throbber
US8646056 to Poplett
`
`
`
`
`
`
`1
`Application as Filed
`05m?
`
`
`DESCRIPTION
`
`
`DATE
`
`2
`
`Filing Receipt
`
`06/07/2007
`
`Notice to File Missing Parts
`06/07/2007
`
`— Declaration
`07/05/2007
`— Updated Filing Receipt
`07/12/2007
`
`
`6
`Information Disclosure Statement
`08/17/2007
`
`
`Amendment
`11/05/2010
`
`
`RCE Transmittal
`02/07/2013
`
`
`18
`Amendment
`
`19
`
`Notice of Allowability
`
`
`20
`Interview Summary
`
`21
`l Notice of Allowance
`22
`Issue Fee
`
`02/07/2013
`
`10/04/2013
`
`10/04/2013
`10/04/2013
`01/02/2014
`
`23
`
`Issue Notification
`
`01/15/2014
`
`
`
`
`
`Apple Ex. 1007, p. 1
`Apple Ex. 1007, p. 1
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`
`
`Notice of Publication
`
`Rejection
`
`7
`
`8
`
`9
`
`
`10
`Final Rejection
`
`11
`
`12
`
`13
`
`RCE Transmittal
`
`Amendment
`
`Rejection
`
`
`14
`Amendment
`
`15
`
`Extension of Time
`
`Final Rejection
`
`11/20/2008
`
`08/05/2010
`
`12/03/2010
`
`03/04/2011
`
`01/17/2012
`
`06/18/2012
`
`06/18/2012
`
`09/07/2012
`
`
`03/04/2011
`
`
`
`

`

`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Patent Application No. 11/750,263
`
`Applicant: POPLETT, John
`
`Filed: May 17, 2007
`
`TC/AU: Unassigned
`
`Examiner: Unassigned
`
`Docket No.: 257322
`
`Customer No.: 23460
`
`Mail Stop Amendment
`Commissioner for Patents
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`INFORMATION DISCLOSURE STATEMENT
`
`Pursuant to 37 CFR 1.97 and 1.98, the references listed on the enclosed Form PTO-1449 and/or
`Substitute Form PTO-1449 (“Form 1449”) are submitted for consideration by the Examiner in
`the examination of the above-identified patent application.
`
`The fiill consideration of the references in their entirety by the Examiner is respectfully requested
`and encouraged. Also, it is respectfully requested that the references be entered into the record of
`the present application and that the Examiner initial the appropriate area on the enclosed Form
`1449, thereby indicating the Examiner’s consideration of each of the references.
`
`The submission of the references listed on the Form 1449 is for the purpose of providing a
`complete record and is not a concession that the references listed thereon are prior art to the
`invention claimed in the patent application. The right is expressly reserved to establish an
`invention date earlier than the above-identified filing date in order to remove any reference
`submitted hereun'th as prior art should it be deemed appropriate to do so.
`
`Further, the submission of the references is not to be taken as a concession that any reference
`represents art that is relevant or analogous to the claimed invention. Accordingly, the right to
`argue that any reference is not properly within the scope of prior art relevant to an examination
`of the claims in the above-identified application is also expressly reserved.
`
`
`
`Page 1 of 4
`
`Apple Ex. 1007, p. 2
`Apple Ex. 1007, p. 2
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`In re Appln of John Poplett
`Application No. 1 1/750,263
`
`The Information Disclosure Statement is being filed:
`
`'
`
`Within any one ofthe following time periods: (a) within three months of the filing date
`of a national application other than a continued prosecution application under
`37 CFR 1.53(d); (b) within three months of the date of entry of the national stage as set
`forth in 37 CFR 1.491 of an international application; (c) before the mailing date of a first
`Office Action on the merits; in (d) before the mailing of a first Office Action after the
`filing of a request for continued examination under 37 CFR 1.1-1 4.
`
`1:]
`
`after (a), (b), (c) or ((1) above, but before the mailing date of a final action under
`37 CFR 1.113, a Notice of Allowance under 37 CFR 1.311, or an action that otherwise
`closes prosecution in the application, and includes one of:
`
`CI
`
`or
`
`I]
`
`the Statement under 37 CFR 1.97(e) (see “Statement under 37 CFR 1.97(e)”
`below).
`
`the fee of$180 set forth in 37 CFR 1.17(p) (see “Fees” below).
`
`El
`
`[I
`
`after the mailing date of a final action under 37 CFR 1.113 or a Notice of Allowance
`under 37 CFR 1.311, or an action that otherwise closes prosecution in the application,
`and on or before payment of the issue fee, and includes the Statement under
`37 CFR 1.97(e) (see “Statement under 37 CFR 1.97(e)” below), and the fee of $180 as set
`forth in 37 CFR 1.17(p) (see “Fees” below).
`
`after the mailing date of a Notice of Allowance under 37 CFR 1.311, and on or before
`payment of the issue fee, and within thirty days of receiving each item of information
`contained in the Information Disclosure Statement, and includes the Statement under
`37 CFR 1.704(d) (see “Statement under 37 CFR 1.704(d)” below), and the fee of $180 as
`set forth in 37 CFR 1.17(p) (see “Fees” below). NOTE: This is for original applications except
`applications for a design patent, filed on or after May 29, 2000, wherein a paper containing only an
`Information Disclosure Statement in compliance with 37 CFR 1.97 and 1.98 is being filed.
`
`Copies of the References
`
`E]
`
`K4
`
`CI
`
`Copies of all of the references listed on the enclosed Form 1449 are enclosed herewith.
`
`Copies of US. patents and patent applications that are listed on the accompanying Form
`1449 are not enclosed herewith. Copies of other references identified on the
`accompanying Form 1449 are enclosed herewith.
`
`For each reference not in the English language, attached is an English translation, a
`concise explanation of relevance, an English-language equivalent/patent, an
`English-language abstract, or an English-language version of the search report or action
`by a foreign patent office in a counterpart foreign application indicating the degree of
`relevance found by the foreign office pursuant to 37 CFR l.98(a)(3).
`
`Page 2 of 4
`
`
`
`
`Apple Ex. 1007, p. 3
`Apple Ex. 1007, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`In re Appln of John Poplett
`Application No. 11/750,263
`
`1:]
`
`I:]
`
`A copy of the foreign search report is enclosed herewith.
`
`The references listed on the enclosed Form 1449 were previously identified in the parent
`application(s) of the present application, and copies of the references were fumished at
`that time. Accordingly, additional copies of the references are not submitted herewith, so
`as not to burden the file with duplicate copies of references. The Examiner is respectfully
`requested to carefully review the references in accordance with the requirements set out
`in the Manual of Patent Examining Procedure. In accordance with 37 CFR‘1.98(d), the
`details of the parent application(s) relied upon for an earlier filing date under 35 USC 120
`in which copies of the references were previously furnished are set out below:
`
`.
`
`
`
`
`
`
`
`'
`U.S. APPLICATIONS
`STATUS (check one)
`U.S. APPLICATIONS
`U.S. FILING DATE
`' PATENTED
`PENDING
`ABANDONED
`—_-_—
`-_——_
`
`—____
`
`'
`
`
`
`
`
`Statement under 37 CFR 1.97(e)
`
`D The undersigned hereby states that cacti item of information contained in the
`Information Disclosure Statement was first cited in any communication from a foreign
`patent office in a counterpart foreign patent application not more than three months prior
`to the filing of the Information Disclosure Statement.
`
`E The undersigned hereby states that no item of information contained in the Information
`Disclosure Statement was cited in a communication from a foreign patent office in a
`counterpart foreign patent application, and, to the knowledge of the undersigned after
`making reasonable inquiry, no item of information contained in the Information
`Disclosure Statement was known to any individual designated in 37 CFR l.56(c) more
`than three months prior to the filing of the Information Disclosure Statement.
`
`Statement under 37 CFR 1.704(d)
`
`D The undersigned hereby states that each item of information contained in the
`Information Disclosure Statement was cited in a communication from a foreign patent
`office in a counterpart application and that this communication was not received by any
`individual designated in 37 CFR l.56(c) more than thirty days prior to the filing of the
`Information Disclosure Statement.
`
`Fees
`
`R?
`
`No fee is owed by the applicant(s).
`
`Page 3 of 4
`
`
`
`Apple Ex. 1007, p. 4
`Apple Ex. 1007, p. 4
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`In re Appln of John Poplett
`Application No. l l/750,263
`
`E]
`
`Charge Deposit Account No. 12—1216 in the amount of $180.00 (37 CFR 1.17(p)).
`(A duplicate copy of this communication is enclosed for that purpose.)
`
`l,
`~
`
`V Authorization to Charge Additional Fees
`
`IX
`
`If any additional fees are owed in connection with this communication, please charge
`Deposit Account No. 12~1216. (A duplicate copy of this communication is enclosed for
`that purpose.)
`
`Instructions as to Overpayment
`
`DE
`CI
`
`Credit Account No. 12-1216.
`
`Refimd
`
`Phillip M. Pippenger, Reg. No. 46,055
`LEYDIG, VOIT & MAYER, LTD.
`Two Prudential Plaza, Suite 4900
`180 North Stetson Avenue
`
`Chicago, Illinois 60601-6731
`(3 12) 616-5600 (telephone)
`(312) 616-5700 (facsimile)
`
`Date: August 17, 2007
`
`IDS (Revised 2006 10 25)
`
`
`
`Page 4 of 4
`
`Apple Ex. 1007, p. 5
`Apple Ex. 1007, p. 5
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`Please type a plus sign (+) inside this box ——)
`
`
`
`Complete if Known
`
`
`Substitute for form 1449AIBIPTO
`11/720,262
`
`
`
`_—INFORMATION DISCLOSURE $1,353?“
`
`
`
`
`STATEMENT BY APPL'CANT _—
`
`
`(Use as many sheets as necessa ‘ _—
`
`——-—-— 257222
`U.S. PATENT DOCUMENTS
`
`
`
`
`
`
`
`
`
`
`. .—_
`'
`'
`‘
`-Br00kner
`—- US7,108.177
`_-_-__—
`_-—_-_—
`_-—I-——
`—-—_——— .
`—-__——_ i
`_-—-—_—
`_-—__—_
`_ ,Al __—_
`_-_-_—_
`
`
`
`
`
`
`
`
`
`
`I
`.
`I
`l
`
`
`
`Examiner
`Initials
`
`Doc.
`No.
`
`Foreign Patent Document
`Application or
`Patent Number
`
`Office
`
`FOREIGN PATENT DOCUMENTS
`
`.
`
`Examiner
`Initials
`
`DocA
`. No.
`
`B C
`
`- B E
`B F
`
`'
`
`OTHER - NON PATENT LITERATURE DOCUMENTS
`Include name of the author (in CAPITAL LETTERS), title of the article (when appropriate), title of the item
`(book, magazine, journal, serial. symposium, catalog, etc), date, page(s), volume-issue number (5), publisher,
`city and/orcount where oublished.
`"eWallet Your Important Info — Secure & Convenient in a Digital Wallet," obtained from
`the internet at htt
`:l/www.iliumsoft.com/site/ew/ewallet.htm on April 11, 2007 (No
`specified date, but not later than an nlicant’s filin- date) (2 pages)
`"eWallet, eWallet Features.” obtained from the internet at
`http://www.iliumsoft.com/site/ew/ew featshtm on April 11, 2007 (No specified date, but
`not later than ap-licant's filing date 2
`the FIDIS consortium-EC Contract No. 507512, "Study on Mobile Identity Management,”
`obtained from the internet at htt
`://www.fidis.net/fileadmin/fidls/deliverableslfidis-w 3-
`de13.3.stud
`on mobile identi maria ement. of on May 18, 2007 (May 9, 2005) (90
`93968)
`FRANKS et aI. “HTTP Authentication: Basic and Digest Access Authentication"
`obtained from the internet at http://wwwletforg/rfc/rfczei7.b<t on March 22, 207 (June
`1999) (32 pages)
`"NFC Forum : Frequently Asked Questions" obtained from the internet at http://wwwnfc—
`forumorg/resources/fagsl on March 22, 2007 Copyri-ht 2007 8 pages
`"Nokia Unveils RFlD Phone Reader" RFID Journal obtained from the internet at
`htt
`:l/www.rtid'ournaI.com/articIe/articleview/834/1/1/ on March 21, 2007 (March 17,
`2004) (3 pages)
`
`‘ A concise statement of relevance is being submitted in lieu of a translation. 37 CFR 1.98(a)(3).
`+ An English-language equivalent/patent, or an English-language abstract, or an English-language version of the search report or action by a foreign patent
`office in a counterpart foreign application indicating the degree of relevance found by the foreign office is being submitted In lieu of a concise explanation
`of relevance under 37 CFR t.98(a)(3).
`
`Apple Ex. 1007, p. 6
`Apple Ex. 1007, p. 6
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`Password Manager and digital wallet for Pocket PC, Palm and Smartphone.
`
`Page 1 of 2
`
`
`
`%W G t E 8‘?
`
`
`
`Your Important Info - Secure & Canvenient in a Digital Wallet
` vim
`
`eWallet 5.0 is; new available? With enhanced, eaSy-tav'ssse synchronization,
`remote: wallet storage an d v ewirig, and r: any otlier imprcwements, it‘s easier than
`
`ever to keep your data secure! ll lag Mere
`
`
`
`
`
`
`1l l
`
`Now you can have all your important information: passwords, creéit cards, accounts and
`more, in a formal: that's secure, easy as access,‘ centralized ' nd pal-table wherever you
`want it? Use llium Software eWailet® on your:
`
`Packet sac
`
`easim as Hamlhelsl
`
`Wineaws Smarmhefie
`
`and synchronize your cards or files with eWalle‘r on your Windows PC.
`'
`
`
`
` A. um» Amman:
`
`
`‘ Amnnis
`Credit (lard;
`
`US$95 t3 Stare:
`
`Earth-Bunk
`
`.
`
`>
`.481304
`
`1311533111: SM
`)5: Try Free for 30 Days
`
`x Buy eWallet Now
`
`gg- Awards: and Reviews;
`
`k Get Gra phics
`
`1%.: Sc reenshots
`
`)ge Technical Support
`
`311113133: is manage may:
`
`' Palm Powered Handhe'ds
`- Pocket PCs
`
`I MS Smartphones
`a Windows PCs
`
`I U3 Flash Drives
`
`(What's My Device?)
`
`53133111111 §~'s «=1» w: 1mm:
`“
`‘
`
`’77/
`
`’w«m,4.
`
`L} ’3a”
`
`eWa llet ga rd Imggrter
`
`Fasswqrdflggemetagtgr
`
`
`
`
`
`‘
`4435334341341: 9344
`‘
`.
`.
`Mid
`
`Passworda
`Calling Cards
`ixali‘esflftlfi
`Credit Cards
`'
`James mask '
`Health Info
`
`H” “mm” Mam: swam 883441111941?
`Travel Clubs
`i
`~-~--
`‘
`"W
`Accounts
`l”
`Details Fields:
`
`
`.
`Memberships:
`§‘m§'tCVC#'
`5.5.
`User Names
`MR1;
`wwearxhim‘kcom"
` liter Mime:
`
`
`
`See,M9..re.§s:remshet§
`
`EataQuick Tour
`
`With eWallet as yam password manager you can:
`
`a Synchronize your wallets quickly villa the easywtwusa Sync: Setup interface.
`a Keep your data current eve"ywhere! Sync to multiple PDAS, LIMPCS, laptops,
`netvorK computeis, even remote locations on the web there is no limit
`a View your data from remcize compilers using our built-in access to {gigrlegg
`
`
`
`hrm:l/wwwjliumsoftcom/site/ew/ewallet.htm
`
`4/11/2007
`Apple Ex. 1007, p. 7
`Apple EX. 1007, p. 7
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`Password Manager and digital wallet for Pocket PC, Palm and Smartphone.
`
`Page 2 of 2
`
`beatweaeera bath for only $29.95.
`
`gigggwa‘ilgl; or; your Packet PC, Palm OS Handheld,
`Smartphone, er Windows PC for only $19.95.
`
`..
`
`
`fig;gm:ligirjflmtgsmima.
`fl) and run eWaiiet on your
`desktop and one of the f'ollcw ..g: a Pocket PC, Palm OS
`Handheld, or Smartphone and synchronize your info
`
`a Printed your important information with strong 256-bit RC4 encryption,
`a Organize your info how yeu want it with nested categories. eWaiiet lets you have
`categories :n other categsries,
`
`See More Great Features
`
`
`
`Try ii: free, with no risk, mfififlfial‘ifi-
`
`5;} U323!) "Mgijgfia Mfififlfishfirixgs: ieWesllei is; also available
`
`For U3 5 iart Drives and MojuPac PCS. Safely access persanal
`data, even on a pubiic computer:
`
`mmm;mmmmmamw,
`
`
`:vi 3 Mm: we Rm; Sail ram9; 3: Its;
`xwhen“\vc‘M\v\-«n\\\\\\\\\\\s\\\KM.van\\x\\vw\\\\.MK\sx\NkK‘\\'\\\K\‘\\‘n\K\N\\\\m\\x\\v\\\\\\\\\\\\\\\\\x\\v\\\\\\\\'\\\\w\\\s\v.\\\\xx\\'h\\\\n\xx\\v“x\\\\n\-\\\VN\~.\\\\V\\\\\\\\'\\\\§
`o Windows Mobile Pocket PC 2003 and ZGOBSE
`a Palm OS 4.6 or higher
`a Windows Mubilee Smartphoma 200355
`6 Windows; XP and Vista
`- Windcws Mobile: SI.» Pocket PCS. arid Smartphoness
`e Wirirfiuws UMPCS
`\
`\“\\\\\n\\\\\\\\\\\\\u\n\\¥\\\\\\n\1\\mmm«mm\~o\\mw\\\\\k\\\\\\\\\R\\\m\\t\x\k\\\\\\\\\\\\\\\\\\‘(\5~\\v\\\\\\\\\k\\v\\\\\\\\\\\\\\\\\\x\\m\m1\\\\\xwoxxxmxn-‘u‘
`a» Wiriflows Meblle 6 Classic, Standard and Professional
`
`2 E §E s
`
`Every Ilium Software purchase includes free upgrades for 90 days. plus all minor version
`upgrades, our worlduclass, mibfree tech support and custamer service. and our in —
`questions, 3G—day money back guarantee.
`
`
`
`Simple Snftwa re
`far a Simuiar Life
`
`
`
`(883) 632-5388 Taliiree
`+1 {734) 973-9338 Worldwide
`
` i SULEQQLZ i 9.4.). “
`
`eCari; i Ei'iliiifil‘i
`
`l HQITlB
`
`
`
`Copyrightfi: Ilium Software, inc. All rig is reserved.
`
`httnrllwwwjliumsoft.com/site/ew/ewallet.htm
`
`4/11/2007
`Apple Ex. 1007, p. 8
`Apple EX. 1007, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`Ilium Software eWallct — More Great Features
`
`Page 1 of 2
`
`
`
`\mx 5.5
`)8: Try Free for 30 Days
`
`3 Buy eWallet New
`Awards and Reviews
`
`fit
`2&5 Gal: Graphics
`
`3. Screenshcts
`
`3 Technical Support
`
`WKMRM‘ §5= evssélei‘éle few:
`
`I Palm Powered Handhelds
`a Pocket PCs
`
`I MS Smartphones
`
`- Windows PCs
`I U3 Flash Drives
`
`(What's My Device?)
`
`
`
`
`
`Card importer
`
`
`
`
`
`8W C} Q g Ei
`
`35533233;
`
`eWallet Features
`.
`with eWallet as yam password manager ypu can:
`
`Synchronize your wallets quickly with the easy’to-use sync Setup interface.
`
`Keep your data current. everywhere! Sync t0 multiple FEMS, UMPCs, laplicaps,
`network computers, even remote locations on the web - thele is no limit.
`
`View your data from remote computers using our built—in access to my;
`
`
`
`
`F’rotect yeur important informatlun With strong ZSfi-bit RC4 encryption.
`Organize your info hox' you want it wlth nested categories. eWallet lets you have
`categories in nth-3r categories;
`
`Get complete support for the Windows Vista Mobile DSVECE Center,
`Create unique and secure paelswoi‘ds él’lss'tantly uslrl-g the bullirili passive-rd
`
`generator.
`«A 4.,
`'
`'
`.-
`,l.'~;~_;'; +.-
`,-.-_
`‘
`ll‘
`:v'r:
`a use Mth .lm..y ljlffer3.,t dull x s
`e.W3llet Nurks on Wmdaws Mobiles 5.0, square,
`
`
`sale (1 devices, high esuiulion devices, UMPCS, and m,
`
`a Change your cards anywhere, any time, and ketags all changes when you sync.
`Cosvlplete gem.
`,y_el__s_yn_gh,r9njz_a_tig_n is available all any platfurnrl.
`
`0
`
`0
`
`import yuur cards; easily from Excel or text files, or from other passwerd managers;
`or digital wallets, with our [119‘
`"
`" -
`'
`
`and password keeper - the winner uf 9y“ I}
`
`Fill in passwords, credit cards and other info on web pages without keying them?
`'8me yourself from l-zey'eozlrd lcxmincl in an easy and secure way.
`
`a Stop worrying about forgetting your password ~ eWallet gives you a password hint.
`
`a Create as; m_a_ny w_al
`as; you want. I'lave d f‘erent wallets; rm work, home,
`
`
`i wly and m
`. Shale Mallets with family members or coworkers on a network.
`a Recognize yuur cards at a glance when they look like real
`:
`,ufligugggligfitemplates ltls easy to have everything with you right when you need
`it!
`
`e Customize your cards with y,
`card with just a glance.
`
`,Ol' make YQUI'" awn.
`4: Use our free glgwglcadatgledgjjggpl '
`
`
`-r mm graphics all-:1 ll;('
`7;
`
`a Make exactly the cam you want. You can change card field labels and save cards
`as templates; Oil any platform.
`a Relax! If you ever have problems, just contact llium Software's {vinflph
`
`
`
`asusntr)
`;-_
`
`Dan't trust ymzr lmpartant information to anything but the best.
`
`htm-l/www1'linmmftcnm/site/ew/ew featshtm
`
`4/11/2007
`
`Apple Ex. 1007, p. 9
`Apple Ex. 1007, p. 9
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`Ilium Software eWallet — More Great Features
`Page 2 of 2
`
`
`
`upgrades, our worm-class, toiiwfme tech Support and customer service, and our {10'
`questions, 30~day money back guarantee,
`
`1
`
`
`Simple- Software
`. -
`,
`
`far a $~im§3§¢r UM
`Emdygts. : mimetfit | E49,!
`; &
`(333) 1532—5388 Tailfree
`+1 (1’34) 973-9383 Wor’idwide
`
`Copyrightiié) Ilium Software, Inc. All rights reserved.
`
`httnzllwww.iliumsoft.com/sitelew/ew feats .htm
`
`4/1 1/2007
`Apple Ex. 1007, p. 10
`Apple EX. 1007, p. 10
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`
`
`FIDIS
`
`Future of Identity in the Information Society
`
`Title:
`Author:
`Editors:
`
`“Study on Mobile Identity Management”
`WP3
`Gunter Miiller, Sven Wohlgemuth (Albert-Ludwigs-
`Universitat Freiburg, Germany)
`
`Reviewers:
`
`Jozef Vyskoc (VaF Bratislava, Slovakia)
`
`Identifier:
`
`Type:
`Version:
`
`Date:
`
`Status:
`
`Class:
`
`Mark Gasson (University of Reading, UK)
`D 3.3
`
`[Deliverable]
`1.0
`
`Monday, 09 May 2005
`
`[Final]
`
`[Final]
`
`File: fidis-wp3-del3 3.study_on__mobile_identity_managementfinal
`
`
`
`Summary
`
`1
`
`;
`]
`
`
`
`
`Objective: This study gives a technical survey on mobile identity management
`
`It identifies requirements for mobile identity management systems in particular
`
`on security and privacy of mobile users with mobile devices, eg. smart phones
`or smart cards. A non-technical reader should understand the need and
`requirements
`for mobile identity management
`systems. Approaches
`for
`realising these requirements are described. The study gives answers to the
`following questions:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1. What are the requirements for mobile identity management systems in
`particular on user’s mobility and privacy?
`
`2, Which approaches for realising mobile identity management systems do
`exist?
`
`. What are the open issues and further steps towards mobile identity
`management?
`
`
`
` r.
`
`,
`Copyright © 2004 by the FIDIS consortium - EC Ca (Phat No. 507512
`The FIDIS NaE receives researchfundingfrom the Community ’3 Sixth Framework Programme
`
`Apple Ex. 1007, p. 11
`Apple Ex. 1007, p. 11
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Infonnatian Society (No. 507512)
`
`Copyright Notice:
`
`This document may not be copied, reproduced, or modified in whole or in part for any
`purpose without written permission fi'om the FIDIS Consortium. In addition to such written
`permission to copy,
`reproduce, or modify this document
`in whole or part,
`an
`acknowledgement of the authors of the document and all applicable portions of the» copyright
`notice must be clearly referenced.
`
`The circulation of this document is restricted to the staff of the FIDIS partner organisations
`and the European Commission. All
`information contained in this document
`is strictly
`confidential and may not be divulged to third parties without the express permission of the
`partners.
`
`All rights reserved.
`
`This document may change without notice.
`
`
`
`
`
`[Final], Version: 1.0
`File:fidis-wp3—del3 3.stua'y_on_1nobile~idenziwwmanagememfinal
`
`Pagez
`
`Apple Ex. 1007, p. 12
`Apple Ex. 1007, p. 12
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society W0. 50 7512)
`
`Members of the FIDIS consortium
`
`Goethe University Frankfurt owe)
`
`Joint Research Centre (JRC)
`
`
`
`Vrije Universiteit Brussel (VUB)
`Unabha'ngiges Landeszentrumffir Datenschutz (ICPP)
`
`
`
`n University ofReading
`
`Tzlburg University (T1LT(KUB))
`
`m Katholieke Universiteit Leuven (KULeuven R&D)
`
`“ Karlstads University
`.
`
`Technische Universita't Berlin
`
`
`
`
`Institut European D 'Administration Des Affaires (INSEAD)
`
`Alhert—Ludwig— University Freiburg
`
`VaF Bratislava
`
`
`
`
`
`
`
`16.
`
`
`
`
`
`London School ofEconomics and Political Science (LSE)
`IBM Research GmbH (IBM)
`
`Budapest University ofTechnology and Economics (ISTRI)
`
`Institut de recherche crirninelle de la Gendarmerie Nationale
`Netherlands Forensic Institute (NFI)
`
`Virtual Identity and Privacy Research Center
`
`Europdisches Microsoft Innovations Center GmbH
`
`17.
`
`
`
`18.
`
`21.
`
`Institute of Communication and Computer Systems (ICCS)
`22.
`
`N
`
`
`
`SIRRIXAG Security Technologies
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Germany
`
`Slovakia
`
`United Kingdom
`U:E.ETEE?a.
`
`Netherlands
`(I!e.81’aE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[Final], Version: 1.0
`File: fidis-ij-delB 3,study_on__mobile_ia’entity_managementfinal
`
`Page 3
`
`Apple Ex. 1007, p. 13
`Apple Ex. 1007, p. 13
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society (No. 507512)
`
`Versions
`
`Version
`
`
`Date
`Description (Editor)
`
`
`21.12.2004
`
`Initi release (Sven Wohlgemuth)
`
`07.01.2005
`
`Introduction of this study added (Sven Wohlgemuth)
`
`
`
`
`
`17.01.2005
`
`
`
`
`18.01.2005
`
`17.01.2005
`
`
`
`
`
`
`
`0.3
`
`0.4
`
`.5
`
`0
`
`0.6
`
`
`
`
`
`
`Scenario of. ICPP extended by requirements for mobile
`identity management
`systems
`and new version of
`
`categorised survey on traditional and privacy—enhancing
`identity management mechanisms (Henry Krasemann,
`
`Martin Meints, Christian Krause)
`
`
`
`Identity and Web Services"
`Contribution "Mobile
`
`(Version 1) added (Joris Claessens, Christian Gener-
`
`
`Pollmann)
`
`
`Structure redefined, introduction for the study revised,
`
`
`initial
`introductions for each chapter, description of
`
`
`identity manager iManager added (Sven Wohlgemuth)
`
`Addition of section 2.8 and some general minor
`22.01.2005
`
`
`corrections (Mark Gasson)
`
`
`
`Section "Categorised survey on identity management
`25.01.2005
`
`
`mechanisms ..." moved after section “Mobile Identity
`
`Managemen "; sections revised (Sven Wohlgemuth)
`
`
` 31.01.2005
`Added outlook to WPll (Denis Royer), syntax and usage
`
`
`
`corrected (Mark Gasson); sections revised,
`technical
`outlook added, review version (Sven Wohlgcrnuth)
`
`
`
`
`10.02.2005
`
`Review comments added (Mark Gasson)
`
`
`
`28.02.2005
`
`
`Contributions revised (all authors), Deliverable version
`
`(Sven Wohlgemuth)
`
`
`[Final], Version: 1.0
`File: fidir-wp3—a'el3 3.study_an_mobile_identity_managememfinal
`
`Page 4
`
`Apple Ex. 1007, p. 14
`Apple Ex. 1007, p. 14
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Infonnation Society (No. 507512)
`
`Foreword
`FIDIS partners from various disciplines have contributed as authors to this document. The
`following list names the main contributors for the chapters of this document:
`
`
`
`Chapter
`7
`‘
`Contributm-(s)
`‘
`V
`,
`
`
` Andre Adelsbach, Ammar Alkassar, Roger Cattin, Joris Claessens,
`2
`
`
`
`
`
`3
`
`
`
`'
`
`Stefan Figge, Mark Gasson, Christian Geuer»Pollmann, Marit
`Hansen, Marcel Jacomet, Henry Krasemann, Chiistian Klause,
`Martin Meints, Lorenz Mfiller, Alain Rollier, Denis Royer, Sven
`Wohlgemuth
`Chn'ster Andersson, Simone Fischer-Hfibner, Leonardo Manucci,
`Sven Wohlgemuth
`f
`Simone Fischer-Hfibner, Jenny Nilsson, John Soren Pettersson,
`Sven Wohlgemuth
`
`
`
`
`
`
`
`Andre Adelsbaeh, Ammar Alkassar, Christer Andersson, Roger
`Cattin, Simone Fischer-Hfibner, Marcel
`Jacomet, Leonardo
`Martueci, Lorenz Mfiller, Alain Rollier, Sven Wohlgemuth
`
`Denis Royer, Sven Wohlgemuth
`
`
`
`
`
`
`
`
`
`
`
`Ammar Allcassar, Joris Claessens, Leonardo Martueci, Martin
`
`
`
`Meints, Lorenz Muller,
`Jenny Nilsson, Denis Royer, Sven
`Wohlgemuth
`
`
`
`
`i
`‘
`A
`
`[Final], Version: 1.0
`File:fidis—wp3-de13 3.study”071__mobilewidentizy‘managementflnal
`
`Page 5
`
`Apple Ex. 1007, p. 15
`Apple Ex. 1007, p. 15
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society 010. 507512)
`
`Table of Contents
`
`Introduction ............................................
`
`.......
`
`8
`
`1
`
`1.1
`1.2
`
`........................
`
`.....8
`Scope .............................................................................
`Structure and Content ................................................................................................. 8
`
`2
`
`The Need for Mobile Identity Management............................................................ 11
`
`Categorised Survey on traditional and privacy—enhancing Identity Management
`2.1
`Mechanisms which are relevant for Mobile Identity Management ...................................... 11
`
`Scenario of the use of Mobile Identity Management Systems...
`2.2
`13
`2.2.]
`Introduction ..............
`13
`2.2.2
`Starting Point .................................................................................................... 14
`Scenario 1: Finding a local restaurant for a business lunch
`2.2.3
`15
`
`Scenario 2: Finding a local restaurant for a private lunch ..............
`2.2.4
`15
`
`Required mechanisms for Mobile Identity Management Systems...
`2.2.5
`16
`
`GSvaased Mobile Identity Management .............................................
`2.3
`16
`
`Elements of a mobile identity............
`2.3.1
`17
`Profile management.................................................. 17
`2.3.2
`
`Exchanging mobile identities .............................................. 18
`2.3.3
`
`Applications for mobile identities ...............................
`2.3.4
`18
`
`Revenue Models for M—Commerce with Mobile Identity ..........
`2.4
`18
`Architecture ............................................................................
`2.4.1
`18
`
`2.4.2
`Summary ................................
`21
`
`Mobile Identity and Web Services .....
`2.5
`21
`
`Mobile Web Services scenarios
`..................................... 22
`2.5.1
`
`Privacy objectives related to billing/payment ..
`..................................... 23
`2.5.2
`
`Privacy objectives related to authentication ................
`2.5.3
`25
`
`Discussion/ conclusion: Summary of requirements
`2.5.4
`26
`
`2.6
`Scenario - Ubiquitous Computing ...........................
`26
`
`Ambient Intelligence environments .................................................
`2.6.1
`26
`2.6.2
`. Required mechanisms for Mobile Identity Management Systems...
`28
`Object identification in mobile computing............................................................... 29
`2.7
`
`Solutions: An Overview ............................................................. 29
`2.7.1
`
`2.7.2
`Outlook ............................................................
`31
`
`
`Linking a physical person with its digital identity ..................................... 31
`2.8
`
`2.8.1
`Authentication within a Mobile Identity Management System
`..... 32
`
`Schemes for distributed 3-factor authentication................................ 33
`2.8.2
`2.8.3
`Digital identity proofs using the authentication token ..................................... 35
`
`3
`
`................................................................................... 36
`Privacy for Mobile Users........
`3.1
`Freiburg Privacy Diamond ....................................................................................... 36
`
`Model Assumptions............................... 37
`3 .1 .1
`
`Classes of Anonymity Mechanisms
`..................................................... 37
`3.1.2
`
`Summary ............................................................................................... 38
`3.1.3
`
`Privacy in mobile ad hoc Networks .......... 39
`3 .2
`
`Background .............................................. 39
`3.2.1
`
`Introduction to scenarios ................................................... .
`.................... 39
`3.2.2
`
`[Final], Version: 1.0
`File:fidis-wp3-del3 3.stuabr__0n_mobz‘le_identity_managementfinal
`
`Page 6
`
`
`
`
`
`Apple Ex. 1007, p. 16
`Apple Ex. 1007, p. 16
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`

`

`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentizy in the Information Society (No. 507512)
`
`4
`
`5
`
`Initial usage scenarios ................................................. 40
`3.2.3
`
`Privacy problems in the scenarios ............. 40
`3.2.4
`
`Privacy-enhanced usage scenarios ...................................
`41
`3.2.5
`Ensuring location privacy in mobile ad hoc networks ..................................... 43
`3.2.6
`Future Work ..................................................................................................... 43
`3.2.7
`Privacy Risk ofUser Agent Systems in WAP based Systems ................................. 44
`3.3
`Usability and Security for Mobile Identity Management Systems ............................ 46
`4.1
`Studies on Usability of P3P for Mobile Phones ....................................................... 46
`
`46
`4.1.1
`Alerting and Informing in P3P Enabled Browsing ..
`
`Setting privacy preferences ..............................................
`4.1.2
`47
`
`Vocabulary tests ..................................................................... 48
`4.1.3
`
`4.2
`Identity Management Mock-ups for Mobile Phones.
`48
`Summary .................................................................................................................. 50
`4.3
`Approaches for Mobile Identity Management Systems.............................................. 52
`5.1
`Freiburg Location addressing as anonymity mechanism ......................................... 52
`
`5.1.1
`Architecture ofFreiburg Location Addressing Schema.
`53
`Summary .......................................................................................................... 54
`5.1.2
`....................................................... 55
`5.2
`mCrowds for anonymising WAP surfmg..
`
`5.2.1
`Introduction to Architecture ..............
`55
`
`Performance Issues ...........................................
`5.2.2
`55
`Conclusions ........................................................................................ 56
`5.2.3
`5.3
`Comparison of Anonymous Communication Mechanisms for ad hoc Networks... 57
`5.3.1
`Anonymous Communication Mechanisms ...................................................... 57
`5.3.2
`Requirements for Anonymous Communication Mechanisms ..............
`58
`
`5.3.3
`Comparison of Anonymous Communication Mechanisms ..................
`.. 58
`
`Conclusions ..........................................................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket