throbber
Square, Inc.
`v.
`4361423 Canada Inc.
`IPR2019-01651
`IPR2019-01652
`
`1
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`February 10, 2021
`4361423 Canada Inc. Exhibit 2015
`Square, Inc. v. 4361423 Canada Inc.
`IPR2019-01652
`Page 1
`
`

`

`IPR2019-01651
`
`U.S. Patent No. 9,443,239
`
`• Ground 1:
`• Claims 1-6 - Valliani in view of Vrotsos under 35 U.S.C. §103(a)
`
`• Ground 2:
`• Claims 1-6 - Bear in view of Vrotsos under 35 U.S.C. §103(a)
`
`• Ground 3:
`• Claims 1-6 - Vrotsos under 35 U.S.C. §103(a)
`
`2
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 2
`
`

`

`The ‘239 Patent
`
`3
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01651
`Ex. 1001
`
`IPR2019-01652 Exhibit 2015 Page 3
`
`

`

`Ground 1
`
`Claims 1-6 - Valliani in view of Vrotsos under
`35 U.S.C. §103(a)
`
`4
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 4
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• ‘239 claims require a sensor for reading the recorded information
`stored on the integrated circuit
`
`Ex. 1001, p. 15
`
`5
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 5
`
`

`

`“Smart Card”
`
`6
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 2004 (Zatkovitch Dec.), ¶18
`(POR, pp. 12-13, 15)
`IPR2019-01652 Exhibit 2015 Page 6
`
`

`

`“Smart Card”
`
`7
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 2004, ¶23
`(POR, p. 31)
`
`Ex. 2004, ¶26
`(POR, p. 12)
`
`IPR2019-01652 Exhibit 2015 Page 7
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• “… Valliani references the unit 210 as being able to sense information from the
`card. Unit 210, however, is a magnetic stripe reader and not a smart card reader.”
`(POR, p. 13)
`• “Valliani proves as much when it specifies that “as magnetic stripe 220 moves
`through slot 290, a read head associated with unit 210 senses magnetic charge
`embedded in stripe(s) 220. If desired, module 200 could also be used to write
`information magnetically to stripe(s) 220 on card 230.” Ex. 1005, 5:20-24
`(emphasis added); see also id. at 5:20-26 (“Associated read head electronics in
`unit 210 can process the magnetically sensed information to learn what was
`embedded in stripe 220.”).” (POR, p. 13)
`• “Thus, despite the mention of a smart card and a reference to memory, a POSITA
`would understand that Valliani only describes a magnetic stripe reader
`performing a reading activity and offers no disclosure of a sensor that would
`actually have the ability to read an integrated circuit of a smart card.” (POR, p. 14)
`
`8
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 8
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• “Vrotsos certainly does not supply the sensor for reading an
`integrated circuit that is missing from Valliani. Petitioner asserts that
`Vrotsos’s “smartcard read/write head” constitutes the claimed sensor,
`but Petitioner is incorrect.” (POR, p. 14)
`• “A POSITA would understand that a read/write “head” refers to a
`magnetic read head used for magnetic stripe. Ex. 2004, ¶35. This is
`consistent with how Vrotsos itself refers to the magnetic stripe sensor
`as “reader head 23,” which is a standard industry term for a magnetic
`read head. Id., ¶35. A magnetic read head would not be compatible
`with a sensor required to read an integrated circuit within a smart
`card … .” (POR, p. 14)
`
`9
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 9
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• ‘239 claims require a controller for converting the recorded information into an
`encrypted signal
`
`Ex. 1001, p. 15
`
`10
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 10
`
`

`

`“a controller”
`• The “controller”: a microprocessor, microcontroller, or similar.
`Controls the flow of operations. (POR, p. 34, discussing “flow of operations”; POSR, p.
`10, citing Zatkovich).
`
`• A controller has to perform the claimed functions of “converting the
`recorded information stored on said integrated circuit into an encrypted
`signal indicative of the recorded information” and “transmitting” the
`converted information. (Claim 1) (Claim 4 is similar) (see previous page)
`
`• Controller would have to receive, interpret and process that information
`as digital payment information. (POR, p. 34, citing Zatkovich)
`
`11
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 11
`
`

`

`“a controller”
`
`“A POSITA would understand that in order to
`convert the card information retrieved from the
`card reader … to an encrypted signal for
`transmission it would require a microprocessor,
`microcontroller, or a controller with similar
`processing power.”
`
`(POSR, p. 10; Ex. 2004, ¶48)
`
`12
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 12
`
`

`

`“a controller”
`
`Ex. 2005, p. 6 (Tang Provisional Application) (cited/quoted at Petitioner’s Reply, p. 4)
`
`13
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 13
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`Valliani’s “electronics 210”
`• “First, the purported controller, ‘electronics 210,’ is a component of
`the Valliani reader’s magstripe reader – not a reader for smart cards
`and specifically not having a controller coupled to a sensor for reading
`and converting recorded information stored on the integrated circuit
`of a smart card.” (POR, p. 17)
`• “Second, ‘electronics 210’ does not perform any kind of conversion or
`encryption of recorded information stored on the integrated circuit as
`required for the claimed controller.” (POR, p. 17)
`
`14
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 14
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• “Valliani clearly contemplates that processing of information from an integrated circuit
`would be carried out, if at all, in mobile device 10 … rather than module 200. See Ex.
`1005, 6:1-15 (software 35/45 is loaded onto device 10 and performs processing functions
`and routines); id., 8:7-15 (explaining that Valliani’s reader device, ‘module 200,’ ‘could be
`marketed as a modular kit, ... [which] could also include appropriate software 35/45
`storable in device 10 memory for execution by CPU 20.’); Ex. 2004, ¶¶49-52.” (POR, p. 17)
`• Vrotsos on Valliani:
`“U.S. Pat. No. 6,234,389 to Valliani et al. describes an [sic] module that may
`interface with a laptop computer or personal digital assistant (PDA) through a
`PCMCIA interface. … However, … data must be transferred to a processor within
`the main device (as opposed to the attachment) before being transmitted, either
`over the wireless network or the PSTN, to the remote computer. Therefore, in the
`system disclosed in the Valliani et al. patent, the telephone, laptop computer or
`PDA is still required to satisfy unnecessarily high hardware and software
`requirements, just as with the integrated systems.”
`(POR, p.17-18, quoting Vrotsos ¶5)
`
`15
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 15
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`
`16
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1005, Fig. 1
`(Pet. at pp. 8, 22, 26)
`IPR2019-01652 Exhibit 2015 Page 16
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• “Valliani does not disclose the claimed controller coupled to the
`sensor claimed in independent claims 1 and 4, which require that
`encryption of information of the integrated circuit must happen
`before the information is transmitted to a mobile communication
`device.” (POR, p. 18)
`
`17
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`POSR, p. 9
`IPR2019-01652 Exhibit 2015 Page 17
`
`

`

`Ground 1: Valliani + Vrotsos (Claim 1-6)
`
`‘239 claims require transmitting to remote transaction server for processing a commercial
`transaction
`
`18
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p. 15
`IPR2019-01652 Exhibit 2015 Page 18
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 1-6)
`• “Valliani’s intent is not to perform a commercial transaction, but rather to
`provide a separate validation function in the form of PIN/signature
`authentication.” (POR, p. 21)
`• “Valliani describes the purpose of the PIN authentication, which is ‘to
`confirm that the card 230 has not been lost or stolen,’ and describes that
`the authentication step may require the user of the card to ‘manually input
`PIN data’ using device 210. This PIN data is then sent to host system 75 to
`compare the PIN entry with the known PIN on file.” (POR, p. 21)
`• “Valliani explains that the ‘comparison outcome is sent by host system 75
`to device 10,’ and that this is where the user learns ‘whether the sale
`should proceed.’” (POR, p. 21)
`• “There is no disclosure at all in Valliani regarding the actual transaction of a
`sale … in the event that the user is authenticated.” (POR, p. 21)
`
`19
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 19
`
`

`

`Ground 1: Valliani + Vrotsos (Claim 1-6)
`
`• Claims 1 and 4 require that the controller of the reader device
`transmits its converted “encrypted signal indicative of the recorded
`information” stored on the smart card’s integrated circuit to the
`mobile communication device.
`
`20
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 20
`
`

`

`Ground 1: Valliani + Vrotsos (Claim 1-6)
`
`21
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 21
`
`Ex. 1005, p. 11, 5:20-32 (quoted at POR, p. 22)
`
`

`

`Ground 1: Valliani + Vrotsos (Claim 1-6)
`
`• “Valliani does not disclose the encryption of the information from the
`integrated circuit in module 200. Valliani only discusses that
`‘additional software can also provide data encryption and decoding’
`somewhere in the system, with the only encryption explicitly
`described as happening in module 200 is when PIN data is manually
`entered by the user at the keypad and then encrypted.” (POR, p. 22)
`• “Valliani discloses only the intent and capability to encrypt PIN
`information and provides no indication of any controller in the reader
`encrypting recorded information read from the integrated circuit.”
`(POR, p. 23)
`
`22
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 22
`
`

`

`Ground 1: Valliani + Vrotsos (Claim 1-6)
`
`• “The combination of Valliani and Vrotsos does not disclose
`transmitting an encrypted signal produced by the controller and
`representing information stored on an integrated circuit.” (POR, p. 23)
`• “[A] POSITA would not understand Vrotsos’s ‘smartcard read/write
`head’ to constitute a reader of a smart card integrated circuit.” (POR, p. 23)
`• “Vrotsos does disclose the encryption of the card information, but the
`encrypted information is derived from Vrotsos’s magstripe reader 23.”
`(POR, p. 24)
`
`23
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 23
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 3, 6)
`
`• Dependent claims 3 and 6 require that the mobile communication
`device “receives transaction validation information from said remote
`transaction server.”
`
`24
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 24
`
`

`

`Ground 1: Valliani + Vrotsos (Claims 3, 6)
`• “As described above, Valliani does not disclose processing a commercial
`transaction because a commercial transaction would require some form of
`payment in exchange for goods and services.” (POR, p. 25)
`
`• “The asserted remote host 75 in Valliani is used for retrieving and verifying
`PIN and signature data—not for processing a commercial transaction.” (POR,
`p. 25)
`
`• “Although Valliani mentions that the results of this PIN or signature
`verification may inform the user ‘whether the sale should proceed,’ there is
`no mention of transaction processor, processing a commercial transaction,
`or of receiving verification from a commercial transaction.” (POR, p. 25)
`
`25
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 25
`
`

`

`Ground 1: Valliani + Vrotsos – No motivation
`to combine
`“First, a claimed invention is not obvious unless prior art references
`establish “the motivation, suggestion or teaching of the desirability of
`making the specific combination that was made by the applicant.” In
`re Kotzab, 217 F.3d 1365, 1370 (Fed. Cir. 2000) (emphasis added).”
`(POR, p. 5)
`“Second, beyond looking for the full quantity of the claim elements in
`the prior art, the quality of the evidence and analysis matters. ‘Broad
`conclusory statements standing alone are not “evidence”’ of a
`suggestion, teaching, or motivation to combine under § 103. Id.”
`(POR, p. 5)
`
`26
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 26
`
`

`

`Ground 1: Valliani + Vrotsos – No motivation
`to combine
`• “At root, neither Valliani nor Vrotsos would teach a POSITA anything
`of substance about the reading and encryption of data from an
`integrated circuit, and a POSITA would not see the value in
`consulting either reference (and certainly not in combining them) in
`reference to an invention that is focused on the reading and
`encryption of information from the integrated circuit of a smart
`card.” (POR, pp. 27-28)
`• “[A] POSITA would understand that no aspects of Vrotsos’
`converting or communicating data between its reader and cell
`phone (e.g., RS232 link) are compatible with Valliani’s reader and
`communication device (PCMCIA Bus).” (POR, p. 28)
`
`27
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 27
`
`

`

`Ground 1: Valliani + Vrotsos – No motivation
`to combine
`
`• The objective of Valliani is to produce a line of PCMCIA based products. See Ex. 2004
`(Zatkovich Dec.) at ¶94-101. (POR, p. 27)
`
`28
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 28
`
`

`

`Ground 2
`
`Claims 1-6 - Bear in view of Vrotsos under
`35 U.S.C. §103(a)
`
`29
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 29
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`sensor for reading the recorded information stored on the integrated circuit of a smart card
`
`‘239 claims require a sensor for reading the recorded information
`stored on the integrated circuit of a smart card
`
`30
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p. 15
`
`IPR2019-01652 Exhibit 2015 Page 30
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`sensor for reading the recorded information stored on the integrated circuit of a smart card
`• “Bear does not disclose smart card or sensor for reading a smart card
`containing an integrated circuit.” (POR, p. 31)
`• “Bear considers a SIM chip from a cellular phone ¶0003, ¶0006 as being a
`smart card. Ex. 1007. A SIM card is not capable of performing a commercial
`transaction, and it cannot be read at a point-of-sale device for initiating a
`commercial transaction.” (POR, p. 31)
`• “Although Bear does identify an embodiment that connects to a POS
`device, and a smart card that ‘could be used as a regular credit/debit card
`… ’ a POSITA would not consider a smartcard to be a regular credit/debit
`card. Ex. 2004, ¶108. Smart cards were designed with additional features,
`such as integrated circuits, that made them unique from “regular” payment
`cards.” (POR, p. 31)
`
`31
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 31
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`sensor for reading the recorded information stored on the integrated circuit of a smart card
`
`32
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`(POSR, p. 16)
`
`IPR2019-01652 Exhibit 2015 Page 32
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`controller and conversion into an encrypted signal
`
`33
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p. 15
`
`IPR2019-01652 Exhibit 2015 Page 33
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`controller and conversion into an encrypted signal
`
`• “The claims of the ‘239 patent require the controller to control the flow of
`operations. This includes receiving information from the smart card’s
`integrated circuit via the sensor. The controller then needs to interpret and
`process that information as digital credit card information, then converts it
`to an encrypted signal for transmission to a mobile communication device.”
`(POR, p. 34)
`• Bear’s SIM? “The only thing that Bear substantive describes about the SIM
`is that it is a component that might be able to encrypt PIN and biometric
`data. Ex. 1007, ¶¶48, 59. There is nothing describing the full functionality
`of the claimed controller in the ‘239 patent described above, and a POSITA
`would know better than to assume that a SIM would be used to provide
`that type of functionality.” (POR, p. 34)
`
`34
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 34
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`controller and conversion into an encrypted signal
`
`• Bear’s “controller 52”:
`
`(Ex. 1007, p. 8, ¶33, quoted at POR, p. 35)
`
`35
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 35
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`controller and conversion into an encrypted signal
`• “The ‘239 claims a controller that is coupled to the sensor, converts
`the information recorded on a smart card’s IC into an encrypted
`signal, and transmits the signal.” (POSR, p. 17)
`• “The controller cannot be both ‘controller 52’ and the SIM that Bear
`discusses for PIN encryption. … To the extent that Petitioenr now
`suggests that ‘controller 52’ is the controller, this is also contradicted
`by Petitioner’s other arguments regarding the SIM, and by Bear’s
`description of how the controller works and its ‘minimal processing
`capabilities.’” (POSR, p. 17)
`• “There is nothing in Bear allocating the claimed encryption
`capabilities to controller 52.” (POSR, p. 18)
`
`36
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 36
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`controller and conversion into an encrypted signal
`Combining Bear + Vrotsos
`• “Vrotsos does not disclose the controller claimed in the ‘239 patent
`that performs the functions of taking information indicative of what is
`stored on an integrated circuit, encrypting that information into an
`encrypted signal, and transmitting that encrypted signal to a mobile
`communication device. Vrotsos’s disclosure does not support the
`reading of an integrated circuit.” (POR, p. 36)
`• “Furthermore, Vrotsos does not disclose transmitting a signal
`containing encrypted information representing information stored on
`an integrated circuit.” (POR, p. 36)
`
`37
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 37
`
`

`

`Ground 2: Bear + Vrotsos (Claims 4, 5-6)
`“further processing by circuitry contained in said mobile communication device”
`
`38
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p. 15
`IPR2019-01652 Exhibit 2015 Page 38
`
`

`

`Ground 2: Bear + Vrotsos (Claims 4, 5-6)
`“further processing by circuitry contained in said mobile communication device”
`
`• “further processing” is not just reformatting, repackaging or relaying
`the encrypted signal to the transaction server. (Ex. 2004, ¶164; POR, p. 37)
`• Square in Morley IPR:
`
`39
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 2001, pp. 52-53
`(POR, p. 39)
`
`IPR2019-01652 Exhibit 2015 Page 39
`
`

`

`Ground 2: Bear + Vrotsos (Claims 4, 5-6)
`“further processing by circuitry contained in said mobile communication device”
`
`• “Minimally the information from the card must be extracted in order
`to be processed, and there is no disclosure that Bear’s wireless
`communication device performs any processing other than passing
`the information on to the transaction server. See, e.g., Ex. 1007,
`¶¶46-48 … .” (POR, p. 37)
`• “Bear+ Vrotsos … Vrotsos’s processor 303 communicates digitally
`with the communication device … . Petitioner does nothing other
`than argue that Vrotsos discloses the possibility of an A/D converter
`without explaining how Vrotsos ever uses it to perform “further
`processing.” (POSR, p. 21)
`
`40
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 40
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`transmitting the encrypted signal indicative of the recorded information
`
`41
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p 15
`
`IPR2019-01652 Exhibit 2015 Page 41
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`transmitting the encrypted signal indicative of the recorded information
`
`• “Petitioner seems to believe that encrypting any card information is
`the same as producing an encrypted signal corresponding to the
`information stored on the integrated circuit of a smart card.” (POR, p. 40)
`• “Bear states … that there is an encryption device identified as a SIM
`(Ex. 1007, ¶35) that may be used for encryption of PIN/biometric
`data, but that the encryption may occur in the smart card itself. Id.
`¶48.” (POR, p. 41)
`
`42
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 42
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`transmitting the encrypted signal indicative of the recorded information
`• “When Petitioner refers to Bear ¶71 stating that ‘communicated data may
`be encrypted as described herein above,’ the ‘herein above’ describes the
`device as being used for general authentication purposes, such as
`authentication of an ID in order to verify a user’s bank balance. In the
`example, Bear also states the PIN entry is optional and need not be
`transmitted, as it may be authenticated in the card itself.” (POR, p. 42)
`• “In disclosing the encryption and transmission of PIN/biometric data with
`no significant disclosure of anything else, Bear does not disclose the
`elements of independent claims 1 and 4.” (POR, p. 42)
`• Bear + Vrotsos does not show IC encryption. “Vrotsos does disclose the
`encryption of the card information, but the encrypted information is
`derived from Vrotsos’s magstripe reader 23.” (POR, p. 43)
`
`43
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 43
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`
`44
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p 15
`
`IPR2019-01652 Exhibit 2015 Page 44
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`• “Bear does not disclose the claimed remote transaction server for processing a commercial
`transaction because [Bear] makes clear that server 106 is not intended to process a commercial
`transaction at all, but rather is intended to authenticate or authorize some other external device
`to process a commercial transaction.” (POR, p. 44)
`
`45
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1007, Fig. 3
`(POR, p. 45)
`
`IPR2019-01652 Exhibit 2015 Page 45
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`
`46
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1007, p. 9, ¶41, (quoted at POR, p. 44)
`IPR2019-01652 Exhibit 2015 Page 46
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`• Bear’s “Server 106” as either an “IVR or Human Service Provider”
`(Ex. 1007, p. 3,Fig. 3, (POR, p. 45)
`
`47
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 47
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`• “Bear’s ‘IVR or Human Service Provider’ does not process[] a
`commercial transaction. Rather, the IVR/human is used to
`authenticate and/or authorize the user to communicate with another
`unspecified ‘external device’ to perform a requested action.” (POSR, p. 22)
`
`• “Bear’s server 106 never interacts with any device to process a
`commercial transaction. It merely communicates information back to
`the mobile phone to ‘authorize the cellular phone’ to request the
`transaction.” (POSR, p. 23)
`
`48
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 48
`
`

`

`Ground 2: Bear + Vrotsos (Claims 3, 6)
`receiving transaction validation information from said remote transaction server
`
`49
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1001, p. 15
`
`Ex. 1001, p. 16
`IPR2019-01652 Exhibit 2015 Page 49
`
`

`

`Ground 2: Bear + Vrotsos (Claims 3, 6)
`receiving transaction validation information from said remote transaction server
`• “[T]he ‘239 patent … calls for the mobile communication device to
`receive transaction validation directly from a remote server—not to
`seek authorization from a human or IVR unit for the mobile phone to
`communicate with a separate external device.” (POR, p. 47)
`• “As stated above in Bear ¶41, the action could take place on the local
`device (to provide the requested access) or on some unnamed
`external device (to perform a requested/authorized action). The
`receiving of this authorization would not constitute the generation of
`transaction validation information, as the transaction access has not
`yet been granted nor has the requested action been performed.” (POR,
`p. 47)
`
`50
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 50
`
`

`

`Ground 2: Bear + Vrotsos (Claims 3, 6)
`receiving transaction validation information from said remote transaction server
`• “Bear’s action taken by the IVR or human operator, with a reference
`to a separate external device, is clearly different than what is claimed
`in the ‘239 patent, with the mobile device communicating directly
`with the remote transaction server to complete and validate the
`commercial transaction.” (POR, p. 47)
`• “[W]hether Bear’s server is human or machine, it does not provide
`transaction validation information because the server has still done
`nothing other than authorize the user to take the next steps to
`com[plete a transaction that has not yet occurred.” (POSR, p. 24)
`
`51
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 51
`
`

`

`Ground 2: Bear + Vrotsos
`No motivation to combine Bear and Vrotsos
`• Petitioner: “[U]sing a smartcard read/write head was known to read recorded
`information stored on said integrated circuit incorporated into said card. Thus,
`a POSITA applying Vrotsos’s teaching to Bear would have expected to yield the
`predictable result of success. Specifically, applying a smartcard read/write
`head to Bear’s smart card reader 64 would have enabled the smart card
`reader 64 to read the data encoded by the smartcard’s memory chip.” (Petition, p.
`51)
`• “In many ways, this argument exemplifies Petitioner’s approach to finding a
`motivation to combine. The Petition starts with a dubious premise (that
`Vrotsos’s read/write head “was known” to read an integrated circuit). From
`there, it proceeds to assume motivation and the successful combinability of
`the prior art (i.e., applying Vrotsos to Bear “would have expected to yield the
`predictable result of success”).” (POR, p. 49)
`
`52
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 52
`
`

`

`Ground 2: Bear + Vrotsos
`No motivation to combine Bear and Vrotsos
`
`• “[A] conclusory assertion with no explanation is inadequate to
`support a finding that there would have been a motivation to
`combine because this type of finding, without more, tracks the ex
`post reasoning KSR warned of and fails to identify any actual reason
`why a skilled artisan would have combined the elements in the
`manner claimed.”) See, e.g., TQ Delta, LLC v. CISCO Sys., Inc., 942 F.3d
`1352, 1359 (Fed. Cir. 2019). (POR, p. 3)
`
`53
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 53
`
`

`

`Ground 3
`
`Claims 1-6 – Vrotsos under 35 U.S.C. §103(a)
`
`54
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 54
`
`

`

`Ground 3: Vrotsos – single reference
`
`•Arendi v. Apple, 832 F.3d 1355 (Fed. Cir. 2016)
`• “[C]onclusory statements and unspecific expert
`testimony” is insufficient in reaching a motivation
`to modify.
`• Must still be supported by evidence and reasoned
`explanation
`
`55
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`POR, p. 51-52
`
`IPR2019-01652 Exhibit 2015 Page 55
`
`

`

`Ground 3: Vrotsos – single reference
`• Vrotsos fails to disclose:
`• (1) the claimed sensor for reading a smart card containing an
`integrated circuit
`• (2) a controller for converting information from an integrated
`circuit into an encrypted signal suitable for transmission to a
`mobile communication device
`• (3) transmitting a signal containing encrypted information from an
`integrated circuit
`• (4) the further processing of card information by a mobile
`communication device.
`
`56
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 56
`
`

`

`Ground 3: Vrotsos – single reference
`
`57
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 2004, ¶180
`(POR, p. 56)
`
`IPR2019-01652 Exhibit 2015 Page 57
`
`

`

`IPR2019-01652
`
`U.S. Patent No. 9,613,351
`
`• Ground 1:
`• Claims 1-10 - Valliani in view of Vrotsos under 35 U.S.C. §103(a)
`• Ground 2:
`• Claims 1-6 - Bear in view of Lahteenmaki under 35 U.S.C. §103(a)
`• Ground 3:
`• Claims 4-10 - Bear in view of Lahteenmaki and Vrotsos under 35 U.S.C.
`§103(a)
`• Ground 4:
`• Claims 1-10 - Vrotsos under 35 U.S.C. §103(a)
`
`58
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 58
`
`

`

`The ‘351 Patent
`
`59
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652
`Ex. 1001
`
`IPR2019-01652 Exhibit 2015 Page 59
`
`

`

`Ground 2
`
`Claims 1-6 - Bear in view of Lahteenmaki under
`35 U.S.C. §103(a)
`
`60
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 60
`
`

`

`Ground 2: Bear + Lahteenmaki (Claims 1-6)
`
`61
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`POSR, p. 13-14
`
`IPR2019-01652 Exhibit 2015 Page 61
`
`

`

`Ground 2: Bear + Lahteenmaki (Claims 1-6)
`“Controller”
`• “The ‘351 claims . . . the controller to control the flow of operations
`and perform advanced processing including receiving information
`from the payment device via the sensor, interpreting and processing
`that information as digital payment information, and finally
`converting that information into a format suitable for transmission to
`a mobile communication device. See, e.g., Ex. 1001, 9:10-13. (POR, p. 35)
`• “The limited functionality of controller 52 is exactly why Petitioner—
`particularly where claims call for encryption—has consistently flip-
`flopped in allocating controller functionality between Bear’s SIM chip
`and controller 52.” (POSR, p. 15)
`
`62
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 62
`
`

`

`Ground 2: Bear + Lahteenmaki (Claims 1-6)
`“Controller”
`
`Ex. 1007, p. 8, ¶33
`(POR, p. 35)
`
`63
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 63
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`• “Petitioner relies on server 106. Petition, 64-65. Server 106, however, is intended to authenticate
`or authorize a user to then interact with “another external device and perform a
`requested/authorized action.” Id., ¶41 (emphasis added). . . . As shown, Bear’s “Server 106,” as
`either an “IVR or Human Service Provider,” neither of which is compatible with the ‘351 patent
`claims. An IVR (Interactive Voice Response) unit can, at most, be used to authenticate and/or
`authorize the user to communicate with another unspecified “external device” to perform a
`requested action. Ex. 2004, ¶¶123-124. (POR, pp. 37-38)
`
`64
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`Ex. 1007, p. 3, Fig. 3
`
`IPR2019-01652 Exhibit 2015 Page 64
`
`

`

`Ground 2: Bear + Vrotsos (Claims 1-6)
`remote transaction server for processing a commercial transaction
`
`65
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`POSR, p. 18
`
`IPR2019-01652 Exhibit 2015 Page 65
`
`

`

`Ground 2: No motivation to combine Bear and
`Lahteenmaki
`• Petition arguments on motivation to combine highlight the
`deficiencies in Bear (POR, pp. 45-46; POSR, pp. 20-21)
`• Petitioner’s argument is “about a smart card; not an argument about
`a multi-component payment device that can read a smart card. …
`There is nothing in that argument supporting the combination … .”
`(POSR, p. 21)
`• See Kinetic Concepts, Inc. v. Smith & Nephew, Inc., 688 F.3d 1342,
`1369 (Fed. Cir. 2012) (“Because each device 22 independently
`operates effectively, a [POSITA] … would have no reason to combine
`the features of both devices into a single device.”). (POSR, pp. 21-22, 24-25)
`
`66
`
`DEMONSTRATIVE EXHIBIT - NOT EVIDENCE
`
`IPR2019-01652 Exhibit 2015 Page 66
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket