throbber
Trials@uspto.gov
`571-272-7822
`
`
`
` Paper 8
` Entered: October 9, 2018
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`____________
`
`Case IPR2018-00810
`Patent 9,100,826 B2
`____________
`
`
`Before PATRICK R. SCANLON, GEORGIANNA W. BRADEN, and
`JASON W. MELVIN, Administrative Patent Judges.
`
`SCANLON, Administrative Patent Judge.
`
`
`
`DECISION
`Granting Institution of Inter Partes Review
`35 U.S.C. § 314
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`I. INTRODUCTION
`Apple, Inc. (“Petitioner”) filed a Petition (Paper 3, “Pet.”) requesting
`an inter partes review of claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26, 27,
`30, 31, and 34 of U.S. Patent No. 9,100,826 B2 (Ex. 1001, “the
`’826 patent”). Universal Secure Registry, LLC (“Patent Owner”) did not file
`a Preliminary Response. We have authority under 35 U.S.C. § 314 and
`37 C.F.R. § 42.4(a).
`To institute an inter partes review, we must determine that the
`information presented in the Petition shows “a reasonable likelihood that the
`petitioner would prevail with respect to at least 1 of the claims challenged in
`the petition.” 35 U.S.C. § 314(a). On April 24, 2018, the Supreme Court
`held that a decision to institute under 35 U.S.C. § 314 may not institute on
`less than all claims challenged in the petition. SAS Inst., Inc. v. Iancu, 138
`S. Ct. 1348, 1359–60 (2018). Upon consideration of the Petition and for the
`reasons set forth below, we conclude that the information presented in the
`Petition establishes a reasonable likelihood that Petitioner would prevail in
`challenging at least one claim of the ’826 patent. Accordingly, an inter
`partes review of all of the claims and all of the grounds presented in the
`Petition is hereby instituted.
`Our factual findings and conclusions at this stage of the proceeding
`are based on the evidentiary record developed thus far. This is not a final
`decision as to the patentability of claims for which inter partes review is
`instituted. Our final decision will be based on the record as fully developed
`during trial.
`
`
`
`
`2
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`II. BACKGROUND
`A. Related Matters
`As required by 37 C.F.R. § 42.8(b)(2), each party identifies various
`judicial or administrative matters that would affect or be affected by a
`decision in this proceeding. Pet. 2–4; Paper 7, 2 (Patent Owner’s Updated
`Mandatory Notices).
`
`B. The ’826 patent
`The ’826 patent, titled “METHOD AND APPARATUS FOR
`SECURE ACCESS PAYMENT AND IDENTIFICATION,” issued August
`4, 2015, with claims 1–35. Ex. 1001, (54), (45), 44:24–48:34. The ’826
`patent is directed to a secure database called a “Universal Secure Registry,”
`which can be used as “a universal identification system” and/or “to
`selectively provide information about a person to authorized users.” Id. at
`3:63–67. The ’826 patent states that the USR database is designed to “take
`the place of multiple conventional forms of identification.” Id. at 4:10–12.
`The ’826 patent further states that various forms of information can be
`stored in the database to verify a user’s identity and prevent fraud:
`(1) algorithmically generated codes, such as a time-varying multi-character
`code or an “uncounterfeitable token,” (2) “secret information” like a PIN or
`password, and/or (3) a user’s “biometric information,” such as fingerprints,
`voice prints, an iris or facial scan, DNA analysis, or even a photograph. See
`id. at 13:52–58, 14:5–23, 43:52–59, Fig. 3.
`The patent discloses a variety of embodiments including those in
`which a user is authenticated on a device using secret information (such a
`PIN code) and biometric information (such as a fingerprint), then the first
`device transmits information to a second device for further authentication.
`
`3
`
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`See id. at 28:52–29:7. The second device may verify the user’s information
`and return an enablement signal to the first device. Id. at 32:43–56.
`Accordingly, the ’826 patent discloses that the system can be used to
`selectively provide authorized users with access to perform transactions
`involving various types of confidential information stored in a secure
`database. See, e.g., id. at 3:63–4:3.
`C. Challenged Claims
`As noted above, Petitioner challenges claims 1, 2, 7, 8, 10, 11, 14, 15,
`21, 22, 24, 26, 27, 30, 31, and 34 of the ’826 patent. Claims 1, 10, 21, and
`30 are independent. Independent claim 1 is illustrative of the claimed
`subject matter and is reproduced below:
`1.
`A system for authenticating identities of a plurality
`of users, the system comprising:
`a first handheld device including:
`a first processor, the processor programmed to
`authenticate a user of the first handheld device based on
`authentication information and to retrieve or receive first
`biometric information of the user of the first handheld
`device; and
`a first wireless transceiver coupled to the first
`processor and programmed to transmit via a network a first
`wireless signal including first authentication information
`of the user of the first handheld device; and
`a second device including:
`a second processor;
`a second wireless transceiver coupled to the second
`processor, and
`a second memory coupled to the second processor,
`
`and
`
`
`
`
`4
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`wherein the second device is configured to retrieve or
`receive respective second authentication information for a first
`plurality of users, wherein the first plurality of users includes the
`user of the first handheld device;
`wherein the first processor is programmed to determine
`the first authentication information derived from the first
`biometric information and to transmit the first authentication
`information of the user of the first handheld device to the second
`device via the network,
`wherein the second processor is configured to:
`receive the first authentication information of the user of
`the first handheld device;
`retrieve or receive the second authentication information
`of the user of the first handheld device; and
`use the first authentication information and the second
`authentication information to authenticate an identity of the user
`of the first handheld device with the second device.
`Id. at 44:24–58.
`
`D. The Prior Art
`Petitioner’s asserted ground of unpatentability for the challenged
`claims relies on the following references:
`Maritzen
`US 2004/0236632 A1 Nov. 25, 2004
`Jakobsson
`WO 2004/051585 A2
`June 17, 2004
`Niwa
`US 6,453,301 B1
`Sept. 17, 2002
`
`Ex. 1004
`Ex. 1005
`Ex. 1007
`
`Petitioner also relies on the Declaration of Dr. Victor Shoup
`(Ex. 1002).
`
`E. Asserted Ground of Unpatentability
`Petitioner asserts that claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26,
`27, 30, 31, and 34 of the ’826 patent are unpatentable under 35 U.S.C. § 103
`over Maritzen, Jakobsson, and Niwa. Pet. 9, 18–75.
`
`5
`
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`III. ANALYSIS
`A. Level of Ordinary Skill in the Art
`Petitioner contends that a person having ordinary skill in the art to
`which the ’826 patent pertains
`would have a Bachelor’s Degree in electrical engineering,
`computer science, or a related scientific field, and
`approximately two years of work experience in the
`computer science field including, for example, operating
`systems, database management, encryption, security
`algorithms, and secure
`transaction systems,
`though
`additional education can substitute for
`less work
`experience and vice versa.
`Id. at 4–5 (citing Ex. 1002 ¶¶ 21–23). We find, based on our review of the
`record before us, that Petitioner’s stated level of ordinary skill in the art is
`reasonable because it appears consistent with the evidence at this stage of
`the proceeding, including the asserted prior art. Accordingly, for the
`purposes of this Decision, we adopt Petitioner’s definition.
`B. Claim Construction
`In an inter partes review, claim terms in an unexpired patent are given
`their broadest reasonable construction in light of the specification of the
`patent in which they appear. 37 C.F.R. § 42.100(b); see also Cuozzo Speed
`Techs., LLC v. Lee, 136 S. Ct. 2131, 2142–46 (2016) (concluding that
`37 C.F.R. § 42.100(b) “represents a reasonable exercise of the rulemaking
`authority that Congress delegated to the Patent Office”). “Under a broadest
`reasonable interpretation, words of the claim must be given their plain
`meaning, unless such meaning is inconsistent with the specification and
`prosecution history.” Trivascular, Inc. v. Samuels, 812 F.3d 1056, 1062
`(Fed. Cir. 2016).
`
`
`
`
`6
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`Petitioner proposes constructions for certain claim terms. Pet. 13–15.
`We determine that for the purposes of this Decision, however, it is
`unnecessary to expressly construe any claim term. See Nidec Motor Corp. v.
`Zhongshan Broad Ocean Motor Co. Ltd., 868 F.3d 1013, 1017 (Fed. Cir.
`2017); Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed.
`Cir. 1999).
`C. Asserted Obviousness based on Maritzen, Jakobsson, and Niwa
`Petitioner contends claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26, 27,
`30, 31, and 34 are obvious over Maritzen, Jakobsson, and Niwa. Pet. 9, 18–
`75. For reasons that follow, we determine that the information presented in
`the Petition demonstrates a reasonable likelihood of prevailing with respect
`to at least one of the challenged claims. We begin our analysis with the
`principles of law that generally apply to a ground based on obviousness and
`overviews of the prior art references relied on by Petitioner, and then we
`address Petitioner’s contentions.
`
`1.
`
`Principles of Law
`A patent claim is unpatentable under 35 U.S.C. § 103(a) if the
`differences between the claimed subject matter and the prior art are such that
`the subject matter, as a whole, would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations including: (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of ordinary skill in the art; and (4) when available, secondary
`
`
`
`
`7
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`considerations, such as commercial success, long felt but unsolved needs,
`and failure of others. Graham v. John Deere Co., 383 U.S. 1, 17–18 (1966).
`We analyze this ground based on obviousness in accordance with the above-
`stated principles.1
`
`2.
`
`Overview of Maritzen
`Maritzen is a published patent application directed to conducting a
`financial transaction, in one embodiment using communication “between a
`vehicle-accessed, payment-gateway terminal (VAPGT) and a pre-registered,
`key-enabled, personal transaction device (PTD).” Ex. 1004, Abstract. In
`one embodiment, Maritzen discloses a financial transaction system in which
`PTD 100 communicates with VAPGT 120 via communication link 150. Id.
`¶ 38, Fig. 1. In addition, VAPGT 120 communicates with clearing house
`130 via communication link 170. Id. ¶ 39, Fig. 1.
`
`3.
`
`Overview of Jakobsson
`Jakobsson is a published international patent application directed to an
`identity-authentication system. Ex. 1005. In certain embodiments of
`Jakobsson’s system, a user is first authenticated on a user device using a PIN
`or biometric information; the user device then sends information to a remote
`verifier including user authentication, PIN, biometric data, and a time-
`varying code, so that the remote system may verify the information and
`return a signal to the user device. Id. ¶¶ 50, 59.
`
`
`1 We address the level of ordinary skill in the art in Section III.A., supra.
`The record does not include any evidence of secondary considerations at this
`point in the proceeding.
`
`
`
`8
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`4.
`
`Overview of Niwa
`Niwa discloses “a method and system for authorizing a transaction
`between two parties over a network . . . when an authorization code has been
`received by an authorizing entity.” Ex. 1007, 1:8–12. The authorization
`code can be “produced by a fingerprint identification device in response to
`comparing a fingerprint of one of the parties to a stored fingerprint in the
`device.” Id. at 1:12–15.
`
`5.
`
`Independent Claim 1
`
`Preamble
`a)
`Petitioner contends that Maritzen satisfies the preamble of claim 1
`because it discloses “a system for authenticating identities of a plurality of
`users.” Pet. 18–19 (citing Ex. 1002 ¶¶ 45–47; Ex. 1004 ¶¶ 11, 38, 43, 44,
`72).
`
`Limitation 1[a]
`b)
`Claim 1 further recites “a first handheld device including: a first
`processor, the processor programmed to authenticate a user of the first
`handheld device based on authentication information.” Petitioner contends
`that Maritzen’s personal transaction device (PTD) 100 is a first handheld
`device that includes a first processor in the form of CPU 210. Id. at 20
`(citing Ex. 1002 ¶ 49; Ex. 1004 ¶ 63). Petitioner also argues that CPU 210 is
`programmed to authenticate a user of the PTD with biometric information
`(i.e., the claimed authentication information) using biometric control
`manager 330. Id. at 20–21 (citing Ex. 1002 ¶ 50; Ex. 1004 ¶¶ 38, 44, 63, 65,
`67, 72).
`
`
`
`
`9
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`Limitation 1[b]
`c)
`Claim 1 further recites that the first processor is programmed “to
`retrieve or receive first biometric information of the user of the first
`handheld device.” Petitioner asserts that the combination of Maritzen and
`Niwa discloses this limitation. Id. at 21 (citing Ex. 1002 ¶ 52). Specifically,
`Petitioner argues that Maritzen’s CPU 210 is programmed to receive
`biometric information, such as a fingerprint or thumbprint, from a user via
`biometric input 630/660 of an integrated privacy card. Id. at 22–23 (citing
`Ex. 1002 ¶ 53; Ex. 1004 ¶¶ 39, 76, 63, 88). Petitioner also argues that
`Maritzen’s CPU 210 is configured to retrieve biometric information because
`one of ordinary skill in the art “would have understood that the PTD must
`retrieve a stored biometric value from memory in order to conduct a
`validation of the biometric information.” Id. at 23 (citing Ex. 1002 ¶ 54; Ex.
`1004 ¶ 44).
`In addition, Petitioner relies on Niwa “[t]o the extent that Maritzen
`does not expressly disclose retrieving stored biometric information.” Id. at
`23–24 (citing Ex. 1002 ¶ 55; Ex. 1007, Abstract). Petitioner argues that “[i]t
`would have been obvious to apply the retrieval of stored biometric
`information, as taught by Niwa, to the teachings of Maritzen to arrive at
`limitation 1[b]” for three reasons. Id. at 24–25. First, Petitioner asserts that
`“Niwa’s teachings regarding a suitable biometric control device are part of
`the specification of Maritzen” because “Niwa . . . issued from an application
`expressly incorporated by reference in Maritzen.” Id. (citing Ex. 1002 ¶ 58;
`Ex. 1004 ¶ 43). Second, Petitioner asserts that combining Niwa with the
`teachings of Maritzen would have involved nothing more than the use of a
`
`
`
`
`10
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`known technique to improve similar devices in the same way. Id. at 25
`(citing Ex. 1002 ¶ 59). Third, Second, Petitioner asserts that combining
`Niwa with the teachings of Maritzen would have involved nothing more than
`applying a known device to a known device to yield predictable results. Id.
`(citing Ex. 1002 ¶ 60).
`
`Limitation 1[c]
`d)
`Claim 1 further recites that the first handheld device includes “a first
`wireless transceiver coupled to the first processor and programmed to
`transmit via a network a first wireless signal including first authentication
`information of the user of the first handheld device.” Petitioner asserts that
`Maritzen discloses the processor of PTD 100 (i.e., the claimed first
`processor) “is coupled to a wireless transmission link 150 and configured to
`transmit using a wireless communication standard” and one of ordinary skill
`in the art would have understood that this processor is coupled to a wireless
`transceiver to communicate wirelessly via communication link 150. Id. at
`26 (citing Ex. 1002 ¶ 63; Ex. 1004 ¶¶ 38, 40). Petitioner further asserts that
`Maritzen discloses that the PTD is configured to transmit a biometric key via
`a network, wherein the biometric key corresponds to a first wireless signal
`including first authentication information of the user. Id. at 27–28 (citing
`Ex. 1002 ¶ 64; Ex. 1004 ¶¶ 45, 46, 64).
`
`Limitation 1[d]
`e)
`Claim 1 further recites “a second device including: a second
`processor.” According to Petitioner, Maritzen discloses clearing house 130
`including programmable CPU 810 that correspond to a second device having
`
`
`
`
`11
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`a second processor. Id. at 28–29 (citing Ex. 1002 ¶ 67; Ex. 1004 ¶¶ 39, 78,
`Fig. 8).
`
`Limitation 1[e]
`f)
`Claim 1 further recites that the second device includes “a second
`wireless transceiver coupled to the second processor.” Petitioner contends
`that Maritzen’s CPU 810 is coupled to a wireless network interface, which
`corresponds to the claimed second wireless transceiver. Id. at 29–30 (citing
`Ex. 1002 ¶ 70; Ex. 1004 ¶¶ 40, 79).
`
`Limitation 1[f]
`g)
`Claim 1 further recites that the second device includes “a second
`memory coupled to the second processor.” According to Petitioner,
`Maritzen discloses non-volatile memory 840 that corresponds to the claimed
`second memory. Id. at 30–31 (citing Ex. 1002 ¶ 73; Ex. 1004 ¶ 78).
`
`Limitation 1[g]
`h)
`Claim 1 further recites “wherein the second device is configured to
`retrieve or receive respective second authentication information for a first
`plurality of users, wherein the first plurality of users includes the user of the
`first handheld device.” Petitioner contends that Maritzen in view of
`Jakobsson discloses this limitation. Id. at 31 (citing Ex. 1002 ¶ 75).
`In particular, Petitioner contends that Maritzen’s clearing house 130
`(i.e., the claimed second device) is configured to retrieve or receive a known
`pre-established biometric key 950 for a number of users that include users of
`the PTD, where biometric key 950 corresponds to the claimed second
`authentication information. Id. at 31–32 (citing Ex. 1002 ¶ 76; Ex. 1004
`
`
`
`
`12
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`¶¶ 48, 80, 85). Petitioner further contends that biometric key 950 is
`accessible to CPU 810 via clearing house bus 850 such that one of ordinary
`skill in the art would have understood the CPU could retrieve or receive
`biometric key 950 from a separate server. Id. at 33 (citing Ex. 1002 ¶ 77;
`Ex. 1004 ¶¶ 78, 80).
`Moreover, Petitioner relies on Jakobsson “[t]o the extent that Maritzen
`does not expressly disclose a second device configured to receive second
`authentication information.” Id. at 33–34 (citing Ex. 1002 ¶ 78; Ex. 1005
`¶ 38). Petitioner argues that “[i]t would have been obvious to a [person
`having ordinary skill in the art] to combine the distributed system of
`Jakobsson with the teachings of Maritzen and Niwa to arrive at limitation
`1[g].” Id. at 34 (citing Ex. 1002 ¶ 80). According to Petitioner, “it would
`have been obvious to combine Jakobsson with Maritzen and Niwa because
`they are in the same field of endeavor, address the same issues, and have the
`same basic structures and functions.” Id. at 39 (citing Ex. 1002 ¶ 85).
`
`Limitation 1[h]
`i)
`Claim 1 further recites “wherein the first processor is programmed to
`determine the first authentication information derived from the first
`biometric information.” Petitioner contends that Maritzen in view of
`Jakobsson discloses this limitation. Id. at 40 (citing Ex. 1002 ¶ 87).
`According to Petitioner, Maritzen discloses that CPU 210 (i.e., the claimed
`first processor) is programmed to determine a biometric key (i.e., the first
`authentication information). Id. (citing Ex. 1002 ¶ 88; Ex. 1004 ¶¶ 39, 44,
`63). Petitioner then argues Maritzen discloses that the biometric key is
`
`
`
`
`13
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`derived based on a validation of biometric information. Id. at 40–41 (citing
`Ex. 1002 ¶ 89; Ex. 1004 ¶ 88).
`In addition, Petitioner relies on Jakobsson “[t]o the extent that
`Maritzen does not expressly disclose that the biometric key . . . is derived
`from the first biometric information.” Id. at 41–42 (citing Ex. 1002 ¶ 90;
`Ex. 1005 ¶¶ 60, 64, 72). Petitioner argues that “[i]t would have been
`obvious to a [person having ordinary skill in the art] to combine the
`combination function of Jakobsson with the teachings of Maritzen and Niwa
`to arrive at limitation 1[h].” Id. at 42 (citing Ex. 1002 ¶ 92). According to
`Petitioner, based on the teachings of Maritzen and Jakobsson, one of
`ordinary skill in the art “would have understood that it was desirable to deter
`third party replication and to improve security by deriving authentication
`codes from biometric information and would have been motivated to look to
`similar references like Jakobsson for a solution.” Id. at 43–44 (citing Ex.
`1002 ¶ 93; Ex. 1004 ¶¶ 45; Ex. 1005 ¶¶ 5, 43, 72). Petitioner also asserts
`that combining Jakobsson’s combination function with Maritzen and Niwa
`would merely involve applying a known technique to a known device to
`yield predictable results. Id. at 44 (citing Ex. 1002 ¶ 94).
`
`Limitation 1[i]
`j)
`Claim 1 further recites that the first processor is programmed “to
`transmit the first authentication information of the user of the first handheld
`device to the second device via the network.” Petitioner contends that
`Maritzen’s CPU 210 is configured to transmit the biometric key via a
`network to clearing house 130 (i.e., the claimed second device) in a
`
`
`
`
`14
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`transaction request. Id. at 46–47 (citing Ex. 1002 ¶ 98; Ex. 1004 ¶¶ 40, 45,
`46).
`
`Limitation 1[j]
`k)
`Claim 1 further recites “wherein the second processor is configured
`to: receive the first authentication information of the user of the first
`handheld device.” Petitioner contends that Maritzen’s CPU 810 is
`configured to receive the biometric key (i.e., the claimed first authentication
`information of the user of the first handheld device) from the vehicle-
`accessed, payment-gateway terminal (VAPGT). Id. at 47 (citing Ex. 1002
`¶ 101; Ex. 1004 ¶¶ 45, 78).
`
`Limitation 1[k]
`l)
`Claim 1 further recites that the second processor is configured to
`“retrieve or receive the second authentication information of the user of the
`first handheld device.” Referencing the section of the Petition discussing
`limitation 1[g], Petitioner contends that Maritzen discloses limitation 1[k].
`Id. at 48 (citing Ex. 1002 ¶ 105).
`
`Limitation 1[l]
`m)
`Claim 1 further recites that the second processor is configured to “use
`the first authentication information and the second authentication
`information to authenticate an identity of the user of the first handheld
`device with the second device.” Petitioner argues that Maritzen discloses
`that clearing house CPU 810 is configured to compare the biometric key
`(i.e., the claimed first authentication information) with pre-established
`biometric key 950 (i.e., the second authentication information) to
`
`
`
`
`15
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`authenticate the identity of the user. Id. at 48–49 (citing Ex. 1002 ¶ 106; Ex.
`1004 ¶¶ 48–52, 54, 78, 81).
`
`Conclusion
`n)
`After reviewing Petitioner’s arguments and the evidence cited in the
`Petition, we determine that Petitioner has demonstrated a reasonable
`likelihood of success in proving that claim 1 is unpatentable over Maritzen,
`Jakobsson, and Niwa. At this stage of the proceeding, we are persuaded by
`Petitioner’s contentions that Maritzen discloses the limitations of claim 1.
`Regarding limitation 1[b], we note that Petitioner appears to rely on Niwa
`only “[t]o the extent that Maritzen does not expressly disclose retrieving
`stored biometric information.” See id. at 23. On the current record,
`however, we find persuasive Petitioner’s contention that Maritzen discloses
`that CPU 210 is configured to retrieve stored biometric information. See id.
`We also find persuasive Petitioner’s contention that Maritzen discloses that
`CPU 210 is programmed to receive biometric information (see id. at 22) and
`note that limitation 1[b] recites the first processor is programmed to retrieve
`or receive biometric information. Accordingly, we understand this ground
`to not necessarily require the teachings of Niwa to satisfy limitation 1[b]
`and, as such, are not considering the combination of Maritzen and Niwa with
`respect to this limitation for purposes of this Decision.
`Similarly, regarding limitations 1[g] and 1[h], we note that Petitioner
`appears to rely on Jakobsson only to the extent that Maritzen does not
`disclose expressly “a second device configured to receive second
`authentication information” and “that the biometric key . . . is derived from
`the first biometric information.” See id. at 33, 41. On the current record,
`
`
`
`
`16
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`however, we find persuasive Petitioner’s contentions that Maritzen discloses
`these features. See id. at 31–33, 40–41. Accordingly, we understand this
`ground to not necessarily require the teachings of Jakobsson to satisfy
`limitations 1[g] and 1[h] and, as such, are not considering the combination
`of Maritzen and Jakobsson with respect to these limitations for purposes of
`this Decision.
`
`6.
`
`Independent claims 10, 21, and 30
`Independent claim 10 recites a computer-implemented method of
`authenticating an identity of a first entity having similar limitations as the
`system claim of claim 1. Compare Ex. 1001, 44:24–58 with id. at 45:30–47.
`For its analysis of claim 10, Petitioner refers back to its analysis of claim 1.
`Pet. 56–58.
`Independent claim 21 recites a system for authenticating identities of a
`plurality of users having similar limitations as the system claim of claim 1.
`Compare Ex. 1001, 44:24–58 with id. at 46:21–57. For most of the
`limitations recited in claim 21, Petitioner relies primarily on arguments
`discussed above with respect to claim 1, with minor variations. Pet. 59–65.
`One variation is that claim 21 recites “a second memory coupled to the
`second processor and configured to store respective information for a first
`plurality of users” (Ex. 1001, 46:39–41), while claim 1 recites merely “a
`second memory coupled to the second processor.” Petitioner argues that
`Maritzen’s non-volatile memory 840 (which is coupled to CPU 810)
`corresponds to the claimed second memory, and memory 840 is “configured
`to store user account information 910, user keys 920, user certificates and
`profiles 930, historical transaction events 940, and pre-established biometric
`
`
`
`
`17
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`key 950,” which correspond to the claimed respective information for a first
`plurality of users. Pet. 60–61 (citing Ex. 1002 ¶ 158; Ex. 1004 ¶¶ 78, 80).
`Claim 21 further recites that the second processor
`is configured to retrieve second biometric information of
`the user of the first handheld device from stored biometric
`information of the first plurality of users or receive the
`second biometric information with the second wireless
`transceiver so as to authenticate an identity of the first user
`of the first handheld device with the second device using
`the first authentication information and the second
`biometric information.
`Ex. 1001, 46:49–57. Petitioner contends that Maritzen in view of Jakobsson
`discloses this limitation, which Petitioner refers to as limitation 21[i]. Pet.
`62 (citing Ex. 1002 ¶ 164).
`Specifically, Petitioner argues Maritzen discloses that CPU 810 (i.e.,
`the claimed second processor) is coupled to a wireless interface (i.e., the
`claimed second wireless transceiver) and is configured to access user
`information. Id. (citing Ex. 1002 ¶ 165). Petitioner then argues that
`Jakobsson discloses verifier 105 has a processor (i.e., the claimed second
`processor) configured to retrieve second biometric information of the user of
`the first handheld device from stored biometric information of the first
`plurality of users. Id. at 63 (citing Ex. 1002 ¶ 166). Petitioner also argues
`that the processor of verifier 105 is coupled to communications channel 170
`(i.e., the claimed second wireless transceiver) such that the processor
`receives the second biometric information with the transceiver. Id. at 63–64
`(citing Ex. 1002 ¶ 167; Ex. 1005 ¶ 48). Last, Petitioner argues that
`“Maritzen in view of Jakobsson discloses that a second processor uses
`second biometric information to authenticate an identity of the first user of
`
`
`
`
`18
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`the first handheld device with the second device using the first
`authentication information and the second biometric information.” Id. at 65
`(citing Ex. 1002 ¶ 170). Relying on the reasons to combine set forth in
`connection with limitation 1[g], Petitioner argues “[i]t would have been
`obvious to a [person having ordinary skill in the art] to combine the
`distributed system of Jakobsson with the teachings of Maritzen and Niwa to
`arrive at limitation 21[i].” Id. at 65 (citing Ex. 1002 ¶ 174).
`Like claim 10, independent claim 30 recites a method of
`authenticating an identity of a first entity having similar limitations as the
`system claim of claim 1. Compare Ex. 1001, 44:24–58 with id. at 47:29–
`48:13. For all but one of the limitations recited in claim 30, Petitioner relies
`on the arguments discussed above with respect to claim 1. Pet. 72–74.
`The exception is the claim 30 limitation, which Petitioner refers to as
`limitation 30[b], that recites “in response to authenticating the first user of
`the first handheld device, transmitting a first wireless signal including first
`authentication information of the first user derived from the first biometric
`information.” Ex. 1001, 47:34–48:2. First, Petitioner argues that “Maritzen
`in view of Jakobsson discloses a first processor configured to transmit a first
`wireless signal including first authentication information of the first user
`derived from the first biometric information.” Pet. 73 (citing Ex. 1002
`¶ 196). Second, Petitioner argues “Maritzen discloses that the PTD first
`performs a biometric authentication of the user before generating the
`biometric key” (i.e., the claimed first authentication information). Id. (citing
`Ex. 1002 ¶ 197; Ex. 1004 ¶¶ 44, 45, 67, 88).
`
`
`
`
`19
`
`

`

`IPR2018-00810
`Patent 9,100,826 B2
`
`
`
`At this stage of the proceeding, and for purposes of this Decision, we
`adopt Petitioner’s analyses of claims 10, 21, and 30 as our own.
`
`7.
`
`Dependent Claims 2, 7, 8, 11, 14, 15, 22, 24, 26, 27, 31, and 34
`Because Petitioner has demonstrated a reasonable likelihood of
`success in proving that at least one claim of the ’826 patent is unpatentable,
`we institute on all grounds and all claims raised in the Petition. Therefore, at
`this stage of the proceeding, it is not necessary for us to provide an
`assessment of every ground raised by Petitioner. Nevertheless, we note that
`Petitioner provides detailed explanations supported by the testimony of Dr.
`Shoup and specific citations to the references indicating where in the
`references the limitations of claims 2, 7, 8, 11, 14, 15, 22, 24, 26, 27, 31, and
`34 are disclosed. Pet. 49–56, 58–59, 65–72, 74–75. For purposes of this
`Decision, we adopt Petitioner’s analyses of claims 2, 7, 8, 11, 14, 15, 22, 24,
`26, 27, 31, and 34 as our own.
`
`IV. ORDER
`In consideration of the foregoing, it is hereby:
`ORDERED that, pursuant to 35 U.S.C. § 314(a), an inter partes
`review claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26, 27, 30, 31, and 34 of
`the ’826 patent is instituted with respect to all grounds set forth in the
`Petition; and
`FURTHER ORDERED that, pursuant to 35 U.S.C. § 314(c) and
`37 C.F.R. § 42.4(b), inter partes review of the ’826 patent shall commence
`on the entry date of this Order, and notice is hereby given of the institution
`of a tria

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket