throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`PAYPAL INC.,
`PETITIONER,
`
`V.
`
`IOENGINE, LLC,
`PATENT OWNER.
`____________________
`
`IPR2019-00884
`IPR2019-00885
`
`PATENT 8,539,047
`____________________
`
`DECLARATION OF AVIEL D. RUBIN, PH.D.
`
`
`
`Exhibit 2003
`
`

`

`
`
`I.
`II.
`
`TABLE OF CONTENTS
`Introduction ..................................................................................................... 3
`Qualifications................................................................................................... 4
`A.
`Education & Career ............................................................................... 4
`B.
`Publications ........................................................................................... 7
`Person of Ordinary Skill in the Art................................................................... 8
`III.
`IV. Legal Framework ............................................................................................. 9
`A.
`Standard of Proof ................................................................................... 9
`B.
`Anticipation ........................................................................................... 9
`C.
`Obviousness ..........................................................................................10
`The ’047 Patent ...............................................................................................12
`V.
`VI. Asserted Grounds and References Relied On In Petitions ...............................14
`A. Abbott ...................................................................................................15
`B.
`Shmueli .................................................................................................18
`VII. Claim Construction .........................................................................................19
`“an interactive user interface” ...............................................................19
`A.
`“communicate through the terminal network interface with the
`B.
`communications network node” // “cause a communication to be sent through
`the terminal network interface to a communications network node” ...............25
`“[first/second/third] program code” ......................................................27
`C.
`VIII. Detailed Analysis ............................................................................................28
`A. No Motivation to Combine Abbott and Shmueli ...................................28
`B.
`Elements Neither Disclosed Nor Obvious .............................................33
`C.
`Dependent Claims .................................................................................48
`
`
`
`2
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`1.
`
`I, Aviel D. Rubin, make this declaration in connection with the
`
`proceedings identified above.
`
`I.
`
`INTRODUCTION
`2.
`
`I have been retained as an expert on behalf of IOENGINE, LLC
`
`(“IOENGINE”) in connection with the proceedings identified above. I submit this
`
`Declaration on behalf of IOENGINE in support of its Preliminary Response responding
`
`to the Petition for Inter Partes Review in Case IPR2019-00884 (the “’884 Petition”)
`
`filed by PayPal Inc. (“PayPal” or “Petitioner”) challenging claims 1−9, 12−16, and
`
`18−31 (the “Challenged Claims”) of U.S. Patent No. 8,539,047 to McNulty (“the ’047
`
`Patent”) (Ex. 1001), and also in support of its Preliminary Response responding to the
`
`Petition for Inter Partes Review in Case IPR2019-00885 (the “’885 Petition”) filed by
`
`Petitioner challenging claims 1, 7, 9-11, 14, 16, and 17, and focusing on claims 10, 11,
`
`and 17, of the ’047 Patent.
`
`3.
`
`The opinions in this Declaration are based on my professional training and
`
`experience and my review of the exhibits discussed herein.
`
`4.
`
`I am being compensated for my services in connection with the
`
`proceedings identified above at my regular rate of $775 per hour (plus reimbursement
`
`for expenses). My compensation is in no way contingent on the outcome of the
`
`proceedings identified above or on any of the opinions I provide below.
`
`3
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`II. QUALIFICATIONS
`5.
`I have summarized in this section my educational background, career
`
`history, publications, and other relevant qualifications. My curriculum vitae is
`
`submitted
`
`as
`
`Ex.
`
`2062,
`
`and
`
`can
`
`also
`
`be
`
`found
`
`at
`
`http://avirubin.com/Avi_Rubins_home_page/Vita.html.
`
`A. Education & Career
`6.
`I received my Ph.D. in Computer Science and Engineering from the
`
`University of Michigan, Ann Arbor, in 1994, with a specialty in computer security and
`
`cryptographic protocols. My thesis was titled “Nonmonotonic Cryptographic
`
`Protocols” and concerned authentication in long-running networking operations.
`
`7.
`
`I am currently employed as Professor of Computer Science at Johns
`
`Hopkins University, where I perform research, teach graduate courses in computer
`
`science and related subjects, and supervise the research of Ph.D. candidates and other
`
`students. Courses I have taught include Computer Network Fundamentals, Security
`
`and Privacy in Computing, Cryptography, and Advanced Topics in Computer Security.
`
`I am also the Technical Director of the Johns Hopkins University Information Security
`
`Institute, the University’s focal point for research and education in information
`
`security, assurance, and privacy. The University, through the Information Security
`
`Institute’s leadership, has been designated as a Center of Academic Excellence in
`
`Information Assurance by the National Security Agency and leading experts in the
`
`4
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`field. The focus of my work over my career has been computer security, and my current
`
`research concentrates on systems and networking security, with special attention to
`
`software and network security.
`
`8.
`
`After receiving my Ph.D., I began working at Bellcore in its Cryptography
`
`and Network Security Research Group from 1994 to 1996. During this period, I
`
`focused my work on internet and computer security. While at Bellcore, I published an
`
`article titled “Blocking Java Applets at the Firewall” about the security challenges of
`
`dealing with Java applets and firewalls, and a system that we built to overcome those
`
`challenges.
`
`9.
`
`In 1997, I moved to AT&T Labs, Secure Systems Research Department,
`
`where I continued to focus on internet and computer security. From 1995 through
`
`1999, in addition to my work in industry, I served as Adjunct Professor at New York
`
`University, where I taught undergraduate classes on computer, network, and internet
`
`security issues.
`
`10.
`
`I stayed at AT&T until 2003, when I left to accept a full-time academic
`
`position at Johns Hopkins University. I was promoted to full professor with tenure in
`
`April, 2004.
`
`11.
`
`I serve, or have served, on a number of technical and editorial advisory
`
`boards. For example, I served on the Editorial and Advisory Board for the International
`
`Journal of Information and Computer Security. I also served on the Editorial Board
`PayPal Inc. v. IOENGINE, LLC
`5
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`for the Journal of Privacy Technology. I have been Associate Editor of IEEE Security
`
`and Privacy Magazine and have served as Associate Editor of ACM Transactions on
`
`Internet Technology.
`
` I am currently an Associate Editor of
`
`the
`
`journal
`
`Communications of the ACM. I was an Advisory Board Member of Springer’s
`
`Information Security and Cryptography Book Series. I have served in the past as a
`
`member of the DARPA Information Science and Technology Study Group, a member
`
`of the Government Infosec Science and Technology Study Group of Malicious Code,
`
`a member of the AT&T Intellectual Property Review Team, Associate Editor of
`
`Electronic Commerce Research Journal, Co-editor of the Electronic Newsletter of the
`
`IEEE Technical Committee on Security and Privacy, a member of the board of directors
`
`of the USENIX Association (the leading academic computing systems society), and a
`
`member of the editorial board of the Bellcore Security Update Newsletter.
`
`12.
`
`I have spoken on information security and electronic privacy issues at
`
`more than 50 seminars and symposia. For example, I presented keynote addresses on
`
`the topics “Security of Electronic Voting” at Computer Security 2004 Mexico in
`
`Mexico City in May 2004; “Electronic Voting” to the Secure Trusted Systems
`
`Consortium 5th Annual Symposium in Washington DC in December 2003; “Security
`
`Problems on the Web” to the AT&T EUA Customer conference in March 2000; and
`
`“Security on the Internet” to the AT&T Security Workshop in June 1997. I also
`
`6
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`presented a talk about hacking devices at the TEDx conference in October 2011 and
`
`another TEDx talk on the same topic in September 2015.
`
`13.
`
`I was founder and President of Independent Security Evaluators (ISE), a
`
`computer security consulting firm, from 2005–2011. In that capacity, I guided ISE
`
`through the qualification as an independent testing lab for Consumer Union, which
`
`produces Consumer Reports magazine. As an independent testing lab for Consumer
`
`Union, I managed an annual project where we tested all of the popular anti-virus
`
`products. Our results were published in Consumer Reports each year for three
`
`consecutive years.
`
`14.
`
`I am currently the founder and managing partner of Harbor Labs, a
`
`software and networking consulting firm.
`
`B.
`15.
`
`16.
`
`Publications
`
`I am a named inventor on ten U.S. patents in the information security area.
`
`I have also testified before Congress regarding the security issues with
`
`electronic voting machines and in the U.S. Senate on the issue of censorship. I also
`
`testified in Congress on November 19, 2013 about security issues related to the
`
`government’s Healthcare.gov website.
`
`17.
`
`I am author or co-author of five books regarding information security
`
`issues: Brave New Ballot, Random House, 2006; Firewalls and Internet Security
`
`(second edition), Addison Wesley, 2003; White-Hat Security Arsenal, Addison
`
`7
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`Wesley, 2001; Peer-to-Peer, O’Reilly, 2001; and Web Security Sourcebook, John
`
`Wiley & Sons, 1997. I am also the author of numerous journal and conference
`
`publications, which are reflected in my CV.
`
`III. PERSON OF ORDINARY SKILL IN THE ART
`In my opinion, a person of ordinary skill in the art (“POSITA”) would be
`18.
`
`a person with a Bachelor of Science degree in Computer Science, or related discipline,
`
`and two to three years of experience in developing, implementing, or deploying
`
`systems for the encryption of data on a portable device.
`
`19. Such a level of skill would encompass a knowledge of computer hardware,
`
`software development, operating systems, networking, portable or embedded devices,
`
`data encryption, data storage, and peripherals, which would be sufficient for
`
`understanding the technology of the ’047 Patent.
`
`20. This definition of a POSITA characterizes the ordinary skill of persons
`
`involved with software research and development at AT&T Labs, where I worked in
`
`the Secure Systems Research Department from 1997 to 2003. It also characterizes the
`
`ordinary skill of persons within the Information Security Institute at Johns Hopkins
`
`University involved in research relating to portable device security. Furthermore, in
`
`my role as Professor of Computer Science where I train students to become persons of
`
`ordinary skill in the area of computer security, an understanding of how to develop,
`
`8
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`implement, or deploy systems for encrypting data on a portable device would require
`
`building the knowledge and skills outlined above.
`
`IV. LEGAL FRAMEWORK
`21.
`I am not a legal expert and I offer no opinions on the law. However, I
`
`have been advised by counsel about some of the legal principles relevant to an analysis
`
`of patentability of claims in a United States patent, as summarized below. I have
`
`conducted my analysis in accordance with these principles.
`
`22.
`
`I understand that, for an invention claimed in a patent to be found
`
`patentable, or to be valid, it must be, among other things, new and not obvious in light
`
`of what came before it such as “prior art.”
`
`A.
`23.
`
`Standard of Proof
`
`I understand that, in these proceedings, the burden is on the party asserting
`
`unpatentability to prove it by a preponderance of the evidence. I understand that “a
`
`preponderance of the evidence” is evidence sufficient to show that something is more
`
`likely than not.
`
`B. Anticipation
`24.
`I have been informed that a patent claim is invalid as anticipated only if
`
`each and every element and element of that claim is publicly disclosed, either explicitly
`
`or inherently, in a single prior art reference, already in practice in the industry in a
`
`single process or method, already in a single marketed product, or otherwise previously
`
`9
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`invented. I also understand that anticipation requires the presence in a single prior art
`
`disclosure of all elements of the claim arranged as in the claim. For a step or element
`
`to be inherent in a reference, I understand that the step or element must necessarily and
`
`inevitably occur or be present when one follows the teachings of the reference. I am
`
`informed that for a reference to be considered as anticipating, it must disclose the
`
`relevant technology in a manner such that a person of ordinary skill in the art would be
`
`able to carry out or utilize the technology that the reference describes without having
`
`to undertake considerable experimentation.
`
`C. Obviousness
`25.
`I have been informed that a patent claim is invalid as obvious only if it
`
`would have been obvious to a person of ordinary skill in the art at the time the patent
`
`was filed, in light of the prior art. The prior art may include one or more references
`
`that a person of ordinary skill in the art trying to solve the problem that the inventor
`
`addressed would likely have considered, as well as the body of knowledge that such a
`
`person would possess. As in the case of a single reference that anticipates a patent
`
`claim, when one or more references make a patent claim obvious, the reference or
`
`combined references relied upon must disclose each and every element of the
`
`challenged claim. If the reference or combined references relied upon fail to disclose
`
`any element in the challenged claim, then it is not obvious.
`
`10
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`26.
`
`I have been informed that, although a challenger may rely on a
`
`combination of separate prior art references to support an obviousness challenge, a
`
`person of ordinary skill in the art at the time of filing must have had some motivation
`
`to combine the references. That motivation can come from the problem the invention
`
`purports to solve, from other references, from the teachings of those references
`
`showing the invention is obvious, from other references, or from the common-sense
`
`knowledge of a person of ordinary skill in the art. However, obviousness findings
`
`grounded in common sense must contain explicit and clear reasoning providing some
`
`rational underpinning why common sense compels a finding of obviousness.
`
`27.
`
`I have been informed that assessing which prior art references to combine
`
`and how they may be combined to match the asserted claim may not be based on
`
`hindsight reconstruction or ex-post reasoning. That is, one must view the prior art
`
`forward from the perspective of the person of ordinary skill in the art at the time of
`
`invention, not backwards from the current time through the lens of hindsight. It is my
`
`understanding that it is improper to use a patent claim as a template and pick and choose
`
`among the prior art to meet the elements of that claim to show obviousness.
`
`28.
`
`I have been informed that a reference qualifies as prior art for determining
`
`obviousness when it is analogous to the claimed invention. I understand that prior art
`
`may be considered analogous if it is from the same field of endeavor, regardless of the
`
`problem addressed, as the claimed invention. I also understand that prior art may be
`PayPal Inc. v. IOENGINE, LLC
`11
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`considered analogous if it is “reasonably pertinent” to the particular problem with
`
`which the inventor is involved. I have been informed that a reference is “reasonably
`
`pertinent” if it is one which, because of the matter with which it deals, logically would
`
`have commended itself to an inventor’s attention in considering the inventor’s problem.
`
`29.
`
`I have been informed that the factual elements of the obviousness
`
`inquiry—the scope and content of the prior art, the differences between the prior art
`
`and the claims, and the level of ordinary skill in the art at the time of the invention—
`
`are primary to performing a proper obviousness analysis and drawing the appropriate
`
`conclusions from that analysis.
`
`V. THE ’047 PATENT
`30. The ’047 Patent describes a tunneling client access point (“TCAP”) that
`
`communicates with an access terminal (e.g., a cellular telephone, or computer), and
`
`communicates with a remote network node or network device (e.g., a server) by
`
`“tunneling” data through the terminal’s network interface. Ex. 1001, Abstract, 1:19-
`
`25, 2:39-51, 3:42-4:31, 18:12-14, Figs. 1, 5, 9, 10. In other words, the access terminal
`
`serves as a “conduit” or “bridge” through which the TCAP communicates with the
`
`server or other network devices. Id., 4:61-65, 9:6-8, 28:54-56.
`
`31. To prevent the terminal from having access to confidential information
`
`sent between the TCAP and the server, the TCAP secures the data such that “if data
`
`moving out of the TCAP and across the [access terminal] were captured at the [access
`
`12
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`terminal], such data would not be readable.” Id., 13:3-4, 27:28-28:15, Fig. 10. For
`
`example, the TCAP preferably includes a Cryptographic Server Module 1020, which
`
`can be used to “encrypt all data sent through the access terminal based on the TCAP’s
`
`unique ID and user’s authorization information.” Id. at 28:9-15. This concept is
`
`reflected in the Title and Abstract of the ’047 Patent and is discussed throughout. See
`
`’047 Patent title (“Apparatus, method and system for a tunneling client access point
`
`“), abstract (“The disclosure details the implementation of a tunneling client access
`
`point (TCAP) that is a highly secure, portable, power efficient storage and data
`
`processing device. The TCAP “tunnels” data through an access terminal’s (AT)
`
`input/output facilities.”), 2:39-51, 3:42-4:31.
`
`32. Users interact with the TCAP through an interactive user interface
`
`(“IUI”)—e.g., an interactive graphical user interface—that is presented by the access
`
`terminal, making use of the terminal’s input/output components. ’047 Patent at
`
`Abstract, 2:39-46, 3:58-61, 17:51-18:3. The TCAP includes a User Interface Module
`
`1017 that “provides a facility through which users may affect, interact, and/or operate
`
`a computer system,” and which causes the IUI to be presented to the user on the
`
`terminal’s output component. ’047 Patent at 26:19-20, 6:65-7:1, 7:13-15, 7:46-48,
`
`8:38-42, 9:6-10:47, 12:34-63, 26:7-14, Figs. 4, 5-8, 10. Further, the user engages with
`
`“interface elements” of the IUI to cause program code to be executed by the TCAP.
`
`See, e.g., id., 10:33 (“Should the user engage a user interface element…”); 10:38
`PayPal Inc. v. IOENGINE, LLC
`13
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`(“engaging the appropriate user interface element…”); 11:14-16 (“engaging a help
`
`facility user interface element”); 11:64-65 (“engaging an interface element to unfurl
`
`the interface”); 1:52-56 (providing examples of “[c]omputer interaction interface
`
`elements such as check boxes, cursors, menus, scrollers, and windows (collectively and
`
`commonly referred to as widgets)…”), 8:20-22 (“The user might simply click on a
`
`button and gain secure access to such data that may be decrypted by the TCAP.”), 9:38-
`
`49 (user engages interface by clicking on a button to access TCAP facilities; the
`
`interface “unfurls” to present more buttons); 10:20-24 (engaging the interface by
`
`dragging and dropping files), 36-39, 10:65-11:5 (drag and drop), 11:14-32, 62-67
`
`(unfurling interface by graphically opening can of soda), 26:7-27 (interface to access
`
`the TCAP functionality); Figs. 5-8 (showing user interface elements).
`
`33. Applications of the TCAP include, for example, improving the security of
`
`accessing remote data, encrypted communication, and secure purchasing, payment and
`
`billing. Id. at abstract, 2:49-51, 3:65-4:31, 5:11-12, 5:53-55, 7:10-8:44, 8:64-9:1,
`
`10:47-62, 12:56-13:28, 19:38-20:24, 27:28-28:15, figs. 2, 4, 9, 10.
`
`VI. ASSERTED GROUNDS AND REFERENCES RELIED ON
`PETITIONS
`I understand that the ’884 Petition asserts two grounds for invalidity as
`34.
`
`IN
`
`summarized on page 10 of the ’884 Petition. I understand that the ’885 Petition asserts
`
`three grounds for invalidity as summarized on pages 10 of the ’885 Petition. The art
`
`14
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`primarily relied on in the ’884 and ’885 Petitions, Abbott and Shmueli, is described in
`
`the following sections.
`
`A. Abbott
`35. Abbott describes a “USB-compliant personal key with integral input and
`
`output devices.” Abbott title. Abbott uses the term “token” to refer to its personal key.
`
`Abbott 4:65, 6:21-23, 23:3-8, 23:39. The integral user input and output devices on
`
`Abbott’s token “communicate with the [token] processor by communication paths
`
`which are independent from the USB-compliant interface, and thus allow the user to
`
`communicate with the processor without manifesting any private information external
`
`to the personal key.” Abbott abstract. This architecture is depicted in Figure 2, which
`
`shows input and output devices 218 and 222 on the token, as well as data transceiver
`
`252, all of which are able to communicate with processor 212 via communication paths
`
`that are separate from the USB communication path 202 between the token and
`
`computer 102. Abbott fig. 2, 6:65-7:4, 7:15-19, 9:43-49; see also id. figs. 7A−8C,
`
`18:8-19:30 (describing integral input and output devices). Abbott’s integral user input
`
`and output devices are central to achieving Abbott’s stated goal of providing “a
`
`personal key that allows the user to store and retrieve passwords and digital certificates
`
`without requiring the use of vulnerable external interfaces.” Abbott 3:59-62
`
`(emphasis added);
`
`15
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`36. Abbott expresses a security concern that the computer or a server may be
`
`compromised and running malicious software. Abbott 19:42-50, 20:51-59. Abbott
`
`explains that its integral user input and output devices can be used to guard against this
`
`security concern by allowing the user to communicate directly with the token, without
`
`making use of the computer or server. Id. at 19:35-50, 20:59-65, 22:6-18. Abbott
`
`discloses two embodiments that use the integral user input and output devices to
`
`provide added security. One is a “squeeze-to-sign” authorization procedure, depicted
`
`in Figure 9, in which the user is prompted to authorize a transaction by “direct user
`
`input via” the token’s integral user input. Id. fig. 9, 19:57-21:51. A second, depicted
`
`in Figure 10, is a PIN authentication procedure in which the user’s PIN is entered
`
`directly on the token’s integral user input. Id. fig. 10, 21:64-22:55. It is apparent from
`
`Abbott’s title, abstract, and written description that the integral user input and output
`
`devices are an important feature of Abbott’s approach to security.
`
`37. Abbott’s token is accessed through a series of specialized function calls
`
`that are part of API 260. Abbott fig. 2, 8:6-15, 12:45-14:36. This arrangement is
`
`important to the security features of Abbott, because this API-based mechanism is how
`
`the system is able to restrict access to functions on the token. Abbott 12:45-13:15
`
`(“The read and write access type controls govern the transfer of files in the personal
`
`key 200 to and from the application 110.”), 19:61-20:2 (token “requires direct user
`
`input…before honoring any request from the host computer”). Moreover, Abbott
`PayPal Inc. v. IOENGINE, LLC
`16
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`contemplates that the computer software, including at least API 260, application 110,
`
`and browser 262, is stored and executed on the computer, not the token. Abbott figs.
`
`1, 2, 6:13-21, 8:6-15. Abbott discloses installation media for the computer software,
`
`but not that the computer software could be stored on or originate from the token.
`
`Abbott 6:26-32.
`
`38. One important distinction between Abbott and the ’047 Patent is that
`
`Abbott does not disclose the concept of tunneling that is the subject of the ’047 Patent.
`
`For example, in Abbott no communications are tunneled between the token and the
`
`server. Rather the token is merely used to provide authentication and “to store and
`
`retrieve passwords and digital certificates without requiring the use of vulnerable
`
`external interfaces.” Abbott 3:60-62. Encryption and decryption are performed by
`
`computer 102, and in particular by the VIEWDOC program, a plug-in to web browser
`
`262. Abbott fig. 2, 15:59-67. Accordingly, Abbott’s computer has access to both
`
`encryption keys and decrypted documents, and Abbott does not disclose any
`
`communications that are “tunneled” between the token and a server or the ’047 Patent’s
`
`concept of tunneling data through the host computer, in which the portable device
`
`communicates through the terminal network interface without the terminal having
`
`access to the tunneled data.
`
`39. Petitioner quotes Abbott’s reference to “point to point tunneling.” ’884
`
`Petition 16. But Abbott actually references “point to point tunneling protocol (PPTP),”
`PayPal Inc. v. IOENGINE, LLC
`17
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`a protocol that was typically built into Microsoft Windows operating systems, within a
`
`long list of other protocols and with no discussion of how the token would be used in
`
`such an environment. Abbott 4:41 (emphasis added). Ex. 2080.
`
`B.
`Shmueli
`40. Shmueli describes a “portable memory device” with software that can
`
`execute on a host computer. Shmueli [0006]-[0007], [0022], [0025]. Shmueli’s
`
`memory device plugs into a host computer’s USB port, and “will emulate a file system
`
`on a solid state mass storage device.” Id. [0026] [0031]. The software on Shmueli’s
`
`memory device “is configured to readily execute on the host 12 upon interface.” Id.
`
`[0028]. Shmueli’s applications that are “stored on the key 10 and capable of executing
`
`on the host 12 are referred to in general as keylets.” Shmueli [0031]; see also id.
`
`[0022], [0028], [0092]. Shmueli thus describes a typical USB mass storage device
`
`having particular applications and data stored on it.
`
`41. Shmueli’s storage device has no on-board processor, and thus cannot
`
`execute any program code. For example, Shmueli’s Figure 1 depicts CPUs in the host
`
`and server, but not in the memory device. Shmueli fig. 1, [0024], [0027], [0030].
`
`Shmueli’s disclosure of “control circuitry” that “assist[s] in interaction with the host
`
`computing devices as well as organizing the data stored thereon” is not a reference to
`
`an onboard device processor, but instead refers to device functionality that would be
`
`found on any USB mass storage device. Shmueli [0006]. Shmueli’s “control circuitry”
`
`18
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`is responsible for implementing the device side of a USB mass storage device. This is
`
`distinct from the invention of the ’047 Patent, in which the portable device comprises
`
`a processor that executes program code.
`
`42. One critical distinction between Shmueli and the ’047 Patent is that,
`
`following Shmueli’s authentication routine, which “run[s] on the host,” the Shmueli
`
`device becomes incidental to the execution of program code on the host computer.
`
`Shmueli figs. 3A−3B, [0035]-[0037]. This architecture is stated explicitly in the
`
`summary of Shmueli, where it is stated that the device is “primarily a memory device”
`
`that may not include control circuitry, and, if it does include control circuitry, the role
`
`of the control circuitry is simply to “assist in interaction with the host computing
`
`device.” Shmueli [0006]. The ’047 Patent, on the other hand, describes and claims
`
`execution of program code on the portable device, and further that such execution is in
`
`response to a communication resulting from user interaction with the interactive user
`
`interface on the terminal. E.g., ’047 Patent 31:5-8, 32:5-10.
`
`VII. CLAIM CONSTRUCTION
`A.
`IUI
`43. As used in the claims, “an interactive user interface” means “a
`
`presentation containing interface elements with which a user may interact to result in
`
`the terminal taking action responsively by modifying what is presented.”
`
`19
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`44. An example of the commonly used definition of an interactive user
`
`interface comes from an influential paper published at the 1992 ACM Conference on
`
`Human Factors in Computing Systems. Dennis J. M. J. de Baar et al., Coupling
`
`Application Design and User Interface Design, Published in CHI ’92 Proceedings of
`
`the SIGCHI Conference on Human Factors in Computing Systems, ACM, New York,
`
`NY, USA (1992), available at https://dl.acm.org/citation.cfm?id=142806, Ex. 2004. In
`
`this paper, de Baar et al. write that “[b]uilding an interactive application involves the
`
`design of both a data model and a graphical user interface (GUI) to present that model
`
`to the user.” Id. at p. 1 (Abstract). Furthermore, “[e]xternal attributes and methods are
`
`represented in the user interface as standard interaction objects such as buttons,
`
`settings, or sliders (hereafter referred to as “controls”) or as data manipulated directly
`
`by the user.” Id. at p. 1 (Introduction). Therefore, it would have been understood that
`
`an interactive user interface for such an interactive application would have user
`
`interface elements represented within the user interface.
`
`45.
`
`de Baar et al. further explain that “[i]nteraction objects are controls such
`
`as buttons, sliders, or menus that can be manipulated directly by the user.” By reference
`
`to Figures 1 and 2, which appear below, de Baar et al. further explain that “[e]very
`
`interaction object in the user interface is associated with an action or attribute in the
`
`application data model (Figure 1). In Figure 2, for example, the attribute ‘volume
`
`Input’ in the application data model is linked to a slider that can be used to change its
`PayPal Inc. v. IOENGINE, LLC
`20
`IPR2019-00884, IPR2019-00885 (US 8,539,047)
`Exhibit 2003
`
`

`

`
`
`value.” Id. at p. 2; Figs. 1-2. These interaction objects are presented within the user
`
`interface and are responsive to user interaction.
`
`
`
`
`
`46. The types of interactive user interfaces described in de Baar serve as
`
`baseline points of reference when considering the interactive user interface (“IUI”)
`
`described in the ’047 Patent. To begin with, although the interactive user interface
`
`(“IUI”) described in the ’047 Patent may be used to cause the TCAP to take actions,
`PayPal Inc. v. IOENGINE, LLC
`21
`IPR2019-00884, IPR2019

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket