throbber
Paper 12
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`________________
`
`VISA INC. and VISA U.S.A. INC.,
`Petitioners,
`
`v.
`
`UNIVERSAL SECURE REGISTRY LLC,
`Patent Owner
`________________
`
`Case IPR2018-01350
`U.S. Patent No. 8,856,539
`________________
`
`PATENT OWNER’S RESPONSE
`PURSUANT TO 37 C.F.R. § 42.120
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Page
`
`I.
`
`II.
`
`OVERVIEW OF THE ’539 PATENT ............................................................ 3
`A.
`The ’539 Patent Specification ............................................................... 3
`B.
`The ’539 Patent Claims ......................................................................... 8
`C.
`Prosecution History of the ’539 Patent ................................................. 8
`OVERVIEW OF THE CITED ART ............................................................... 9
`A.
`Brener (Ex-1005) ................................................................................... 9
`B. Weiss (Ex-1006) .................................................................................. 10
`C.
`Desai (Ex-1007) .................................................................................. 11
`III. LEVEL OF ORDINARY SKILL IN THE ART ........................................... 11
`IV. CLAIM CONSTRUCTION .......................................................................... 12
`A.
`“Entity” ................................................................................................ 13
`B.
`“Based at least in part on the indication of the provider and the
`time-varying multicharacter code of the transaction request” ............ 13
`“Third party” ....................................................................................... 16
`C.
`“The Provider Requesting The Transaction” (Claims 1 and 22) ........ 18
`D.
`STANDARD OF REVIEW ........................................................................... 21
`V.
`VI. THE PETITION FAILS TO PROVE BRENER IN VIEW OF WEISS
`AND DESAI RENDERS THE CHALLENGED CLAIMS OBVIOUS ....... 22
`A.
`The Petition Has Failed To Prove Brener Discloses Limitation
`1.6 ........................................................................................................ 22
`A Person of Ordinary Skill in the Art Would Not Combine
`Brener and Weiss to Obtain a Time-varying Multicharacter
`Code ..................................................................................................... 25
`1.
`Petitioner’s Proposed Modification to Brener’s PKI-
`based Authentication Scheme Renders the Combination
`Unsatisfactory for Its Intended Purpose and/or Changes
`Brener’s Principle of Operation ................................................ 27
`Time-Varying Public-Private Key Pairs Would Render
`Brener’s Intended Purpose of Recognizing Returning
`Customers Inoperable. .............................................................. 38
`
`B.
`
`2.
`
`
`
`i
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`C.
`
`3. Whether Brener’s customer object could have been made
`time-varying through a smart card or at the user’s
`computer is irrelevant. .............................................................. 40
`A Person of Ordinary Skill in the Art Would Not Combine
`Brener and Desai to Obtain “Access Restrictions” (Limitation
`1.4) ....................................................................................................... 42
`1.
`Petitioner’s Proposed Combination is Based on Features
`of Brener and Desai that Both Teach Away or Contradict
`the Invention as Claimed .......................................................... 43
`A Person of Ordinary Skill in the Art at the Time of the
`Invention Would Not Have Had a Reasonable
`Expectation of Success of Implementing Desai’s
`Information Exchange System into Brener’s Anonymous
`Transaction System ................................................................... 46
`Petitioner Fails to Show Claims 3 and 24 are Obvious ....................... 49
`D.
`VII. STRONG EVIDENCE OF SECONDARY CONSIDERATIONS OF
`NON-OBVIOUSNESS .................................................................................. 51
`A.
`Long-felt Need and Failure of Others ................................................. 51
`B.
`Commercial Success............................................................................ 55
`VIII. CONCLUSION .............................................................................................. 57
`
`
`
`2.
`
`
`
`
`
`ii
`
`

`

`TABLE OF AUTHORITIES
`
`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Page
`
`CASES
`
`Apple Inc. v. Int'l Trade Comm’n,
` 725 F.3d 1356 (Fed. Cir. 2013) ....................................................................51
`
`Apple Inc. v. Samsung Elecs. Co. Ltd.,
` 816 F.3d 788 (Fed. Cir. 2016) ......................................................................51
`
`Cuozzo Speed Techs., LLC v. Lee,
` 136 S. Ct. 2131 (2016) ..................................................................................12
`
`DyStar Textilfarben GmbH & Co. Deutschland KG v. C.H. Patrick Co.,
` 464 F.3d 1356 (Fed. Cir. 2006) ............................................................. 45, 46
`
`Guinn v. Kopf,
` 96 F.3d 1419 (Fed. Cir. 1996) ........................................................................ 1
`
`Cyclobenzaprine Hydrochloride Extended-Release Capsule Patent Litig.,
` 676 F.3d 1080 (Fed. Cir. 2012) ....................................................................50
`
`Heidelberger Druckmaschinen AG v. Hantscho Commercial Prods., Inc.,
` 21 F.3d 1068 (Fed. Cir. 1994) ......................................................................51
`
`In re Gordon,
` 733 F.2d 900 (Fed. Cir. 1984) ......................................................................27
`
`In re Ratti,
` 270 F.2d 810 (CCPA 1959) ..........................................................................27
`
`In re Stepan Co.,
` 868 F.3d 1342 (Fed. Cir. 2017) ............................................................. 36, 46
`
`Innogenetics, N.V. v. Abbott Labs.,
` 512 F.3d 1374 (Fed. Cir. 2008) ....................................................................40
`
`Intelligent Bio-Sys., Inc. v. Illumina Cambridge Ltd.,
` 821 F.3d 1359 (Fed. Cir. 2016) ............................................................. 36, 46
`
`Kinetic Concepts, Inc. v. Smith & Nephew, Inc.,
` 688 F.3d 1342 (Fed. Cir. 2012) ....................................................................40
`
`KSR Int’l Co. v. Teleflex Inc.,
` 550 U.S. 398 (2007)......................................................................................40
`
`Merck & Co., Inc. v. Teva Pharm. USA, Inc.,
` 395 F.3d 1364 (Fed. Cir. 2005) ....................................................................17
`
`
`
`iii
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Phillips v. AWH Corp.,
` 415 F.3d 1303 (Fed. Cir. 2005) ...................................................................... 1
`
`Plas-Plak Industries, Inc. v. Sulzer Mixpac AG,
` 600 Fed. Appx. 755 (Fed. Cir. 2015) ...........................................................27
`
`Samsung Elecs. Co., Ltd. v. Infobridge Pte. Ltd.,
` IPR2017-00100 (Paper 30) (PTAB Apr. 23, 2018) ......................................21
`
`Stratoflex, Inc. v. Aeroquip Corp.,
` 713 F.3d 1538 (Fed. Cir. 1983) ....................................................................51
`
`Trivascular, Inc. v. Samuels,
` 812 F.3d 1056 (Fed. Cir. 2016) ....................................................................21
`
`
`
`
`STATUTORY AUTHORITIES
`
`35 U.S.C. § 253 .......................................................................................................... 1
`
`35 U.S.C. § 314(a) ..................................................................................................... 1
`
`35 U.S.C. § 316(e) ..................................................................................................... 1
`
`
`
`37 C.F.R. § 42.100(b) ..............................................................................................12
`
`RULES AND REGULATIONS
`
`
`
`
`
`
`
`
`
`
`iv
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Exhibit #
`Ex-2001
`
`Ex-2002
`
`Ex-2003
`Ex-2004
`
`Ex-2005
`
`Ex-2006
`
`Ex-2007
`
`Ex-2008
`Ex-2009
`Ex-2010
`
`EXHIBIT TABLE
`
`
`
`Description
`Declaration of Dr. Markus Jakobsson in Support of Patent
`Owner’s Preliminary Response .
`
`Curriculum Vitae of Dr. Markus Jakobsson.
`
`Terminal Disclaimer Dated August 17, 2018.
`Declaration of Dr. Markus Jakobsson in Support of Patent
`Owner’s Response.
`Transcript of Dr. J. Douglas Tygar Deposition Dated April
`19, 2019.
`N. Asokan, et. al, The State of the Art in Electronic Payment
`Systems, IEEE Computer, Vol. 30, No. 9, pp. 28-35 (IEEE
`Computer Society Press, Sept. 1997)
`M. Baddeley, Using E-Cash in the New Economy: An
`Economic Analysis of Micropayment Systems, J. Electronic
`Commerce Research, Vol. 5, No. 4, pp. 239-253 (Nov. 2004)
`U.S. Application No. 11/768,729.
`U.S. Application No. 09/710,703.
`Declaration of Dr. Markus Jakobsson in Support of Motion
`to Amend.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`v
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`VISA, Inc. and VISA U.S.A. Inc.’s Petition (Paper 2, “Petition” or “Pet.”)
`
`proffers one invalidity ground for U.S. Patent No. 8,856,539 (“’539 patent”) (Ex-
`
`1001): Claims 1-9, 16-31, 37, and 38 are allegedly obvious over WO 00/14648
`
`(“Brener”) (Ex-1005) in view of U.S. Patent No. 4,885,778 (“Weiss”) (Ex-1006)
`
`and U.S. Patent No. 6,820,204 B1 (“Desai”) (Ex-1007). On February 11, 2019, the
`
`Board instituted review (Paper 7, “Inst. Dec.”). Patent Owner Universal Secure
`
`Registry, L.L.C. (“PO”) timely submits this Response.1
`
`Petitioner has not met its “burden of proving a proposition of unpatentability
`
`by a preponderance of the evidence.” 35 U.S.C. § 316(e). The Petition should be
`
`denied for many reasons.
`
`First, Petitioner fails to show Brener discloses that account identifying
`
`information is not provided to a provider and that such information is instead
`
`provided from a secure registry to a third party to enable or deny a transaction.
`
`
`1 On August 17, 2018, PO disclaimed claims 5-8, 17-20, and 26-30. Ex-
`
`2003. Accordingly, these claims did not exist at the time of institution and are not
`
`addressed herein. See Guinn v. Kopf, 96 F.3d 1419, 1422 (Fed. Cir. 1996) (“A
`
`statutory disclaimer under 35 U.S.C. § 253 has the effect of canceling the claims
`
`from the patent and the patent is viewed as though the disclaimed claims had never
`
`existed in the patent.”).
`
`
`
`1
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Instead, the cited sections of Brener relied upon at best show that the merchant
`
`provider—not the secure registry—sends account identifying information to an
`
`alleged third party (e.g., bank computer).
`
`Second, Petitioner’s attempt to add Weiss’ non-predictable code into Brener
`
`by modifying Brener’s private key authorization code to be time-varying renders
`
`the combination unsatisfactory for Brener’s intended purpose. Specifically, as
`
`admitted by Petitioner’s expert, Brener’s private key authorization code is a digital
`
`certificate issued by a certificate authority. Causing such a certificate to vary in
`
`time would wreak havoc on Brener’s public key cryptographic scheme for
`
`numerous reasons and ultimately render the result unworkable.
`
`Third, varying Brener’s customer object over time would also defeat a key
`
`objective of Brener to allow vendors to recognize returning customers. Fourth,
`
`Petitioner’s proposed combination of Brener and Desai to achieve the claimed
`
`“access restrictions” overlooks key aspects of Desai’s inner-workings that when
`
`incorporated into Brener would destroy any reasonable expectation of success.
`
`Fifth, Petitioner fails to show that dependent claims 3 and 24 are obvious because
`
`Brener does not teach or disclose that its customer object (alleged time-varying
`
`multicharacter code) is encrypted and decrypted.
`
`For each of these reasons, and others described below, PO respectfully
`
`requests that the Board deny the Petition.
`
`
`
`2
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`I.
`
`OVERVIEW OF THE ’539 PATENT
`
`A. The ’539 Patent Specification
`
`The ’539 patent provides a unique and highly secure anonymous
`
`identification system that uses a time-varying multicharacter code for both
`
`verifying the identity of an entity and enabling transactions between the entity and
`
`a provider without requiring the entity to share personal or otherwise sensitive
`
`information with the provider. See Ex-1001, ’539 patent, 2:64-3:1, 3:24-27, 12:19-
`
`54; Ex-2004, Decl. of Dr. Markus Jakobsson (“Jakobsson”), ¶25. As one example,
`
`the system, referred to as a Universal Secure Registry (USR) system, allows a
`
`person to purchase goods from a brick and mortar or online merchant without
`
`publicly providing credit card information to the merchant for fear that the credit
`
`card information may be stolen or used fraudulently. See Ex-1001, ’539 patent,
`
`3:44-54; Ex-2004, Jakobsson, ¶25.
`
`FIG. 1 depicts one embodiment of the USR system:
`
`
`
`3
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`
`
`The USR system’s main unit 12, which may be connected to a wide area network,
`
`includes a database 24 that stores data entries 30 related to different people or
`
`entities. Ex-1001, ’539 patent, 7:11-13; 7:40-41; Ex-2004, Jakobsson, ¶26. Each
`
`entry 30 may contain different types of information such as, but not limited to,
`
`validation information, access information, publicly available information, address
`
`information, credit card information, medical information, job application
`
`
`
`4
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`information, and/or tax information. Ex-1001, ’539 patent, 7:57-63; Ex-2004,
`
`Jakobsson, ¶26. “The validation information [32] is information about the user of
`
`the database to whom the data pertains and is to be used by the USR software 18 to
`
`validate that the person attempting to access the information is the person to whom
`
`the data pertains or is otherwise authorized to receive it.” Ex-1001, ’539 patent,
`
`8:10-14; Ex-2004, Jakobsson. ¶26. In particular, the validation information 32
`
`contains information that enables the USR software 18 to validate a person that has
`
`presented the system with a one-time nonpredictable code uniquely associated with
`
`the user. See Ex-1001, ’539 patent, 8:17-35; Ex-2004, Jakobsson, ¶26. The access
`
`information 34 allows “different levels of security to attach to different types of
`
`information stored in the entry 30” so that the user can specify which particular
`
`individuals or companies can have access to what specific data such as credit card
`
`numbers, medical information, and tax information. See Ex-1001, ’539 patent,
`
`8:62-9:11; Ex-2004, Jakobsson, ¶26. As such, the USR system may execute a
`
`restriction mechanism to determine compliance with any access restrictions for the
`
`provider to secure data of the user.
`
`FIG. 8 depicts an embodiment of using the USR system “to purchase goods
`
`or services from a merchant without revealing to the merchant account information
`
`relating to the person’s bank or credit card.” Ex-1001, ’539 patent, 9:46-50; Ex-
`
`2004, Jakobsson, ¶27.
`
`
`
`5
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`A user desiring to make a purchase at a merchant without providing their financial
`
`information, such as a credit or debit card number, may enter a secret code into
`
`their electronic ID device (any type of electronic device that may be used to obtain
`
`
`
`
`
`6
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`access to the USR database (Ex-1001, ’539 patent, 8:45-47)), which generates a
`
`one-time nonpredictable code that is provided to the merchant. Id., 12:21-24; Ex-
`
`2004, Jakobsson, ¶27. The merchant in turn may transmit the one-time
`
`nonpredictable code, a store number, and a purchase amount to the USR. Ex-1001,
`
`’539 patent, 12:24-26; Ex-2004, Jakobsson, ¶27. The USR may then determine
`
`whether the code received is valid, and if valid, accesses from the USR database
`
`the user’s actual credit card information. Ex-1001, ’539 patent, 12:27-29; Ex-
`
`2004, Jakobsson, ¶27. The USR next transmits to the credit card company the
`
`credit card number, the store number, and the purchase amount. Ex-1001, ’539
`
`patent, 12:29-31; Ex-2004, Jakobsson. ¶27. The credit card company then
`
`processes the transaction, such as by checking the credit worthiness of the person,
`
`and either declines the card or debits the user’s account and transfers money to the
`
`merchant’s account. Ex-1001, ’539 patent, 12:40-43; Ex-2004, Jakobsson, ¶27.
`
`The credit card company notifies the USR the transaction result and the USR may
`
`in turn notify the merchant. Ex-1001, ’539 patent, 12:43-46; Ex-2004, Jakobsson,
`
`¶27.
`
`Hence, the USR system provides a secure anonymous identification system
`
`that uses a time-varying multicharacter code for both verifying the identity of an
`
`entity and also enabling transactions between the entity and a provider, such as a
`
`merchant, without requiring the entity to share personal or otherwise sensitive
`
`
`
`7
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`information with the provider. Ex-2004, Jakobsson, ¶28. In one case, this allows a
`
`user to purchase goods or services from a merchant without providing the
`
`merchant the user’s credit card number. Id. Advantageously, the USR system also
`
`allows such secure transactions to be transparent to the credit card company and
`
`thus requires no or minimal cooperation from the credit card company to
`
`implement. Id.
`
`B.
`
`The ’539 Patent Claims
`
`The ’539 patent has four independent claims: 1, 22, 37 and 38. All of the
`
`claims relate to communicating authentication information from an electronic ID
`
`device. Ex-2004, Jakobsson, ¶29.
`
`C.
`
`Prosecution History of the ’539 Patent
`
`The ’539 patent was filed as U.S. Application No. 11/768,729 (“’729
`
`Application”) filed on June 26, 2007. The ’729 Application is a continuation
`
`application of U.S. Application No. 09/810,703 filed on March 16, 2001, now U.S.
`
`Patent No. 7,237,117.
`
`The ’539 patent was subject to a thorough examination by Examiners
`
`Beemnet Dada and Thomas Gyorfi. During prosecution, the Applicant and the
`
`Examiners discussed the application and prior art in detail, both through paper
`
`submissions and telephonic interviews. Claim amendments were made to further
`
`distinguish the invention from the prior art. Ultimately, Examiner Gyorfi allowed
`
`
`
`8
`
`

`

`the claims of the ’539 patent over a large body of cited prior art. See Ex-1001,
`
`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`’539 patent, 1-3.
`
`II. OVERVIEW OF THE CITED ART
`
`A. Brener (Ex-1005)
`
`Brener is directed to a centralized system that generates and distributes static
`
`objects to a vendor that allow for anonymous shopping. Ex-2004, Jakobsson, ¶30.
`
`Brener emphasizes that a goal of its invention is “to provide such an e-commerce
`
`system whereby the customer can remain anonymous but still visit web sites as a
`
`character or persona such that he or she is recognized upon return to the vendor
`
`web site.” Ex-1005, Brener, 2:15-17; Ex-2004, Jakobsson, ¶30.
`
`To accomplish this goal, Brener touts that the “customer object” (i.e., screen
`
`name persona like “GOLFO”) it uses to act as a proxy for the user/purchaser’s real
`
`identity can be remembered by the vendor (e.g., using cookies) so the vendor may
`
`“develop a relationship with the customer through his persona” and promote
`
`goods/services that the vendor may believe the customer would be interested in
`
`based on prior purchases/site visits. Ex-1005, Brener, 12:7-20; Ex-2004,
`
`Jakobsson, ¶31.
`
`In particular, Brener teaches its’ customer object comprises a public/private
`
`key pair wherein the public key includes the user’s account number. Ex-1005,
`
`Brener, 16:8-9 (“The public key will contain information such as a customer object
`
`
`
`9
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`and a customer bank account or credit card number.”). And, Brener further teaches
`
`that the public key is sent to the vendor 140. Id., 16:15-16 (“When a customer
`
`computer 100 enters the web site of the vendor computer 140, the vendor computer
`
`140 is provided with the public key.”); see Ex-2004, Jakobsson, ¶32.
`
`Brener also discloses that in a preferred embodiment the bank computer 150
`
`keeps a blind eye to “the transactional information of the customer” and that “the
`
`bank need not know what is being purchased and from where, only that the
`
`customer has the money or credit to cover the transaction.” Ex-1005, Brener,
`
`13:26-14:4 (emphasis added); see Ex-2004, Jakobsson, ¶33.
`
`B. Weiss (Ex-1006)
`
`Weiss is directed to a code-generation system that synchronizes generation
`
`of separate, free running, time dependent equipment. Ex-1006, Weiss, Title; Ex-
`
`2004, Jakobsson. ¶34. In particular, Weiss discloses a distribution architecture that
`
`includes the capability of every system participant to generate the same
`
`authentication code at the same time. Ex-1006, Weiss, Abstract; Ex-2004,
`
`Jakobsson, ¶34. Most importantly, the invention uses a “predetermined algorithm
`
`[that] constantly generates new unique and verifiable non-predictable codes, which
`
`are derived from the fixed data and at least one dynamic variable, such as the time
`
`of day.” Ex-1006, Weiss, 1:63-65; Ex-2004, Jakobsson, ¶34. Moreover, Weiss
`
`
`
`10
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`requires the algorithm that generates the authentication code to be secret. Ex-1006,
`
`Weiss, Abstract, line 3; Ex-2004, Jakobsson, ¶34.
`
`C. Desai (Ex-1007)
`
`Desai discloses a system that “provid[es] users with granular control over
`
`arbitrary information that allows for selective, real-time information sharing in a
`
`communications network.” Ex-1007, Desai, Abstract, lines 1-3 (emphasis added);
`
`Ex-2004, Jakobsson, ¶35. Specifically, Desai teaches providing user-by-user and
`
`element-by-element restrictions to data. Ex-1007, Desai, Abstract, lines 17-21
`
`(“Each registered user may selectively control the granting and denying of access
`
`to each of its associated data elements by other respective user, on an element-by-
`
`element, and user-by-user basis.”); see id., 3:38-40 (“Each user of the system and
`
`method has granular control over its own user profile information, and can control
`
`access to each stored data element”); see Ex-2004, Jakobsson, ¶35. Moreover, in
`
`Desai, the stored information is released directly to the vendor once the vendor
`
`establishes that it has the proper permissions. Ex-1007, Desai, 4:16-18 (“the
`
`vendors will not receive this information unless and until the registered user
`
`provides access to the vendor.”); Ex-2004, Jakobsson, ¶35.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`A person of ordinary skill in the art (“POSITA”) relevant to the ’539 patent
`
`at the time of the invention would have a Bachelor of Science degree in electrical
`
`
`
`11
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`engineering and/or computer science, and three years of work or research
`
`experience in the fields of secure transactions and encryption, or a Master’s degree
`
`in electrical engineering and/or computer science and two years of work or
`
`research experience in related fields. Ex-2004, Jakobsson, ¶16. PO’s description
`
`of the level of ordinary skill in the art is essentially the same as that of the
`
`Petitioner, except that Petitioner’s description requires two years of work in the
`
`computer science field. See Pet., 12;. The positions set forth in this preliminary
`
`response would be the same under either parties’ proposal. Ex-2004, Jakobsson,
`
`¶17.
`
`IV. CLAIM CONSTRUCTION
`
`For inter partes reviews filed before November 13, 2018, claim terms are
`
`given their broadest reasonable interpretation (“BRI”) in view of the specification
`
`in which they appear. 37 C.F.R. § 42.100(b); see also Cuozzo Speed Techs., LLC v.
`
`Lee, 136 S. Ct. 2131, 2142 (2016).
`
`Petitioner identifies two terms that purportedly require construction:
`
`“entity” and “based at least in part on the indication of the provider and the time-
`
`varying multicharacter code of the transaction request.” Pet., 14-17. PO contends
`
`no construction of “entity” is necessary to resolve matters raised here, and the
`
`Board has agreed. Inst. Dec., 7. With respect to Petitioner’s other proffered term,
`
`PO proposed a different construction, to which the Board also agreed. Id., 7-9.
`
`
`
`12
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`Furthermore, PO identifies two additional terms that require construction: “third
`
`party” and “the provider requesting the transaction.”
`
`A.
`
`“Entity”
`
`Petitioner states the term “entity” purportedly requires construction. Pet., 14-
`
`15. PO contends construction of this term is not necessary to resolve the matters
`
`raised by this Petition; the Board agreed in its institution decision. Inst. Dec., 7.
`
`B.
`
`“Based at least in part on the indication of the provider and the
`time-varying multicharacter code of the transaction request”
`
`Petitioner argues the phrase “based at least in part on the indication of the
`
`provider and the time-varying multicharacter code of the transaction request”
`
`should be read to modify the terms “completing the transaction” instead of “access
`
`restrictions for the provider.” See Pet., 17.
`
`Consistent with the plain language of the claims and in view of the
`
`specification, PO contends the phrase “based at least in part on the indication of the
`
`provider and the time-varying multicharacter code of the transaction request”
`
`should be construed to modify “determining compliance with any access
`
`restrictions for the provider to secure data of the entity.” See Ex-2004, Jakobsson,
`
`¶37. The Board agreed with PO’s construction and reasoning. Inst. Dec., 8-9.
`
`In particular, the specification of the ’539 patent explains that the USR
`
`system’s main unit 12, which may be connected to a wide area network, and
`
`include a database 24 that stores data entries 30 related to different people or
`
`
`
`13
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`entities. Ex-1001, ’539 patent, 7:11-13; 7:40-41; Ex-2004, Jakobsson, ¶38.
`
`Among other things, each database entry 30 may contain “access information 34”
`
`and certain pieces of data such as “Credit Card and Other Financial Information,”
`
`“Medical Information,” Job Application Information,” and “Tax Information.” Ex-
`
`1001, ’539 patent, FIG. 3, 7:57-63; Ex-2004, Jakobsson, ¶38. The access
`
`information 34 allows “different levels of security to attach to different types of
`
`information stored in the entry 30” so that the user can specify which particular
`
`individuals or companies can have access to what specific data such as credit card
`
`numbers, medical information, and tax information. See Ex-1001, ’539 patent,
`
`8:62-9:11; Ex-2004, Jakobsson, ¶38.
`
`The specification further provides that during “training” of the USR
`
`database 24, the user “specif[ies] the type of access restrictions and/or whom
`
`should be allowed to access the advanced personal data.” Ex-1001, ’539 patent,
`
`10:23-25. Referring to FIG. 6 of the ’539 patent, once the database 24 has been
`
`trained, “USR software 18 queries whether the requester has the right to
`
`access the type of requested data,” and “determining the requestor’s rights
`
`(602) typically involves validating the requestor’s identity and correlating the
`
`identity, the requested information and the access information 34 provided by
`
`the person to the USR database during the training process.” Ex-1001. ’539
`
`patent, 10:40-48 (emphasis added). Thus, the context that “access rights” and
`
`
`
`14
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`compliance therewith is discussed in the specification and figures of the ’539
`
`patent explicitly ties in the identity of the requestor (e.g., provider). Ex-2004,
`
`Jakobsson, ¶39.
`
`As such, claims 1 and 22 specify that compliance with any access
`
`restrictions for the provider to secure data of the entity for completing the
`
`transaction are based at least in part on the indication of the provider (i.e., who the
`
`requesting provider is) and the time-varying multicharacter code. Id., ¶40.
`
`Petitioner argues
`
`the phrase should only modify “completing
`
`the
`
`transaction” because some embodiments of the ’539 patent allegedly describe
`
`access to information “based solely on a determination whether ‘the [electronic ID]
`
`code is valid.’” Pet., 17. As found by the Board, Petitioner is wrong. Inst. Dec.,
`
`8-9.
`
`First, each portion of the ’539 patent cited by Petitioner explicitly recites that
`
`the provider’s request includes a store number (i.e., one example of “indication of
`
`the provider”) before the transaction is approved or denied. Thus, Petitioner’s
`
`statement that these embodiments associated with FIGS. 7-10 are “based solely on
`
`a determination whether the ‘the [electronic ID] code is valid’” lacks merit. Ex-
`
`2004, Jakobsson, ¶42.
`
`Second, even if embodiments in the ’539 patent did not require an indication
`
`of the provider to be sent, the claims at issue recite and require that an indication of
`
`
`
`15
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`the provider is provided and that compliance with access restrictions is based on
`
`such an indication of the provider and time-varying multicharacter code. Id., ¶43.
`
`Petitioner’s argument ignores the portion of the claim language that specifically
`
`makes these recitations, and its limiting, improper interpretation and grammatical
`
`manipulations of the claim language runs counter to the ’539 patent’s specification.
`
`For these reasons, proper construction of the phrase “based at least in part on
`
`the indication of the provider and the time-varying multicharacter code of the
`
`transaction request” should be construed to modify the terms “determining
`
`compliance with any access restrictions for the provider to secure data of the
`
`entity.” Ex-2004, Jakobsson, ¶44.
`
`C.
`
`“Third party”
`
`The ’539 patent includes four independent claims 1, 22, 37, and 38, which
`
`all recite the term “the third party.” Consistent with the context of the claims in
`
`which they appear, PO contends “third party” should be construed to mean “a party
`
`other than the entity, the provider, and the secure registry.” Ex-2004, Jakobsson,
`
`¶45. In its institution decision in IPR2018-00812 (for the same ’539 patent), the
`
`Board agreed with PO:
`
`We agree the claim language supports that the third party must
`
`be different from the “provider” and “entity.” As to the secure
`
`registry itself, we agree further with Patent Owner that the claim
`
`language mandates that the “third party” cannot be the secure registry
`
`
`
`16
`
`

`

`Case No. IPR2018-01350
`U.S. Patent No. 8,856,539
`
`system. The claims recite that the secure-registry processor is
`
`configured such that “account identifying information is provided to a
`
`third party.” By using “provided,” the claim instructs that the secure
`
`registry must send account-identifying information somewhere, not
`
`simply perform an additional operation on
`
`the
`
`information.
`
`Accordingly, we construe “third party” as “a party that is not the
`
`secure registry itself, the user, or the provider.
`
`IPR2018-00812 (Paper 9) (“Op”), 6-7 (footnote omitted).
`
`PO’s construction is supported by the context of the claims in which the
`
`term “third party” appears. Ex-2004, Jakobsson, ¶46. All of the Challenged
`
`Claims already recite “a secure registry,” “a provider,” and “an entity.” Ex-1001,
`
`’539 patent, 18:29-60 (claim 1); 20:4-31 (claim 22); 21:25-22:13 (claim 37);
`
`22:14-40 (claim 38); Ex-2004, Jakobsson, ¶46. Thus, the “third party” should
`
`reasonably be interpreted to be a party other than one of these other parties already
`
`recited in the claims otherwise two or more of these terms would be duplicative.
`
`See Merck & Co., Inc. v. Teva Pharm. USA, Inc., 395 F.3d 1364, 1372 (Fed. Cir.
`
`2005) (“A claim construction that gives meaning to all the terms of the claim is
`
`preferred over one that does not do so.”); see also Ex-2004, Jakobsson, ¶46.
`
`Moreover, PO’s construction is consistent with the specification, where the
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket