throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY, LLC,
`
`Patent Owner.
`
`_________________________________________
`
`Case IPR2018-00812
`U.S. Patent No. 8,856,539
`_________________________________________
`
`DECLARATION OF DR. VICTOR SHOUP IN SUPPORT OF
`PETITIONER’S OPPOSITION TO PATENT OWNER’S
`CONDITIONAL MOTION TO AMEND
`
`Apple 1136
`Apple v. USR
`IPR2018-00812
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`Table of Contents
`
`Page
`
`I.
`II.
`
`INTRODUCTION............................................................................... 1
`LEGAL PRINCIPLES.......................................................................... 2
`A.
`Claim Construction..................................................................... 2
`B. Obviousness............................................................................... 3
`C.
`Subject Matter Eligibility............................................................. 5
`D.
`Indefiniteness............................................................................. 6
`III. OPINIONS......................................................................................... 7
`A.
`Substitute Claims 39-47 Are Obvious Over Reber In View Of
`Franklin And Schutzer................................................................. 7
`1.
`Substitute Claims 39, 44, 46, and 47..................................... 7
`2.
`Substitute Claims 40-43 and 45 ......................................... 21
`The Substitute Claims 39-47 Are Ineligible Under 35 U.S.C. § 101. 21
`1.
`Alice Step 1: The Substitute Claims Are Directed to an
`Abstract Idea................................................................... 22
`Alice Step 2: The Remaining Limitations Of The Substitute
`Claims Add Nothing Inventive To The Abstract Idea............ 24
`Substitute Limitations 39[h], 44[b], and 47[c] Are Indefinite .......... 25
`C.
`IV. CONCLUSION................................................................................. 26
`V. AVAILABILITY FOR CROSS-EXAMINATION................................. 26
`VI. RIGHT TO SUPPLEMENT................................................................ 26
`VII. JURAT............................................................................................. 28
`
`B.
`
`2.
`
`i
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`I, Victor Shoup, Ph.D., declare as follows:
`
`I.
`
`INTRODUCTION
`
`1.
`
`I have been retained by Apple to provide opinions in this proceeding
`
`relating to Universal Secure Registry’s (“USR” or “Patent Owner”) Conditional
`
`Motion to Amend (“CMTA”) the claims of U.S. Patent No. 5,856,839 (“’539
`
`patent”). I previously prepared and submitted a Declaration in support of the
`
`Petition in this proceeding, dated April 12, 2018.
`
`2.
`
`Since preparing my previous Declaration, I have reviewed the
`
`following additional materials in connection with this Supplemental Declaration:
`
`(cid:120) The Board’s Decision on Institution (“DOI”)
`
`(cid:120) USR’s Patent Owner Preliminary Response (“POPR”)
`
`(cid:120) USR’s Patent Owner Response (“POR”)
`
`(cid:120) Dr. Jakobsson’s Declaration in Support of USR’s POPR (Ex.
`
`2101)
`
`(cid:120) Dr. Jakobsson’s Declaration in Support of USR’s POR (Ex.
`
`2108)
`
`(cid:120) USR’s CMTA
`
`(cid:120) Dr. Jakobsson’s Declaration in Support of USR’s CMTA (Ex.
`
`2107)
`
`(cid:120) The transcript of Dr. Jakobsson’s April 24, 2019, deposition
`
`1
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`
`(Ex. 1137)
`
`3. My background and qualifications are summarized in Section I of my
`
`previous Declaration and my curriculum vitae, which was attached thereto as
`
`Appendix A.
`
`4.
`
`I am being compensated at my normal consulting rate for my work.
`
`My compensation is not dependent on the outcome of this IPR proceeding or the
`
`related litigation, and does not affect the substance of my statements in this
`
`Supplemental Declaration.
`
`5.
`
`I have no financial interest in Petitioner. I have no financial interest in
`
`the ’539 patent.
`
`II.
`
`LEGAL PRINCIPLES
`
`6.
`
`I am not an attorney. For purposes of this Supplemental Declaration, I
`
`have been informed about certain aspects of the law that are relevant to my
`
`analysis and opinions.
`
`A.
`
`7.
`
`Claim Construction
`
`I have been informed that claim construction is a matter of law and
`
`that the final claim construction will be determined by the Board. I have been
`
`informed that the claim terms in an IPR review should be given their broadest
`
`reasonable construction in light of the specification as commonly understood by a
`
`person of ordinary skill in the art (“POSITA”). I have applied this standard in my
`
`2
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`
`analysis.
`
`B.
`
`8.
`
`Obviousness
`
`I have been informed and understand that a patent claim can be
`
`considered to have been obvious to a POSITA at the time the application was filed.
`
`I understand that this means that, even if all the requirements of a claim are not
`
`found in a single prior art reference, the claim is not patentable if the differences
`
`between the subject matter in the prior art and the subject matter in the claim
`
`would have been obvious to a POSITA at the time the application was filed.
`
`9.
`
`I have been informed and understand that a determination of whether
`
`a claim would have been obvious should be based upon several factors, including,
`
`among others:
`
`(cid:120) the level of ordinary skill in the art at the time the application was
`
`filed;
`
`(cid:120) the scope and content of the prior art; and
`
`(cid:120) what differences, if any, existed between the claimed invention and
`
`the prior art.
`
`10.
`
`I have been informed and understand that the teachings of two or
`
`more references may be combined in the same way as disclosed in the claims, if
`
`such a combination would have been obvious to a POSITA. In determining
`
`whether a combination based on either a single reference or multiple references
`
`3
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`would have been obvious, it is appropriate to consider, among other factors:
`
`(cid:120) whether the teachings of the prior art references disclose known
`
`concepts combined in familiar ways, and when combined, would yield
`
`predictable results;
`
`(cid:120) whether a POSITA could implement a predictable variation, and
`
`would see the benefit of doing so;
`
`(cid:120) whether the claimed elements represent one of a limited number of
`
`known design choices, and would have a reasonable expectation of
`
`success by those skilled in the art;
`
`(cid:120) whether a POSITA would have recognized a reason to combine
`
`known elements in the manner described in the claim;
`
`(cid:120) whether the proposed modification would have a reasonable
`
`expectation of success by those skilled in the art;
`
`(cid:120) whether there is some teaching or suggestion in the prior art to make
`
`the modification or combination of elements claimed in the patent;
`
`and
`
`(cid:120) whether the innovation applies a known technique that had been used
`
`to improve a similar device or method in a similar way.
`
`11.
`
`I have been informed and understand that a POSITA has ordinary
`
`creativity, and is not an automaton.
`
`4
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`I have been informed and understand that in considering obviousness,
`
`12.
`
`it is important not to determine obviousness using the benefit of hindsight derived
`
`from the patent being considered.
`
`13.
`
`I have also been informed that objective evidence can also be relevant
`
`to the question of obviousness. I understand that such evidence, which is
`
`sometimes referred to as “secondary considerations,” can include evidence of
`
`commercial success, long-felt but unsolved needs, failure of others, copying by
`
`others, and unexpected results. I also understand that when considering the
`
`strength of secondary considerations, weight is not given unless a nexus is
`
`established between the rebuttal evidence and the claimed invention. In other
`
`words, secondary considerations only carry weight when the secondary
`
`considerations are attributable to the claimed invention.
`
`C.
`
`14.
`
`Subject Matter Eligibility
`
`I have been informed that laws of nature, abstract ideas, and natural
`
`phenomena are not patent eligible.
`
`15.
`
`I have been informed that an application of an abstract idea, such as a
`
`mathematical formula, may be patent eligible if the patent claims add significantly
`
`more than routine, conventional activity to the underlying concept.
`
`16.
`
`I have been informed that an important and useful clue to patent
`
`eligibility is whether a claim is tied to a particular machine or apparatus or
`
`5
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`transforms a particular article into a different state or thing, according to the so-
`
`called machine-or-transformation test. I have been informed that the machine-or-
`
`transformation test is not the only test for patent eligibility.
`
`17.
`
`I have been informed that the Supreme Court’s decision in the Alice
`
`Corp. case in 2014 articulates a two-step framework for distinguishing patents that
`
`claim ineligible abstract ideas from those that claim eligible applications of those
`
`ideas. In step one, the court must determine whether the claims at issue are
`
`directed to a patent-ineligible abstract concept. If the claim is directed to an
`
`abstract idea, the analysis proceeds to step two. In step two, I understand that the
`
`elements of the claim must be searched, both individually and as an ordered
`
`combination, for an inventive concept—i.e., an element or combination of
`
`elements that is sufficient to ensure that the patent in practice amounts to
`
`significantly more than a patent upon the ineligible concept itself. I am informed
`
`that a patentee cannot circumvent the prohibition on patenting abstract ideas by
`
`limiting the idea to a particular technological environment, nor by adding
`
`insignificant postsolution activity, or well-understood, routine, conventional
`
`features.
`
`D.
`
`18.
`
`Indefiniteness
`
`I have been informed that a patent claims must be definite. To be
`
`definite, I understand that patent claims must particularly point out and distinctly
`
`6
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`claim the subject matter that the patentee regards as his or her invention. Definite
`
`claims definite claims clearly and precisely inform persons of ordinary skilled in
`
`the art of the boundaries of protected subject matter. I understand that determining
`
`if a claim is definite requires a determination of whether those skilled in the art
`
`would understand what is claimed when the claim is read in light of the
`
`specification.
`
`III. OPINIONS
`
`Substitute Claims 39-47 Are Obvious Over Reber In View Of
`A.
`Franklin And Schutzer.
`
`1.
`
`Substitute Claims 39, 44, 46, and 47
`
`a)
`
`Limitations 39[b], 44[a], and 47[b]
`
`19. Reber alone or in view of Franklin renders obvious substitute
`
`limitations 39[b], 44[a], and 47[b] that recite a “transaction request” or a “time-
`
`varying multicharacter code from [a/the] provider.”
`
`20. Reber discloses transaction data [transaction request] generated by
`
`the user device [entity] that is initially transmitted to the computer 20 [provider].
`
`Ex-1131, Reber, 5:16-26, 5:45-59, 6:14-29. As I explained in my prior declaration
`
`(Ex-1102, Shoup-Decl., ¶¶104-08), a POSITA would have found it obvious to
`
`configure Reber’s transaction request to include a first data element containing
`
`information about a merchant/provider [indication of the provider] and a second
`
`data element containing a time-varying code corresponding to an entity [time-
`
`7
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`varying multicharacter code]. Ex-1131, Reber, 5:17-19, 5:45-59. 1 A POSITA
`
`would have understood that Reber teaches the computer 20 [provider] may receive
`
`and subsequently transmit (via the electronic network 22) the transaction data
`
`[transaction request] to the computer 64 [secure registry]. Ex-1131, Reber,
`
`5:46-48 (“the computer 64 receives transaction data via the electronic network
`
`22”); see also id., 5:17-19. Thereafter, the computer 64 processes the received data
`
`elements (including the data element [time-varying multicharacter code]) and
`
`completes the transaction in conjunction with a third party. Id., 6:25-29 (“the
`
`computer 64 directs that an account for the first party be credited by the transaction
`
`amount, and an account for the second party be debited by the transaction
`
`amount”) (emphasis added).
`
`21.
`
`To the extent Reber alone does not render this limitation obvious, a
`
`POSITA would have looked to Franklin, which discloses that the merchant
`
`[provider] submits a request for authorization [transaction request] including a
`
`proxy transaction number [time-varying multicharacter code] to the issuing bank
`
`1 USR argues in its POR that it would not have been obvious to combine the cited
`
`portions of Reber. USR’s argument is incorrect for the reasons set forth in my
`
`prior declaration and my declaration in support of Apple’s Reply. Ex-1102,
`
`Shoup-Decl., ¶¶88-99, 109-118; Ex-1135, Shoup-Decl., ¶¶43-45.
`
`8
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`front-end [secure registry] for processing in conjunction with a third party. See
`
`Ex-1132, Franklin, 11:33-49, 12:30-32. A POSITA would have been motivated to
`
`combine the disclosures of Reber and Franklin to arrive at these claim limitations
`
`for the same reasons set forth in my prior declaration and discussed in my
`
`declaration in support of Apple’s reply brief. Ex-1102, Shoup-Decl., ¶¶88-99,
`
`104-08; Ex-1135, Shoup-Decl., ¶¶39-45.
`
`22.
`
`Accordingly, limitations 39[b], 44[a], and 47[b] are obvious over
`
`Reber in view of Franklin.
`
`b)
`
`Limitations 39[c] and 46[b]
`
`23. Reber alone or in view of Franklin renders obvious substitute
`
`limitations 39[c] and 46[b] that recite “the transaction request including a time
`
`value representative of when the time-varying multicharacter code was generated”
`
`and “extract the time value from the transaction request.”
`
`24. Both Reber and Franklin disclose the claimed transaction request as
`
`set forth above with respect to limitations 39[b], 44[a], and 47[b]. See also Ex-
`
`1102, Shoup-Decl., ¶¶104-08. Reber further discloses that the transaction data
`
`[transaction request] may contain information sufficient for either the computer
`
`20 [provider] or the computer 64 [secure registry] to generate transaction records
`
`that include, for instance, the date and time of the transaction. Ex-1131, Reber,
`
`5:33-38. A POSITA would have understood that to generate such a record, time
`
`9
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`information could either be “extracted” from the transaction data or generated at
`
`the computer 20 or computer 64. Because the time-varying second data element is
`
`generated concurrent with the time of the transaction, the second data element
`
`could include “a time value representative of when the time-varying multicharacter
`
`code was generated,” id., 3:4-8, 3:20-25, which could be “extracted” from the
`
`transaction data [transaction request] for incorporation into the record generated
`
`by the computer 20 or the computer 64. Id., 5:33-38. Therefore, Reber alone
`
`renders this limitation obvious.
`
`25.
`
`To the extent Reber alone does not render this limitation obvious, a
`
`POSITA would have looked to Franklin, which discloses the transmission of a
`
`request for authorization [transaction request] by the merchant [provider] that
`
`includes transaction-specific data, including the time and date. Ex-1132, Franklin,
`
`11:33-38. As part of processing the transaction request, Franklin discloses that
`
`“[t]he account manager 60 submits the private key, the customer-related data, and
`
`the transaction-specific data to the MAC coding and comparator unit 82,” which
`
`uses that data to generate a “test MAC” to compare to the received MAC for
`
`validation. Id., 12:11-26, see also id., 2:26-38, 5:24-39, 9:40-55, cl. 3. Because
`
`the test MAC is generated based on the same data as the received MAC, a POSITA
`
`would have understood that the time value is “extracted” from the transaction
`
`request for use by the MAC coding and comparator unit 82 to generate its own
`
`10
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`code for comparison. Without extracting a time value, the MAC coding and
`
`comparator unit 82 could not accurately generate its own MAC for comparison.
`
`26. A POSITA would have been motivated to combine Franklin’s known
`
`technique of extracting a time value from a received code with Reber’s code-based
`
`transaction system to generate a data record based on received information.
`
`Incorporating the time information into Reber’s one-time code would have
`
`increased efficiency since it would have eliminated the need to separately receive
`
`time data with the transaction. A POSITA would have had a reasonable
`
`expectation that this combination would be successful because both Reber and
`
`Franklin disclose that various types of information can be ascertained from
`
`transmitted codes for use by the receiving party. Ex-1131, Reber, 6:17-28; Ex-
`
`1132, Franklin, 7:65-8:14, Figs. 5-6; see also, Ex-1102, Shoup-Decl., ¶¶88-99,
`
`104-08.
`
`27.
`
`Accordingly, limitations 39[c] and 46[b] are obvious over Reber in
`
`view of Franklin.
`
`c)
`
`Limitations 39[e] and 44[d]
`
`28. Reber alone or in view of Franklin renders obvious proposed
`
`substitute limitations 39[e] and 44[d] that recite “validate an identity of the
`
`provider and then execute a restriction mechanism.” (emphasis added).
`
`29.
`
`In the DI, the Board found that merchant validation followed by
`
`11
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`subsequent access to data was sufficient to meet this claim limitation. DI, 14-16.
`
`That is precisely what Reber and Franklin disclose. Both references emphasize
`
`protecting account identifying information and other sensitive information
`
`(including from dishonest merchants). Ex-1131, Reber, 1:46-49, 2:29-32; Ex-
`
`1132, Franklin, 1:48-54, 11:38-47. In view of this emphasis, a POSITA would
`
`have found it obvious to use the received transaction data of Reber to ensure both
`
`that the merchant is trustworthy [validate an identity of the provider] and is
`
`entitled to access the data needed to conduct the transaction [restriction
`
`mechanism/access restrictions]. A POSITA would have understood, based on
`
`both Reber’s and Franklin’s repeated teachings to prevent unauthorized access to
`
`sensitive data (Ex-1131, Reber, 1:46-48, 2:29-31; Ex-1132, Franklin, 1:39-49) that
`
`such access should not be provided absent some determination that the merchant
`
`was entitled to access that data. Because the only data the computer 64 receives
`
`about the transaction is the transaction data (i.e., Reber’s first data element
`
`[indication of the provider] and second data element [time-varying
`
`multicharacter code]), a POSITA would have further understood that the
`
`determination of compliance could be made based on only that received transaction
`
`data. Id. A POSITA would have been motivated to combine these disclosures for
`
`the reasons set forth in my prior declaration. Ex-1102, Shoup-Decl., ¶¶112-18; see
`
`also Ex-1135, Shoup-Decl., ¶¶22-24.
`
`12
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`30. Accordingly, limitations 39[e] and 44[d] are obvious over Reber in
`
`view of Franklin.
`
`d)
`
`Limitation 39[h], 44[b], and 47[c]
`
`31. Reber in view of Franklin and European Patent Appl. No. 1,028,401
`
`to Schutzer (“Schutzer”) renders obvious substitute limitations 39[h], 44[b], and
`
`47[c] that recite “wherein the identity of the entity is verified using a biometric.”
`
`32. Although Reber and Franklin do not explicitly discuss the use of
`
`biometric authentication, Reber teaches that its user device stores a secret key that
`
`a POSITA would have understood needs to be protected from unauthorized access.
`
`Ex-1131, Reber, 7:42-48 (incorporating by reference teachings regarding time-
`
`varying codes from U.S. Patent No. 5,168,520); Ex-1138, ’520 patent, 3:31-36
`
`(describing a “stored static value” in a user device used to generate a time-varying
`
`code). Additionally, Franklin teaches the user to authenticate themselves at their
`
`device prior to conducting a transaction. For instance, Franklin teaches that prior
`
`to granting the user access to a proxy card number, the customer 22 must invoke
`
`the software module and enter a password to gain access to the secure data, which
`
`is then used to generate a proxy card number and complete the transaction. Ex-
`
`1132, Franklin, 5:24-28. A POSITA would have understood that the purpose of
`
`this authentication procedure is to ensure that an authorized user is attempting to
`
`conduct the transaction before involving any other parties. Ex-1131, Reber, 4:18-
`
`13
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`20, 4:25-27, 5:13-15; Ex-1132, Franklin, 2:22-27, 5:24-28.
`
`33.
`
`Schutzer discloses a system for performing transactions using proxy
`
`information that closely resembles both Reber and Franklin. For instance,
`
`Schutzer discloses using a time-varying, one-time “alternate card number” in place
`
`of a user’s actual credit card number in a transaction. Ex-1130, Schutzer, ¶¶11, 19.
`
`An issuing bank server authenticates the one-time card number and replaces it with
`
`the user’s actual card number; then a transaction is processed according to
`
`traditional protocols. Id., ¶19. Like Franklin, Schutzer discloses that a user must
`
`be authenticated prior to accessing software used to generate proxy card
`
`information needed to conduct a transaction. Id., ¶¶12 (“The transaction card user
`
`can authenticate . . . by entering transaction card user information at a computing
`
`device…coupled to the card issuer's server.”); 14. Schutzer explains that the
`
`“transaction card user information” used to conduct this authentication may
`
`comprise, for example, “a biometric sample.” Id., ¶13.
`
`34. Because Reber and Franklin already disclose authentication prior to
`
`accessing sensitive data, a POSITA would have found it obvious to incorporate
`
`Schutzer’s teachings of biometric authentication (either locally or remotely) into
`
`the framework of Reber. Id., ¶¶13, 14. The addition of Schutzer’s technique to
`
`Reber and Franklin would have been a simple substitution (or combination) of
`
`well-known prior art elements. For instance, if an additional layer of security was
`
`14
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`required in a particular implementation, it would have been obvious to add
`
`biometric authentication to the use of a PIN or password. Adding an off-the-shelf
`
`biometric sensor would have been trivial and would not have required large scale
`
`architectural changes, since Schutzer explains that a biometric sample could be
`
`collected using a connected input device, which even the ’539 patent admits was
`
`well known in the art prior to 2001. Id., ¶35; Ex-1101, ’539 patent, 4:4-12, 6:34-
`
`40; Ex-1137, Jakobsson-Dep., 307:18-20, 322:5-12. A POSITA would have had a
`
`reasonable expectation that the modification would be successful in improving the
`
`security protocol at least because Schutzer describes its approach as effective and
`
`because existing biometric scanners could already be used successfully in
`
`authentication frameworks. Id.; Ex-1130, Schutzer, ¶¶8-10, 13-14. Likewise, if
`
`conducting biometric authentication was more convenient in a particular setting, it
`
`would have been obvious to substitute biometric authentication for another
`
`method. Substituting biometric information for the PIN or passcode-based
`
`authentication procedures described in Reber and Franklin would have had the
`
`predictable result of, where necessary, enhancing or adapting the security protocol
`
`for transactions using proxy information. Id.
`
`35. Accordingly, limitations 39[h], 44[b], and 47[c] are obvious over
`
`Reber in view of Franklin.
`
`e)
`
`Limitations 44[f] and 47[g]
`
`15
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`36. Both Reber and Franklin render obvious substitute limitations 44[f]
`
`and 37[g] that recite “the third party being a different entity from the secure
`
`registry.”
`
`37. As discussed in my prior declaration, Reber and Franklin both
`
`describe systems wherein an entity and a provider conduct a transaction using a
`
`time-varying multicharacter code that is validated at a secure registry. Ex-1102,
`
`Shoup-Decl., ¶¶100-03, 119-25. The secure registry then directs a third party
`
`(such as an issuing bank) to credit and debit specific financial accounts. For
`
`instance, Reber explains that once “[t]he computer 64 authenticates the second data
`
`element,” the computer 64 may “direct[] that an account for the first party be
`
`credited by the transaction amount, and an account for the second party be debited
`
`by the transaction amount.” Ex-1131, Reber, 6:17-28. Because Reber does not
`
`specify what party is “directed” by the computer 64, a POSITA would have
`
`understood that the computer 64 would “direct” a third party, such as an issuing
`
`institution. This conclusion is consistent with Reber’s disclosure, since a party
`
`typically “directs” another to perform an action. Moreover, as a practical matter, a
`
`single party (such as the computer 64) is often not in control of both the account
`
`being debited and the account being credited.
`
`38.
`
`Franklin likewise discloses a system involving a third-party backend.
`
`Specifically, Franklin discloses an issuing bank 26 that receives an external
`
`16
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`transaction number from the merchant as a proxy for a user’s actual credit card
`
`account number. Ex-1132, Franklin, 2:46-60, 5:59-65. Franklin further discloses
`
`that the issuing bank determines that the received number is a proxy, substitutes
`
`the user’s actual credit card information, and then processes the transaction using
`
`its existing processing system. Id., 2:61-3:6, 5:65-6:12. Although the issuing bank
`
`26 is depicted in the Figures as a single entity, Franklin is explicit that the issuing
`
`bank is not limited to a single system controlled by a single party. For instance,
`
`Franklin explains that although the issuing bank 26 is “labeled as a ‘bank’, the
`
`issuing bank 26 may represent other types of card-issuing institutions….” Id., 4:3-
`
`5. Franklin further teaches “that other participants may be involved in some
`
`phases of the transaction, such as an intermediary settlement institution, but these
`
`participants are not shown.” Id., 4:7-9. In addition, Franklin states that “[t]he bank
`
`26 has a computing center 32 … [that] may be implemented in other forms, such as
`
`a minicomputer, a PC server, a networked set of computers, and the like.” Id.,
`
`4:16-20.
`
`39.
`
`In view of these disclosures, to the extent that Reber itself does not
`
`expressly teach that a third party separate from the computer 64 [secure registry]
`
`could complete the transaction, Franklin teaches that one front-end party of bank
`
`computing center 32 (comprising elements 60, 62, 80, and 82) could receive and
`
`process proxy information (such as a Reber’s second data element or Franklin’s
`
`17
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`external card number) before passing the actual account number on to a bank
`
`processing system 84 controlled by a different party on a remote networked
`
`computer. Ex-1132, Franklin, 11:39-40 (“The FIG. 7 illustration is simplified for
`
`discussion purposes, as other participants will most likely be involved.”)
`
`(emphasis added); see also id., 11:39-12:43. Thus, because Reber in view of
`
`Franklin discloses conducting transactions involving an entity, provider, secure
`
`registry, and a separate third party, a POSITA would have found this limitation
`
`obvious. A POSITA would have been motivated to combine these disclosures and
`
`would have had a reasonable expectation of success for the reasons set forth in my
`
`prior declaration. Ex-1102, Shoup-Decl., ¶¶88-99, 119-25.
`
`40. Accordingly, limitations 44[f] and 47[g] are obvious over Reber in
`
`view of Franklin.
`
`f)
`
`Limitation 47[f] and 47[g]
`
`41. Reber in view of Franklin and Schutzer renders obvious proposed
`
`substitute limitations 47[f] and 47[g] that recite a “processor configured to ...
`
`access from the database … information including account identifying information
`
`that includes a public ID code that identifies a financial account number associated
`
`with the entity” and “use[] the public ID code to obtain the financial account
`
`number associated with the entity.”
`
`42. As discussed above, Reber in view of Franklin discloses a system
`
`18
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`wherein the computer 64 [secure registry] receives a one-time code that is used to
`
`approve a transaction. Supra, Section III(A)(1)(a). Once the one-time code is
`
`validated, the secure registry can “direct” a third party to credit and debit accounts
`
`associated with a financial transaction. Id. Because the direction to credit or debit
`
`a particular account is passed to a third party, a POSITA would have understood
`
`that the identifying information, such as an account number, must be transmitted
`
`over a network connection, such as Reber’s electronic network 22. See Ex-1131,
`
`Reber, 5:28-30. In Reber and Franklin, the account number that is passed to the
`
`third party is the user’s actual account number. Id., 6:25-28; Ex-1132, Franklin,
`
`12:27-33.
`
`43. As explained above, supra III(A)(1)(d), Schutzer teaches an “alternate
`
`account number” [Public ID Code] that is used in place of a user’s actual credit
`
`card number in order to protect sensitive data during transmission (including
`
`transmissions over encrypted payment networks). Ex-1130, Schutzer ¶¶3, 11, 27
`
`(“At S6, the merchant (acquiring) bank’s server 18 receives the request for
`
`authorization and sends the request with the alternate card number over the card
`
`association network 20 to the card issuer’s server 14.”) (emphasis added), 30-31,
`
`Figs. 3-4.
`
`
`
`44. A POSITA would have found it obvious to use a public ID Code, such
`
`as Schutzer’s alternate card number, which is associated with the user’s actual
`
`19
`
`

`

`U.S. Patent No. 8,856,539
`Declaration of Dr. Shoup in Support of Petitioner’s Opposition
`to Patent Owner’s Conditional Motion to Amend
`account number when the computer 64 [secure registry] of Reber directs the third
`
`party to credit or debit user accounts [account identifying information that
`
`includes a public ID code that identifies a financial account number associated
`
`with the entity]. Upon receipt, a POSITA would have found it obvious for the
`
`third party to match the public ID code to the user’s actua

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket