priority date (as the patent admits) and are implemented
`
`
`
`- 15 -
`
`
`
`
`
`in a conventional manner (as the patent admits). Ex-1101 ’813 patent, 43:54-44:7.
`
`That is, the processor performs standard data operations such as comparing data,
`
`performing calculations, and executing commands, the user interface accepts user
`
`input, the communication interface communicates, and the secure registry database
`
`stores and controls access to conventional information such as a user’s financial or
`
`medical records. See, e.g., Ex-1101, ’813 patent, claim 16 (limitations reciting
`
`standard computer and networking functions “authenticating,” “activating,”
`
`“generating,” “receiving,” and “communicating”).
`
`The named inventor did not claim to have invented a new computer,
`
`processor, database, or Internet system. Instead, he leveraged known technology to
`
`claim methods for verifying an account holder’s identity based on codes and/or
`
`information related to the account holder before enabling a transaction. Indeed, the
`
`’813 patent concedes that the claimed invention is not tied to any particular
`
`technology, and can be implemented in “a general purpose computer system” using
`
`“a commercially available microprocessor” running “any other commercially
`
`available operating system” and that the secure registry database itself “may be any
`
`kind of database,” which can communicate using “any [network] protocol.” Ex-
`
`1101, ’813 patent, 10:1-11:28.
`
`The ’813 prosecution history provides further evidence that the ’813 claims
`
`are not technically distinguishable from the prior art. For example, the
`
`
`
`- 16 -
`
`
`
`
`
`amendments made to overcome prior art during prosecution were all non-technical
`
`in nature and the claims were ultimately allowed based on a non-technical
`
`distinction over the prior art. See Ex-1108, ’813 Patent File History, 12/17/2012
`
`Amendment/Req. Reconsideration After Non-Final Rejection, 3-8 (amending
`
`claim to add conventional access restriction (i.e., biometric or secret information
`
`authorization) to use of processor); Ex-1111, ’813 Patent File History, 03/07/2013
`
`Response After Final Action, 2-7 (rolling limitation of claim 2 requiring
`
`communication with generic POS device into claim 1).
`
`ii.
`
`The ’813 patent does not solve a technical problem
`with a technical solution.
`
`The ’813 patent also fails the second prong of the technological invention
`
`test because it does not solve a technical problem with a technical solution. This
`
`prong requires a review of the patent’s specification to determine what problem the
`
`claimed invention purportedly solves. See Liberty Mut. Ins. Co. v. Progressive
`
`Cas. Ins. Co., CBM2012-00003, Paper No. 15 at 14-15 (P.T.A.B. Feb. 12, 2013).
`
`If the problem is non-technical, the patent does not meet the technological
`
`invention exception. See Interthinx, Inc. v. Corelogic Solutions, LLC, CBM2012-
`
`00007, Paper No. 15 at 18 (P.T.A.B. Jan. 31, 2013). Moreover, where the
`
`specification recognizes that technology known in the art could be used to reach
`
`the desired result, the patent does not solve a technical problem with a technical
`
`
`
`- 17 -
`
`
`
`
`
`solution. See, e.g., Liberty Mut., CBM2012-00004, Paper No. 10 at 8 (P.T.A.B.
`
`Jan. 25, 2013).
`
`The ’813 patent states at the outset that it is directed to a system for
`
`“authenticating identity or verifying the identity of individuals and other entities
`
`seeking access to certain privileges and for selectively granting privileges and
`
`providing other services in response to such identifications/verifications.” Ex-
`
`1101, ’813 patent, 1:36-46 (describing the “field of invention”). How to control
`
`access to information stored in a particular location is a problem as old as society
`
`itself. Although humans have more recently employed computers to make identity
`
`verification more precise and transactions more secure, the underlying problem of
`
`ensuring that people conducting transacti