throbber
Trials@uspto.gov
`Tel: 571-272-7822
`
`
`
`Paper 9
`Entered: November 7, 2018
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`____________
`
`Case IPR2018-00812
`Patent 8,856,539 B2
`____________
`
`Before PATRICK R. SCANLON, GEORGIANNA W. BRADEN, and
`JASON W. MELVIN, Administrative Patent Judges.
`
`MELVIN, Administrative Patent Judge.
`
`
`
`DECISION
`Institution of Inter Partes Review
`35 U.S.C. § 314
`
`
`
`
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`INTRODUCTION
`I.
`Petitioner, Apple Inc., filed a Petition (Paper 3, “Pet.”) requesting
`inter partes review of claims 1–3, 5–8, 16–24, 26–30, 37, and 38 (“the
`challenged claims”) of U.S. Patent No. 8,856,539 B2 (Ex. 1101, “the ’539
`patent”). Patent Owner, Universal Secure Registry, LLC, timely filed a
`Preliminary Response. Paper 8 (“Prelim. Resp.”). Pursuant to 35 U.S.C.
`§ 314 and 37 C.F.R. § 42.4(a), we have authority to determine whether to
`institute review.
`An inter partes review may not be instituted unless “the information
`presented in the petition . . . and any response . . . shows that there is a
`reasonable likelihood that the petitioner would prevail with respect to at least
`1 of the claims challenged in the petition.” 35 U.S.C. § 314(a). For the
`reasons set forth below, we conclude that Petitioner has shown a reasonable
`likelihood it will prevail in establishing the unpatentability of at least one
`challenged claim. We, therefore, institute inter partes review of the
`challenged claims of the ’539 patent in this proceeding.
`
`A. RELATED MATTERS
`As required by 37 C.F.R. § 42.8(b)(2), each party identifies various
`judicial or administrative matters that would affect or be affected by a
`decision in this proceeding. Pet. 3–4; Paper 7, 2 (Patent Owner’s Updated
`Mandatory Notices).
`
`B. THE ’539 PATENT
`The ’539 patent is titled “Universal Secure Registry” and describes “a
`universal identification system . . . used to selectively provide personal,
`financial or other information about a person to authorized users.” Ex. 1101,
`
`2
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`[54], 3:5–9. The ’539 patent discloses that secure registry system may
`include “[a] multicharacter public code . . . which the system can map to
`provide permit delivery of items, complete telephone calls and perform other
`functions for entities. The system may also be utilized to locate an individual
`based on limited biological data.” Id. at [57].
`The challenged patent describes a secure database called a “Universal
`Secure Registry,” which can be used as “a universal identification system”
`and/or “to selectively provide . . . information about a person to authorized
`users.” Id. at 3:5–9. The ’539 patent states that the USR database is designed
`to “take the place of multiple conventional forms of identification.” Id. at
`3:22–24. According to ’539 patent, “the USR system may enable the user's
`identity to be confirmed or verified without providing any identifying
`information about the person to the entity requiring identification.” Id. at
`3:25–27.
`
`C. CHALLENGED CLAIMS
`Challenged claims 1, 22, 37, and 38 are independent. Claim 1 is
`illustrative of the claimed subject matter and is reproduced below:
`1. A secure registry system for providing information to a
`provider to enable transactions between the provider and
`entities with secure data stored in the secure registry
`system, the secure registry system comprising:
`[a] a database including secure data for each entity, wherein
`each entity is associated with a time-varying
`multicharacter code for each entity having secure data in
`the secure registry system, respectively, each time-
`varying multicharacter code representing an identity of
`one of the respective entities; and
`a processor configured
`
`3
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`[b] to receive a transaction request including at least the
`time-varying multicharacter code for the entity on
`whose behalf a transaction is to be performed and an
`indication of the provider requesting the transaction,
`[c] to map the time-varying multicharacter code to the
`identity of the entity using the time-varying
`multicharacter code,
`[d] to execute a restriction mechanism to determine
`compliance with any access restrictions for the
`provider to secure data of the entity for completing
`the transaction based at least in part on the indication
`of the provider and the time-varying multicharacter
`code of the transaction request, and to allow or not
`allow access to the secure data associated with the
`entity including information required to enable the
`transaction based on the determined compliance with
`any access restrictions for the provider, the
`information including account identifying
`information,
`[e] wherein the account identifying information is not
`provided to the provider and the account identifying
`information is provided to a third party to enable or
`deny the transaction with the provider without
`providing the account identifying information to the
`provider.
`Ex. 1101, 18:29–60.1
`
`
`1 We add formatting and square-bracketed annotations to separate claim
`limitations as identified by the parties. Our formatting and annotations
`imply no functional or structural aspect of the claim beyond identifying
`limitations for discussion.
`
`4
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`D. PROPOSED GROUND OF UNPATENTABILITY
`Petitioner asserts claims 1–3, 5–8, 16–24, 26–30, 37, and 38 are
`unpatentable as obvious under 35 U.S.C. § 103(a) in view of Reber2 and
`Franklin3. Pet. 24, 63. Petitioner also relies on the Declaration of Dr. Victor
`Shoup (Ex. 1102). Pet. 6.
`
`II. DISCUSSION
`A. CLAIM CONSTRUCTION
`In an inter partes review, the Board interprets claims of an unexpired
`patent using the broadest-reasonable construction in light of the specification
`of the patent. 37 C.F.R. § 42.100(b); Cuozzo Speed Techs., LLC v. Lee,
`136 S. Ct. 2131, 2144–46 (2016). Under that standard, we generally give a
`claim term its “ordinary and customary meaning,” which is “the meaning
`that the term would have to a person of ordinary skill in the art in question”
`at the time of the invention. In re Translogic Tech., Inc., 504 F.3d 1249,
`1257 (Fed. Cir. 2007). The specification may impose a specialized meaning,
`departing from the ordinary and customary meaning, by defining a term with
`reasonable clarity, deliberateness, and precision. In re Paulsen, 30 F.3d
`1475, 1480 (Fed. Cir. 1994). Furthermore, a party may prove “the existence
`of a ‘clear and unmistakable’ disclaimer” that narrowed a term’s definition
`in the prosecution history of a challenged patent. Trivascular, Inc. v.
`Samuels, 812 F.3d 1056, 1063–64 (Fed. Cir. 2016) (quoting Elbex Video,
`Ltd. v. Sensormatic Elecs. Corp., 508 F.3d 1366, 1371 (Fed. Cir. 2007)).
`
`
`2 U.S. Patent No. 5,930,767 (filed May 28, 1997; issued July 27, 1999)
`(Ex. 1131).
`3 U.S. Patent No. 6,000,832 (filed Sept. 24, 1997; issued Dec. 14, 1999)
`(Ex. 1132).
`
`5
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`Petitioner proposes constructions for several terms in the ’539 patent:
`“provider,” “entity,” and “time-varying multicharacter code,” “indication of
`the provider,” “account identifying information,” and “secure registry.”
`Pet. 12–17. Patent Owner proposes a construction for one term: “third
`party.” Prelim. Resp. 20–22.
`The parties dispute whether “third party” may include the secure
`registry itself. Patent Owner argues that a third party is “a party that is not
`the secure registry itself, the user, or the provider.” Prelim. Resp. 51.
`Petitioner does not address the issue directly, but argues that a bank’s
`“traditional backend processing network” is a third party to the bank’s
`system for authenticating users. Pet. 40–41. Patent Owner contends that
`Petitioner’s assertion improperly treats Franklin’s bank computing center as
`both the secure registry and the third party. Prelim. Resp. 52–53.
`The term “third party” appears only in the claims, not elsewhere in the
`Specification. Patent Owner relies on the fact that the claims recite “third
`party” separately from “a secure registry,” “a provider,” and “an entity.”
`Prelim. Resp. 20–21. Patent Owner also points out that the Specification
`describes “how the secure registry accesses and then transmits the user’s
`credit card or bank account number to the credit card company (CCC) or
`bank, respectively.” Id. at 21–22 (citing Ex. 1101, 11:61–65; 12:29–31;
`13:3–7; Fig. 7 (708); Fig. 8 (808); Fig. 9 (908)).
`We agree the claim language supports that the third party must be
`different from the “provider” and “entity.” As to the secure registry itself,
`we agree further with Patent Owner that the claim language mandates that
`the “third party” cannot be the secure registry system. The claims recite that
`the secure-registry processor is configured such that “account identifying
`
`6
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`information is provided to a third party.” By using “provided,” the claim
`instructs that the secure registry must send account-identifying information
`somewhere, not simply perform an additional operation on the information.4
`Accordingly, we construe “third party” as “a party that is not the secure
`registry itself, the user, or the provider.”
`We conclude that there is no need to construe any other term to
`resolve the issues in this decision. See Nidec Motor Corp. v. Zhongshan
`Broad Ocean Motor Co. Ltd., 868 F.3d 1013, 1017 (Fed. Cir. 2017); Vivid
`Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999).
`
`B. OBVIOUSNESS OVER REBER AND FRANKLIN
`An invention is not patentable “if the differences between the subject
`matter sought to be patented and the prior art are such that the subject matter
`as a whole would have been obvious at the time the invention was made to a
`person having ordinary skill in the art to which said subject matter pertains.”
`35 U.S.C. § 103(a).5 The question of obviousness is resolved on the basis of
`underlying factual determinations including: (1) the scope and content of the
`prior art; (2) any differences between the claimed subject matter and the
`prior art; (3) the level of skill in the art; and, (4) where in evidence, so-called
`secondary considerations, including commercial success, long-felt but
`unsolved needs, and failure of others. Graham v. John Deere Co.,
`383 U.S. 1, 17−18 (1966). When evaluating a combination of teachings, we
`
`
`4 This restriction appears either as a capability of the processor (claims 1, 37,
`and 38) or as a separate step of the claimed method (claim 22)
`5 The America Invents Act included revisions to, inter alia, 35 U.S.C. § 103
`effective on March 16, 2013. Because the application resulting in the ’539
`patent was filed before March 16, 2013 (see Ex. 1101, [22]), the pre-AIA
`version of 35 U.S.C. § 103 applies.
`
`7
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`must also “determine whether there was an apparent reason to combine the
`known elements in the fashion claimed by the patent at issue.” KSR Int’l Co.
`v. Teleflex Inc., 550 U.S. 398, 418 (2007) (citing In re Kahn, 441, F.3d 977,
`988 (Fed. Cir. 2006)). Whether a combination of elements produced a
`predictable result weighs in the ultimate determination of obviousness. KSR,
`550 U.S. at 416–17.
`
`1. Petitioner’s assertions
`Petitioner asserts that claims 1–3, 5–8, 16–24, 26–30, 37, and 38 are
`obvious over Reber and Franklin. Pet. 19–71. Patent Owner raises several
`arguments against institution, which we address below. Because the
`independent claims recite a variety of limitations, some of Patent Owner’s
`arguments apply to only certain of the challenged claims. We focus our
`analysis at this stage on claim 1, addressing differences where significant.
`Petitioner relies on Reber as the primary reference, which discloses “a
`system for conducting secure financial transactions anonymously by
`utilizing proxy information representing a user.” Pet. 17. In particular, a user
`device in Reber transmits a transaction request that includes data
`representing the user and the merchant. Ex. 1131, 5:45–60. The data
`identifying the user includes both a personal identification code and a time-
`varying value. Id. at 4:14–20. Once a transaction request is transmitted to a
`remote computer, that computer may approve the transaction based on
`authenticating the user. Id. at 5:4–9, 5:16–32.
`Petitioner further relies on Franklin, which “discloses a system for
`anonymous authentication of a party to a financial transaction using a
`randomly generated ‘transaction number’ in place of a user’s personal
`account information.” Pet. 18 (citing Ex. 1132, [57]). The transaction
`
`8
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`number is used in place of a regular card number, and a merchant passes the
`transaction number to its bank, which in turn passes it to the user’s bank, the
`issuing institution. Id. at 2:35–38. The issuing institution uses information in
`the transaction number to identify the customer and generate matching
`information so it can authenticate the user and approve the transaction. Id. at
`2:51–3:6. Franklin discloses that the acquiring bank (the merchant’s bank)
`“validates the authorization request by verifying that the merchant is a valid
`merchant.” Id. at 11:43–45. It also discloses that once the issuing bank’s
`system verifies the transaction number and substitutes the customer account
`number for the transaction number, the system performing authentication
`“then submits the authorization request to the bank’s traditional processing
`system 84 for normal authorization processing.” Id. at 12:27–33.
`Petitioner submits that Reber teaches most limitations of the
`challenged claims and that a skilled artisan would have incorporated certain
`teachings from Franklin to arrive at the claimed subject matter. Pet. 19–42.
`In particular, Petitioner submits that Franklin teaches merchant validation
`and that a skilled artisan had reason to incorporate merchant validation “as
`part of the validation process performed by the processor and database . . . to
`improve the security of the Reber system,” thereby “reducing fraud by
`merchants.” Id. at 37 (citing Ex. 1102 ¶ 114).
`Additionally, Petitioner submits that a skilled artisan had reason to
`incorporate Franklin’s teaching to submit an authorization request to a
`traditional processing system for processing “to complete the transaction.”
`Id. at 40–41.
`
`9
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`We have reviewed Petitioner’s submissions and, other than as
`discussed below, determine that Petitioner has shown a reasonable
`likelihood of prevailing with unpatentability.
`
`2. Patent Owner’s arguments against institution
`a. Reason to combine
`Patent Owner argues that a skilled artisan had no reason to combine
`Franklin’s teachings with those of Reber. Prelim. Resp. 23–27. First, Patent
`Owner argues that Franklin teaches away from the combination because
`Franklin teaches seamless integration into existing merchant and banking
`systems, whereas Reber introduces a new scheme and hardware, and thus is
`not backwards compatible. Id. at 23–26. Patent Owner argues that Reber
`implements a system with anonymity by using a time-varying bar code
`whereas Franklin includes the user name in transactions. Id. at 26–27. We
`recognize that Reber’s system lacks certain advantages taught by Franklin,
`but Patent Owner has not identified aspects of Franklin that are so at odds
`with Reber so as to discourage a skilled artisan from making the asserted
`combination. See In re Gurley, 27 F.3d 551, 553 (Fed. Cir. 1994).
`Patent Owner argues also that Petitioner provides inadequate reasons
`to combine the references. Prelim. Resp. 27–37. Patent Owner’s arguments,
`however, focus on whether the references may be combined overall, not
`whether Petitioner’s arguments for combining individual features are flawed.
`For example, Patent Owner argues that Reber and Franklin address different
`problems. Id. at 28–29. But even accepting that, it does not undermine
`Petitioner’s assertions because “familiar items may have obvious uses
`beyond their primary purposes.” KSR, 550 U.S. at 420.
`
`10
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`Patent Owner further criticizes Petitioner’s reasons for using the
`references together as inadequate. Prelim. Resp. 35–37. We understand
`Petitioner’s discussion to provide a general framework for how the
`references would be used together. See Pet. 23–31. Petitioner additionally
`provides reasons for using Franklin’s individual teachings with Reber’s
`system (see id. at 36–42 (addressing limitations 1[d] and 1[e])), and we
`evaluate those as challenged (see infra at 15–17 (section II.B.2.d)).
`Accordingly, we do not agree with Patent Owner that Petitioner fails
`to provide adequate reasons that a skilled artisan would have used Franklin’s
`teachings in combination with Reber’s.
`b. Transaction request including a time-varying multicharacter code
`and an indication of the provider requesting the transaction
`Petitioner relies on Reber as disclosing the claimed transaction
`request. Pet. 33–35. Patent Owner argues that Reber fails to disclose a
`transaction request including both a “time-varying multicharacter code for
`the entity on whose behalf a transaction is to be performed and an indication
`of the provider requesting the transaction.” Prelim. Resp. 37–43. This
`argument applies to only claims 1 and 22. Id. at 37–38.
`Patent Owner’s arguments appear to be premised on the notion that
`the claims require “the secure registry receives the transaction request from
`the provider.” Prelim. Resp. 38 (emphasis added); accord id. at 42–43. But
`the plain language of the claims does not recite such a requirement, and we
`decline to read one into the claims at this stage. The claim language does not
`mandate that the provider “requesting a transaction” play any role in
`generating the transaction request or passing it to the secure registry. Instead,
`it indicates simply that the provider desires to have the transaction
`completed.
`
`11
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`Moreover, we are not persuaded at this stage that Reber’s
`“computer 20” is not a merchant. Reber discloses that, in prior systems, a
`personal identification number (PIN) serves as a proxy for a user’s credit
`card number and is submitted “to a Web-based merchant via the Internet.”
`Ex. 1131, 1:39–43. Reber purports to improve on such a system in multiple
`ways, including eliminating the need for users to remember a PIN and
`strengthening the system against interception of the PIN. Id.at 1:48–55.
`Thus, Reber discloses acquiring a user’s identifying information using a data
`reader (so the user need not remember the information) and making the PIN
`“time-varying and nonpredictable” (so interception would not permit
`ongoing unauthorized access). See id. at 3:6–19, 4:14–27. The system
`transmits the required information to “computer 20,” allowing the computer
`to “selectively approve[] or disapprove[] the transaction based upon the
`second data element” (identifying the user requesting the transaction). See
`id. at 4:63–5:9. For Reber’s computer 20 to be a merchant computer is
`consistent with Reber’s goal of improving a system where payment
`information is submitted to merchants. See id. at 1:39–43.
`We do agree with Patent Owner that Reber describes a system in
`which a transaction request is sent to a registry. See Prelim. Resp. 39. Reber
`teaches that, rather than processing a request, computer 20 may send it to
`computer 64 for authentication. Ex. 1131, 5:7–9, 5:16–24. Thus, we do not
`agree with Patent Owner’s argument that Reber does not disclose a system
`in which a merchant receives a transaction request and sends it to a registry
`for authentication.
`Patent Owner argues also that Petitioner improperly draws from two
`different embodiments of Reber by relying on the description of an
`
`12
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`alternative transaction request that includes information about the
`provider/merchant. Prelim. Resp. 40–42; see Ex. 1131, 5:45–60. Based on
`the present record, we do not view Reber’s two transaction requests as
`wholly separate embodiments. Rather, the “second preferred transaction
`method” appears to describe an alternative form of the message generated
`for a transaction that would operate just as the transaction described in the
`first embodiment.
`Accordingly, we do not agree with Patent Owner that Petitioner fails
`to show the claimed transaction request.
`c. Secure data and secure registry
`All challenged claims recite “secure data” and “secure registry.”
`Petitioner submits that a skilled artisan “would have understood that in a
`system designed to prevent fraud like Reber, the database itself would need
`to be secure.” Pet. 21. Petitioner further argues that the verification checks
`Franklin discloses “would be meaningless” without a secure database. Id.
`Patent Owner argues that the combination of Reber and Franklin fails
`to teach “secure data” or a “secure registry.” Prelim. Resp. 43–44. Patent
`Owner does not propose a construction for “secure registry” or otherwise
`argue what the claims require, other than to distinguish the security in Reber
`and Franklin as relating to transmitted, rather than stored, data. Prelim.
`Resp. 44.
`We conclude that, absent some restriction on what is required to
`secure data in the registry, the broadest-reasonable construction of the term
`encompasses financial systems such as those described by both Reber and
`Franklin. Accordingly, we do not agree with Patent Owner that Petitioner
`fails to show the claimed secure data and secure registry.
`
`13
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`d. Restriction mechanism
`Claim 1 requires the processor be configured:
`
`to execute a restriction mechanism to determine compliance
`with any access restrictions for the provider to secure data of
`the entity for completing the transaction based at least in part on
`the indication of the provider and the time-varying
`multicharacter code of the transaction request, and to allow or
`not allow access to the secure data associated with the entity
`including information required to enable the transaction based
`on the determined compliance with any access restrictions for
`the provider.
`Claims 22 and 37 recite similar limitations. See Prelim. Resp. 45. Patent
`Owner argues that Petitioner fails to show such a mechanism. Id.
`Petitioner argues that a skilled artisan would have understood the need
`for validating the provider/merchant for a transaction. Pet. 36. In light of that
`need, Petitioner argues, such a person would have looked to Franklin, which
`discloses checking to ensure the merchant is valid (thus complying with
`access restrictions). Id. at 37 (citing Ex. 1132, 11:38–47). According to
`Petitioner, skilled artisans “would have applied the known techniques of
`Franklin to improve the security of the Reber system,” and “[s]uch
`modifications would have had the predictable result of reducing fraud by
`merchants.” Id.
`Regarding Franklin’s disclosures, Patent Owner argues that “simply
`because a merchant is validated by the issuing bank of Franklin does not
`mean that access to data stored at the database is made accessible.” Prelim.
`Resp. 48. In our view, Patent Owner’s framing improperly limits the term
`“access restrictions,” which does not require that such restrictions permit
`access to data once satisfied. Patent Owner points out that the Specification
`
`14
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`discloses checking a party’s identity before permitting a transaction. Prelim.
`Resp. 46 (citing Ex. 1101, 9:1–6, 10:40–47). That disclosure appears to be
`consistent with Petitioner’s contentions regarding Franklin.
`Patent Owner argues that Franklin’s validation procedure is performed
`by the acquiring bank, not the issuing bank, and that only the issuing bank
`controls access to the data. Prelim. Resp. 48–49. Patent Owner argues
`further that Petitioner “fails to even allege a motivation to move or change
`the architecture.” Id. at 49. Petitioner asserts that a skilled artisan “would
`have found it obvious to either involve an acquiring bank that performed
`merchant validation or implement merchant validation as part of the
`validation process performed by the processor and database.” Pet. 37
`(emphasis added). As an initial matter, we do not agree that involving an
`acquiring bank that performs merchant validation would satisfy the claim
`language. In that regard, we agree with Patent Owner that the restriction
`mechanism must occur as part of the secure registry, not on another system.
`See Prelim. Resp. 48.
`Petitioner’s other assertion, however, is consistent with the record.
`Petitioner’s declarant supports the conclusion that a skilled artisan would
`have found it obvious to implement merchant validation within the processor
`and database. See Ex. 1102 ¶ 114. Although Patent Owner’s declarant opines
`that such a modification to Reber would not have been obvious (see
`Ex. 2101 ¶ 83), at this stage of the proceeding, we view conflicting
`testimonial evidence in the light most favorable to Petitioner. 37 C.F.R.
`§ 42.108(c). Petitioner and its declarant submit that a skilled artisan would
`have incorporated Franklin’s merchant validation to “improve the security of
`the Reber system” and “reduce[] fraud by merchants.” Pet. 37 (citing
`
`15
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`Ex. 1102 ¶ 114). We determine that Petitioner provides adequate reason a
`skilled artisan would have modified Reber’s system to result in the claimed
`arrangement.
`As to claims 1 and 22, Patent Owner argues that Reber and Franklin
`fail to disclose that compliance with the restriction mechanism is “based on
`the indication of the provider and the time-varying multicharacter code.”
`Prelim. Resp. 47, 49 (emphasis omitted). Petitioner’s assertions regarding
`the provider depend on combination with Franklin, as discussed above. As
`for the time-varying code, Petitioner asserts further that, in Reber, access to
`account-identifying information requires validation of the time-varying code
`(which identifies the user for a transaction), satisfying that aspect of the
`claim language. Pet. 38. Separately, Petitioner asserts that a skilled artisan
`would have incorporated Franklin’s teaching of comparing received
`information to a database to determine access to a customer account number.
`Id. at 38–39 (citing Ex. 1132, 12:1–26, 12:37–33). According to Petitioner,
`artisans would have done so “to improve the security of the transaction via a
`comparison with verified data stored in the database.” Id. at 39. We
`determine that Petitioner’s assertions are sufficient at this stage of the
`proceeding.
`As to claim 37, Patent Owner challenges whether Petitioner makes the
`required showing that the prior art teaches a processor configured “to store
`an appropriate code with each such [restricted] portion of secure data.”
`Prelim. Resp. 49. Petitioner asserts that a skilled artisan “would have known
`that such validation could be performed by storing a code in the database
`and comparing it to a received code from a merchant.” Pet. 68. Based on the
`current evidence of record, we agree with Patent Owner that, even accepting
`
`16
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`that a skilled artisan knew a particular act could be performed, Petitioner
`does not show that such a person had reason to configure the system a
`particular way. Because our institution decisions may not remove claims
`from a proceeding, however, we will address the parties’ arguments on this
`claim in our final decision. See SAS Institute Inc. v. Iancu, 138 S. Ct. 1348,
`1355–56 (2018).
`
`e. Third party
`All challenged claims require that account-identifying information be
`provided to a third party to enable or deny the transaction and not be
`provided to the provider. Petitioner submits that Reber teaches forwarding
`the transaction from computer 20 to computer 64, an arrangement that would
`easily incorporate a third party. Pet. 39–40 (citing Ex. 1131, 2:52–57, 5:17–
`23). Thus, Petitioner argues, a skilled artisan would have looked to
`Franklin’s teaching to pass the user’s account-identifying information to a
`“traditional backend processing network” (and, therefore, not to the
`merchant). Id. at 40–41 (citing Ex. 1132, 12:27–33; Ex. 1102 ¶ 122).
`Petitioner reasons that skilled artisans had reason to use Franklin’s teachings
`with Reber as claimed “to ensure that the transaction data provided to the
`merchant in Reber did not contain any account identifying information, such
`as the user’s account number,” and that doing so would “protect[] the user’s
`account information from misappropriation.” Id. at 41–42 (citing Ex. 1102
`¶ 124).
`Patent Owner argues that, in Reber, account-identifying information at
`computer 64 never leaves that computer. Prelim. Resp. 51–52. Patent
`Owner’s perspective is an accurate view of Reber’s teachings, but does not
`consider Petitioner’s assertions, which are based also on Franklin’s
`
`17
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`teachings. Patent Owner does not at this stage challenge Petitioner’s
`reasoning that a skilled artisan would have used Franklin’s teachings as
`asserted. See Prelim. Resp. 50–53.
`Patent Owner argues further that when Franklin teaches using a
`“traditional backend processing network,” “any account identifying
`information at the computing center 32 never leaves the computing center
`32.” Prelim. Resp. 52 (emphasis omitted). Patent Owner adds that the secure
`registry is neither the claimed third party nor controlled by the third party.
`Id. at 52–53 (citing Ex. 2101 ¶ 92). Yet Patent Owner’s proposed
`construction for “third party” does not require that the secure registry be
`controlled by an entity different from the claimed “third party.” See supra at
`5. We agreed with Patent Owner that the secure registry cannot be
`coextensive with the third party. And because Franklin’s “processing
`system 84” in the asserted combination performs functions of the claimed
`third party and not the claimed secure registry, we find it is consistent with
`our construction for “third party.”
`Accordingly, we do not agree with Patent Owner that Petitioner fails
`to show the claimed third party.
`
`III. CONCLUSION
`For the foregoing reasons, we determine the information presented in
`the Petition establishes a reasonable likelihood that Petitioner will prevail in
`showing claims 1, 22, and 38 unpatentable but does not establish a
`reasonable likelihood that Petitioner would prevail in showing claim 37
`unpatentable. Accordingly, we institute review of the challenged claims.
`
`18
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`
`IV. ORDER
`
`Accordingly, it is:
`ORDERED that pursuant to 35 U.S.C. § 314(a), an inter partes
`review is instituted on the unpatentability of claims 1–3, 5–8, 16–24, 26–30,
`37, and 38 of U.S. Patent No. 8,856,539 B2 under 35 U.S.C. § 103(a) in
`view of Reber and Franklin; and
`FURTHER ORDERED that no other grounds are authorized for inter
`partes review; and
`FURTHER ORDERED that pursuant to 35 U.S.C. § 314(c) and 37
`C.F.R. § 42.4, notice is hereby given of the institution of a trial.
`
`
`
`19
`
`

`

`Case IPR2018-00812
`Patent 8,856,539 B2
`
`PETITIONER:
`
`Monica Grewal
`Benjamin Fernandez
`Wilmer Cutler Pickering Hale and Dorr LLP
`monica.grewal@wilmerhale.com
`ben.fernandez@wilmerhale.com
`
`
`PATENT OWNER:
`
`James M. Glass
`Tigran Guledjian
`Christopher Mathews
`Nima Hefazi
`Richard Lowry
`Quinn Emanuel Urquhart & Sullivan LLP
`jimglass@quinnemanuel.com
`tigranguledjian@quinnemanuel.com
`chrismathews@quinnemanuel.com
`nimahefazi@quinnemanuel.com
`richardlowry@quinnemanuel.com
`
`
`20
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket