throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`
`PAYPAL, INC.,
`PETITIONER,
`
`V.
`
`IOENGINE, LLC,
`PATENT OWNER.
`____________________
`
`IPR2019-00907
`
`PATENT 9,059,969
`____________________
`
`DECLARATION OF AVIEL D. RUBIN, PH.D.
`
`
`
`Exhibit 2003
`
`

`

`
`
`I.
`
`II.
`
`TABLE OF CONTENTS
`
`Introduction .......................................................................................................... 3
`
`Qualifications ....................................................................................................... 3
`
`A.
`
`B.
`
`Education & Career ................................................................................... 4
`
`Publications ............................................................................................... 7
`
`III.
`
`Person of Ordinary Skill in the Art ...................................................................... 8
`
`IV. Legal Framework ................................................................................................. 9
`
`A.
`
`B.
`
`C.
`
`Standard of Proof....................................................................................... 9
`
`Anticipation ............................................................................................. 10
`
`Obviousness ............................................................................................. 10
`
`V.
`
`The ’969 Patent .................................................................................................. 12
`
`VI. Asserted Grounds and References Relied On In Petitions ................................ 15
`
`A. DiGiorgio ................................................................................................. 15
`
`B.
`
`C.
`
`D.
`
`Burger ...................................................................................................... 16
`
`Shmueli .................................................................................................... 17
`
`Cannata .................................................................................................... 18
`
`VII. Claim Construction ............................................................................................ 19
`
`A.
`
`IUI ............................................................................................................ 19
`
`“facilitate communications . . . to a communications network node
`B.
`through the terminal [network] communication interface” and “facilitate
`communication[s] [to be transmitted] through . . . the terminal network
`interface to a communications network node” .................................................. 24
`
`C.
`
`“[first/second/third/fourth/fifth] program code” ..................................... 26
`
`“communication received by the portable device resulting from user
`D.
`interaction with the interactive user interface” .................................................. 27
`
`VIII. Detailed Analysis ............................................................................................... 29
`
`A. No Motivation to Combine DiGiorgio and Burger ................................. 29
`
`B.
`
`C.
`
`
`
`Elements Neither Disclosed Nor Obvious .............................................. 35
`
`Dependent Claims ................................................................................... 51
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`2
`
`

`

`
`
`1.
`
`I, Aviel D. Rubin, make this declaration in connection with the
`
`proceedings identified above.
`
`I.
`
`INTRODUCTION
`
`2.
`
`I have been retained as an expert on behalf of IOENGINE, LLC
`
`(“IOENGINE”) in connection with the proceedings identified above. I submit this
`
`Declaration on behalf of IOENGINE in support of its Preliminary Response responding
`
`to the Petition for Inter Partes Review in Case IPR2019-00907 (the “’907 Petition”)
`
`filed by PayPal, Inc. (“PayPal” or “Petitioner”) challenging claims 1-22 and 24-29 (the
`
`“Challenged Claims”) of U.S. Patent No. 9,059,969 to McNulty (“the ’969 Patent”)
`
`(Ex. 1002).
`
`3.
`
`The opinions in this Declaration are based on my professional training and
`
`experience and my review of the exhibits discussed herein.
`
`4.
`
`I am being compensated for my services in connection with the
`
`proceedings identified above at my regular rate of $775 per hour (plus reimbursement
`
`for expenses). My compensation is in no way contingent on the outcome of the
`
`proceedings identified above or on any of the opinions I provide below.
`
`II. QUALIFICATIONS
`
`5.
`
`I have summarized in this section my educational background, career
`
`history, publications, and other relevant qualifications. My curriculum vitae is
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`3
`
`

`

`
`
`submitted
`
`as
`
`Ex.
`
`2062,
`
`and
`
`can
`
`also
`
`be
`
`found
`
`at
`
`http://avirubin.com/Avi_Rubins_home_page/Vita.html.
`
`A. Education & Career
`
`6.
`
`I received my Ph.D. in Computer Science and Engineering from the
`
`University of Michigan, Ann Arbor, in 1994, with a specialty in computer security and
`
`cryptographic protocols. My thesis was titled “Nonmonotonic Cryptographic
`
`Protocols” and concerned authentication in long-running networking operations.
`
`7.
`
`I am currently employed as Professor of Computer Science at Johns
`
`Hopkins University, where I perform research, teach graduate courses in computer
`
`science and related subjects, and supervise the research of Ph.D. candidates and other
`
`students. Courses I have taught include Computer Network Fundamentals, Security
`
`and Privacy in Computing, Cryptography, and Advanced Topics in Computer Security.
`
`I am also the Technical Director of the Johns Hopkins University Information Security
`
`Institute, the University’s focal point for research and education in information
`
`security, assurance, and privacy. The University, through the Information Security
`
`Institute’s leadership, has been designated as a Center of Academic Excellence in
`
`Information Assurance by the National Security Agency and leading experts in the
`
`field. The focus of my work over my career has been computer security, and my current
`
`research concentrates on systems and networking security, with special attention to
`
`software and network security.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`4
`
`

`

`
`
`8.
`
`After receiving my Ph.D., I began working at Bellcore in its Cryptography
`
`and Network Security Research Group from 1994 to 1996. During this period, I
`
`focused my work on internet and computer security. While at Bellcore, I published an
`
`article titled “Blocking Java Applets at the Firewall” about the security challenges of
`
`dealing with Java applets and firewalls, and a system that we built to overcome those
`
`challenges.
`
`9.
`
`In 1997, I moved to AT&T Labs, Secure Systems Research Department,
`
`where I continued to focus on internet and computer security. From 1995 through
`
`1999, in addition to my work in industry, I served as Adjunct Professor at New York
`
`University, where I taught undergraduate classes on computer, network, and internet
`
`security issues.
`
`10.
`
`I stayed at AT&T until 2003, when I left to accept a full-time academic
`
`position at Johns Hopkins University. I was promoted to full professor with tenure in
`
`April, 2004.
`
`11.
`
`I serve, or have served, on a number of technical and editorial advisory
`
`boards. For example, I served on the Editorial and Advisory Board for the International
`
`Journal of Information and Computer Security. I also served on the Editorial Board
`
`for the Journal of Privacy Technology. I have been Associate Editor of IEEE Security
`
`and Privacy Magazine and have served as Associate Editor of ACM Transactions on
`
`Internet Technology.
`
` I am currently an Associate Editor of
`
`the
`
`journal
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`5
`
`

`

`
`
`Communications of the ACM. I was an Advisory Board Member of Springer’s
`
`Information Security and Cryptography Book Series. I have served in the past as a
`
`member of the DARPA Information Science and Technology Study Group, a member
`
`of the Government Infosec Science and Technology Study Group of Malicious Code,
`
`a member of the AT&T Intellectual Property Review Team, Associate Editor of
`
`Electronic Commerce Research Journal, Co-editor of the Electronic Newsletter of the
`
`IEEE Technical Committee on Security and Privacy, a member of the board of directors
`
`of the USENIX Association (the leading academic computing systems society), and a
`
`member of the editorial board of the Bellcore Security Update Newsletter.
`
`12.
`
`I have spoken on information security and electronic privacy issues at
`
`more than 50 seminars and symposia. For example, I presented keynote addresses on
`
`the topics “Security of Electronic Voting” at Computer Security 2004 Mexico in
`
`Mexico City in May 2004; “Electronic Voting” to the Secure Trusted Systems
`
`Consortium 5th Annual Symposium in Washington DC in December 2003; “Security
`
`Problems on the Web” to the AT&T EUA Customer conference in March 2000; and
`
`“Security on the Internet” to the AT&T Security Workshop in June 1997. I also
`
`presented a talk about hacking devices at the TEDx conference in October 2011 and
`
`another TEDx talk on the same topic in September 2015.
`
`13.
`
`I was founder and President of Independent Security Evaluators (ISE), a
`
`computer security consulting firm, from 2005–2011. In that capacity, I guided ISE
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`6
`
`

`

`
`
`through the qualification as an independent testing lab for Consumer Union, which
`
`produces Consumer Reports magazine. As an independent testing lab for Consumer
`
`Union, I managed an annual project where we tested all of the popular anti-virus
`
`products. Our results were published in Consumer Reports each year for three
`
`consecutive years.
`
`14.
`
`I am currently the founder and managing partner of Harbor Labs, a
`
`software and networking consulting firm.
`
`B.
`
`Publications
`
`15.
`
`I am a named inventor on ten U.S. patents in the information security area.
`
`16.
`
`I have also testified before Congress regarding the security issues with
`
`electronic voting machines and in the U.S. Senate on the issue of censorship. I also
`
`testified in Congress on November 19, 2013 about security issues related to the
`
`government’s Healthcare.gov website.
`
`17.
`
`I am author or co-author of five books regarding information security
`
`issues: Brave New Ballot, Random House, 2006; Firewalls and Internet Security
`
`(second edition), Addison Wesley, 2003; White-Hat Security Arsenal, Addison
`
`Wesley, 2001; Peer-to-Peer, O’Reilly, 2001; and Web Security Sourcebook, John
`
`Wiley & Sons, 1997. I am also the author of numerous journal and conference
`
`publications, which are reflected in my CV.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`7
`
`

`

`
`
`III. PERSON OF ORDINARY SKILL IN THE ART
`
`18.
`
`In my opinion, a person of ordinary skill in the art (“POSITA”) would be
`
`a person with a Bachelor of Science degree in Computer Science, or related discipline,
`
`and two to three years of experience in developing, implementing, or deploying
`
`systems for the encryption of data on a portable device.
`
`19. Such a level of skill would encompass a knowledge of computer hardware,
`
`software development, operating systems, networking, portable or embedded devices,
`
`data encryption, data storage, and peripherals, which would be sufficient for
`
`understanding the technology of the ’969 Patent. Because the focus of the ’969 Patent
`
`is not merely on a portable device, but instead a portable device that tunnels data
`
`through a terminal to a remote networked device so as to provide a “solution to securely
`
`access, execute, and process data….,” ’969 Patent at 2:26-27, a POSITA would have
`
`had experience with encryption. Moreover, secure tunneling on the Internet is typically
`
`done via IPSec and sometimes SSL. IPSec and SSL are based on encryption
`
`algorithms. A POSITA would know how these tunneling protocols utilize encryption
`
`to protect information as it transits on the Internet.
`
`20. This definition of a POSITA characterizes the ordinary skill of persons
`
`involved with software research and development at AT&T Labs, where I worked in
`
`the Secure Systems Research Department from 1997 to 2003. It also characterizes the
`
`ordinary skill of persons within the Information Security Institute at Johns Hopkins
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`8
`
`

`

`
`
`University involved in research relating to portable device security. Furthermore, in
`
`my role as Professor of Computer Science where I train students to become persons of
`
`ordinary skill in the area of computer security, an understanding of how to develop,
`
`implement, or deploy systems for encrypting data on a portable device would require
`
`building the knowledge and skills outlined above.
`
`IV. LEGAL FRAMEWORK
`
`21.
`
`I am not a legal expert and I offer no opinions on the law. However, I
`
`have been advised by counsel about some of the legal principles relevant to an analysis
`
`of patentability of claims in a United States patent, as summarized below. I have
`
`conducted my analysis in accordance with these principles.
`
`22.
`
`I understand that, for an invention claimed in a patent to be found
`
`patentable, or to be valid, it must be, among other things, new and not obvious in light
`
`of what came before it such as “prior art.”
`
`A.
`
`Standard of Proof
`
`23.
`
`I understand that, in these proceedings, the burden is on the party asserting
`
`unpatentability to prove it by a preponderance of the evidence. I understand that “a
`
`preponderance of the evidence” is evidence sufficient to show that something is more
`
`likely than not.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`9
`
`

`

`
`
`B. Anticipation
`
`24.
`
`I have been informed that a patent claim is invalid as anticipated only if
`
`each and every element and element of that claim is publicly disclosed, either explicitly
`
`or inherently, in a single prior art reference, already in practice in the industry in a
`
`single process or method, already in a single marketed product, or otherwise previously
`
`invented. I also understand that anticipation requires the presence in a single prior art
`
`disclosure of all elements of the claim arranged as in the claim. For a step or element
`
`to be inherent in a reference, I understand that the step or element must necessarily and
`
`inevitably occur or be present when one follows the teachings of the reference. I am
`
`informed that for a reference to be considered as anticipating, it must disclose the
`
`relevant technology in a manner such that a person of ordinary skill in the art would be
`
`able to carry out or utilize the technology that the reference describes without having
`
`to undertake considerable experimentation.
`
`C. Obviousness
`
`25.
`
`I have been informed that a patent claim is invalid as obvious only if it
`
`would have been obvious to a person of ordinary skill in the art at the time the patent
`
`was filed, in light of the prior art. The prior art may include one or more references
`
`that a person of ordinary skill in the art trying to solve the problem that the inventor
`
`addressed would likely have considered, as well as the body of knowledge that such a
`
`person would possess. As in the case of a single reference that anticipates a patent
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`10
`
`

`

`
`
`claim, when one or more references make a patent claim obvious, the reference or
`
`combined references relied upon must disclose each and every element of the
`
`challenged claim. If the reference or combined references relied upon fail to disclose
`
`any element in the challenged claim, then it is not obvious.
`
`26.
`
`I have been informed that, although a challenger may rely on a
`
`combination of separate prior art references to support an obviousness challenge, a
`
`person of ordinary skill in the art at the time of filing must have had some motivation
`
`to combine the references. That motivation can come from the problem the invention
`
`purports to solve, from other references, from the teachings of those references
`
`showing the invention is obvious, from other references, or from the common-sense
`
`knowledge of a person of ordinary skill in the art. However, obviousness findings
`
`grounded in common sense must contain explicit and clear reasoning providing some
`
`rational underpinning why common sense compels a finding of obviousness.
`
`27.
`
`I have been informed that assessing which prior art references to combine
`
`and how they may be combined to match the asserted claim may not be based on
`
`hindsight reconstruction or ex-post reasoning. That is, one must view the prior art
`
`forward from the perspective of the person of ordinary skill in the art at the time of
`
`invention, not backwards from the current time through the lens of hindsight. It is my
`
`understanding that it is improper to use a patent claim as a template and pick and choose
`
`among the prior art to meet the elements of that claim to show obviousness.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`11
`
`

`

`
`
`28.
`
`I have been informed that a reference qualifies as prior art for determining
`
`obviousness when it is analogous to the claimed invention. I understand that prior art
`
`may be considered analogous if it is from the same field of endeavor, regardless of the
`
`problem addressed, as the claimed invention. I also understand that prior art may be
`
`considered analogous if it is “reasonably pertinent” to the particular problem with
`
`which the inventor is involved. I have been informed that a reference is “reasonably
`
`pertinent” if it is one which, because of the matter with which it deals, logically would
`
`have commended itself to an inventor’s attention in considering the inventor’s problem.
`
`29.
`
`I have been informed that the factual elements of the obviousness
`
`inquiry—the scope and content of the prior art, the differences between the prior art
`
`and the claims, and the level of ordinary skill in the art at the time of the invention—
`
`are primary to performing a proper obviousness analysis and drawing the appropriate
`
`conclusions from that analysis.
`
`V. THE ’969 PATENT
`
`30. The ’969 Patent describes a tunneling client access point (“TCAP”) that
`
`communicates with an access terminal (e.g., a cellular telephone or computer), and also
`
`communicates with a remote network device (e.g., a server) by “tunneling” data
`
`through the terminal’s network interface. ’969 Patent Title, Abstract, 1:19−25,
`
`2:39−51, 3:41−4:30, 18:12−14, Figs. 1, 9−10. Specifically, the access terminal serves
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`12
`
`

`

`
`
`as a “conduit” or “bridge” through which the TCAP communicates with the server or
`
`other network devices. Id. at 4:60–64, 28:54–57.
`
`31. To prevent the terminal from accessing information sent between the
`
`TCAP and the server, the TCAP secures the data such that “if data moving out of the
`
`TCAP and across the [terminal] were captured at the [terminal], such data would not
`
`be readable.” Id. at 12:67–13:4, 27:28–28:15, Fig. 10. For example, the TCAP
`
`preferably includes a Cryptographic Server Module, which can be used to “encrypt all
`
`data sent through the access terminal based on the TCAP’s unique ID and user’s
`
`authorization information.” Id. at 28:9−12. Thus, when the ’969 Patent claims refer
`
`to the portable device facilitating communications “through” the terminal’s network
`
`interface to a network device (as opposed to communicating “with” or “to” the
`
`terminal), it means that information is “tunneled” through the terminal in a secure
`
`manner, such that the terminal cannot access it.
`
`32. Users interact with an interactive user interface (“IUI”)—e.g., an
`
`interactive graphical user interface—presented by the terminal on the “output
`
`component.” ’969 Patent Abstract, 2:39–46, 3:57–60, 17:51–18:3, 30:60–66, 33:8–13,
`
`34:2–7. In order to allow the user to interact with the IUI presented on the terminal,
`
`the claims include an “input component” on the terminal. See, e.g., ’969 Patent 30:62,
`
`33:8, 34:2. The IUI on the terminal is thus able to accept user input (from the “input
`
`component”) as interaction with the presented interface elements, interpret the inputs,
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`13
`
`

`

`
`
`and generate corresponding communications to the TCAP. Further, the user engages
`
`with “interface elements” of the IUI to cause program code to be executed by the
`
`TCAP. See, e.g., id., 10:32 (“Should the user engage a user interface element…”);
`
`10:37-38 (“engaging the appropriate user interface element…”); 11:14-15 (“engaging
`
`a help facility user interface element”); 11:63-64 (“engaging an interface element to
`
`unfurl the interface”); 1:52-61 (providing examples of “[c]omputer interaction
`
`interface elements such as check boxes, cursors, menus, scrollers, and windows
`
`(collectively and commonly referred to as widgets)…”); 8:19-21 (“The user might
`
`simply click on a button and gain secure access to such data that may be decrypted by
`
`the TCAP.”), 9:32-48 (user engages interface by clicking on button to access TCAP
`
`facilities; the interface “unfurls” to present more buttons); 10:19-23 (engaging the
`
`interface by dragging and dropping files), 10:32-43 (drag-and-drop zone); 10:62-11:4
`
`(drag and drop), 11:13-31 (“engaging a help facility user interface element”); 11:61-64
`
`(unfurling interface by graphically opening can of soda); Figs. 5-8 (showing user
`
`interface elements).
`
`33. Applications of the TCAP include, e.g., securely accessing remote data,
`
`encrypted communication, and secure purchasing, payment and billing. ’969 Patent
`
`2:49–51, 8:63−9:1, 12:55−13:27, fig. 2.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`14
`
`

`

`
`
`VI. ASSERTED GROUNDS AND REFERENCES RELIED ON
`PETITIONS
`
`IN
`
`34.
`
`I understand that the ’907 Petition asserts three grounds for invalidity as
`
`summarized on page 9 of the ’907 Petition. The art relied on in the ’907 Petition is
`
`described in the following sections.
`
`A. DiGiorgio
`
`35. DiGiorgio describes a system for using a secure token device 10 to access
`
`services provided by an Internet Service Provider (“ISP”). Ex. 1010, Title, Abstract,
`
`3:66-4:3, Figs. 1-4. The token device 10 can be, e.g., a smart card or an “ibutton.”. Id.
`
`3:66-4:3, 5:12-17, Figs. 2A-C, 3, 4.
`
`36. The token device 10 connects with a reader 12 that facilitates
`
`communications between a computer system 14 and the token device, Id. 5:26-33, Fig.
`
`1, and may be integrated as part of the computer system. Id. 7:63-65. There is no
`
`indication in DiGiorgio that the reader is portable. The computer system 14 may
`
`communicate with a remote server 16 via a communication link 15. Id. 5:50-51, Fig.
`
`1. However, there is nothing in DiGiorgio to suggest that the computer does not have
`
`access to communications between the token and server.
`
`37. DiGiorgio’s computer has applications to communicate with the token, id.
`
`5:31-33, and has a separate network adapter for communicating with the server, id.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`15
`
`

`

`
`
`7:24-31, but contains no software that facilitates communications with both the token
`
`and the server.
`
`38. DiGiorgio says nothing about what kind of user interface, if any, is
`
`presented on the computer 14. In addition, there is nothing in DiGiorgio about program
`
`code that is configured (1) to be executed by the token or reader in response to a
`
`communication resulting from user interaction with an IUI, and (2) to cause a
`
`communication to be transmitted to the server, much less a communication that
`
`facilitates transmission of encrypted communications from the server to the computer
`
`14.
`
`39. DiGiorgio also does not describe verification of the token or the reader, or
`
`download of any program code from the server to the computer.
`
`B.
`
`Burger
`
`40. Burger describes a portable electronic authorization system and method
`
`based on an electronic device called a “Pocket Vault” 102 and an associated
`
`token 102a, also referred to as a “Chameleon Card.” Ex. 1011, Title, Abstract, [0086].
`
`The Pocket Vault 102 may be interfaced with an interface station 104, which can
`
`include an interface station computer 304 (e.g., a desktop personal computer (“PC”)),
`
`coupled to a pocket vault interface unit 302. Id. [0123]-[0124]. There is no indication
`
`in Burger that the interface unit is portable.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`16
`
`

`

`
`
`41. Burger does not describe any program code stored on the Pocket Vault or
`
`the interface unit 302 which (1) when executed, causes the presentation of any kind of
`
`user interface, much less an IUI, on the computer 304, or (2) is executed by a processor
`
`in the Pocket Vault or the interface unit in response to a communication resulting from
`
`user interaction with an interactive user interface. In addition, there is no indication
`
`that either the Pocket Vault or the interface unit 302 receives any communication or
`
`causes any communication to be sent as a result of user interaction with an interface on
`
`the computer 304. In particular, neither the Pocket Vault nor the interface unit
`
`executes, in response to a communication resulting from user interaction with an IUI,
`
`any program code configured to cause a communication to be transmitted to the server,
`
`much less a communication that facilitates transmission of encrypted communications
`
`from the server to the computer.
`
`42. Burger’s computer can communicate with both the interface unit and a
`
`server, id. [0124], [0176], Fig. 3, but nothing in Burger suggests that the computer does
`
`not have access to communications between the interface unit and the server.
`
`43. Burger also does not describe verification of the Pocket Vault or the
`
`interface unit or download of any program code from the server to the computer.
`
`C.
`
`Shmueli
`
`44. Shmueli describes a portable memory device, or “key,” that interacts with
`
`a host computer to provide a customized configuration for a computing session. Ex.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`17
`
`

`

`
`
`1009, Abstract, [0024]. The key contains a variety of software functions called
`
`“keylets” which are provided to and executed on the host. Id. [0031], [0034]. The key
`
`has a memory to store software and data, but no processor. Id. [0025]-[0026], Fig. 1.
`
`Thus, it is cannot execute program code.
`
`45. When the key is first plugged into or otherwise connected to the host, the
`
`host runs an initial keylet from the key to authenticate the user. Id. [0028], [0033]-
`
`[0035], Fig. 3A. No security measures are taken before the host executes the user-
`
`authentication keylet. Id. [0034]-[0035], Fig. 3A (Step 106: “EXECUTE INITIAL
`
`KEYLET FROM KEY (UNSECURE)”).
`
`D. Cannata
`
`46. Cannata describes a system and method for providing Web-based
`
`groupware. Ex. 1052, Title, 1:9-12. The purpose of Cannata’s system is to allow
`
`workers in different locations to collaborate with each other on projects by sharing
`
`information via a web server. Id. 1:15-41, 3:28-62, 4:29-40, 6:35-60. The reference
`
`briefly mentions displaying a stock ticker on a webpage but says nothing further about
`
`it. Id. 9:13-22.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`18
`
`

`

`
`
`VII. CLAIM CONSTRUCTION
`
`A.
`
`IUI
`
`47. As used in the claims, “an interactive user interface” means “a
`
`presentation containing interface elements with which a user may interact to result in
`
`the terminal taking action responsively by modifying what is presented.”
`
`48. An example of the commonly used definition of an interactive user
`
`interface comes from an influential paper published at the 1992 ACM Conference on
`
`Human Factors in Computing Systems. Dennis J. M. J. de Baar et al., Coupling
`
`Application Design and User Interface Design, Published in CHI ’92 Proceedings of
`
`the SIGCHI Conference on Human Factors in Computing Systems, ACM, New York,
`
`NY, USA (1992), available at https://dl.acm.org/citation.cfm?id=142806, Ex. 2004. In
`
`this paper, de Baar et al. write that “[b]uilding an interactive application involves the
`
`design of both a data model and a graphical user interface (GUI) to present that model
`
`to the user.” Id. at p. 1 (Abstract). Furthermore, “[e]xternal attributes and methods are
`
`represented in the user interface as standard interaction objects such as buttons,
`
`settings, or sliders (hereafter referred to as “controls”) or as data manipulated directly
`
`by the user.” Id. at p. 1 (Introduction). Therefore, it would have been understood that
`
`an interactive user interface for such an interactive application would have user
`
`interface elements represented within the user interface.
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`19
`
`

`

`
`
`49.
`
`de Baar et al. further explain that “[i]nteraction objects are controls such
`
`as buttons, sliders, or menus that can be manipulated directly by the user.” By reference
`
`to Figures 1 and 2, which appear below, de Baar et al. further explain that “[e]very
`
`interaction object in the user interface is associated with an action or attribute in the
`
`application data model (Figure 1). In Figure 2, for example, the attribute ‘volume
`
`Input’ in the application data model is linked to a slider that can be used to change its
`
`value.” Id. at p. 2; Figs. 1-2. These interaction objects are presented within the user
`
`interface and are responsive to user interaction.
`
`
`
`PayPal Inc. v. IOENGINE, LLC
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`20
`
`

`

`
`
`
`
`50. The types of interactive user interfaces described in de Baar serve as
`
`baseline points of reference when considering the interactive user interface (“IUI”)
`
`described in the ’969 Patent. To begin with, the IUI is presented on the access terminal.
`
`’969 Patent abstract, figs. 5−8, 4:39–64, 30:65–66 (“first program code which, when
`
`executed…, is configured to present an interactive user interface on the terminal output
`
`component”). Furthermore, the IUI is “interactive” in the sense that the user may
`
`manipulate the IUI such that the device on which the IUI resides—the terminal—acts
`
`responsively to the user’s input by modifying what is presented. Id. 9:37–48 (when
`
`user clicks button, interface “further unfurl[s]” to present options to access facilities
`
`and services, including a login button which takes user to a login screen), 10:19–23
`
`(engaging the interface by dragging and dropping files), 10:35–38, 10:64–11:4 (drag
`
`and drop), 11:13–31, 11:61–66 (unfurling interface by graphically opening can of
`PayPal Inc. v. IOENGINE, LLC
`21
`IPR2019-00907 (US 9,059,969)
`Exhibit 2003
`
`

`

`
`
`soda), Figs. 5−8. In contrast, if the user’s input were simply passed along to a different
`
`device, such that the device presenting the interface behaves no differently regardless
`
`of the user’s input, then a POSITA would not consider the user to be interacting with
`
`the interactive user interface.
`
`51. Furthermore, similar to the “interaction objects” of de Baar, the ’969
`
`Patent explains that user interaction takes place by way of “computer interaction
`
`interface elements such as check boxes, cursors, menus, scrollers, and windows….”
`
`’969 Patent 1:52–61; see also id. figs. 5−8 (showing various interaction interface
`
`elements of an IUI). The interaction interface elements are not simply examples or
`
`suggestions. It is these interaction interface elements that “allow for the display,
`
`execution, interaction, manipulation, and/or operation of program modules and/or
`
`system facilities through textual and/or graphical facilities,” and “provide[] a facility
`
`through which users may affect, interact, and/or operate a computer system.” Id. at
`
`17:58–63; see also id. at 10:32–46 (engaging an interface element to manipulate data),
`
`11:13–17 (accessing help facilities by “engaging a help facility user interface
`
`element”).
`
`52.
`
`Indeed, a central purpose of the invention of th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket