throbber
Paper No. 6
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`________________
`
`VISA INC. and VISA U.S.A. INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY LLC,
`Patent Owner
`________________
`
`Case IPR2018-01351
`U.S. Patent No. 8,856,539
`________________
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`PURSUANT TO 35 U.S.C. § 313 AND 37 C.F.R. § 42.107
`
`
`
`
`
`
`
`

`

`TABLE OF CONTENTS
`
`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`Page
`
`I.
`
`II.
`
`INTRODUCTION ........................................................................................... 1
`
`OVERVIEW OF THE ’539 PATENT ............................................................ 5
`
`A.
`
`B.
`
`C.
`
`The ’539 Patent Specification ............................................................... 5
`
`The ’539 Patent Claims ....................................................................... 10
`
`Prosecution History of the ’539 Patent ............................................... 14
`
`III. OVERVIEW OF THE CITED ART ............................................................. 15
`
`A.
`
`B.
`
`Junda .................................................................................................... 15
`
`Brody ................................................................................................... 19
`
`IV. LEVEL OF ORDINARY SKILL IN THE ART ........................................... 21
`
`V.
`
`CLAIM CONSTRUCTION .......................................................................... 22
`
`A.
`
`B.
`
`C.
`
`D.
`
`“Entity” ................................................................................................ 22
`
`“Based at least in part on the indication of the provider and the
`time-varying multicharacter code of the transaction request” ............ 23
`
`“Provider” ............................................................................................ 26
`
`“Access restrictions for the provider” ................................................. 28
`
`VI. THE PETITION FAILS TO DEMONSTRATE A REASONABLE
`LIKELIHOOD THAT ANY CLAIM IS INVALID BASED ON
`JUNDA AND BRODY (GROUND 1) .......................................................... 30
`
`A.
`
`Brody Fails to Disclose a Time-varying Multicharacter Code. .......... 31
`
`1.
`
`2.
`
`“Dynamic Mappings” Refer to Mappings Between
`Anonymous Card Attributes and Real Card Attributes
`Performed Close in Time (i.e., Real Time) to Real Card
`Attribute Processing/Authorization. ......................................... 32
`
`Brody’s Anonymous Card Number and Attributes are
`Static. ......................................................................................... 37
`
`B.
`
`Junda Fails to Disclose Restriction Mechanisms are Executed to
`Determine Compliance with Any Access Restrictions for the
`Provider to Secure Data Stored at the Secure Registry for
`Completing the Transaction ................................................................ 40
`
`
`
`i
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`1.
`
`2.
`
`Junda’s Discussion That Real User Data is Provided to a
`Card Issuer While Proxy User Data is Provided to a
`Merchant Fails to Disclose Limitations 1.4, 22.3, and
`37.5. ........................................................................................... 43
`
`Petitioner’s Additional Arguments Also Fail to Disclose
`Limitations 1.4 and 22.3. .......................................................... 45
`
`(a)
`
`“Based at least in part on the indication of the
`provider and the time-varying multicharacter code
`of the transaction request” does not modify only
`“completing the transaction.” ......................................... 46
`
`(b) User preselection of the specific real data to obtain
`proxy data for, is not merchant-specific and is used
`and processed by Junda’s system the same way
`regardless of the merchant requesting the
`transaction. ...................................................................... 49
`
`(c) Restricted-use attributes setting an expiration
`parameter on proxy data is not merchant-specific
`and is used and processed by Junda’s system the
`same way regardless of the merchant requesting
`the transaction. ................................................................ 50
`
`(d) A merchant logging onto an authorization network
`to send authorization requests to a proxy agent
`does not establish that the proxy agent determines
`whether a provider is compliant with access
`restrictions specific to the provider based on an
`indication of the provider. .............................................. 51
`
`C.
`
`Junda Fails to Disclose Allowing or Not Allowing Access to
`Secure Data Associated with an Entity Including Information
`Required to Enable the Transaction Based on Determined
`Compliance with Access Restrictions for the Provider ...................... 54
`
`D.
`
`Petitioner Fails to Show that Junda Discloses “To Store an
`Appropriate Code With Each Such Portion of Secure Data” ............. 55
`
`VII. CONCLUSION .............................................................................................. 57
`
`
`
`
`
`
`
`ii
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`TABLE OF AUTHORITIES
`
`Page
`
`CASES
`
`C&D Zodiac, Inc. v. B/E Aerospace, Inc.,
`Case No. IPR2014-00727 (P.T.A.B. October 29, 2014) ......................... 57-58
`
`Commvault Systems, Inc. v. Realtime Data LLC,
`Case No. IPR2017-02006 (P.T.A.B. March 29, 2018) .................................57
`
`Cuozzo Speed Techs., LLC v. Lee,
`136 S. Ct. 2131 (2016) ...................................................................................22
`
`Graham v. John Deere Co.,
` 383 U.S. 1, 148 USPQ 459 (1966) ......................................................... 30, 31
`
`Harmonic Inc. v. Avid Tech., Inc.,
` 815 F.3d 1356, 1363 (Fed. Cir. 2016) .......................................................... 55
`
`KSR International Co. v. Teleflex Inc.,
` 550 U.S. 398, 82 USPQ2d 1385 (2007) ....................................................... 30
`
`Pre-AIA 35 U.S.C. § 103 .....................................................................................1, 30
`
`STATUTES
`
`RULES
`
`37 C.F.R. § 42.24 .....................................................................................................59
`
`37 C.F.R. § 42.6(e) ...................................................................................................60
`
`37 C.F.R. § 42.100 ................................................................................................... 22
`
`
`
`
`
`
`
`
`iii
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`EXHIBIT TABLE
`
`
`
`Exhibit #
`2001
`
`2002
`
`2003
`
`Description
`Declaration of Markus Jakobsson
`in Support of Patent Owner’s Preliminary Response
`
`Curriculum Vitae of Markus Jakobsson
`
`Terminal Disclaimer Dated August 17, 2018
`
`
`
`
`
`
`
`
`
`
`
`
`
`iv
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`I.
`
`INTRODUCTION
`
`The present petition (Paper 2, IPR2018-01351, hereinafter “Petition”) is one
`
`of two petitions filed by VISA INC. and VISA U.S.A. INC. (hereinafter
`
`“Petitioner”) challenging various claims of U.S. Patent No. 8,856,539 (hereinafter
`
`“’539 patent”). See also IPR2018-01350. The Petition requests inter partes review
`
`of the ’539 patent and relies on a combination of two references in its attempt to
`
`invalidate the challenged claims. See Petition at 13-14. Specifically, the Petition
`
`asserts that claims 1-9, 16-31, 37, and 381 are obvious over WO 01/13275 A1
`
`(“Junda”) in view of U.S. Pub. No. 2001/0029485 A1 (“Brody”) under pre-AIA 35
`
`U.S.C. § 103(a) (collectively “the Challenged Claims”). Id. Patent Owner strongly
`
`disagrees that the Challenged Claims are invalid over the cited art, and submits this
`
`Preliminary Response to the Petition requesting that the Board deny institution of
`
`inter partes review.
`
`The ’539 patent, which issued on October 7, 2014 from U.S. application No.
`
`11/768,729 filed on June 26, 2007, was subject to a thorough and rigorous
`
`examination by Examiners Beemnet Dada and Thomas Gyorfi that lasted over four
`
`
`1 Claims 5-8, 17-20, and 26-30 are no longer at issue since Patent Owner
`
`disclaimed these claims on August 17, 2018 by filing a terminal disclaimer. See
`
`Ex. 2003.
`
`
`
`1
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`years and included seven substantive office actions. See Exs. 1005-1025. During
`
`prosecution, the Applicant and the Examiners discussed the application and prior
`
`art in detail, both through paper submissions and telephonic interviews. See Exs.
`
`1005-1024. Ultimately, Examiner Gyorfi allowed the claims of the ’539 patent
`
`(Ex. 1025 at 5; Ex. 1028 at 5.) over a large body of cited prior art. See Ex. 1001 at
`
`1-3.
`
`The Board should not institute inter partes review of the ’539 patent because
`
`the Petition fails to demonstrate that there is a reasonable likelihood that at least
`
`one of the Challenged Claims is unpatentable. Notwithstanding deficiencies in the
`
`Petition that are unique to the dependent claims, the Petition fails to establish that
`
`independent claims 1, 22, 37, and 38 are obvious over Junda in view of Brody.
`
`First, Petitioner admits that its primary reference, Junda, fails to disclose a
`
`“time-varying multicharacter code” that is recited in all four independent claims.
`
`Petitioner contends that Brody makes up for the deficiencies of Junda, and that the
`
`combination of Junda and Brody teach a time-varying multicharacter code. As
`
`explained in greater detail below, Brody simply parrots Junda’s discussion of using
`
`static proxy numbers in place of actual credit card numbers, and thus adds nothing
`
`relevant to time-varying multicharacter codes. In support of its position, Petitioner
`
`goes to great lengths to distort the context of the word “dynamic” used in Brody in
`
`its failed attempt to reengineer Brody’s static proxy numbers into time-varying
`
`
`
`2
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`ones. A close review of Brody reveals that, as in Junda, its proxy numbers—used
`
`in place of real credit card numbers—are fixed and merely expire after a
`
`predetermined period or number of uses. Thus, Junda in combination with Brody
`
`fails to disclose a “time-varying multicharacter value.” Since this limitation is
`
`found in all claims of the ’539 patent, Junda and Brody’s shortcomings are fatal to
`
`the Petition.
`
`Second, as to independent claims 1, 22, and 37, Petitioner fails to show that
`
`Junda, alone or in combination with Brody, discloses “execute a restriction
`
`mechanism to determine compliance with any access restrictions for the provider
`
`to at least one portion of secure data for completing the transaction.” Petitioner
`
`argues that Junda discloses this limitation because Junda’s proxy agent reveals real
`
`user data to a credit card issuer while only providing corresponding proxy user data
`
`to a merchant. This argument fails because the claims specifically require that
`
`compliance with access restrictions are determined “for the provider,” and
`
`Junda’s card issuer is not a provider as that term is properly construed. Moreover,
`
`Junda’s proxy agent enables access to sensitive information to the card issuer
`
`regardless of who the transaction requesting merchant is. So long as the proxy user
`
`data received at Junda’s proxy agent is valid and matches proxy user data stored at
`
`the proxy agent, the proxy agent releases the real user card number to the card
`
`issuer irrespective of the requesting merchant’s identity. Junda does not disclose
`
`
`
`3
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`any embodiments where the proxy agent determines provider compliance with
`
`access restrictions specific to the provider.
`
`Third, as to independent claims 1 and 22, Petitioner fails to show that
`
`Junda, alone or in combination with Brody, discloses “allow or not allow access to
`
`the secure data associated with the entity including information required to enable
`
`the transaction based on the determined compliance with any access restrictions for
`
`the provider.” Petitioner argues that Junda teaches this limitation because the user
`
`in Junda can select the level of confidentiality for a transaction by choosing what
`
`real user data (e.g., name, card number, address, etc.) to obtain proxy user data for.
`
`However, such a teaching by Junda is irrelevant because claims 1 and 22 require
`
`that the secure registry determine the provider’s compliance with any access
`
`restrictions specific to the provider. Based on this provider-specific access
`
`restriction determination the secure registry allows or does not allow access to
`
`account identifying information. By contrast, in Junda it does not matter what real
`
`user data the user obtains proxy user data for—be it name, card number, address,
`
`etc.—because once that proxy user data is provided to the proxy agent, the proxy
`
`agent performs the same steps of mapping the proxy data to real data and providing
`
`the real user data to the card issuer. At no point does the proxy agent check to see
`
`who the requesting merchant is and whether the merchant complies with access
`
`
`
`4
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`restrictions specific to it before allowing or not allowing the release of secure data
`
`based on that determined compliance.
`
`Since the Petition has failed to show that Junda in combination with Brody
`
`renders obvious various limitations found in the claims, the Petition fails to
`
`demonstrate that there is a reasonable likelihood that at least one of the claims
`
`challenged in the Petition is unpatentable. As such, Patent Owner respectfully
`
`requests that the Board deny institution of inter partes review.
`
`II. OVERVIEW OF THE ’539 PATENT
`
`A. The ’539 Patent Specification
`
`The ’539 patent provides a unique and highly secure anonymous identification
`
`system that uses a time-varying multicharacter code for both verifying the identity
`
`of an entity and also enabling transactions between the entity and a provider without
`
`requiring the entity to share personal or otherwise sensitive information with the
`
`provider. See Ex. 1001 at 2:64-3:1, 3:24-27, 12:19-54; Ex. 2001, Jakobsson at ¶ 26.
`
`As one non-exclusive example, the system, referred to as a Universal Secure
`
`Registry (USR) system, allows a person to purchase goods from a brick and mortar
`
`or online merchant without publicly providing credit card information to the
`
`merchant for fear that the credit card information may be stolen or used fraudulently.
`
`See Ex. 1001 at 3:44-54; Ex. 2001, Jakobsson at ¶ 26. As another example, the USR
`
`system may be used by a patient to supply “insurance data, medical history data, and
`
`
`
`5
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`other appropriate medical information to a medical provider, once that medical
`
`provider has been established as an authorized recipient [of such data].” See Ex.
`
`1001 at 3:55-60; Ex. 2001, Jakobsson at ¶ 26.
`
`FIG. 1 depicts one possible embodiment of the USR system:
`
`
`
`
`
`The USR system’s main unit 12, which may be connected to a wide area network,
`
`
`
`6
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`includes a database 24 that stores data entries 30 related to different people or
`
`entities. Ex. 1001 at 7:11-13; 7:40-41; Ex. 2001, Jakobsson at ¶ 27. Each entry 30
`
`may contain different types of information such as, but not limited to, validation
`
`information, access
`
`information, publicly available
`
`information, address
`
`information, credit card information, medical information, job application
`
`information, and/or tax information. Ex. 1001 at 7:57-63; Ex. 2001, Jakobsson at ¶
`
`27. “The validation information [32] is information about the user of the database to
`
`whom the data pertains and is to be used by the USR software 18 to validate that the
`
`person attempting to access the information is the person to whom the data pertains
`
`or is otherwise authorized to receive it.” Ex. 1001 at 8:10-14; Ex. 2001, Jakobsson
`
`at ¶ 27. In particular, the validation information 32 contains information that enables
`
`the USR software 18 to validate a person that has presented the system with a one-
`
`time nonpredictable code uniquely associated with the user. See Ex. 1001 at 8:17-
`
`35; Ex. 2001, Jakobsson at ¶ 27. The access information 34 allows “different levels
`
`of security to attach to different types of information stored in the entry 30” so that
`
`the user can specify which particular individuals or companies can have access to
`
`what specific data such as credit card numbers, medical information, and tax
`
`information. See Ex. 1001 at 8:62-9:11; Ex. 2001, Jakobsson at ¶ 27.
`
`FIG. 8 depicts one possible embodiment of using the USR system “to
`
`purchase goods or services from a merchant without revealing to the merchant
`
`
`
`7
`
`

`

`account information relating to the person’s bank or credit card.” Ex. 1001 at 9:46-
`
`50; Ex. 2001, Jakobsson at ¶ 28.
`
`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`A user desiring to make a purchase at a merchant without providing their financial
`
`
`
`
`
`8
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`information, such as a credit or debit card number, may enter a secret code into their
`
`electronic ID device (any type of electronic device that may be used to obtain access
`
`to the USR database (Ex. 1001 at 8:45-47)), which generates a one-time
`
`nonpredictable code that is provided to the merchant. Id. at 12:21-24; Ex. 2001,
`
`Jakobsson at ¶ 28. The merchant in turn may transmit the one-time nonpredictable
`
`code, a store number, and a purchase amount to the USR. Ex. 1001 at 12:24-26; Ex.
`
`2001, Jakobsson at ¶ 28. The USR may then determine whether the code received is
`
`valid, and if valid, accesses from the USR database the user’s actual credit card
`
`information. Ex. 1001 at 12:27-29; Ex. 2001, Jakobsson at ¶ 28. The USR next
`
`transmits to the credit card company the credit card number, the store number, and
`
`the purchase amount. Ex. 1001 at 12:29-31; Ex. 2001, Jakobsson at ¶ 28. The credit
`
`card company then processes the transaction, such as by checking the credit
`
`worthiness of the person, and either declines the card or debits the user’s account
`
`and transfers money to the merchant’s account. Ex. 1001 at 12:40-43; Ex. 2001,
`
`Jakobsson at ¶ 28. The credit card company notifies the USR the transaction result
`
`and the USR may in turn notify the merchant. Ex. 1001 at 12:43-46; Ex. 2001,
`
`Jakobsson at ¶ 28.
`
`Hence, the USR system provides a secure anonymous identification system
`
`that uses a time-varying multicharacter code for both verifying the identity of an
`
`entity and also enabling transactions between the entity and a provider, such as a
`
`
`
`9
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`merchant, without requiring the entity to share personal or otherwise sensitive
`
`information with the provider. Ex. 2001, Jakobsson at ¶ 29. In one case, this allows
`
`a user to purchase goods or services from a merchant without providing the
`
`merchant the user’s credit card number. Id. Advantageously, the USR system also
`
`allows such secure transactions to be transparent to the credit card company and
`
`thus requires no or minimal cooperation from the credit card company to
`
`implement. Id. As another example, a user may obtain medical treatment from a
`
`medical care provider without having to directly supply the medical care provider
`
`her medical history, which may not be with the patient herself. Id. at ¶ 30. In yet
`
`another example, the user may facilitate shipment of goods purchased from a
`
`merchant without having to provide the merchant their shipping address. Id.
`
`B.
`
`The ’539 Patent Claims
`
`The ’539 patent includes 38 claims, of which claims 1, 22, 37, and 38 are
`
`independent. The four independent claims of the ’539 patent are reproduced below:
`
`1.
`
`A secure registry system for providing information to a
`
`provider to enable transactions between the provider and entities with secure
`
`data stored in the secure registry system, the secure registry system
`
`comprising:
`
`a database including secure data for each entity, wherein each entity is
`
`associated with a time-varying multicharacter code for each entity having
`
`secure data in the secure registry system, respectively, each time-varying
`
`
`
`10
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`multicharacter code representing an identity of one of the respective entities;
`
`and
`
`a processor configured to receive a transaction request including at
`
`least the time-varying multicharacter code for the entity on whose behalf a
`
`transaction is to be performed and an indication of the provider requesting
`
`the transaction, to map the time-varying multicharacter code to the identity
`
`of the entity using the time-varying multicharacter code, to execute a
`
`restriction mechanism to determine compliance with any access restrictions
`
`for the provider to secure data of the entity for completing the transaction
`
`based at least in part on the indication of the provider and the time-varying
`
`multicharacter code of the transaction request, and to allow or not allow
`
`access to the secure data associated with the entity including information
`
`required to enable the transaction based on the determined compliance with
`
`any access restrictions for the provider, the information including account
`
`identifying information, wherein the account identifying information is not
`
`provided to the provider and the account identifying information is provided
`
`to a third party to enable or deny the transaction with the provider without
`
`providing the account identifying information to the provider.
`
`Ex. 1001 at 18:29-60.
`
`
`22. A method for providing information to a provider to enable
`
`transactions between the provider and entities who have secure data stored in
`
`a secure registry in which each entity is identified by a time-varying
`
`multicharacter code, the method comprising:
`
`receiving a transaction request including at least the time-varying
`
`multicharacter code for an entity on whose behalf a transaction is to take
`
`place and an indication of the provider requesting the transaction;
`
`
`
`11
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`mapping the time-varying multicharacter code to an identity of the
`
`entity using the time-varying multicharacter code;
`
`determining compliance with any access restrictions for the provider
`
`to secure data of the entity for completing the transaction based at least in
`
`part on the indication of the provider and the time-varying multicharacter
`
`code of the transaction request;
`
`accessing information of the entity required to perform the transaction
`
`based on the determined compliance with any access restrictions for the
`
`provider, the information including account identifying information;
`
`providing the account identifying information to a third party without
`
`providing the account identifying information to the provider to enable or
`
`deny the transaction; and
`
`enabling or denying the provider to perform the transaction without
`
`the provider's knowledge of the account identifying information.
`
`Id. at 20:4-31.
`
`37. A secure registry system for providing information to a
`
`provider to enable transactions between the provider and entities with secure
`
`data stored in the secure registry system, the secure registry system
`
`comprising:
`
`a database including secure data for each entity, wherein each entity is
`
`associated with a time-varying multicharacter code for each entity having
`
`secure data in the secure registry system, respectively, each time-varying
`
`multicharacter code representing an identity of one of the respective entities,
`
`wherein the database is configured to permit or deny access to information
`
`on the respective entity using the time-varying multicharacter code; and
`
`
`
`12
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`a processor configured to receive the time-varying multicharacter
`
`code for the entity on whose behalf a transaction is to be performed,
`
`configured to map the time-varying multicharacter code to the identity of the
`
`entity to identify the entity, configured to execute a restriction mechanism to
`
`determine compliance with any access restrictions for the provider to at least
`
`one portion of secure data for completing the transaction and to store an
`
`appropriate code with each such portion of secure data, configured to obtain
`
`from the database the secure data associated with the entity including
`
`information required to enable the transaction, the information including
`
`account identifying information, and configured to provide the account
`
`identifying information to a third party to enable or deny the transaction
`
`without providing the account identifying information to the provider.
`
`Id. at 21:25-22:13.
`
`38. A secure registry system for providing information to a
`
`provider to enable transactions between the provider and entities with secure
`
`data stored in the secure registry system, the secure registry system
`
`comprising:
`
`a database including secure data for each entity, wherein each entity is
`
`associated with a time-varying multicharacter code for each entity having
`
`secure data in the secure registry system, respectively, each time-varying
`
`multicharacter code representing an identity of one of the respective entities;
`
`and
`
`a processor configured to receive the time-varying multicharacter
`
`code for the entity on whose behalf a transaction is to be performed,
`
`configured to map the time-varying multicharacter code to the identity of the
`
`entity without requiring further information to identify the entity, configured
`
`
`
`13
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`to access from the database secure data associated with the entity including
`
`information required to enable the transaction, the information including
`
`account identifying information, and configured to provide the account
`
`identifying information to a third party to enable or deny the transaction
`
`without providing the account identifying information to the provider, and
`
`wherein enabling or denying the transaction without providing account
`
`identifying information to the provider includes limiting transaction
`
`information provided by the secure registry system to the provider to
`
`transaction approval information.
`
`Id. at 22:14-22:40.
`
`C.
`
`Prosecution History of the ’539 Patent
`
`The ’539 patent issued on October 7, 2014 from U.S. Application
`
`No. 11/768,729 (“’729 Application”) filed on June 26, 2007. The ’729 Application
`
`is a continuation application of U.S. Application No. 09/810,703 filed on March
`
`16, 2001, now U.S. Patent No. 7,237,117.
`
`The ’539 patent was subject to a thorough examination by Examiners
`
`Beemnet Dada and Thomas Gyorfi. See Exs. 1005-1025. During prosecution, the
`
`Applicant and the Examiners discussed the application and prior art in detail, both
`
`through paper submissions and telephonic interviews. See Exs. 1005-1024. Claim
`
`amendments were made to further distinguish the invention from the prior art.
`
`Ultimately, Examiner Gyorfi allowed the claims of the ’539 patent (Ex. 1025 at 5;
`
`Ex. 1028 at 5.) over a large body of cited prior art. See Ex. 1001 at 1-3.
`
`
`
`14
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`III. OVERVIEW OF THE CITED ART
`
`A.
`
`Junda
`
`Junda discusses “a system and a method for enabling a customer… to make
`
`purchases and take delivery of goods or services while keeping some or all of the
`
`user’s personal information confidential and secure throughout the purchase and
`
`delivery transactions.” Ex. 1008, Junda at 3:27-31. FIG. 1 of Junda shown below is
`
`instructive of this method and system. Ex. 2001, Jakobsson at ¶ 32.
`
`
`
`15
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`
`
`Referring to FIG. 1 of Junda above, the process begins when “a user 120
`
`registers with the proxy agent 140 for obtaining proxy user data that he or she can
`
`use when making purchases and taking delivery of goods or services.” Ex. 1008,
`
`Junda at 11:11-13. Specifically, the user may have “a credit or debit card for which
`
`he or she requests proxy user data.” Id. at 11:26-27. The user may fill out an
`
`electronic form to provide the proxy agent 140 its real name, shipping address, and
`
`
`
`16
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`email address. Id. at 11:29-33. In the case where the proxy agent 140 was not the
`
`entity that issued the user 120 its credit or debit card account, the user 120 would
`
`also provide the proxy agent 140 its real credit or debit card number. Id. at 12:33-
`
`36. The proxy agent 140 generates proxy user data corresponding to this data and
`
`stores all of this information in its user database 144. See id. at 13:9-33. The proxy
`
`agent 140 may then provide the generated proxy user data to the user 120 for
`
`subsequent use by the user 120 with, for example, a merchant 130. Id. at 13:35-
`
`14:2. To reduce the risk that such proxy user data may be intercepted and used by
`
`an “unscrupulous individual,” Junda discusses that the proxy user data may be
`
`“valid for only a limited number of purchases or requiring the user to make a
`
`purchase only within a limited period of time.” Id. at 14:30-33; Ex. 2001,
`
`Jakobsson at ¶ 33.
`
`The user 120 may then take the proxy user data and present it to an online
`
`merchant 130 instead of the real data (e.g., real credit card number) when desiring
`
`to make a purchase. Id. at 15:27-35. The merchant 130 then logs onto an
`
`authorization network 112 to request authorization to charge the user’s credit/debit
`
`card account for the selected purchase. Id. at 16:1-3. The proxy agent 140 receives
`
`the proxy user data, such as the proxy credit/debit card number, from the merchant
`
`130 and—in the case the proxy agent 140 did not issue the underlying credit/debit
`
`card account—translates the proxy number to the real credit/debit account number
`
`
`
`17
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`and forwards the real account number to the card issuer 170 that issued the real
`
`account number. See id. at 16:3-23; Ex. 2001, Jakobsson at ¶ 34.
`
`The card issuer 170 sends an authorization response authorizing or denying
`
`the transaction to the authorization proxy agent 140 over the authorization network
`
`112. Id. at 16:25-26. The proxy agent 140 then substitutes out the real account
`
`numbers with the proxy numbers before sending the authorization information
`
`back to the merchant 130. Id. at 16:26-31. The merchant 130 lets the user 120
`
`know the outcome (approval/denial) of the transaction. See id. at 16:31-37. In this
`
`fashion, “the user 120 is not required to send any real user data to the merchant
`
`130” and “the proxy agent 140 does not reveal any of the real user data stored in
`
`the user database 144 to the merchant 130.” Id. at 17:1-6; Ex. 2001, Jakobsson at ¶
`
`35.
`
`Junda’s system and method also includes delivery of goods using proxy user
`
`data. For example, not knowing the user’s shipping address, the merchant 130
`
`sends the goods to a delivery provider 150 that in turn ships the goods to the user
`
`120. Id. at 18:14-24. Next, the delivery provider visits the proxy agent site 142 and
`
`requests the real user data (e.g., shipping address) corresponding to the proxy user
`
`data provided. Id. at 18:26-28. The proxy agent 140 looks up the user’s real
`
`shipping address based on the proxy data and provides the real shipping address to
`
`the delivery provider 150. Id. at 18:28-32; Ex. 2001, Jakobsson at ¶ 36.
`
`
`
`18
`
`

`

`Case No. IPR2018-01351
`U.S. Patent No. 8,856,539
`
`Notably, Junda makes no disclosure that the proxy user data provided to the
`
`user is time-varying or that a restriction mechanism is executed to determine
`
`compliance with any access restrictions for the merchant or delivery provider to
`
`secure data. Ex. 2001, Jakobsson at ¶ 37.
`
`B.
`
`Brody
`
`Brody discusses an anonymous transaction server (ATS) that generates
`
`pseudo-random credit card attributes, such as a pseudo-random credit card number,
`
`name, billing zip code, or expiration date, which are provided to consumers for
`
`subsequent use with merchants to purchases goods and services anonymously. See
`
`Ex. 1009, Brody at [0009]-[0011]. FIG. 1 of Brody shown below is instructive of
`
`this method and system. Ex. 2001, Jakobsson at ¶ 38.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket