throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
` Paper 9
` Entered: October 9, 2018
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`____________
`
`Case IPR2018-00813
`Patent 9,100,826 B2
`____________
`
`
`Before PATRICK R. SCANLON, GEORGIANNA W. BRADEN, and
`JASON W. MELVIN, Administrative Patent Judges.
`
`SCANLON, Administrative Patent Judge.
`
`
`
`DECISION
`Granting Institution of Inter Partes Review
`35 U.S.C. § 314
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`I. INTRODUCTION
`Apple, Inc. (“Petitioner”) filed a Petition (Paper 3, “Pet.”) requesting
`an inter partes review of claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26, 27,
`30, 31, and 34 of U.S. Patent No. 9,100,826 B2 (Ex. 1101, “the
`’826 patent”). Universal Secure Registry, LLC (“Patent Owner”) did not file
`a Preliminary Response. We have authority under 35 U.S.C. § 314 and
`37 C.F.R. § 42.4(a).
`To institute an inter partes review, we must determine that the
`information presented in the Petition shows “a reasonable likelihood that the
`petitioner would prevail with respect to at least 1 of the claims challenged in
`the petition.” 35 U.S.C. § 314(a). On April 24, 2018, the Supreme Court
`held that a decision to institute under 35 U.S.C. § 314 may not institute on
`less than all claims challenged in the petition. SAS Inst., Inc. v. Iancu, 138
`S. Ct. 1348, 1359–60 (2018). Upon consideration of the Petition and for the
`reasons set forth below, we conclude that the information presented in the
`Petition establishes a reasonable likelihood that Petitioner would prevail in
`challenging at least one claim of the ’826 patent. Accordingly, an inter
`partes review of all of the claims and all of the grounds presented in the
`Petition is hereby instituted.
`Our factual findings and conclusions at this stage of the proceeding
`are based on the evidentiary record developed thus far. This is not a final
`decision as to the patentability of claims for which inter partes review is
`instituted. Our final decision will be based on the record as fully developed
`during trial.
`
`
`
`
`2
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`II. BACKGROUND
`A. Related Matters
`As required by 37 C.F.R. § 42.8(b)(2), each party identifies various
`judicial or administrative matters that would affect or be affected by a
`decision in this proceeding. Pet. 2–4; Paper 7, 2 (Patent Owner’s Updated
`Mandatory Notices).
`
`B. The ’826 patent
`The ’826 patent, titled “METHOD AND APPARATUS FOR
`SECURE ACCESS PAYMENT AND IDENTIFICATION,” issued August
`4, 2015, with claims 1–35. Ex. 1101, (54), (45), 44:24–48:34. The ’826
`patent is directed to a secure database called a “Universal Secure Registry,”
`which can be used as “a universal identification system” and/or “to
`selectively provide information about a person to authorized users.” Id. at
`3:63–67. The ’826 patent states that the USR database is designed to “take
`the place of multiple conventional forms of identification.” Id. at 4:10–12.
`The ’826 patent further states that various forms of information can be
`stored in the database to verify a user’s identity and prevent fraud:
`(1) algorithmically generated codes, such as a time-varying multi-character
`code or an “uncounterfeitable token,” (2) “secret information” like a PIN or
`password, and/or (3) a user’s “biometric information,” such as fingerprints,
`voice prints, an iris or facial scan, DNA analysis, or even a photograph. See
`id. at 13:52–58, 14:5–23, 43:52–59, Fig. 3.
`The patent discloses a variety of embodiments including those in
`which a user is authenticated on a device using secret information (such a
`PIN code) and biometric information (such as a fingerprint), then the first
`device transmits information to a second device for further authentication.
`
`3
`
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`See id. at 28:52–29:7. The second device may verify the user’s information
`and return an enablement signal to the first device. Id. at 32:43–56.
`Accordingly, the ’826 patent discloses that the system can be used to
`selectively provide authorized users with access to perform transactions
`involving various types of confidential information stored in a secure
`database. See, e.g., id. at 3:63–4:3.
`C. Challenged Claims
`As noted above, Petitioner challenges claims 1, 2, 7, 8, 10, 11, 14, 15,
`21, 22, 24, 26, 27, 30, 31, and 34 of the ’826 patent. Claims 1, 10, 21, and
`30 are independent. Independent claim 1 is illustrative of the claimed
`subject matter and is reproduced below:
`1.
`A system for authenticating identities of a plurality
`of users, the system comprising:
`a first handheld device including:
`a first processor, the processor programmed to
`authenticate a user of the first handheld device based on
`authentication information and to retrieve or receive first
`biometric information of the user of the first handheld
`device; and
`a first wireless transceiver coupled to the first
`processor and programmed to transmit via a network a first
`wireless signal including first authentication information
`of the user of the first handheld device; and
`a second device including:
`a second processor;
`a second wireless transceiver coupled to the second
`processor, and
`a second memory coupled to the second processor,
`
`and
`
`
`
`
`4
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`wherein the second device is configured to retrieve or
`receive respective second authentication information for a first
`plurality of users, wherein the first plurality of users includes the
`user of the first handheld device;
`wherein the first processor is programmed to determine
`the first authentication information derived from the first
`biometric information and to transmit the first authentication
`information of the user of the first handheld device to the second
`device via the network,
`wherein the second processor is configured to:
`receive the first authentication information of the user of
`the first handheld device;
`retrieve or receive the second authentication information
`of the user of the first handheld device; and
`use the first authentication information and the second
`authentication information to authenticate an identity of the user
`of the first handheld device with the second device.
`Id. at 44:24–58.
`
`D. The Prior Art
`Petitioner’s asserted grounds of unpatentability for the challenged
`claims rely on the following references:
`June 17, 2004
`Jakobsson
`WO 2004/051585 A2
`Maritzen
`US 2004/0236632 A1 Nov. 25, 2004
`Gullman
`US 5,280,527
`Jan. 18, 1994
`Verbauwhede WO 2005/001751 A1
`Jan. 6, 2005
`
`Ex. 1104
`Ex. 1105
`Ex. 1106
`Ex. 1107
`
`Petitioner also relies on the Declaration of Dr. Victor Shoup
`(Ex. 1102).
`
`E. Asserted Grounds of Unpatentability
`Petitioner challenges claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26,
`27, 30, 31, and 34 of the ’826 patent on the following grounds:
`
`5
`
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Reference(s)
`Jakobsson
`
`Jakobsson, Verbauwhede, and
`Maritzen
`Jakobsson and Gullman
`
`
`
`Basis
`§ 102
`
`§ 103
`
`§ 103
`
`Claims Challenged
`1, 2, 10, 11, 21, 22, 24,
`27, 30, and 31
`7, 14, 26, and 34
`
`8 and 15
`
`III. ANALYSIS
`A. Level of Ordinary Skill in the Art
`Petitioner contends that a person having ordinary skill in the art to
`which the ’826 patent pertains
`would have a Bachelor’s Degree in electrical engineering,
`computer science, or a related scientific field, and
`approximately two years of work experience in the
`computer science field including, for example, operating
`systems, database management, encryption, security
`algorithms, and secure
`transaction systems,
`though
`additional education can substitute for
`less work
`experience and vice versa.
`Id. at 4–5 (citing Ex. 1102 ¶¶ 26–28). We find, based on our review of the
`record before us, that Petitioner’s stated level of ordinary skill in the art is
`reasonable because it appears consistent with the evidence at this stage of
`the proceeding, including the asserted prior art. Accordingly, for the
`purposes of this Decision, we adopt Petitioner’s definition.
`B. Claim Construction
`In an inter partes review, claim terms in an unexpired patent are given
`their broadest reasonable construction in light of the specification of the
`patent in which they appear. 37 C.F.R. § 42.100(b); see also Cuozzo Speed
`Techs., LLC v. Lee, 136 S. Ct. 2131, 2142–46 (2016) (concluding that
`
`6
`
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`37 C.F.R. § 42.100(b) “represents a reasonable exercise of the rulemaking
`authority that Congress delegated to the Patent Office”). “Under a broadest
`reasonable interpretation, words of the claim must be given their plain
`meaning, unless such meaning is inconsistent with the specification and
`prosecution history.” Trivascular, Inc. v. Samuels, 812 F.3d 1056, 1062
`(Fed. Cir. 2016).
`Petitioner proposes constructions for certain claim terms. Pet. 12–15.
`We determine that for the purposes of this Decision, however, it is
`unnecessary to expressly construe any claim term. See Nidec Motor Corp.
`v. Zhongshan Broad Ocean Motor Co. Ltd., 868 F.3d 1013, 1017 (Fed. Cir.
`2017); Vivid Techs., Inc. v. Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed.
`Cir. 1999).
`
`C. Asserted Anticipation by Jakobsson
`Petitioner contends claims 1, 2, 10, 11, 21, 22, 24, 27, 30, and 31 are
`anticipated by Jakobsson. Pet. 19–55. For reasons that follow, we
`determine that the information presented in the Petition demonstrates a
`reasonable likelihood of prevailing with respect to at least one of the
`challenged claims. We begin our analysis with the principles of law that
`generally apply to a ground based on anticipation and an overview of the
`prior art reference relied on by Petitioner, and then we address Petitioner’s
`contentions.
`
`1.
`
`Principles of Law
`“A claim is anticipated only if each and every element as set forth in
`the claim is found, either expressly or inherently described, in a single prior
`art reference.” Verdegaal Bros. Inc., v. Union Oil Co., 814 F.2d 628, 631
`
`
`
`
`7
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`(Fed. Cir. 1987). Moreover, “[b]ecause the hallmark of anticipation is prior
`invention, the prior art reference—in order to anticipate under 35 U.S.C.
`§ 102—must not only disclose all elements of the claim within the four
`corners of the document, but must also disclose those elements ‘arranged as
`in the claim.’” Net MoneyIN, Inc. v. VeriSign, Inc., 545 F.3d 1359, 1369
`(Fed. Cir. 2008). Whether a reference anticipates is assessed from the
`perspective of an ordinarily skilled artisan. See Dayco Prods., Inc. v. Total
`Containment, Inc., 329 F.3d 1358, 1368 (Fed. Cir. 2003) (“[T]he dispositive
`question regarding anticipation [i]s whether one skilled in the art would
`reasonably understand or infer from the [prior art reference’s] teaching that
`every claim element was disclosed in that single reference.”).
`
`2.
`
`Overview of Jakobsson
`Jakobsson is a published international patent application directed to an
`identity-authentication system. Ex. 1104. In certain embodiments of
`Jakobsson’s system, a user is first authenticated on a user device using a PIN
`or biometric information; the user device then sends information to a remote
`verifier including user authentication, PIN, biometric data, and a time-
`varying code, so that the remote system may verify the information and
`return a signal to the user device. Id. ¶¶ 50, 59.
`
`3.
`
`Independent Claim 1
`
`Preamble
`a)
`Petitioner contends that Jakobsson satisfies the preamble of claim 1
`because it discloses “a system for authenticating a large number of users.”
`Pet. 19–20 (citing Ex. 1102 ¶¶ 49–51; Ex. 1104 ¶¶ 29, 37, 38, 40).
`
`
`
`
`8
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Limitation 1[a]
`b)
`Claim 1 further recites “a first handheld device including: a first
`processor, the processor programmed to authenticate a user of the first
`handheld device based on authentication information.” Petitioner contends
`that Jakobsson discloses handheld user authentication device 120 (i.e., the
`claimed first handheld device) that includes a microprocessor (i.e., the
`claimed first processor). Id. at 20–21 (citing Ex. 1102 ¶ 53; Ex. 1104 ¶ 41).
`Petitioner further contends that Jakobsson discloses that the first handheld
`device is programmed to authenticate a user based on information supplied
`by the user including a PIN, a password, or biometric information (i.e., the
`claimed authentication information). Id. at 21 (citing Ex. 1102 ¶ 54; Ex.
`1104 ¶ 59).
`
`Limitation 1[b]
`c)
`Claim 1 further recites that the first processor is programmed “to
`retrieve or receive first biometric information of the user of the first
`handheld device.” Petitioner asserts that Jakobsson’s user authentication
`device 120 is configured to receive biometric information biometric
`information (i.e., the claimed first biometric information) from user 110. Id.
`at 21–22 (citing Ex. 1102 ¶ 57; Ex. 1104 ¶¶ 40, 41). Petitioner also argues
`that Jakobsson’s user authentication device 120 is configured to retrieve
`biometric information of user 110 because one of ordinary skill in the art
`“would have understood that the user authentication device must retrieve a
`stored biometric value from memory in order to conduct authentication
`based on the biometric information.” Id. at 23 (citing Ex. 1102 ¶ 58; Ex.
`1104 ¶ 59).
`
`
`
`
`9
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Limitation 1[c]
`d)
`Claim 1 further recites that the first handheld device includes “a first
`wireless transceiver coupled to the first processor and programmed to
`transmit via a network a first wireless signal including first authentication
`information of the user of the first handheld device.” Petitioner asserts that
`Jakobsson’s user authentication device 120 includes a wireless transceiver
`that corresponds to the claimed first wireless transceiver coupled to the first
`processor. Id. at 24 (citing Ex. 1102 ¶ 61; Ex. 1104 ¶ 45, Fig. 1). Dr. Shoup
`testifies that one of ordinary skill in the art “would have understood that an
`electronic device with wireless communications capability includes a
`wireless transceiver coupled to a processor.” Ex. 1102 ¶ 61. According to
`Petitioner, Jakobsson further discloses that user authentication device 120
`generates an authentication code (i.e., the claimed first wireless signal
`including first authentication information of the user of the first handheld
`device) that is transmitted through communications network 140 via
`communications channel 170 to verifier 105, and thus via a network. Pet.
`24–26 (citing Ex. 1102 ¶ 62; Ex. 1104 ¶¶ 43, 44, 48, 112).
`
`Limitation 1[d]
`e)
`Claim 1 further recites “a second device including: a second
`processor.” According to Petitioner, Jakobsson discloses verifier 105 that
`corresponds to a second device including a second processor. Id. at 26
`(citing Ex. 1102 ¶ 65; Ex. 1104 ¶ 38, Fig. 1).
`
`Limitation 1[e]
`f)
`Claim 1 further recites that the second device includes “a second
`wireless transceiver coupled to the second processor.” Petitioner contends
`
`10
`
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`that Jakobsson’s communications channel 170 is coupled to the processor of
`verifier 105 and corresponds to the claimed second wireless transceiver. Id.
`at 27 (citing Ex. 1102 ¶ 68; Ex. 1104 ¶ 48).
`
`Limitation 1[f]
`g)
`Claim 1 further recites that the second device includes “a second
`memory coupled to the second processor.” According to Petitioner,
`Jakobsson discloses that the processor of verifier 105 is coupled to memory.
`Id. at 28 (citing Ex. 1102 ¶ 73; Ex. 1104 ¶ 78).
`
`Limitation 1[g]
`h)
`Claim 1 further recites “wherein the second device is configured to
`retrieve or receive respective second authentication information for a first
`plurality of users, wherein the first plurality of users includes the user of the
`first handheld device.” First, Petitioner contends that Jakobsson discloses
`that verifier 105 is configured to retrieve or receive Authentication Code A1V
`(i.e., the claimed second authentication information) for comparison with
`Authentication Code AD (i.e., the claimed first authentication information).
`Id. at 29–31 (citing Ex. 1102 ¶ 74; Ex. 1104 ¶¶ 38, 50, 58, 118). Second,
`Petitioner contends that Jakobsson discloses that verifier 105 is configured
`to authenticate a plurality of users such that verifier 105 retrieves or receives
`respective second authentication information for a first plurality of users,
`wherein the first plurality of users includes the user of the first handheld
`device. Id. at 31 (citing Ex. 1102 ¶ 75; Ex. 1104 ¶¶ 37, 38).
`
`
`
`
`11
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Limitation 1[h]
`i)
`Claim 1 further recites “wherein the first processor is programmed to
`determine the first authentication information derived from the first
`biometric information.” Petitioner contends Jakobsson discloses that user
`authentication device 120 derives authentication code 290 (i.e., the claimed
`first authentication information) from User Data (P) (i.e., the claimed first
`biometric information). Id. at 32–33 (citing Ex. 1102 ¶ 78; Ex. 1104 ¶ 72,
`Fig. 2).
`
`Limitation 1[i]
`j)
`Claim 1 further recites that the first processor is programmed “to
`transmit the first authentication information of the user of the first handheld
`device to the second device via the network.” Petitioner contends Jakobsson
`discloses that the processor of user authentication device 120 is programmed
`to transmit authentication code 290 to verifier 105 (i.e., the claimed second
`device). Id. at 33–35 (citing Ex. 1102 ¶ 81; Ex. 1104 ¶¶ 44, 48, 118, Fig. 1).
`
`Limitation 1[j]
`k)
`Claim 1 further recites “wherein the second processor is configured
`to: receive the first authentication information of the user of the first
`handheld device.” Petitioner contends that the processor of Jakobsson’s
`verifier 105 is configured to receive an authentication code that corresponds
`to the claimed first authentication information of the user of the first
`handheld device. Id. at 35 (citing Ex. 1102 ¶ 84; Ex. 1104 ¶¶ 21, 118).
`
`
`
`
`12
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Limitation 1[k]
`l)
`Claim 1 further recites that the second processor is configured to
`“retrieve or receive the second authentication information of the user of the
`first handheld device.” Referencing the section of the Petition discussing
`limitation 1[g], Petitioner contends that Jakobsson discloses limitation 1[k].
`Id. at 36 (citing Ex. 1102 ¶ 86).
`
`Limitation 1[l]
`m)
`Claim 1 further recites that the second processor is configured to “use
`the first authentication information and the second authentication
`information to authenticate an identity of the user of the first handheld
`device with the second device.” Petitioner argues that Jakobsson discloses
`that verifier 105 is configured to compare the received Authentication Code
`AD (i.e., the claimed first authentication information) with the generated
`Authentication Code A1V (i.e., the claimed second authentication
`information) to authenticate user 110 with the verifier. Id. at 36–37 (citing
`Ex. 1102 ¶ 89; Ex. 1104 ¶¶ 50, 118).
`
`Conclusion
`n)
`After reviewing Petitioner’s arguments and the evidence cited in the
`Petition, we determine that Petitioner has demonstrated a reasonable
`likelihood of success in proving that Jakobsson anticipates claim 1. At this
`stage of the proceeding, we find persuasive Petitioner’s contentions as to
`how Jakobsson teaches each limitation in claim 1.
`
`
`
`
`13
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`4.
`
`Independent claims 10, 21, 30
`Independent claim 10 recites a computer-implemented method of
`authenticating an identity of a first entity having similar limitations as the
`system claim of claim 1. Compare Ex. 1101, 44:24–58 with id. at 45:30–47.
`For its analysis of claim 10, Petitioner refers back to its analysis of claim 1.
`Pet. 40–41.
`Independent claim 21 recites a system for authenticating identities of a
`plurality of users having similar limitations as the system claim of claim 1.
`Compare Ex. 1101, 44:24–58 with id. at 46:21–57. For most of the
`limitations recited in claim 21, Petitioner primarily relies on arguments
`discussed above with respect to claim 1. Pet. 42–47. Claim 21, however,
`recites that the second processor
`is configured to retrieve second biometric information of
`the user of the first handheld device from stored biometric
`information of the first plurality of users or receive the
`second biometric information with the second wireless
`transceiver so as to authenticate an identity of the first user
`of the first handheld device with the second device using
`the first authentication information and the second
`biometric information.
`Ex. 1101, 46:49–57. For this limitation, Petitioner contends that Jakobsson
`discloses that the processor of verifier 105 stores User Data (P), which
`includes biometric data (i.e., the claimed second biometric information) for a
`large number of users (i.e., the claimed first plurality of users) and generates
`an authentication code by using stored User Data (P) as an input to
`combination function 230, and one of ordinary skill in the art would have
`understood that User Data (P) must be retrieved from memory to facilitate
`its input to combination function 230. Pet. 44–45 (citing Ex. 1102 ¶ 131).
`
`14
`
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`Petitioner also contends Jakobsson discloses that communications
`channel 170 (i.e., the claimed second wireless transceiver) is coupled to the
`processor of verifier 105 can receive the second biometric information with
`the second wireless transceiver such that the processor receives the second
`biometric information with the transceiver. Id. at 45 (citing Ex. 1102 ¶ 132;
`Ex. 1104 ¶ 48). According to Petitioner, one of ordinary skill in the art
`would have understood that User Data (P) could be stored on a “different”
`computer, and verifier 105 could be configured to retrieve or receive the data
`from the “different” computer with communications channel 170. Id. at 46
`(citing Ex. 1102 ¶ 134).
`Like claim 10, independent claim 30 recites a method of
`authenticating an identity of a first entity having similar limitations as the
`system claim of claim 1. Compare Ex. 1101, 44:24–58 with id. at
`47:29–48:13. Petitioner relies on the arguments discussed above with
`respect to claim 1 except for two limitations. Pet. 52–55.
`The first exception is the claim 30 limitation, which Petitioner refers
`to as limitation 30[a], that recites “authenticating, with a first handheld
`device, a first user of the first handheld device based on first biometric
`information provided by the first user.” Ex. 1101, 47:31–33. Petitioner
`contends that Jakobsson discloses that authentication device 120
`authenticates user 110 based on biometric information provided by the user.
`Pet. 52–53 (citing Ex. 1102 ¶ 150; Ex. 1104 ¶ 59).
`The second exception is the claim 30 limitation, which Petitioner
`refers to as limitation 30[b], that recites “in response to authenticating the
`first user of the first handheld device, transmitting a first wireless signal
`
`
`
`
`15
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`including first authentication information of the first user derived from the
`first biometric information.” Ex. 1101, 47:34–48:2. First, Petitioner argues
`that “Jakobsson discloses a first processor configured to transmit a first
`wireless signal including first authentication information of the first user
`derived from the first biometric information,” as discussed in the sections of
`the Petition discussing limitations 1[c] and 1[h]. Pet. 53 (citing Ex. 1102
`¶ 153). Second, Petitioner argues that “Jakobsson discloses that user
`authentication device 120 transmits an authentication code in response to
`authenticating the user.” Id. at 54 (citing Ex. 1102 ¶ 154; Ex. 1104 ¶ 59).
`At this stage of the proceeding, and for purposes of this Decision, we
`adopt Petitioner’s analyses of claims 10, 21, and 30 as our own.
`
`5.
`
`Dependent Claims 2, 11, 22, 24, 27, and 31
`Because Petitioner has demonstrated a reasonable likelihood of
`success in proving that at least one claim of the ’826 patent is unpatentable,
`we institute on all grounds and all claims raised in the Petition. Therefore, at
`this stage of the proceeding, it is not necessary for us to provide an
`assessment of every ground raised by Petitioner. Nevertheless, we note that
`Petitioner provides detailed explanations supported by the testimony of Dr.
`Shoup and specific citations to Jakobsson indicating where in the reference
`the limitations of claims 2, 11, 22, 24, 27, and 31 are disclosed. Pet. 37–39,
`41–42, 47–52, 55. For purposes of this Decision, we adopt Petitioner’s
`analyses of claims 2, 11, 22, 24, 27, and 31 as our own.
`
`
`
`
`16
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`D. Asserted Obviousness based on Jakobsson,
`Verbauwhede, and Maritzen
`Petitioner contends claims 7, 14, 26, and 34 are obvious over
`Jakobsson, Verbauwhede, and Maritzen. Pet. 55–67.
`
`1.
`
`Principles of Law
`A patent claim is unpatentable under 35 U.S.C. § 103(a) if the
`differences between the claimed subject matter and the prior art are such that
`the subject matter, as a whole, would have been obvious at the time the
`invention was made to a person having ordinary skill in the art to which said
`subject matter pertains. KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398, 406
`(2007). The question of obviousness is resolved on the basis of underlying
`factual determinations including: (1) the scope and content of the prior art;
`(2) any differences between the claimed subject matter and the prior art;
`(3) the level of ordinary skill in the art; and (4) when available, secondary
`considerations, such as commercial success, long felt but unsolved needs,
`and failure of others. Graham v. John Deere Co., 383 U.S. 1, 17–18 (1966).
`We analyze this ground based on obviousness in accordance with the above-
`stated principles.1
`
`2.
`
`Discussion
`Claims 7, 14, 26, and 34 depend from claims 1, 10, 21, and 30,
`respectively. Dependent claim 7 recites “wherein the first processor is
`further configured to: compare stored authentication information with the
`
`
`1 We address the level of ordinary skill in the art in Section III.A., supra.
`The record does not include any evidence of secondary considerations at this
`point in the proceeding.
`
`
`
`17
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`authentication information of the user of the first handheld device; and
`enable or disable use of the first handheld device based on a result of the
`comparison.” Ex. 1101, 45:15–20. Dependent claims 14, 26, and 34 recite
`similar limitations. Id. at 45:60–64, 47:7–12, 48:24–28.
`Petitioner argues that Jakobsson in view of Verbauwhede and
`Maritzen discloses claim 7. Pet. 55 (citing Ex. 1102 ¶ 163). In particular,
`Petitioner contends Jakobsson discloses that user authentication device 120
`(i.e., the claimed first handheld device) is programmed to authenticate a user
`based on a PIN, password, or biometric information supplied by the user
`(i.e., the claimed authentication information of the user) and to store the
`PIN, password, or biometric information (i.e., the claimed stored
`authentication information). Id. at 55–56 (citing Ex. 1102 ¶ 164; Ex. 1104
`¶¶ 59, 110, 111). In addition, “[t]o the extent that Jakobsson does not
`expressly state that the first device compares stored authentication
`information with the authentication information of the user,” Petitioner
`argues that Verbauwhede discloses a microcontroller of thumbpod 200 (i.e.,
`the claimed first processor) configured to compare a stored fingerprint
`template (i.e., the claimed stored authentication information) with a received
`fingerprint (i.e., the claimed authentication information of the user of the
`first handheld device) to authenticate a user. Id. at 57–58 (citing Ex. 1102
`¶ 165; Ex. 1107 ¶¶ 6, 63, 86).
`Petitioner further argues that Jakobsson recognizes that access to user
`authentication device 120 can be limited or denied based on the
`authentication of a user using a PIN, passcode, or biometric information. Id.
`at 58–59 (citing Ex. 1102 ¶ 166; Ex. 1104 ¶¶ 3, 4, 5). In addition, “[t]o the
`
`
`
`
`18
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`extent that Jakobsson does not expressly disclose that the first processor is
`configured to enable or disable use of the first handheld device based on the
`result of an authentication,” Petitioner argues that Maritzen discloses CPU
`210 (i.e., the claimed first processor) configured to unlock the personal
`transaction device (PTD) and limit access to authorized users (i.e., enable or
`disable the first handheld device) based on the result of a biometric
`comparison. Id. at 59–60 (citing Ex. 1102 ¶ 167; Ex. 1105 ¶¶ 63, 65, 67,
`72).
`
`Petitioner argues that “[i]t would have been obvious to a [person
`having ordinary skill in the art] to combine Verbauwhede’s comparison-
`based authentication and Maritzen’s device unlocking function with the
`teachings of Jakobsson” because the references “are in the same field of
`endeavor, address the same issues, and have the same basic structures and
`functions.” Id. at 60–66 (citing Ex. 1102 ¶¶ 169–176).
`Petitioner’s arguments regarding claims 14, 26, and 34 refer back to
`their contentions regarding claim 7. Id. at 66–67.
`At this stage of the proceeding, and for purposes of this Decision, we
`adopt Petitioner’s analyses of claims 7, 14, 26, and 34 as our own.
`E. Asserted Obviousness based on Jakobsson and Gullman
`Petitioner contends claims 8 and 15 are obvious over Jakobsson and
`Gullman. Pet. 67–74.
`Claims 8 and 15 depend from claims 1 and 10, respectively.
`Dependent claim 8 recites “wherein the first handheld device includes a first
`memory coupled to the first processor included in the first handheld device
`
`
`
`
`19
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`and configured to store respective biometric information for a second
`plurality of users.” Ex. 1101, 45:21–25. Dependent claim 15 recites similar
`limitations. Id. at 45:65–67.
`Petitioner argues that Jakobsson in view of Gullman discloses claim 8.
`Pet. 68 (citing Ex. 1102 ¶ 184). In particular, Petitioner contends Jakobsson
`discloses that user authentication device 120 (i.e., the claimed first handheld
`device) includes an on-board memory coupled to a microprocessor (i.e., the
`claimed first memory coupled to the first processor). Id. at 68 (citing Ex.
`1102 ¶ 185; Ex. 1104 ¶ 41). Petitioner further contends Jakobsson discloses
`that user authentication device 120 is configured to store biometric
`information. Id. at 69 (citing Ex. 1102 ¶ 186; Ex. 1104 ¶ 110).
`Next, Petitioner contends that “[a]lthough Jakobsson does not
`expressly disclose that the first device is configured to store biometric
`information for a second plurality of users,” Gullman discloses that security
`apparatus 14 (i.e., the claimed first device) stores biometric templates (i.e.,
`the claimed biometric information) for multiple users. Id. (citing Ex. 1102
`¶ 187; Ex. 1106, 5:55–65).
`Petitioner argues that “[i]t would have been obvious to combine
`Gullman’s biometric storage for multiple users with Jakobsson” because the
`references “are in the same field of endeavor, address the same issues, and
`have the same basic structures and functions.” Id. at 70–74 (citing Ex. 1102
`¶¶ 189–195).
`Petitioner’s arguments regarding claim 15 refer back to their
`contentions regarding claim 8. Id. at 74.
`
`
`
`
`20
`
`

`

`IPR2018-00813
`Patent 9,100,826 B2
`
`
`
`At this stage of the proceeding, and for purposes of this Decision, we
`adopt Petitioner’s analyses of claims 7, 14, 26, and 34 as our own.
`
`
`IV. ORDER
`In consideration of the foregoing, it is hereby:
`ORDERED that, pursuant to 35 U.S.C. § 314(a), an inter partes
`review claims 1, 2, 7, 8, 10, 11, 14, 15, 21, 22, 24, 26, 27, 30, 31, and 34 of
`the ’826 patent is instituted with respect to all grounds set forth in the
`Petition; and
`FURTHER ORDERED that, pursuant to 35 U.S.C. § 314(c) and
`37 C.F.R. § 42.4(b), inter partes review of the ’826 patent shall commence
`on the entry date of this Order, a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket