`
`
`
`
`
`
`1
`Application as Filed
`05m?
`
`
`DESCRIPTION
`
`
`DATE
`
`2
`
`Filing Receipt
`
`06/07/2007
`
`Notice to File Missing Parts
`06/07/2007
`
`— Declaration
`07/05/2007
`— Updated Filing Receipt
`07/12/2007
`
`
`6
`Information Disclosure Statement
`08/17/2007
`
`
`Amendment
`11/05/2010
`
`
`RCE Transmittal
`02/07/2013
`
`
`18
`Amendment
`
`19
`
`Notice of Allowability
`
`
`20
`Interview Summary
`
`21
`l Notice of Allowance
`22
`Issue Fee
`
`02/07/2013
`
`10/04/2013
`
`10/04/2013
`10/04/2013
`01/02/2014
`
`23
`
`Issue Notification
`
`01/15/2014
`
`
`
`
`
`Apple Ex. 1007, p. 1
`Apple Ex. 1007, p. 1
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`
`
`Notice of Publication
`
`Rejection
`
`7
`
`8
`
`9
`
`
`10
`Final Rejection
`
`11
`
`12
`
`13
`
`RCE Transmittal
`
`Amendment
`
`Rejection
`
`
`14
`Amendment
`
`15
`
`Extension of Time
`
`Final Rejection
`
`11/20/2008
`
`08/05/2010
`
`12/03/2010
`
`03/04/2011
`
`01/17/2012
`
`06/18/2012
`
`06/18/2012
`
`09/07/2012
`
`
`03/04/2011
`
`
`
`
`
`
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Patent Application No. 11/750,263
`
`Applicant: POPLETT, John
`
`Filed: May 17, 2007
`
`TC/AU: Unassigned
`
`Examiner: Unassigned
`
`Docket No.: 257322
`
`Customer No.: 23460
`
`Mail Stop Amendment
`Commissioner for Patents
`P.O. Box 1450
`
`Alexandria, VA 22313-1450
`
`INFORMATION DISCLOSURE STATEMENT
`
`Pursuant to 37 CFR 1.97 and 1.98, the references listed on the enclosed Form PTO-1449 and/or
`Substitute Form PTO-1449 (“Form 1449”) are submitted for consideration by the Examiner in
`the examination of the above-identified patent application.
`
`The fiill consideration of the references in their entirety by the Examiner is respectfully requested
`and encouraged. Also, it is respectfully requested that the references be entered into the record of
`the present application and that the Examiner initial the appropriate area on the enclosed Form
`1449, thereby indicating the Examiner’s consideration of each of the references.
`
`The submission of the references listed on the Form 1449 is for the purpose of providing a
`complete record and is not a concession that the references listed thereon are prior art to the
`invention claimed in the patent application. The right is expressly reserved to establish an
`invention date earlier than the above-identified filing date in order to remove any reference
`submitted hereun'th as prior art should it be deemed appropriate to do so.
`
`Further, the submission of the references is not to be taken as a concession that any reference
`represents art that is relevant or analogous to the claimed invention. Accordingly, the right to
`argue that any reference is not properly within the scope of prior art relevant to an examination
`of the claims in the above-identified application is also expressly reserved.
`
`
`
`Page 1 of 4
`
`Apple Ex. 1007, p. 2
`Apple Ex. 1007, p. 2
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`In re Appln of John Poplett
`Application No. 1 1/750,263
`
`The Information Disclosure Statement is being filed:
`
`'
`
`Within any one ofthe following time periods: (a) within three months of the filing date
`of a national application other than a continued prosecution application under
`37 CFR 1.53(d); (b) within three months of the date of entry of the national stage as set
`forth in 37 CFR 1.491 of an international application; (c) before the mailing date of a first
`Office Action on the merits; in (d) before the mailing of a first Office Action after the
`filing of a request for continued examination under 37 CFR 1.1-1 4.
`
`1:]
`
`after (a), (b), (c) or ((1) above, but before the mailing date of a final action under
`37 CFR 1.113, a Notice of Allowance under 37 CFR 1.311, or an action that otherwise
`closes prosecution in the application, and includes one of:
`
`CI
`
`or
`
`I]
`
`the Statement under 37 CFR 1.97(e) (see “Statement under 37 CFR 1.97(e)”
`below).
`
`the fee of$180 set forth in 37 CFR 1.17(p) (see “Fees” below).
`
`El
`
`[I
`
`after the mailing date of a final action under 37 CFR 1.113 or a Notice of Allowance
`under 37 CFR 1.311, or an action that otherwise closes prosecution in the application,
`and on or before payment of the issue fee, and includes the Statement under
`37 CFR 1.97(e) (see “Statement under 37 CFR 1.97(e)” below), and the fee of $180 as set
`forth in 37 CFR 1.17(p) (see “Fees” below).
`
`after the mailing date of a Notice of Allowance under 37 CFR 1.311, and on or before
`payment of the issue fee, and within thirty days of receiving each item of information
`contained in the Information Disclosure Statement, and includes the Statement under
`37 CFR 1.704(d) (see “Statement under 37 CFR 1.704(d)” below), and the fee of $180 as
`set forth in 37 CFR 1.17(p) (see “Fees” below). NOTE: This is for original applications except
`applications for a design patent, filed on or after May 29, 2000, wherein a paper containing only an
`Information Disclosure Statement in compliance with 37 CFR 1.97 and 1.98 is being filed.
`
`Copies of the References
`
`E]
`
`K4
`
`CI
`
`Copies of all of the references listed on the enclosed Form 1449 are enclosed herewith.
`
`Copies of US. patents and patent applications that are listed on the accompanying Form
`1449 are not enclosed herewith. Copies of other references identified on the
`accompanying Form 1449 are enclosed herewith.
`
`For each reference not in the English language, attached is an English translation, a
`concise explanation of relevance, an English-language equivalent/patent, an
`English-language abstract, or an English-language version of the search report or action
`by a foreign patent office in a counterpart foreign application indicating the degree of
`relevance found by the foreign office pursuant to 37 CFR l.98(a)(3).
`
`Page 2 of 4
`
`
`
`
`Apple Ex. 1007, p. 3
`Apple Ex. 1007, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`In re Appln of John Poplett
`Application No. 11/750,263
`
`1:]
`
`I:]
`
`A copy of the foreign search report is enclosed herewith.
`
`The references listed on the enclosed Form 1449 were previously identified in the parent
`application(s) of the present application, and copies of the references were fumished at
`that time. Accordingly, additional copies of the references are not submitted herewith, so
`as not to burden the file with duplicate copies of references. The Examiner is respectfully
`requested to carefully review the references in accordance with the requirements set out
`in the Manual of Patent Examining Procedure. In accordance with 37 CFR‘1.98(d), the
`details of the parent application(s) relied upon for an earlier filing date under 35 USC 120
`in which copies of the references were previously furnished are set out below:
`
`.
`
`
`
`
`
`
`
`'
`U.S. APPLICATIONS
`STATUS (check one)
`U.S. APPLICATIONS
`U.S. FILING DATE
`' PATENTED
`PENDING
`ABANDONED
`—_-_—
`-_——_
`
`—____
`
`'
`
`
`
`
`
`Statement under 37 CFR 1.97(e)
`
`D The undersigned hereby states that cacti item of information contained in the
`Information Disclosure Statement was first cited in any communication from a foreign
`patent office in a counterpart foreign patent application not more than three months prior
`to the filing of the Information Disclosure Statement.
`
`E The undersigned hereby states that no item of information contained in the Information
`Disclosure Statement was cited in a communication from a foreign patent office in a
`counterpart foreign patent application, and, to the knowledge of the undersigned after
`making reasonable inquiry, no item of information contained in the Information
`Disclosure Statement was known to any individual designated in 37 CFR l.56(c) more
`than three months prior to the filing of the Information Disclosure Statement.
`
`Statement under 37 CFR 1.704(d)
`
`D The undersigned hereby states that each item of information contained in the
`Information Disclosure Statement was cited in a communication from a foreign patent
`office in a counterpart application and that this communication was not received by any
`individual designated in 37 CFR l.56(c) more than thirty days prior to the filing of the
`Information Disclosure Statement.
`
`Fees
`
`R?
`
`No fee is owed by the applicant(s).
`
`Page 3 of 4
`
`
`
`Apple Ex. 1007, p. 4
`Apple Ex. 1007, p. 4
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`In re Appln of John Poplett
`Application No. l l/750,263
`
`E]
`
`Charge Deposit Account No. 12—1216 in the amount of $180.00 (37 CFR 1.17(p)).
`(A duplicate copy of this communication is enclosed for that purpose.)
`
`l,
`~
`
`V Authorization to Charge Additional Fees
`
`IX
`
`If any additional fees are owed in connection with this communication, please charge
`Deposit Account No. 12~1216. (A duplicate copy of this communication is enclosed for
`that purpose.)
`
`Instructions as to Overpayment
`
`DE
`CI
`
`Credit Account No. 12-1216.
`
`Refimd
`
`Phillip M. Pippenger, Reg. No. 46,055
`LEYDIG, VOIT & MAYER, LTD.
`Two Prudential Plaza, Suite 4900
`180 North Stetson Avenue
`
`Chicago, Illinois 60601-6731
`(3 12) 616-5600 (telephone)
`(312) 616-5700 (facsimile)
`
`Date: August 17, 2007
`
`IDS (Revised 2006 10 25)
`
`
`
`Page 4 of 4
`
`Apple Ex. 1007, p. 5
`Apple Ex. 1007, p. 5
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`Please type a plus sign (+) inside this box ——)
`
`
`
`Complete if Known
`
`
`Substitute for form 1449AIBIPTO
`11/720,262
`
`
`
`_—INFORMATION DISCLOSURE $1,353?“
`
`
`
`
`STATEMENT BY APPL'CANT _—
`
`
`(Use as many sheets as necessa ‘ _—
`
`——-—-— 257222
`U.S. PATENT DOCUMENTS
`
`
`
`
`
`
`
`
`
`
`. .—_
`'
`'
`‘
`-Br00kner
`—- US7,108.177
`_-_-__—
`_-—_-_—
`_-—I-——
`—-—_——— .
`—-__——_ i
`_-—-—_—
`_-—__—_
`_ ,Al __—_
`_-_-_—_
`
`
`
`
`
`
`
`
`
`
`I
`.
`I
`l
`
`
`
`Examiner
`Initials
`
`Doc.
`No.
`
`Foreign Patent Document
`Application or
`Patent Number
`
`Office
`
`FOREIGN PATENT DOCUMENTS
`
`.
`
`Examiner
`Initials
`
`DocA
`. No.
`
`B C
`
`- B E
`B F
`
`'
`
`OTHER - NON PATENT LITERATURE DOCUMENTS
`Include name of the author (in CAPITAL LETTERS), title of the article (when appropriate), title of the item
`(book, magazine, journal, serial. symposium, catalog, etc), date, page(s), volume-issue number (5), publisher,
`city and/orcount where oublished.
`"eWallet Your Important Info — Secure & Convenient in a Digital Wallet," obtained from
`the internet at htt
`:l/www.iliumsoft.com/site/ew/ewallet.htm on April 11, 2007 (No
`specified date, but not later than an nlicant’s filin- date) (2 pages)
`"eWallet, eWallet Features.” obtained from the internet at
`http://www.iliumsoft.com/site/ew/ew featshtm on April 11, 2007 (No specified date, but
`not later than ap-licant's filing date 2
`the FIDIS consortium-EC Contract No. 507512, "Study on Mobile Identity Management,”
`obtained from the internet at htt
`://www.fidis.net/fileadmin/fidls/deliverableslfidis-w 3-
`de13.3.stud
`on mobile identi maria ement. of on May 18, 2007 (May 9, 2005) (90
`93968)
`FRANKS et aI. “HTTP Authentication: Basic and Digest Access Authentication"
`obtained from the internet at http://wwwletforg/rfc/rfczei7.b<t on March 22, 207 (June
`1999) (32 pages)
`"NFC Forum : Frequently Asked Questions" obtained from the internet at http://wwwnfc—
`forumorg/resources/fagsl on March 22, 2007 Copyri-ht 2007 8 pages
`"Nokia Unveils RFlD Phone Reader" RFID Journal obtained from the internet at
`htt
`:l/www.rtid'ournaI.com/articIe/articleview/834/1/1/ on March 21, 2007 (March 17,
`2004) (3 pages)
`
`‘ A concise statement of relevance is being submitted in lieu of a translation. 37 CFR 1.98(a)(3).
`+ An English-language equivalent/patent, or an English-language abstract, or an English-language version of the search report or action by a foreign patent
`office in a counterpart foreign application indicating the degree of relevance found by the foreign office is being submitted In lieu of a concise explanation
`of relevance under 37 CFR t.98(a)(3).
`
`Apple Ex. 1007, p. 6
`Apple Ex. 1007, p. 6
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`Password Manager and digital wallet for Pocket PC, Palm and Smartphone.
`
`Page 1 of 2
`
`
`
`%W G t E 8‘?
`
`
`
`Your Important Info - Secure & Canvenient in a Digital Wallet
` vim
`
`eWallet 5.0 is; new available? With enhanced, eaSy-tav'ssse synchronization,
`remote: wallet storage an d v ewirig, and r: any otlier imprcwements, it‘s easier than
`
`ever to keep your data secure! ll lag Mere
`
`
`
`
`
`
`1l l
`
`Now you can have all your important information: passwords, creéit cards, accounts and
`more, in a formal: that's secure, easy as access,‘ centralized ' nd pal-table wherever you
`want it? Use llium Software eWailet® on your:
`
`Packet sac
`
`easim as Hamlhelsl
`
`Wineaws Smarmhefie
`
`and synchronize your cards or files with eWalle‘r on your Windows PC.
`'
`
`
`
` A. um» Amman:
`
`
`‘ Amnnis
`Credit (lard;
`
`US$95 t3 Stare:
`
`Earth-Bunk
`
`.
`
`>
`.481304
`
`1311533111: SM
`)5: Try Free for 30 Days
`
`x Buy eWallet Now
`
`gg- Awards: and Reviews;
`
`k Get Gra phics
`
`1%.: Sc reenshots
`
`)ge Technical Support
`
`311113133: is manage may:
`
`' Palm Powered Handhe'ds
`- Pocket PCs
`
`I MS Smartphones
`a Windows PCs
`
`I U3 Flash Drives
`
`(What's My Device?)
`
`53133111111 §~'s «=1» w: 1mm:
`“
`‘
`
`’77/
`
`’w«m,4.
`
`L} ’3a”
`
`eWa llet ga rd Imggrter
`
`Fasswqrdflggemetagtgr
`
`
`
`
`
`‘
`4435334341341: 9344
`‘
`.
`.
`Mid
`
`Passworda
`Calling Cards
`ixali‘esflftlfi
`Credit Cards
`'
`James mask '
`Health Info
`
`H” “mm” Mam: swam 883441111941?
`Travel Clubs
`i
`~-~--
`‘
`"W
`Accounts
`l”
`Details Fields:
`
`
`.
`Memberships:
`§‘m§'tCVC#'
`5.5.
`User Names
`MR1;
`wwearxhim‘kcom"
` liter Mime:
`
`
`
`See,M9..re.§s:remshet§
`
`EataQuick Tour
`
`With eWallet as yam password manager you can:
`
`a Synchronize your wallets quickly villa the easywtwusa Sync: Setup interface.
`a Keep your data current eve"ywhere! Sync to multiple PDAS, LIMPCS, laptops,
`netvorK computeis, even remote locations on the web there is no limit
`a View your data from remcize compilers using our built-in access to {gigrlegg
`
`
`
`hrm:l/wwwjliumsoftcom/site/ew/ewallet.htm
`
`4/11/2007
`Apple Ex. 1007, p. 7
`Apple EX. 1007, p. 7
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`Password Manager and digital wallet for Pocket PC, Palm and Smartphone.
`
`Page 2 of 2
`
`beatweaeera bath for only $29.95.
`
`gigggwa‘ilgl; or; your Packet PC, Palm OS Handheld,
`Smartphone, er Windows PC for only $19.95.
`
`..
`
`
`fig;gm:ligirjflmtgsmima.
`fl) and run eWaiiet on your
`desktop and one of the f'ollcw ..g: a Pocket PC, Palm OS
`Handheld, or Smartphone and synchronize your info
`
`a Printed your important information with strong 256-bit RC4 encryption,
`a Organize your info how yeu want it with nested categories. eWaiiet lets you have
`categories :n other categsries,
`
`See More Great Features
`
`
`
`Try ii: free, with no risk, mfififlfial‘ifi-
`
`5;} U323!) "Mgijgfia Mfififlfishfirixgs: ieWesllei is; also available
`
`For U3 5 iart Drives and MojuPac PCS. Safely access persanal
`data, even on a pubiic computer:
`
`mmm;mmmmmamw,
`
`
`:vi 3 Mm: we Rm; Sail ram9; 3: Its;
`xwhen“\vc‘M\v\-«n\\\\\\\\\\\s\\\KM.van\\x\\vw\\\\.MK\sx\NkK‘\\'\\\K\‘\\‘n\K\N\\\\m\\x\\v\\\\\\\\\\\\\\\\\x\\v\\\\\\\\'\\\\w\\\s\v.\\\\xx\\'h\\\\n\xx\\v“x\\\\n\-\\\VN\~.\\\\V\\\\\\\\'\\\\§
`o Windows Mobile Pocket PC 2003 and ZGOBSE
`a Palm OS 4.6 or higher
`a Windows Mubilee Smartphoma 200355
`6 Windows; XP and Vista
`- Windcws Mobile: SI.» Pocket PCS. arid Smartphoness
`e Wirirfiuws UMPCS
`\
`\“\\\\\n\\\\\\\\\\\\\u\n\\¥\\\\\\n\1\\mmm«mm\~o\\mw\\\\\k\\\\\\\\\R\\\m\\t\x\k\\\\\\\\\\\\\\\\\\‘(\5~\\v\\\\\\\\\k\\v\\\\\\\\\\\\\\\\\\x\\m\m1\\\\\xwoxxxmxn-‘u‘
`a» Wiriflows Meblle 6 Classic, Standard and Professional
`
`2 E §E s
`
`Every Ilium Software purchase includes free upgrades for 90 days. plus all minor version
`upgrades, our worlduclass, mibfree tech support and custamer service. and our in —
`questions, 3G—day money back guarantee.
`
`
`
`Simple Snftwa re
`far a Simuiar Life
`
`
`
`(883) 632-5388 Taliiree
`+1 {734) 973-9338 Worldwide
`
` i SULEQQLZ i 9.4.). “
`
`eCari; i Ei'iliiifil‘i
`
`l HQITlB
`
`
`
`Copyrightfi: Ilium Software, inc. All rig is reserved.
`
`httnrllwwwjliumsoft.com/site/ew/ewallet.htm
`
`4/11/2007
`Apple Ex. 1007, p. 8
`Apple EX. 1007, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`Ilium Software eWallct — More Great Features
`
`Page 1 of 2
`
`
`
`\mx 5.5
`)8: Try Free for 30 Days
`
`3 Buy eWallet New
`Awards and Reviews
`
`fit
`2&5 Gal: Graphics
`
`3. Screenshcts
`
`3 Technical Support
`
`WKMRM‘ §5= evssélei‘éle few:
`
`I Palm Powered Handhelds
`a Pocket PCs
`
`I MS Smartphones
`
`- Windows PCs
`I U3 Flash Drives
`
`(What's My Device?)
`
`
`
`
`
`Card importer
`
`
`
`
`
`8W C} Q g Ei
`
`35533233;
`
`eWallet Features
`.
`with eWallet as yam password manager ypu can:
`
`Synchronize your wallets quickly with the easy’to-use sync Setup interface.
`
`Keep your data current. everywhere! Sync t0 multiple FEMS, UMPCs, laplicaps,
`network computers, even remote locations on the web - thele is no limit.
`
`View your data from remote computers using our built—in access to my;
`
`
`
`
`F’rotect yeur important informatlun With strong ZSfi-bit RC4 encryption.
`Organize your info hox' you want it wlth nested categories. eWallet lets you have
`categories in nth-3r categories;
`
`Get complete support for the Windows Vista Mobile DSVECE Center,
`Create unique and secure paelswoi‘ds él’lss'tantly uslrl-g the bullirili passive-rd
`
`generator.
`«A 4.,
`'
`'
`.-
`,l.'~;~_;'; +.-
`,-.-_
`‘
`ll‘
`:v'r:
`a use Mth .lm..y ljlffer3.,t dull x s
`e.W3llet Nurks on Wmdaws Mobiles 5.0, square,
`
`
`sale (1 devices, high esuiulion devices, UMPCS, and m,
`
`a Change your cards anywhere, any time, and ketags all changes when you sync.
`Cosvlplete gem.
`,y_el__s_yn_gh,r9njz_a_tig_n is available all any platfurnrl.
`
`0
`
`0
`
`import yuur cards; easily from Excel or text files, or from other passwerd managers;
`or digital wallets, with our [119‘
`"
`" -
`'
`
`and password keeper - the winner uf 9y“ I}
`
`Fill in passwords, credit cards and other info on web pages without keying them?
`'8me yourself from l-zey'eozlrd lcxmincl in an easy and secure way.
`
`a Stop worrying about forgetting your password ~ eWallet gives you a password hint.
`
`a Create as; m_a_ny w_al
`as; you want. I'lave d f‘erent wallets; rm work, home,
`
`
`i wly and m
`. Shale Mallets with family members or coworkers on a network.
`a Recognize yuur cards at a glance when they look like real
`:
`,ufligugggligfitemplates ltls easy to have everything with you right when you need
`it!
`
`e Customize your cards with y,
`card with just a glance.
`
`,Ol' make YQUI'" awn.
`4: Use our free glgwglcadatgledgjjggpl '
`
`
`-r mm graphics all-:1 ll;('
`7;
`
`a Make exactly the cam you want. You can change card field labels and save cards
`as templates; Oil any platform.
`a Relax! If you ever have problems, just contact llium Software's {vinflph
`
`
`
`asusntr)
`;-_
`
`Dan't trust ymzr lmpartant information to anything but the best.
`
`htm-l/www1'linmmftcnm/site/ew/ew featshtm
`
`4/11/2007
`
`Apple Ex. 1007, p. 9
`Apple Ex. 1007, p. 9
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`Ilium Software eWallet — More Great Features
`Page 2 of 2
`
`
`
`upgrades, our worm-class, toiiwfme tech Support and customer service, and our {10'
`questions, 30~day money back guarantee,
`
`1
`
`
`Simple- Software
`. -
`,
`
`far a $~im§3§¢r UM
`Emdygts. : mimetfit | E49,!
`; &
`(333) 1532—5388 Tailfree
`+1 (1’34) 973-9383 Wor’idwide
`
`Copyrightiié) Ilium Software, Inc. All rights reserved.
`
`httnzllwww.iliumsoft.com/sitelew/ew feats .htm
`
`4/1 1/2007
`Apple Ex. 1007, p. 10
`Apple EX. 1007, p. 10
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`
`
`FIDIS
`
`Future of Identity in the Information Society
`
`Title:
`Author:
`Editors:
`
`“Study on Mobile Identity Management”
`WP3
`Gunter Miiller, Sven Wohlgemuth (Albert-Ludwigs-
`Universitat Freiburg, Germany)
`
`Reviewers:
`
`Jozef Vyskoc (VaF Bratislava, Slovakia)
`
`Identifier:
`
`Type:
`Version:
`
`Date:
`
`Status:
`
`Class:
`
`Mark Gasson (University of Reading, UK)
`D 3.3
`
`[Deliverable]
`1.0
`
`Monday, 09 May 2005
`
`[Final]
`
`[Final]
`
`File: fidis-wp3-del3 3.study_on__mobile_identity_managementfinal
`
`
`
`Summary
`
`1
`
`;
`]
`
`
`
`
`Objective: This study gives a technical survey on mobile identity management
`
`It identifies requirements for mobile identity management systems in particular
`
`on security and privacy of mobile users with mobile devices, eg. smart phones
`or smart cards. A non-technical reader should understand the need and
`requirements
`for mobile identity management
`systems. Approaches
`for
`realising these requirements are described. The study gives answers to the
`following questions:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1. What are the requirements for mobile identity management systems in
`particular on user’s mobility and privacy?
`
`2, Which approaches for realising mobile identity management systems do
`exist?
`
`. What are the open issues and further steps towards mobile identity
`management?
`
`
`
` r.
`
`,
`Copyright © 2004 by the FIDIS consortium - EC Ca (Phat No. 507512
`The FIDIS NaE receives researchfundingfrom the Community ’3 Sixth Framework Programme
`
`Apple Ex. 1007, p. 11
`Apple Ex. 1007, p. 11
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Infonnatian Society (No. 507512)
`
`Copyright Notice:
`
`This document may not be copied, reproduced, or modified in whole or in part for any
`purpose without written permission fi'om the FIDIS Consortium. In addition to such written
`permission to copy,
`reproduce, or modify this document
`in whole or part,
`an
`acknowledgement of the authors of the document and all applicable portions of the» copyright
`notice must be clearly referenced.
`
`The circulation of this document is restricted to the staff of the FIDIS partner organisations
`and the European Commission. All
`information contained in this document
`is strictly
`confidential and may not be divulged to third parties without the express permission of the
`partners.
`
`All rights reserved.
`
`This document may change without notice.
`
`
`
`
`
`[Final], Version: 1.0
`File:fidis-wp3—del3 3.stua'y_on_1nobile~idenziwwmanagememfinal
`
`Pagez
`
`Apple Ex. 1007, p. 12
`Apple Ex. 1007, p. 12
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society W0. 50 7512)
`
`Members of the FIDIS consortium
`
`Goethe University Frankfurt owe)
`
`Joint Research Centre (JRC)
`
`
`
`Vrije Universiteit Brussel (VUB)
`Unabha'ngiges Landeszentrumffir Datenschutz (ICPP)
`
`
`
`n University ofReading
`
`Tzlburg University (T1LT(KUB))
`
`m Katholieke Universiteit Leuven (KULeuven R&D)
`
`“ Karlstads University
`.
`
`Technische Universita't Berlin
`
`
`
`
`Institut European D 'Administration Des Affaires (INSEAD)
`
`Alhert—Ludwig— University Freiburg
`
`VaF Bratislava
`
`
`
`
`
`
`
`16.
`
`
`
`
`
`London School ofEconomics and Political Science (LSE)
`IBM Research GmbH (IBM)
`
`Budapest University ofTechnology and Economics (ISTRI)
`
`Institut de recherche crirninelle de la Gendarmerie Nationale
`Netherlands Forensic Institute (NFI)
`
`Virtual Identity and Privacy Research Center
`
`Europdisches Microsoft Innovations Center GmbH
`
`17.
`
`
`
`18.
`
`21.
`
`Institute of Communication and Computer Systems (ICCS)
`22.
`
`N
`
`
`
`SIRRIXAG Security Technologies
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Germany
`
`Slovakia
`
`United Kingdom
`U:E.ETEE?a.
`
`Netherlands
`(I!e.81’aE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[Final], Version: 1.0
`File: fidis-ij-delB 3,study_on__mobile_ia’entity_managementfinal
`
`Page 3
`
`Apple Ex. 1007, p. 13
`Apple Ex. 1007, p. 13
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society (No. 507512)
`
`Versions
`
`Version
`
`
`Date
`Description (Editor)
`
`
`21.12.2004
`
`Initi release (Sven Wohlgemuth)
`
`07.01.2005
`
`Introduction of this study added (Sven Wohlgemuth)
`
`
`
`
`
`17.01.2005
`
`
`
`
`18.01.2005
`
`17.01.2005
`
`
`
`
`
`
`
`0.3
`
`0.4
`
`.5
`
`0
`
`0.6
`
`
`
`
`
`
`Scenario of. ICPP extended by requirements for mobile
`identity management
`systems
`and new version of
`
`categorised survey on traditional and privacy—enhancing
`identity management mechanisms (Henry Krasemann,
`
`Martin Meints, Christian Krause)
`
`
`
`Identity and Web Services"
`Contribution "Mobile
`
`(Version 1) added (Joris Claessens, Christian Gener-
`
`
`Pollmann)
`
`
`Structure redefined, introduction for the study revised,
`
`
`initial
`introductions for each chapter, description of
`
`
`identity manager iManager added (Sven Wohlgemuth)
`
`Addition of section 2.8 and some general minor
`22.01.2005
`
`
`corrections (Mark Gasson)
`
`
`
`Section "Categorised survey on identity management
`25.01.2005
`
`
`mechanisms ..." moved after section “Mobile Identity
`
`Managemen "; sections revised (Sven Wohlgemuth)
`
`
` 31.01.2005
`Added outlook to WPll (Denis Royer), syntax and usage
`
`
`
`corrected (Mark Gasson); sections revised,
`technical
`outlook added, review version (Sven Wohlgcrnuth)
`
`
`
`
`10.02.2005
`
`Review comments added (Mark Gasson)
`
`
`
`28.02.2005
`
`
`Contributions revised (all authors), Deliverable version
`
`(Sven Wohlgemuth)
`
`
`[Final], Version: 1.0
`File: fidir-wp3—a'el3 3.study_an_mobile_identity_managememfinal
`
`Page 4
`
`Apple Ex. 1007, p. 14
`Apple Ex. 1007, p. 14
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Infonnation Society (No. 507512)
`
`Foreword
`FIDIS partners from various disciplines have contributed as authors to this document. The
`following list names the main contributors for the chapters of this document:
`
`
`
`Chapter
`7
`‘
`Contributm-(s)
`‘
`V
`,
`
`
` Andre Adelsbach, Ammar Alkassar, Roger Cattin, Joris Claessens,
`2
`
`
`
`
`
`3
`
`
`
`'
`
`Stefan Figge, Mark Gasson, Christian Geuer»Pollmann, Marit
`Hansen, Marcel Jacomet, Henry Krasemann, Chiistian Klause,
`Martin Meints, Lorenz Mfiller, Alain Rollier, Denis Royer, Sven
`Wohlgemuth
`Chn'ster Andersson, Simone Fischer-Hfibner, Leonardo Manucci,
`Sven Wohlgemuth
`f
`Simone Fischer-Hfibner, Jenny Nilsson, John Soren Pettersson,
`Sven Wohlgemuth
`
`
`
`
`
`
`
`Andre Adelsbaeh, Ammar Alkassar, Christer Andersson, Roger
`Cattin, Simone Fischer-Hfibner, Marcel
`Jacomet, Leonardo
`Martueci, Lorenz Mfiller, Alain Rollier, Sven Wohlgemuth
`
`Denis Royer, Sven Wohlgemuth
`
`
`
`
`
`
`
`
`
`
`
`Ammar Allcassar, Joris Claessens, Leonardo Martueci, Martin
`
`
`
`Meints, Lorenz Muller,
`Jenny Nilsson, Denis Royer, Sven
`Wohlgemuth
`
`
`
`
`i
`‘
`A
`
`[Final], Version: 1.0
`File:fidis—wp3-de13 3.study”071__mobilewidentizy‘managementflnal
`
`Page 5
`
`Apple Ex. 1007, p. 15
`Apple Ex. 1007, p. 15
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentity in the Information Society 010. 507512)
`
`Table of Contents
`
`Introduction ............................................
`
`.......
`
`8
`
`1
`
`1.1
`1.2
`
`........................
`
`.....8
`Scope .............................................................................
`Structure and Content ................................................................................................. 8
`
`2
`
`The Need for Mobile Identity Management............................................................ 11
`
`Categorised Survey on traditional and privacy—enhancing Identity Management
`2.1
`Mechanisms which are relevant for Mobile Identity Management ...................................... 11
`
`Scenario of the use of Mobile Identity Management Systems...
`2.2
`13
`2.2.]
`Introduction ..............
`13
`2.2.2
`Starting Point .................................................................................................... 14
`Scenario 1: Finding a local restaurant for a business lunch
`2.2.3
`15
`
`Scenario 2: Finding a local restaurant for a private lunch ..............
`2.2.4
`15
`
`Required mechanisms for Mobile Identity Management Systems...
`2.2.5
`16
`
`GSvaased Mobile Identity Management .............................................
`2.3
`16
`
`Elements of a mobile identity............
`2.3.1
`17
`Profile management.................................................. 17
`2.3.2
`
`Exchanging mobile identities .............................................. 18
`2.3.3
`
`Applications for mobile identities ...............................
`2.3.4
`18
`
`Revenue Models for M—Commerce with Mobile Identity ..........
`2.4
`18
`Architecture ............................................................................
`2.4.1
`18
`
`2.4.2
`Summary ................................
`21
`
`Mobile Identity and Web Services .....
`2.5
`21
`
`Mobile Web Services scenarios
`..................................... 22
`2.5.1
`
`Privacy objectives related to billing/payment ..
`..................................... 23
`2.5.2
`
`Privacy objectives related to authentication ................
`2.5.3
`25
`
`Discussion/ conclusion: Summary of requirements
`2.5.4
`26
`
`2.6
`Scenario - Ubiquitous Computing ...........................
`26
`
`Ambient Intelligence environments .................................................
`2.6.1
`26
`2.6.2
`. Required mechanisms for Mobile Identity Management Systems...
`28
`Object identification in mobile computing............................................................... 29
`2.7
`
`Solutions: An Overview ............................................................. 29
`2.7.1
`
`2.7.2
`Outlook ............................................................
`31
`
`
`Linking a physical person with its digital identity ..................................... 31
`2.8
`
`2.8.1
`Authentication within a Mobile Identity Management System
`..... 32
`
`Schemes for distributed 3-factor authentication................................ 33
`2.8.2
`2.8.3
`Digital identity proofs using the authentication token ..................................... 35
`
`3
`
`................................................................................... 36
`Privacy for Mobile Users........
`3.1
`Freiburg Privacy Diamond ....................................................................................... 36
`
`Model Assumptions............................... 37
`3 .1 .1
`
`Classes of Anonymity Mechanisms
`..................................................... 37
`3.1.2
`
`Summary ............................................................................................... 38
`3.1.3
`
`Privacy in mobile ad hoc Networks .......... 39
`3 .2
`
`Background .............................................. 39
`3.2.1
`
`Introduction to scenarios ................................................... .
`.................... 39
`3.2.2
`
`[Final], Version: 1.0
`File:fidis-wp3-del3 3.stuabr__0n_mobz‘le_identity_managementfinal
`
`Page 6
`
`
`
`
`
`Apple Ex. 1007, p. 16
`Apple Ex. 1007, p. 16
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
`IPR2020-00019
`
`
`
`
`
`
`
`FIDIS
`
`D 3.3
`
`Future ofIdentizy in the Information Society (No. 507512)
`
`4
`
`5
`
`Initial usage scenarios ................................................. 40
`3.2.3
`
`Privacy problems in the scenarios ............. 40
`3.2.4
`
`Privacy-enhanced usage scenarios ...................................
`41
`3.2.5
`Ensuring location privacy in mobile ad hoc networks ..................................... 43
`3.2.6
`Future Work ..................................................................................................... 43
`3.2.7
`Privacy Risk ofUser Agent Systems in WAP based Systems ................................. 44
`3.3
`Usability and Security for Mobile Identity Management Systems ............................ 46
`4.1
`Studies on Usability of P3P for Mobile Phones ....................................................... 46
`
`46
`4.1.1
`Alerting and Informing in P3P Enabled Browsing ..
`
`Setting privacy preferences ..............................................
`4.1.2
`47
`
`Vocabulary tests ..................................................................... 48
`4.1.3
`
`4.2
`Identity Management Mock-ups for Mobile Phones.
`48
`Summary .................................................................................................................. 50
`4.3
`Approaches for Mobile Identity Management Systems.............................................. 52
`5.1
`Freiburg Location addressing as anonymity mechanism ......................................... 52
`
`5.1.1
`Architecture ofFreiburg Location Addressing Schema.
`53
`Summary .......................................................................................................... 54
`5.1.2
`....................................................... 55
`5.2
`mCrowds for anonymising WAP surfmg..
`
`5.2.1
`Introduction to Architecture ..............
`55
`
`Performance Issues ...........................................
`5.2.2
`55
`Conclusions ........................................................................................ 56
`5.2.3
`5.3
`Comparison of Anonymous Communication Mechanisms for ad hoc Networks... 57
`5.3.1
`Anonymous Communication Mechanisms ...................................................... 57
`5.3.2
`Requirements for Anonymous Communication Mechanisms ..............
`58
`
`5.3.3
`Comparison of Anonymous Communication Mechanisms ..................
`.. 58
`
`Conclusions ..........................................................