throbber
Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLE INC.,
`Petitioner,
`v.
`UNIVERSAL SECURE REGISTRY, LLC,
`Patent Owner.
`_________________________________________
`Case IPR2020-01221
`
`U.S. Patent No. 9,947,000
`_________________________________________
`
`DECLARATION OF DR. PATRICK MCDANIEL IN SUPPORT OF
`PETITION FOR INTER PARTES REVIEW (CLAIMS 22-28)
`
`APPLE 1102
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`TABLE OF CONTENTS
`
`Page
`
`Table of Contents ...................................................................................................... ii 
`I. 
`Background ...................................................................................................... 1 
`II. 
`Legal Principles ............................................................................................... 4 
`A. 
`Claim Construction ............................................................................... 5 
`B. 
`Obviousness ........................................................................................... 6 
`III.  Description of the Relevant Field and the Relevant Timeframe ..................... 8 
`IV.  Technology Background .................................................................................. 9 
`A. 
`Computer Networks .............................................................................. 9 
`B. 
`Electronic Commerce .......................................................................... 10 
`C. 
`Authentication ..................................................................................... 12 
`D.  Multi-Factor Systems .......................................................................... 15 
`E. 
`Cryptography ....................................................................................... 16 
`Level of Ordinary Skill .................................................................................. 17 
`V. 
`VI.  The ’000 Patent .............................................................................................. 18 
`A. 
`Specification and Claims ..................................................................... 18 
`B. 
`Brief Description of the ’000 Patent Disclosure ................................. 19 
`C. 
`Prosecution History ............................................................................. 21 
`VII.  Overview of Prior Art References ................................................................. 22 
`A. 
`Schutzer ............................................................................................... 22 
`B.  Walker ................................................................................................. 24 
`
`- ii -
`
`

`


`

`

`

`

`

`

`
`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`Franklin ............................................................................................... 27 
`C. 
`Slater .................................................................................................... 28 
`D. 
`VIII.  Claims 22-28 of the ’000 Patent Are Unpatentable under 35 U.S.C.
`§ 103 .............................................................................................................. 29 
`A.  Ground 1: Claims 22-26 and 28 Are Obvious over Schutzer
`Alone or in View of Walker. ............................................................... 29 
`Independent Claim 22 ............................................................... 29 
`Dependent Claim 23 ................................................................. 51 
`Dependent Claim 24 ................................................................. 51 
`Dependent Claim 25 ................................................................. 52 
`Dependent Claim 26 ................................................................. 53 
`Dependent Claim 28 ................................................................. 62 
`Ground 2: Claim 27 Is Obvious over Schutzer Alone or in View
`of Walker and/or Slater ....................................................................... 63 
`Dependent Claim 27 ................................................................. 63 
`Ground 3: Claims 22-26 and 28 Are Obvious over Franklin in
`View of Schutzer. ................................................................................ 72 
`Independent Claim 22 ............................................................... 72 
`Dependent Claim 23 ............................................................... 100 
`Dependent Claim 24 ............................................................... 101 
`Dependent Claim 25 ............................................................... 102 
`Dependent Claim 26 ............................................................... 103 
`Dependent Claim 28 ............................................................... 110 
`D.  Ground 4: Claim 27 Is Obvious over Franklin Alone or in View
`of Schutzer and/or Slater. .................................................................. 112 
`
`B. 
`
`C. 
`

`

`

`

`

`

`
`- iii -
`
`

`


`
`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`Dependent Claim 27 ............................................................... 112 
`IX.  Conclusion ................................................................................................... 121 
`X.  Availability for Cross-Examination ............................................................ 121 
`XI.  Right to Supplement .................................................................................... 122 
`XII.  Jurat .............................................................................................................. 123 
`Appendix A ............................................................................................................ 124 
`Appendix B ............................................................................................................ 125 
`
`- iv -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`I, Patrick McDaniel, Ph.D., declare as follows:
`
`1. My name is Patrick McDaniel.
`
`2.
`
`I have been retained by Apple Inc. (“Apple”) to provide opinions in
`
`this proceeding relating to U.S. Patent No. 9,947,000 (“’000 patent”).
`
`3.
`
`I am being compensated at my standard billing rate of $600 per hour
`
`for time spent on this matter.
`
`4. My compensation is in no way dependent on the outcome of this
`
`proceeding.
`
`5.
`
`I have no financial interest in Apple or in the ’000 patent.
`
`I.
`
`BACKGROUND
`6. My qualifications for forming the opinions in this declaration are
`
`summarized here. I earned a Ph.D. in Computer Science and Engineering from
`
`University of Michigan, Ann Arbor in 2001. I earned a Bachelor of Science
`
`degree in Computer Science from Ohio University in 1989 and a Master of Science
`
`degree, also in Computer Science, from Ball State University in 1991.
`
`7.
`
`Since 2017, I have been the William L. Weiss Professor of
`
`Information and Communications Technology in the School of Electrical
`
`Engineering and Computer Science at Pennsylvania State University in University
`
`Park, PA. I am also the director of the Institute for Network and Security
`
`- 1 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`Research, and founder and co-director of the Systems and Internet Infrastructure
`
`Security Laboratory, a research laboratory focused on the study of security in
`
`diverse network and computer environments. My research efforts primarily
`
`involve computer systems, network, management, authentication, systems security,
`
`and technical public policy.
`
`8.
`
`Before my current position, I was an Assistant Professor (2004-2007),
`
`Associate Professor (2007-2011), Full Professor (2011-2015), and Distinguished
`
`Professor of Computer Science and Engineering at Pennsylvania State University
`
`(2015-2017). Since 2004, I have taught several courses in the field of computer
`
`systems, systems programming, networks, and network and computer security at
`
`both the undergraduate and graduate level. I created and continue to maintain
`
`several of these courses for Penn State.
`
`9.
`
`From 2003-2009, I was also an Adjunct Professor at the Stern School
`
`of Business at New York University in New York, NY. At the Stern School of
`
`Business, I taught courses in computer and network security and online privacy.
`
`10.
`
`I am a Fellow of the Association for Computing Machinery (the
`
`leading professional association for computer science) and the Institute for
`
`Electrical and Electronics Engineering (the leading professional association for
`
`computer engineering).
`
`- 2 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`I was also the Program Manager (PM) and lead scientist for the Cyber
`
`11.
`
`Security Collaborative Research Alliance (CRA) from 2013 to 2018. The CRA is
`
`led by Penn State University and includes faculty and researchers from the Army
`
`Research Laboratory, Carnegie Mellon University, Indiana University, the
`
`University of California-Davis, and the University of California-Riverside. This
`
`initiative is a major research project aimed at developing new cyber-security
`
`technology for military networks, computers, and installations.
`
`12.
`
`I have served as an advisor to several Ph.D. and master’s degree
`
`candidates, several of whom have gone on to become professors at various
`
`institutions such as Purdue University, University of Toronto, North Carolina State
`
`University, the University of Oregon, and the Georgia Institute of Technology. I
`
`am currently an advisor to two Ph.D. candidates and a number of master’s
`
`students.
`
`13. Before joining Pennsylvania State University as a professor, I was a
`
`software developer and project manager for companies in the networking industry
`
`including Applied Innovation, Inc. and Primary Access Corporation. I was also a
`
`senior researcher at AT&T Research-Labs. As part of my duties in these industrial
`
`positions, I informed, reviewed, and formed corporate policies and practices
`
`- 3 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`relating to the deployment and subsequent management of software systems such
`
`as those sold and supported by Oracle.
`
`14.
`
`I have published extensively in the field of network and security
`
`management, computer systems, authentication, systems security, applied
`
`cryptography, and network security. In addition to writing several articles for
`
`industry journals and conferences, I have authored portions of numerous books
`
`related to computer systems, applied cryptography, and network security. I have
`
`served on the editorial boards of several peer-reviewed journals including ACM
`
`Transactions on Internet Technology, for which I was the Editor-in-Chief. I was
`
`also an Associate Editor for ACM Transactions on Information and System
`
`Security and IEEE Transactions of Software Engineering, two highly regarded
`
`journals in the field. A complete list of my publications in the last 10 years, as
`
`well as a list of editorial positions can be found in my curriculum vitae, which is
`
`attached as Appendix B.
`
`II.
`
`LEGAL PRINCIPLES
`15. For purposes of this declaration, I have been informed about certain
`
`aspects of the law that are relevant to my analysis and opinions. I am not an
`
`attorney.
`
`- 4 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`A. Claim Construction
`16.
`I have been informed that claim construction is a matter of law and
`
`that the final claim construction will ultimately be determined by the Board.
`
`17.
`
`I understand that the terms of a patent claim are generally given their
`
`ordinary and customary meaning. This is the meaning that the term would have to
`
`a person of ordinary skill in the art as of the time of the alleged invention.
`
`18.
`
`I understand that terms of a claim should be understood in the context
`
`of the claim as a whole. I also understand that the specification of the patent is
`
`relevant to the meaning of a claim term. I understand that the claims must be read
`
`in light of the specification.
`
`19.
`
`I understand that the file history should also be considered when
`
`interpreting the meaning of the claims of a patent. The file history can contain
`
`evidence of how the U.S. Patent and Trademark Office (“PTO”) and the applicant
`
`understood the patent and the meaning of the terms of the patent.
`
`20.
`
`I understand that the claim language, specification, and prosecution
`
`history are referred to as “intrinsic evidence.”
`
`21.
`
`I understand that evidence from an expert in the field may also be
`
`relevant in the determination of how a person of ordinary skill in the art would
`
`understand the claims. I understand that this evidence, which is referred to as
`
`- 5 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`“extrinsic evidence,” must be considered in the context of the intrinsic evidence
`
`and cannot be used to change the meaning of a claim term to be inconsistent with
`
`the intrinsic evidence.
`
`B. Obviousness
`22.
`I have been informed and understand that a patent claim can be
`
`considered to have been obvious to a person of ordinary skill in the art at the time
`
`the application was filed. This means that even if all the requirements of a claim
`
`are not found in a single prior art reference, the claim is not patentable if the
`
`differences between the subject matter in the prior art and the subject matter in the
`
`claim would have been obvious to a person of ordinary skill in the art at the time
`
`the application was filed.
`
`23.
`
`I have also been informed and understand that a determination of
`
`whether a claim would have been obvious should be based upon several factors,
`
`including, among others:
`
`o the level of ordinary skill in the art at the time the application was
`filed;
`o the scope and content of the prior art; and
`o what differences, if any, existed between the claimed invention and
`the prior art.
`
`- 6 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`I have further been informed and understand that the teachings of two
`
`24.
`
`or more references may be combined in the same way as disclosed in the claims, if
`
`such a combination would have been obvious to one having ordinary skill in the
`
`art. In determining whether a combination based on either a single reference or
`
`multiple references would have been obvious, it is appropriate to consider, among
`
`other factors:
`
`o whether the teachings of the prior art references disclose known
`concepts combined in familiar ways, and when combined, would yield
`
`predictable results;
`o whether a person of ordinary skill in the art could implement a
`predictable variation, and would see the benefit of doing so;
`o whether the claimed elements represent one of a limited number of
`known design choices, and would have a reasonable expectation of
`
`success by those skilled in the art;
`o whether a person of ordinary skill would have recognized a reason to
`combine known elements in the manner described in the claim;
`o whether there is some teaching or suggestion in the prior art to make
`the modification or combination of elements claimed in the patent;
`
`and
`
`- 7 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`o whether the claimed invention applies a known technique that had
`been used to improve a similar device or method in a similar way.
`
`25.
`
`In addition, I have been informed and understand that one of ordinary
`
`skill in the art has ordinary creativity, and is not an automaton.
`
`26.
`
`I have been informed and understand that in considering obviousness,
`
`it is important not to determine obviousness using the benefit of hindsight derived
`
`from the patent being considered.
`
`III.
`
`DESCRIPTION OF THE RELEVANT FIELD AND THE RELEVANT
`TIMEFRAME
`27.
`I have studied and understand the specification, claims, and file
`
`history of the ’000 patent. I have also studied the exhibits listed in the Table of
`
`Exhibits attached hereto as Appendix A, as well as the materials cited herein.
`
`Based on my study of these materials, I believe that the relevant field for purposes
`
`of my analysis is computer science, including the areas of distributed systems,
`
`authentication, and systems and data security. As described above, I have
`
`extensive experience in the relevant technology and am well versed in the state of
`
`the art from before the claimed priority date of the patent.
`
`28. The ’000 patent was filed on August 30, 2017 and issued on April 17,
`
`2018. The ’000 patent is a continuation of a series of applications and claims
`
`priority to an application filed on March 16, 2001.
`
`- 8 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`TECHNOLOGY BACKGROUND
`29.
`In this section, I discuss the state of the art with respect to certain
`
`IV.
`
`technologies relevant to the subject matter of the ’000 patent.
`
`30. During the time around March 2001, a person of ordinary skill in the
`
`art would have been aware of various developments in the areas of computer
`
`electronic transactions, authentication, and multifactor authentication systems, as I
`
`discuss below.
`
`A. Computer Networks
`31. A person of ordinary skill in the art would have been aware of the use
`
`of computer networks for the purposes of creating transactions prior to the alleged
`
`invention date of the ’000 patent. Modern computers use networks to support
`
`applications such as e-mail, network browsing, and streaming entertainment over
`
`large geographic areas. A network is a collection of computers and hardware
`
`devices that cooperate to transfer data between endpoints such as desktop
`
`computers, laptops, tablets, and phones. These networks are focused on providing
`
`point-to-point communication (i.e., device to device), in which a sender computer
`
`sends data to a recipient (receiver) computer.
`
`32. The dominant network in recent times, including the time preceding
`
`the alleged invention date of the ’000 patent, is the Internet, which is a world-wide
`
`- 9 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`collection of networks run by different organizations (e.g., Penn State University,
`
`Amazon, etc.), network providers (called Internet Service Providers, e.g., Time
`
`Warner, AT&T), and individuals. All the computers and network devices run a set
`
`of standardized protocols called the Internet Protocols (IP). These standards define
`
`the rules for how the computers communicate and coordinate to move data from
`
`one part of the network to another.
`
`B.
`Electronic Commerce
`33. As of the late 1990s, one of the driving forces behind the development
`
`of the Internet was electronic commerce (“EC”). EC is the sale of goods and
`
`services over the Internet, e.g., purchasing a book from an online bookstore such as
`
`Amazon. Indeed, by 2001, EC was established and growing quickly. There were
`
`literally hundreds of EC companies and software platforms available to online
`
`retailers and service providers, and many standards were published and available
`
`for use.
`
`34. The basic unit of electronic commerce is the transaction. A
`
`transaction is generally just the purchase of goods or services through the Internet
`
`(most often through an online retailer such as Amazon). There are three parties
`
`typically involved in a transaction, the consumer/customer (referred to as the
`
`“user” in the ’000 patent), the retailer or merchant (business selling goods or
`
`- 10 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`services), and a bank or credit card company (facilitating the transfer of funds from
`
`the customer’s account to the retailer’s account). Note that there are many
`
`arrangements in EC that may include other parties, e.g., the bank role may consist
`
`of both a traditional commercial bank (e.g., Bank of America) and a credit card
`
`network (e.g., VISA).
`
`35. The flow of a transaction is generally the same. The customer and
`
`retailer agree on the goods and pricing for the transaction (e.g., through an online
`
`shopping basket), and the customer signals the desire to proceed with the
`
`transaction through an online interface (e.g., hitting the pay now button on the
`
`webpage). At that point the transaction is begun by the user providing some
`
`authentication information and presenting the information to the retailer. The
`
`retailer then validates the user directly or passes it on to the bank. If correct, the
`
`bank then provides confirmation to the retailer that the transaction can proceed and
`
`records and initiates the transfer of money. The retailer then records the success of
`
`the transaction and arranges to provide the goods (e.g., shipping the book) or
`
`services (e.g., letting the user view a video they paid to see).
`
`36. One key to making this process work is to ensure that the
`
`authentication of the user is secure. Here, secure means that somebody that is not
`
`- 11 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`the user cannot forge or copy the authentication information and get goods under a
`
`victim’s account.
`
`C. Authentication
`37. Prior to the alleged invention date of the ’000 patent, a person of
`
`ordinary skill in the art would have been aware of the structure and use of
`
`authentication in computer systems. The purported purpose of the ’000 patent is to
`
`provide a system and method for the authentication of a user for a transaction, i.e.,
`
`performing user authentication. Ex-1101, ’000 patent at Abstract, 3:15-4:6, 19:5-
`
`18, 19:45-56. Authentication generally relates to the process of securely
`
`identifying the identity of a user, system, or device. In the context of the ’000
`
`patent, it specifically relates to the authentication of the user in an EC transaction.
`
`Authentication is often performed in order to subsequently evaluate the user as
`
`being able to exercise some right such as completing a transaction. Here,
`
`authentication is needed to ensure that users only access data stores and services
`
`they are authorized to access, and to ensure non-authorized users are prevented
`
`from accessing data and services they are not authorized to access.
`
`38. Almost all authentication—EC and others—is performed in the same
`
`general manner. When users attempt to access a system, they are prompted for
`
`some kind of credential proving their identity. If they can supply the credential or
`
`- 12 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`otherwise prove they are authorized to access it, they are deemed authentic and the
`
`system provides access.
`
`39.
`
`It was known prior to the alleged invention date of the ’000 patent that
`
`the architecture of most authentication systems involves a client (customer
`
`computer) asking a server (service-providing computer) for access, e.g., via a login
`
`prompt or transaction request. The server then receives the credential over the
`
`network and checks its validity, e.g., whether the password is correct. Most often,
`
`the user information and credential information used for validating the credential
`
`are contained within an authentication database located at the server. This
`
`database can be as simple as a file (such as the password file in the UNIX
`
`operating system) or as complex as a relational database within a banking system.
`
`40.
`
`In computer security, it was known prior to the alleged invention date
`
`of the ’000 patent that there are at least three kinds of credentials: something you
`
`know, something you are, and something you have. The classical means of
`
`authentication is the password as “something you know.” To simplify, a password
`
`is a secret that is presumed known only to the user and the system. When a user
`
`wishes to gain access to the system, the system prompts the user for the password.
`
`If the password is correct, then the user is deemed to be who he/she says he/she is
`
`(is authenticated).
`
`- 13 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`41. Biometrics are “something you are” credentials. Here, at access time,
`
`the system passively authenticates or prompts the user to provide proof of identity
`
`via measurement of some physical characteristic “such as a fingerprint, voice print,
`
`signature, iris or facial scan, or DNA analysis.” Ex-1101, ’000 patent at 4:26-28.
`
`The design and use of biometric systems were well known and practiced by March
`
`2001. See Exs-1111-1113 (generally discussing the use of biometrics for computer
`
`network authentication).
`
`42.
`
`“Something you have” credentials are devices or objects that a user
`
`provides for the purposes of authentication. Examples of these credentials are
`
`credit cards, access badges, or password token devices.
`
`43.
`
`It was known prior to the alleged invention date of the ’000 patent that
`
`some credentials have a limited lifetime and were designed for “one time” use.
`
`Such credentials are typically created to have a short window of time where they
`
`are usable (a time-variant password) or only allowed to be used once (one-time
`
`password). For example, one of the earliest authentication systems using a one-
`
`time password approach was the S/Key system introduced and subsequently
`
`standardized in the early 1990s. In this one-time password scheme, the user was
`
`given a list of passwords that could only be used once. Each time the user logged
`
`in, he/she would use the next password on the list and cross it off. Other solutions
`
`- 14 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`are based on time, where the user will calculate a password as a function of some
`
`credential and a time window. Here the password could be used several times
`
`within that (presumably short) window.
`
`44. The RSA SecureID token is a device introduced before the priority
`
`date of the ’000 patent that generates a new password every few seconds and
`
`displays it on a small LCD display. When a user logs in, he/she provides the
`
`password that is currently on the display. A server also can generate the same
`
`password and thereby validate the password presented by the user. Note that the
`
`password can only be used once to log in to a device (and hence is truly a one-time
`
`use password). Hence, the user will have to wait a few seconds for another
`
`password if they desire to log in again or to another device.
`
`D. Multi-Factor Systems
`45. Prior to the alleged invention date of the ’000 patent, a person of
`
`ordinary skill in the art would have been aware of multi-factor authentication
`
`systems. In recognition of the challenges of authentication in computer systems,
`
`the security community noted as early as 1984 that authentication would be greatly
`
`enhanced if the system used multiple forms of authentication. Ex-1110, Liu at 29
`
`(“Using biometrics also allows a hierarchical structure of data protection, making
`
`the data even more secure: Passwords supply a minimal level of access to network
`
`- 15 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`data; biometrics, the next level. You can even layer biometric technologies to
`
`enhance security levels.”). In this model, two or more different authentication
`
`means (factors) would be used to perform authentication. For example, it was
`
`common in 2001 to use a physical device token, such as the SecureID, as well as a
`
`password as a strong means of authenticating users in high value settings, e.g.,
`
`business applications. Thus, an adversary would have to break or bypass multiple
`
`systems to gain access—and as a result the system as a whole was substantially
`
`stronger than a system using a single form of authentication.
`
`E. Cryptography
`46. Prior to the alleged invention date of the ’000 patent, a person of
`
`ordinary skill in the art would have been aware of the cryptographic tools used to
`
`support electronic transactions and user authentication. One of the most widely
`
`used approach for this was the use of encryption. An encryption algorithm is a
`
`software implemented function that converts data (called plaintext) into a form that
`
`cannot be read by anyone (called ciphertext) unless they have access to a special
`
`encryption key. The process of converting the ciphertext back into plaintext is
`
`- 16 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`called decryption, which requires access to the decryption key.1 Note that the
`
`ciphertext created by encryption of data is unpredictable.
`
`47. Another cryptographic tool frequently used in electronic commerce
`
`application is a cryptographic hash function. This function takes arbitrary data as
`
`input and generates an unpredictable value that is a large number (e.g., a code).
`
`For example, one could take unique transaction data as input and use a
`
`cryptographic hash algorithm to generate a one-time code that would be
`
`(a) unpredictable without the input data, and (b) statistically unique to that input
`
`data. These properties of a hash function enable the code to be used as a value to
`
`authenticate a user for a single transaction or session.
`
`V.
`
`LEVEL OF ORDINARY SKILL
`48.
`I understand that a person of ordinary skill in the art (“POSITA”) is a
`
`hypothetical person to whom an expert in the relevant field could assign a routine
`
`task with reasonable confidence that the task would be successfully carried out. I
`
`
`1 The encryption key and the decryption key may be the same key for some
`
`algorithms (in a symmetric encryption) or may be different (in an asymmetric
`
`encryption algorithm). Regardless of the type, the security of the system relies on
`
`securely managing the keys.
`
`- 17 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`understand that in prior IPR proceedings on a parent of the ’000 patent (the ’539
`
`patent), the Patent Owner argued a POSITA would have had “a Bachelor of
`
`Science degree in electrical engineering and/or computer science, and three years
`
`of work or research experience in the fields of secure transactions and encryption,
`
`or a Master’s degree in electrical engineering and/or computer science, and two
`
`years of work or research experience in related fields.” Apple Inc. v. Universal
`
`Secure Registry, LLP, IPR2018-00812, Paper No. 45, 6 (P.T.A.B. Nov. 5, 2019);
`
`see also Apple Inc. v. Universal Secure Registry, LLP, IPR2018-00809, Paper No.
`
`51, 6-7 (P.T.A.B. Oct. 8, 2019) (adopting Patent Owner’s definition).
`
`49.
`
`I find the Board’s determination to be consistent with my experience
`
`and understanding. Therefore, it is my opinion that the same level of skill in the
`
`art should apply here. Further, as indicated in the section regarding my
`
`background above, I meet this definition.
`
`VI.
`
`THE ’000 PATENT
`A.
`Specification and Claims
`50. Entitled “Universal Secure Registry,” the ’000 patent issued on April
`
`17, 2018 from an application filed on August 30, 2017. The ’000 patent is a
`
`continuation of U.S. Application No. 15/040,873, which was filed on February 10,
`
`2016 (now U.S. Patent No. 9,754,250), which is a continuation of U.S. Application
`
`- 18 -
`
`

`

`Declaration of Dr. Patrick McDaniel
`In Support of Petition for Inter Partes Review
`of U.S. Patent No. 9,947,000
`
`
`No. 14/508,483, which was filed on October 7, 2014,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket