throbber
U.S. Patent Application No. 12/210,926
`Attorney Docket No. IQAMR002USO
`
`Certification Under 37 C.F.R.
`
`1.8
`
`I hereby certify that on March 1, 2012 this correspondence is being: (a) deposited with the
`United States Postal Service in an envelope addressed to Commissioner for Patents, P.O.
`Box 1450, Alexandria, Virginia 22313-1450; or (b) transmitted via facsimile to facsimile
`number 571-273-8300; or (c) electronically filed with the U.S. Patent Office.
`
`
`Date: March 1 2012
`
`Signature:
`
`/Michael P. Fortkort/
`Michael P. Fortkort
`
`(Reg. No. 35,141)
`
`IN THE UNITED STATES PATENT & TRADEMARK OFFICE
`
`APPLICANT: NADER ASGHARI-KAMRANI and IQAMRAN ASGHARI-KAMRANI
`
`SERIAL NO.: 12/210,926
`
`FILING DATE: September 15, 2008
`
`EXAMINER: Mr. Abdulhakim Nobahar
`
`ART UNIT: 2432
`
`TITLE: CENTRALIZED IDENTIFICATION AND AUTHENTICATION SYSTEM AND
`METHOD
`
`ATTORNEY DOCKET: KAMR002USO
`
`CONFIRMATION NO.: 7516
`
`VIA ELECTRONIC FILING SYSTEM
`ASSISTANT COMMISSIONER FOR PATENTS
`
`WASHINGTON, D.C. 20231
`
`AFFIDAVIT UNDER RULE 132
`
`Applicants hereby submit this affidavit in support of their response to the Office
`
`Action mailed January 6, 2012 which rejected the pending claims.
`
`This affidavit is being provided as testimony in the prosecution of U.S. Serial No.
`
`12/210,926, and pursuant to the provisions of 37 C.F.R. § 1.132. The witness hereby avers
`
`and testifies as follows:
`
`

`
`1.
`
`I am James Hewitt, residing at 12587 Fair Lakes Circle, #202, Fairfax,
`
`Virginia 2203 3.
`
`2.
`
`3.
`
`I received a Bachelors of Arts in Philosophy from Vassar College in 1983.
`
`I have been a Certified Information System Security Professional since 2001.
`
`My certification number is #21060 per ISC2.org.
`
`4.
`
`From 1998-2002, I was Director of Professional Services at CertCo, Inc. in
`
`Cambridge, Massachusetts. During this time, I produced cryptographic systems used by Tier 1
`
`banks for authentication of users, machines and financial transactions.
`
`5.
`
`From 2002-2003, I was Secure Messaging Project Manager for the
`
`Commonwealth of Massachusetts Information Technology Division. During this period, I
`
`implemented a system for securing healthcare-related transactions statewide.
`
`6.
`
`Since 2004 I have been Director of Security Governance for CGI Federal in
`
`Fairfax, Virginia. In this position, I design, implement and manage the security of large—scale
`
`applications for government and commercial clients.
`
`7.
`
`I am familiar with the specification and pending claims of the present
`
`Application.
`
`8.
`
`I have reviewed U.S. Patent Publication No. 2010/0100724 A1 by Kaliski, Ir.
`
`(“KaZiskz', J24”).
`
`Nonce Not Equivalent to SecureCode
`
`9.
`
`One of skill in the authentication art would understand that an identifier is
`
`non secret information such as a name or label that identifies an entity. And in the world of
`
`authentication an identifier is only used for identification of an entity and not for
`
`authentication of the entity.
`
`10.
`
`One of skill in the authentication art would understand that in Kaliski, Jr., a
`
`nonce is a session identifier. “The authentication server 730 returns the blinded result R to
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMRO02USO
`
`the client 715, along with a nonce or other session identifier 772.” Kaliski, Jr., 1] [01 l l]
`
`(emphasis supplied).
`
`A cryptographic nonce is an arbitrary number used to establish the uniqueness or
`
`discreteness of an operation. That is, an operation such as a data request is accompanied by a
`
`nonce in order to demonstrate that the request is not a repeat or replay of a previous request.
`
`A session is a series of information exchanges between two communicating parties,
`
`usually involving an initiation protocol and more than one message in each direction.
`
`In Kaliski, Jr. a nonce is used for identification of a user’s session. In the
`
`client/server world, a session refers to all the requests that a single client makes to a server. A
`
`session is specific to each user and for each user a new session is created to track all the
`
`requests from that user. Every user has a separate session and separate session identifier is
`
`associated with that session.
`
`11.
`
`One of skill in the authentication art would understand that the nonce in
`
`Kaliski, Jr. is not equivalent to the SecureCode of the present application. A nonce is a
`
`session identifier associated with a user’s session, but a nonce is not used for authentication
`
`of a user, as is the SecureCode recited in the claims of Kamrani.
`
`12.
`
`One of skill in the authentication art would understand that the statement “the
`
`nonce corresponds to the recited dynamic SecureCode” is inaccurate. In Kaliski, Jr. the web
`
`server receives the nonce and hardened password from the client and authenticates the user
`
`based on successful decryption of a digital signature associated with the hardened password.
`
`Kaliski, Jr., ‘W [0109] and [01 12]. The nonce is used by the web server to identify the user
`
`and the hardened password used in the authentication process of authenticating the user. In
`
`Kamrani, a dynamic code authenticates a user whereas in Kaliski, Jr. a nonce is a session
`
`identifier. Therefore the argument that “the nonce corresponds to the recited dynamic code”
`
`is invalid.
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROOZUSO
`
`No Authentication Request Message
`
`13.
`
`One of skill in the authentication art would understand that in the system of
`
`Kaliski, Jr. there is nothing equivalent to a Central Entity receiving an authentication request
`
`message, as recited in the claims at issue. The Office Action equates the claimed
`
`authentication request message to message 776 of Kaliski, Jr. But, message 776 that the
`
`authentication server in FIG 7 of Kaliski, Jr. receives is NOT an authentication request
`
`message. Rather, message 776 indicates simply whether or not the authentication of the
`
`client by the web server was successful. See Kaliski, Jr. flfll [0109] through [0112]. This
`
`message 776 is a one way acknowledgement and expects no return, whereas the
`
`authentication request message as recited in the claims at issue is a different type of message
`
`than the cited acknowledgement as the claimed authentication request should generate a
`
`response because it is a REQUEST as opposed to an acknowledgement. Thus, the message
`
`in Kaliski, Jr. cited by the Office Action at issue is not equivalent to the claimed
`
`authentication request message in Kamram‘. Thus, one of skill in the authentication art would
`
`understand that the argument in the Office Action equating the claimed authentication request
`
`message to the acknowledgement message 776 in Kaliski, Jr. is not valid.
`
`No Central Entity Authenticating User
`
`14.
`
`One of skill in the authentication art would understand that there is nothing in
`
`Kaliski, Jr. equivalent to a Central Entity authenticating the user as recited in the claims at
`
`issue. The Office Action equates the Central Entity to the authentication server 730 in
`
`Kaliski, Jr. But, the authentication server 730 in FIG 7 never authenticates the client.
`
`Rather, the web server 710 authenticates the client based on successful decryption of the
`
`client’s digital signature associated with the hardened password. See Kaliski, Jr. W [0109]
`
`through [01 12]. Moreover, the web server 710 of Kaliski, Jr. does not generate anything
`
`-3-
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROOZUSO
`
`equivalent to the claimed SecureCode, as recited in the claims at issue. Thus, neither the web
`
`server 710 nor the authentication server 730 of Kaliski, Jr. performs the functions of the
`
`Central Entity recited in the claims.
`
`15.
`
`One of skill in the authentication art would understand that in Kaliski, fir. a
`
`user’s client application generates a hardened password (based on the blinded result R
`
`received from the authentication server) and submits the generated hardened password to the
`
`web server and not to the authentication server cited by the Office Action. In Kaliski, Jr. the
`
`client receives the blinded result R along with a nonce from the authentication server and
`
`generates the hardened password at the client side for authentication to the web server.
`
`Kaliski, Jr., 1] [O111].
`
`16. One of skill in the authentication art would understand that the argument in the
`
`Office Action equating the claimed “authenticating by the Central-Entity the user during the
`
`transaction, if the digital identity is valid” with the authentication protocol in Kaliski, Jr. is
`
`not valid. The authentication server 730 does not authenticate the client; it is the web server
`
`that authenticates the client. And, the web server 710 of Kaliski, Jr. also cannot be the
`
`claimed Central Entity because the web server does not generate anything equivalent to the
`
`claimed SecureCode. Thus, there is no Central Entity authenticating the user in Kaliski, Jr.
`
`Authentication Process Different
`
`17. The web server of Kaliski, Jr. stores the user’s personal information as encryption
`
`secrets (See Kaliskz’, Jr, fl [0103]) and the encrypted secrets are stored such that they can be
`
`decrypted with a decryption key/hardened password. In Kaliski, Jr. a blind function
`
`evaluation protocol is used by the client to drive a decryption key/hardened password from a
`
`blinded result R received from the authentication server (See Kaliski, Jr., 1l [0] I 1]), to
`
`decrypt the encrypted secrets. The web server authenticates the client if the hardened
`
`password received from the client successfully decrypt user’s information.
`
`-4-
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROO2USO
`
`18. It is clear that in Kaliski, Jr., authentication is based on a cgzptographic protocol.
`
`The use of this cryptographic approach allows authenticity of a client to be checked by
`
`creating a digital signature of a user’s personal information using the encryption key, which
`
`can be verified using hardened password as the decryption key received from the client
`
`during the transaction.
`
`19. One of skill in the authentication art would understand that in the blind function
`
`evaluation protocol used in Kaliski, Jr. (See, Kaliski, Jr. 1] [003 8]), the client has some secret
`
`information and the authentication server has some secret information, and together the client
`
`and the authentication server provide their respective secrets as an input to a jointly
`
`calculated function, with only the client obtaining the output of the jointly calculated function
`
`(the output is the decryption key or hardened password). This means that only the client
`
`obtains the hardened password (decryption key) as the output of the blind function evaluation
`
`protocol. See Kaliski, Jr. Figure 7. The authentication server of Kaliski, Jr. which the Office
`
`Action equated to the Central Entity of the claims cannot generate the hardened password
`
`(decryption key) since the authentication server does not have access to the client’s secret
`
`information. See Kaliski, Jr. 1] [0040], which states:
`
`The use of a blind function evaluation protocol, or other
`embodiments in which the decryption key is derived from the
`client information, provides additional security benefits
`resulting from the fact that the first server 30 does not have the
`decryption key in an unblinded form. Even if the first server 30
`is compromised, and a server secret obtained, it will still be
`necessary for an attacker to do more work to transform the
`server secret into the decryption key. Just as one example, in
`one such embodiment, the first server 30 and client 15 engage
`in a blind function evaluation protocol that results in the first
`server 30 providing to the client 15 a blinded key as the
`intermediate data 22. The client 15 has information used to
`
`unblind the decryption key 24, which is then used to decrypt
`the encrypted secrets 5. Compromise of the first server 30
`would still not directly reveal the decryption key 25 to an
`attacker.
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROO2USO
`
`Thus, the entire basis for authentication in Kaliski, Jr. is different than the claimed
`
`SecureCode authentication process of Kamrani, and one of ordinary skill in the art would
`
`understand this difference.
`
`Hill et al.
`
`20.
`
`One of skill in the authentication and payment art would understand that the
`
`user of Hill et al. purchases a set of payment tokens from the payment service provider before
`
`the user being involved in any transaction with the merchant. Hill et al., col. 5, lines 31-51
`
`and col. 8, lines I -9. The tokens are not Valid for a predefined period of time because the user
`
`buys them. The tokens are like real money and will be used for online purchases.
`
`initially, the user establishes an internet connection with
`the payment service, and purcliases tokens to a certain value.
`This transaction may be carried out, for oxaniple, by trans-
`rnitting from the client to the payment service a request for
`tokens to at certain Value, say £10. togctlier with it credit card
`number. This ntinzber may be encrypted using any one of :1
`number of public key encryption tools. such as PGP. The
`payment service debits the relevant sum from the credit card
`account, and generates at number of payment tokens, say
`3000 tokens of value 1;). These are encrypted using the
`public key algorithm and returned to the user via the internet
`connection, together with a key which is unique to the user.
`Each token comprises,
`in this exarnple. a 64 bit random
`hexadecimal nunzbcr, drawn from a large list of 11 random
`numbers l.¥’.=(r(}, r1, r2,
`.
`.
`.
`, rn—", rn—'l) at the payment
`service. For each user, the payment service keeps two pieces
`of secret information k and s. k is a rzmdorn key for use with
`a symmetric block cipher. S is a random security parainctcr,
`where (0§s§n—‘l,_) taken at random from the range (0 .
`.
`. 1]).
`There is also an integer index variable i. its secrecy is not
`essential although it's integrity is important.
`
`V):U:
`
`40
`
`45
`
`‘
`
`21.
`
`One of skill in the authentication art would understand that the payment server
`
`of Hill et al. encrypt the generated set of tokens with user’s public key and send it to the user
`
`before the user starting any transactions with a merchant. Hill et al., col. 5, lines 40-42. The
`
`Carnet program installed on user’s computer stores the tokens. Hill Col. 5, lines 25~30 and
`
`lines 52-65; C016, lines 3-20.
`
`

`
`U.S. Patent Application No. 12/210,926
`Attorney Docket No. KAMROOZUSO
`
`22.
`
`One of skill in the authentication art would understand that the merchant stores
`
`a set of authentication tokens before starting any transaction with the user. Hill et al., col. 6,
`
`lines 46-47 and col. 13, lines 1-5.
`
`‘The mercliatit module imtlucles a.d1;ni.u.istrati.or3 furzetions.
`
`These ntaintain at count of how many unused authenlieaticm
`’[f3l{.CI‘]S remain, and send a reqllest for fUéE'll’lt2-ii‘ tokens to the
`payment service wlien. that number falls below a predeterv 5
`m:i:ter:l
`tl‘.ll'CSl‘.lOl(l.
`
`23.
`
`One of skill in the authentication art would understand that the authentication
`
`tokens of the merchant are similar to the payment tokens of the user. The tokens are issued to
`
`the merchant at the time of registration and before the merchant or the user being involved in
`
`any transaction. Hill et al., col 6, lines 25-32. The merchant and the user do not receive any
`
`tokens at the time of the transaction and the tokens stored at the user or merchant’s computer
`
`are not valid for a predefined period of time. Hill’s tokens do not serve an identification
`
`function, but rather act is a fungible financial instrument. That is, a given quantity or value of
`
`tokens is equivalent to their stated value in dollars.
`
`I affirm that all statements made herein of my own knowledge are true, and that all
`
`statements made herein on information and belief are believed to be true. I understand that
`
`willful false statements and the like are punishable by line or imprisonment, or both
`
`(18 U,S.C. 1001), and may jeopardize the validity of the present patent application or any
`
`patent issuing thereon.
`
`FURTHER AFFIANT SAYETH NOT.
`
`It witness whereof,
`
`‘
`lffhl/1"?
`(‘"0
`ll‘:
`
`ames Hewitt
`
`jg’;
`” ll;
`
`‘
`
`a
`I
`
`M
`
`<9”
`
`T
`
`g’/V
`
`-*9
`
`E
`”"~
`6;} K A
`
`Date

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket