throbber
Paper 1
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`––––––––––––––
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`––––––––––––––
`
`SAMSUNG ELECTRONICS AMERICA, INC,
`Petitioner
`
`v.
`
`PROXENSE, LLC
`Patent Owner
`––––––––––––––
`IPR2021-01439
`Patent 9,235,700
`––––––––––––––
`
`PETITION FOR INTER PARTES REVIEW
`
`

`

`
`
`TABLE OF CONTENTS
`
`Page
`PETITION FOR INTER PARTES REVIEW .................................................. 1
`I.
`INTRODUCTION ................................................................................ 1
`II. MANDATORY DISCLOSURES ........................................................ 2
`A. Grounds for Standing (37 C.F.R. § 42.104(a)) .......................... 2
`B.
`Real Party in Interest .................................................................. 3
`C.
`Related Matters .......................................................................... 3
`D.
`Lead and Back-Up Counsel (37 C.F.R. § 42.8(b)(3)) and
`Service Information (37 C.F.R. § 42.8(b)(3)-(4)) ...................... 3
`Payment of Fees (37 C.F.R. § 42.15(a)) .................................... 4
`E.
`III. LEVEL OF SKILL IN THE ART ........................................................ 4
`IV. OVERVIEW OF THE ’700 PATENT ................................................. 5
`V.
`PROSECUTION OF THE ’700 PATENT ........................................... 6
`VI. CLAIM CONSTRUCTION ................................................................. 6
`VII. CITED ART ......................................................................................... 6
`A. Giobbi ’157 ................................................................................ 6
`B.
`Giobbi ’139 ................................................................................ 9
`C.
`Broadcom ................................................................................. 11
`D. Dua ........................................................................................... 12
`VIII. DISCRETIONARY FACTORS ......................................................... 14
`A.
`35 U.S.C. § 325(d) Does Not Favor Denial ............................. 14
`B.
`35 U.S.C. § 314(a) Does Not Favor Denial ............................. 16
`IX. GROUND 1: GIOBBI ’157, GIOBBI ’139 AND DUA
`RENDER OBVIOUS CLAIMS 1-20 ................................................. 22
`A.
`Claim 1 ..................................................................................... 22
`B.
`Claim 2 The hybrid device of claim 1, wherein at least
`one of the one or more of the application, the function,
`and the service are enabled at least in part on the hybrid
`device. ...................................................................................... 41
`
`
`
`i
`
`

`

`C.
`
`D.
`
`E.
`
`F.
`
`
`
`Claim 3 The hybrid device of claim 1, wherein at least
`one of the one or more of the application, the function,
`and the service are enabled at least in part on a device
`external to the hybrid device and communicatively
`coupled to the external RDC. ................................................... 41
`Claim 4 The hybrid device of claim 1, wherein the
`integrated PDK includes local, secured biometric
`information for authenticating a user, the biometric
`information based on one or more of a fingerprint,
`palmprint, a retinal scan, an iris scan, a photograph, a
`signature, a voice sample, DNA and RNA. ............................. 42
`Claim 5 The hybrid device of claim 1, wherein the
`external PDK stores local, secured financial information. ...... 42
`Claim 6 The hybrid device of claim 1, wherein the
`integrated PDK stores local, secured financial
`information and at least one of the one or more of the
`application, the function, and the service enabled
`completes a financial transaction based on the financial
`information. .............................................................................. 43
`Claim 7. The hybrid device of claim 1, wherein the
`hybrid device is a cell phone. ................................................... 43
`Claim 8. The hybrid device of claim 1, wherein the
`external PDK is included in jewelry. ....................................... 44
`Claim 9. The hybrid device of claim 1, comprising a
`storage for inheritance information. ......................................... 44
`Claim 10 The hybrid device of claim 1, wherein the
`external PDK is included in a watch ........................................ 45
`Claim 11 ................................................................................... 45
`Claim 12 The method of claim 11 further comprising:
`sending the enablement signal to the hybrid device,
`wherein at least one of the one or more of the application,
`the function, and the service are enabled at least in part
`on the hybrid device. ................................................................ 46
`M. Claim 13 The method of claim 11 further comprising:
`sending the enablement signal to the hybrid device,
`wherein at least one of the one or more of the application,
`
`G.
`
`H.
`
`I.
`
`J.
`
`K.
`L.
`
`
`
`ii
`
`

`

`N.
`
`O.
`
`P.
`
`Q.
`
`R.
`S.
`
`T.
`
`
`
`the function, and the service are enabled at least in part
`on a device external to the hybrid device and
`communicatively coupled to the external RDC. ...................... 47
`Claim 14 The method of claim 11, wherein the integrated
`PDK includes local, secured biometric information for
`authenticating a user, the biometric information based on
`one or more of a fingerprint, palmprint, a retinal scan, an
`iris Scan, a photograph, a signature, a Voice sample,
`DNA and RNA. ........................................................................ 47
`Claim 15 The method of claim 11, wherein the external
`PDK stores local, secured financial information. .................... 47
`Claim 16 The method of claim 11, wherein the hybrid
`device is a cell phone. .............................................................. 47
`Claim 17 The method of claim 11, wherein the external
`PDK is included in jewelry. ..................................................... 47
`Claim 18 ................................................................................... 47
`Claim 19 The method of claim 11, wherein the first
`signal includes inheritance information. .................................. 49
`Claim 20 The method of claim 11, wherein the external
`PDK is included in a watch. ..................................................... 49
`X. GROUND 2: BROADCOM RENDERS OBVIOUS CLAIMS
`1-7, 9, 11-16 AND 18-19 ................................................................... 50
`A.
`Claim 1 ..................................................................................... 50
`B.
`Claim 2 The hybrid device of claim 1, wherein at least
`one of the one or more of the application, the function,
`and the service are enabled at least in part on the hybrid
`device. ...................................................................................... 60
`Claim 3 The hybrid device of claim 1, wherein at least
`one of the one or more of the application, the function,
`and the service are enabled at least in part on a device
`external to the hybrid device and communicatively
`coupled to the external RDC. ................................................... 60
`Claim 4 The hybrid device of claim 1, wherein the
`integrated PDK includes local, secured biometric
`information for authenticating a user, the biometric
`
`C.
`
`D.
`
`
`
`iii
`
`

`

`E.
`
`F.
`
`G.
`
`H.
`
`
`
`information based on one or more of a fingerprint,
`palmprint, a retinal scan, an iris scan, a photograph, a
`signature, a voice sample, DNA and RNA. ............................. 61
`Claim 5 The hybrid device of claim 1, wherein the
`external PDK stores local, secured financial information. ...... 61
`Claim 6 The hybrid device of claim 1, wherein the
`integrated PDK stores local, secured financial
`information and at least one of the one or more of the
`application, the function, and the service enabled
`completes a financial transaction based on the financial
`information. .............................................................................. 61
`Claim 7. The hybrid device of claim 1, wherein the
`hybrid device is a cell phone. ................................................... 62
`Claim 9. The hybrid device of claim 1, comprising a
`storage for inheritance information. ......................................... 62
`Claim 11 ................................................................................... 63
`Claim 12 The method of claim 11 further comprising:
`sending the enablement signal to the hybrid device,
`wherein at least one of the one or more of the application,
`the function, and the service are enabled at least in part
`on the hybrid device. ................................................................ 64
`Claim 13 The method of claim 11 further comprising:
`sending the enablement signal to the hybrid device,
`wherein at least one of the one or more of the application,
`the function, and the service are enabled at least in part
`on a device external to the hybrid device and
`communicatively coupled to the external RDC. ...................... 64
`Claim 14 The method of claim 11, wherein the integrated
`PDK includes local, secured biometric information for
`authenticating a user, the biometric information based on
`one or more of a fingerprint, palmprint, a retinal scan, an
`iris scan, a photograph, a signature, a voice sample, DNA
`and RNA. .................................................................................. 64
`M. Claim 15 The method of claim 11, wherein the external
`PDK stores local, secured financial information. .................... 65
`
`I.
`J.
`
`K.
`
`L.
`
`
`
`iv
`
`

`

`N.
`
`O.
`P.
`
`
`
`Claim 16 The method of claim 11, wherein the hybrid
`device is a cell phone. .............................................................. 65
`Claim 18 ................................................................................... 65
`Claim 19 The method of claim 11, wherein the first
`signal includes inheritance information. .................................. 66
`XI. GROUND 3: BROADCOM AND GIOBBI ’157 RENDER
`OBVIOUS CLAIMS 8, 10, 17 AND 20 ............................................ 66
`A.
`Claim 8. The hybrid device of claim 1, wherein the
`external PDK is included in jewelry. ....................................... 66
`Claim 10 The hybrid device of claim 1, wherein the
`external PDK is included in a watch ........................................ 67
`Claim 17 The method of claim 11, wherein the external
`PDK is included in jewelry. ..................................................... 67
`Claim 20 The method of claim 11, wherein the external
`PDK is included in a watch. ..................................................... 67
`XII. SECONDARY CONSIDERATIONS ................................................ 67
`XIII. CONCLUSION .................................................................................. 68
`
`
`B.
`
`C.
`
`D.
`
`
`
`v
`
`

`

`Paper 1
`
`LIST OF EXHIBITS
`
`Exhibit
`1001
`1002
`1003
`1004
`1005
`1006
`1007
`
`Description
`U.S. Patent No. 9,235,700 (“’700 patent”)
`File History for U.S. Patent No. 9,235,700
`Declaration of Andrew Wolfe
`U.S. Patent Pub. No. 2007/0245157 A1 (“Giobbi ’157”)
`U.S. Patent Pub. No. 2004/0255139 A1 (“Giobbi ’139”)
`U.S. Patent No. 9,042,819 (“Dua”)
`European Patent No. 1536306 A1 (“Broadcom”)
`
`
`
`vi
`
`
`
`
`
`
`
`
`
`

`

`Paper 1
`
`LIST OF CHALLENGED CLAIMS
`
`Claim
`1pre
`
`U.S. Patent No. 9,235,700
`A hybrid device comprising:
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`2
`
`3
`
`4
`
`5
`
`6
`
`an integrated personal digital key (PDK) for storing local,
`secured financial information a user and capable of
`communicating wirelessly with an external receiver-decoder
`circuit (RDC); and
`an integrated RDC for communicating wirelessly with at least
`one external PDK within a proximity zone,
`the integrated RDC coupled to the integrated PDK by a first
`signal line for communication,
`the integrated RDC coupled to at least one other component of
`the hybrid device by a second signal line,
`one or more of the integrated RDC and integrated PDK
`enabling one or more of an application, a function, and a
`service.
`The hybrid device of claim 1, wherein at least one of the one
`or more of the application, the function, and the service are
`enabled at least in part on the hybrid device.
`The hybrid device of claim 1, wherein at least one of the one
`or more of the application, the function, and the service are
`enabled at least in part on a device external to the hybrid
`device and communicatively coupled to the external RDC.
`The hybrid device of claim 1, wherein the integrated PDK
`includes local, secured biometric information for
`authenticating a user, the biometric information based on one
`or more of a fingerprint, palmprint, a retinal scan, an iris scan,
`a photograph, a signature, a voice sample, DNA and RNA.
`The hybrid device of claim 1, wherein the external PDK stores
`local, secured financial information.
`The hybrid device of claim 1, wherein the integrated PDK
`stores local, secured financial information and at least one of
`
`vii
`
`
`
`
`
`
`

`

`Paper 1
`
`7.
`
`8.
`
`9.
`
`10
`
`11B
`
`11C
`
`11D
`
`11E
`
`the one or more of the application, the function, and the
`service enabled completes a financial transaction based on the
`financial information.
`The hybrid device of claim 1, wherein the hybrid device is a
`cell phone.
`The hybrid device of claim 1, wherein the external PDK is
`included in jewelry.
`The hybrid device of claim 1, comprising a storage for
`inheritance information.
`The hybrid device of claim 1, wherein the external PDK is
`included in a watch
`11pre A method comprising:
`11A
`creating a first wireless link between an integrated receiver-
`decoder circuit (RDC) of a hybrid device and an external
`personal digital key (PDK),
`the hybrid device including an integrated PDK and the
`integrated RDC,
`wherein the integrated PDK stores local, secured financial
`information,
`receiving a first signal at the integrated RDC via the first
`wireless link from the external PDK;
`generating an enablement signal enabling one or more of an
`application, a function and a service.
`The method of claim 11 further comprising: sending the
`enablement signal to the hybrid device, wherein at least one of
`the one or more of the application, the function, and the
`service are enabled at least in part on the hybrid device.
`The method of claim 11 further comprising: sending the
`enablement signal to the hybrid device, wherein at least one of
`the one or more of the application, the function, and the
`service are enabled at least in part on a device external to the
`hybrid device and communicatively coupled to the external
`RDC.
`
`12
`
`13
`
`viii
`
`
`
`
`
`
`

`

`
`
`
`14
`
`15
`
`16
`
`17
`
`18A
`
`18B
`
`18C
`
`19
`
`20
`
`
`
`
`
`Paper 1
`
`The method of claim 11, wherein the integrated PDK includes
`local, secured biometric information for authenticating a user,
`the biometric information based on one or more of a
`fingerprint, palmprint, a retinal scan, an iris scan, a
`photograph, a signature, a voice sample, DNA and RNA.
`The method of claim 11, wherein the external PDK stores
`local, secured financial information
`The method of claim 11, wherein the hybrid device is a cell
`phone.
`The method of claim 11, wherein the external PDK is included
`in jewelry.
`
`The method of claim 11, wherein the integrated PDK is
`electrically coupled to the integrated RDC, and the method
`further comprises:
`
`creating a second wireless link between the integrated PDK
`and an external RDC; and
`sending the enablement signal from the integrated PDK to the
`external RDC using the second wireless link,
`the enablement signal based on financial information stored
`locally and securely on the integrated PDK and used to
`complete a financial transaction.
`The method of claim 11, wherein the first signal includes
`inheritance information.
`The method of claim 11, wherein the external PDK is included
`in a watch.
`
`
`
`
`
`ix
`
`

`

`Paper 1
`
`GROUNDS OF CHALLENGE (37 C.F.R. § 42.204(b)(2))
`
`No. Ground for Challenge
`1
`Claims 1-20 are rendered obvious by Giobbi ’157 in view of
`Giobbi ’139 and Dua
`Claims 1-7, 9, 11-16 and 18-19 are rendered obvious by Broadcom
`Claims 8, 10, 17 and 20 are rendered obvious by Broadcom in view
`of Giobbi ’157
`
`2
`3
`
`x
`
`
`
`
`
`
`
`
`
`

`

`
`
`I.
`
`Paper 1
`
`INTRODUCTION
`The claims of the ’700 patent recite a “hybrid device” that uses a
`
`Personal Digital Key (PDK) in conjunction with a Receiver Decoder Circuit
`
`(RDC) to access secure data on the hybrid device (e.g., a cell phone).
`
`Essentially, the claimed RDC acts as a digital lock protecting secured data on
`
`a device like a phone, and the PDK functions as a digital key: when an
`
`authorized PDK makes an access request to a corresponding RDC, the secured
`
`data is made available. The claimed hybrid device includes both an internal
`
`PDK (key) and an internal RDC (lock), and these integrated components
`
`communicate with external PDKs and external RDCs in other devices.
`
`But this type of digital lock-and-key system was known years before
`
`the ’700 patent was filed. For example, in 2004—three years before the ’700
`
`patent’s earliest filing date—the Giobbi ’139 system disclosed a hybrid device
`
`(also a cell phone) that used a PDK and an RDC to secure data in the exact
`
`same manner. Likewise, the Giobbi ’157 reference also expressly discloses
`
`using a PDK and an RDC to access secured data on a hybrid device like a
`
`phone.
`
`In fact, numerous prior art patents teach the same concept of using a
`
`digital lock-and-key to secure a data or service. For example, Dua discloses
`
`an RFID system in portable devices, such as phones, that uses the same type
`
`
`
`1
`
`

`

`
`
`of digital lock-and-key recited in the claims ’700 patent. Likewise, the
`
`Paper 1
`
`Broadcom reference uses a digital key (referred to as a “token”) and a digital
`
`lock (referred to as a “reader”) to secure access to a wireless network. Thus,
`
`the challenged claims merely recite the well-known concept of securing data
`
`or services with a digital lock and key which was known in the art years before
`
`the ’700 patent was filed. Accordingly, the challenged claims should be held
`
`unpatentable.
`
`II. MANDATORY DISCLOSURES
`Pursuant 37 C.F.R. § 42.8(a)(1), the following mandatory notices are
`
`provided as part of this Petition.
`
`A. Grounds for Standing (37 C.F.R. § 42.104(a))
`Petitioner respectfully requests inter partes review (“IPR”) of Claims
`
`1-20 (“Challenged Claims”) of the ’700 patent (Ex-1001), which is indicated
`
`as assigned to Proxense LLC (“Patent Owner” or “Proxense”).
`
`Petitioner certifies that the ’700 Patent is available for inter partes
`
`review and Petitioner is not barred or estopped from requesting review of the
`
`Challenged Claims on the grounds identified in this Petition.
`
`
`
`2
`
`

`

`
`
`
`Paper 1
`
`B. Real Party in Interest
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies Samsung
`
`Electronics, Co., Ltd. and Samsung Electronics America, Inc. are the real
`
`parties-in-interest.
`
`C. Related Matters
`The ’700 patent has been asserted against Petitioner in: Proxense, LLC
`
`v. Samsung Electronics, Co., Ltd. et al., No. 6.21-CV-00210 (W.D. Tex.
`
`March 5, 2021).
`
`D. Lead and Back-Up Counsel (37 C.F.R. § 42.8(b)(3)) and
`Service Information (37 C.F.R. § 42.8(b)(3)-(4))
`Petitioner provides the following counsel and service information.
`
`Pursuant to 37 C.F.R. § 42.10(b), a Power of Attorney accompanies this
`
`Petition. Petitioner agrees to accept electronic service at the email addresses
`
`listed below.
`
`LEAD COUNSEL
`James M. Glass (Reg. No. 46729)
`jimglass@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL
`URQUHART & SULLIVAN, LLP
`51 Madison Ave, 22nd Floor
`New York, New York 10010
`Tel:
`(212) 849-7000
`Fax: (212) 849-7100
`
`BACK-UP COUNSEL
`Marissa Ducca (Reg. No. 59,807)
`marissaduca@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`1300 I St. NW
`Washington, DC 20005
`Tel:
`(202) 538-8000
`Fax: (202) 538-8100
`
`
`
`
`3
`
`

`

`
`
`
`
`
`Paper 1
`
`Sean Gloth (Reg. No. 75,316 )
`seangloth@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`51 Madison Ave, 22nd Floor
`New York, New York 10010
`Tel:
`(212) 849-7000
`Fax: (212) 849-7100
`
`Richard Lowry (Reg. No. 70,306)
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`1300 I St. NW
`Washington, DC 20005
`Tel:
`(202) 538-8000
`Fax: (202) 538-8100
`
`
`E.
`Payment of Fees (37 C.F.R. § 42.15(a))
`The undersigned authorizes the Office to charge the fee required for
`
`this Petition for Inter Partes Review to Deposit Account No. 50-5708. Any
`
`additional fees that might be due are also authorized.
`
`III. LEVEL OF SKILL IN THE ART
`Petitioner proposes that a Person of Ordinary Skill in the Art would
`
`have had a bachelor’s degree in computer or electrical engineering (or an
`
`equivalent degree) with at least three years of experience in the field of
`
`
`
`4
`
`

`

`
`
`encryption and security (or equivalent experience). Petitioner further
`
`Paper 1
`
`proposes that more education could compensate for less experience and vice
`
`versa. Ex. 1003 at ¶ 23.
`
`IV. OVERVIEW OF THE ’700 PATENT
`The ’700 patent relates to a “hybrid device” comprised of an integrated
`
`personal digital key (PDK) and an integrated receiver-decoder circuit (RDC)
`
`that are coupled in communication with each other. Ex. 1001 at 2:18-22. The
`
`integrated PDK communicates wirelessly with an external RDC and the
`
`integrated RDC communicates wirelessly with at least one external PDK
`
`within its proximity zone. Ex. 1001 at 22:6-12. The integrated PDK is
`
`capable of storing local, secured financial information and secured biometric
`
`information for authenticating a user. Ex. 1001 at 22:48-50, 22:65-67. The
`
`external PDK is also capable of storing information. Ex. 1001 at 22:30-31.
`
`In one embodiment, the integrated PDK carries credentials such as credit card
`
`or account information that are used to enable services associated with the
`
`external RDC. Ex. 1001 at 16:48-50. A user can make a purchase with the
`
`hybrid device provided that they are in possession of the external PDK and in
`
`proximity to the hybrid device. If so, the external PDK wirelessly connects
`
`to the integrated RDC and authorizes the integrated PDK to enable a
`
`
`
`5
`
`

`

`
`
`transaction by sharing credit card or account information with the external
`
`Paper 1
`
`RDC. Ex. 1003 at ¶ 24.
`
`V.
`
`PROSECUTION OF THE ’700 PATENT
`The ’700 patent was subject to only a single rejection based on double-
`
`patenting. Ex. 1002 at 91. No substantive rejections were made and the patent
`
`issued within eight months. Id. at 153; Ex. 1003 at ¶ 25.
`
`VI. CLAIM CONSTRUCTION
`Petitioner submits that express interpretations of the challenged claims
`
`are not required to resolve this petition. Because no constructions are
`
`necessary to resolve this petition, Petitioner proposes that the claim terms
`
`should be given their plain and ordinary meaning. Petitioner reserves its right
`
`to respond to any claim constructions raised by the Patent Owner or the Board
`
`in the future. Ex. 1003 at ¶ 26.
`
`VII. CITED ART
`A. Giobbi ’157
`U.S. Patent Pub. No. 2007/0245157 A1 to Giobbi et al. (“Giobbi ’157”)
`
`is directed at a system and method to “provide efficient, secure and highly
`
`reliable authentication for transaction processing and/or access control
`
`applications.” Ex. 1004 at Abstract; Ex. 1003 at ¶ 27.
`
`
`
`6
`
`

`

`
`
`
`Giobbi ’157 discloses a Personal Digital Key (PDK) that “stores one or
`
`Paper 1
`
`more profiles (e.g., a biometric profile) in a tamperproof memory that is
`
`acquired in a secure and trusted process.” Id. Giobbi ’157 further teaches that
`
`the PDK may be integrated into a hybrid device, such as a cell phone. Ex.
`
`1004 at ¶ 35 (“a portable electronic device such as a cell phone”), ¶ 12; Ex.
`
`1003 at ¶ 28.
`
`Giobbi ’157
`
`teaches
`
`that
`
`its
`
`integrated PDK
`
`is capable of
`
`communicating wirelessly with an external receiver-decoder circuit (RDC).
`
`In particular, Giobbi ’157 teaches that information stored on a PDK, such as
`
`fingerprint information, is transmitted to an external RDC located on a
`
`“Reader 108.” Id. at ¶ 49; Ex. 1003 at ¶ 29. Giobbi ’157’s hybrid device is
`
`shown in the annotated1 version of Figure 3 below prepared by petitioner’s
`
`expert, Dr. Wolfe:
`
`
`1 All figures annotated and all emphasis added to quotations unless
`
`otherwise noted.
`
`
`
`7
`
`

`

`
`
`
`Paper 1
`
`
`
`Ex. 1004 at Fig. 3. Giobbi ’157 teaches that its external RDC is
`
`communicatively coupled to an external database which is used for enabling
`
`an application/function/service:
`
`For example, in one type of authentication, information is
`received from the PDK 102 at the RDC 304, processed by the
`processor 306, and transmitted to an external database 112-116
`through the network interface 308.
`Ex. 1004 at ¶ 53. This is shown, for example, in annotated Figure 3:
`
`
`
`8
`
`

`

`
`
`
`Paper 1
`
`
`
`Ex. 1004 at Fig. 3.
`
`Giobbi ’157 teaches that its hybrid device, which contains the PDK,
`
`enables an application/function/service to take place. Ex. 1003 at ¶ 30. For
`
`example, Giobbi ’157 teaches that its hybrid device’s PDK is used to enable
`
`a financial transaction, such as an ATM withdraw:
`
`Additionally, the PDK can store other information such as
`credit/debit card information, bank information, or personal
`information in a memory for use in authorizing or completing a
`transaction.
`Ex. 1004 at ¶¶ 11, 65.
`
`B. Giobbi ’139
`U.S. Patent Pub. No. 2004/0255139 A1 to Giobbi (“Giobbi ’139”) is
`
`directed towards a “Personal Digital Key Digital Content Security System”
`
`which is aimed at protecting “unauthorized use and protect[ing] the digital
`
`content stored on computers from being wrongfully accessed, copied, and/or
`
`
`
`9
`
`

`

`
`
`distributed.” Ex. 1005 at Abstract. Like the Giobbi ’157 publication, Giobbi
`
`Paper 1
`
`’139 further teaches communicating with a receiver decoder circuit (RDC),
`
`and discloses that an RDC can be incorporated into a cell phone: “This
`
`embodiment involves integrating RDCs into…PDAs, cell phones [etc.]”).
`
`Ex. 1005 at ¶ 88, compare with Ex. 1004 at ¶ 35 (“The PDK 102 can be
`
`standalone as a portable, physical device or can be integrated into commonly
`
`carried items. . . such as a cell phone [or] Personal Digital Assistant
`
`(PDA)[.]”); Ex. 1003 at ¶ 31.
`
`Giobbi ’139 expressly teaches coupling an integrated RDC and an
`
`integrated PDK by a signal line for communication. Ex. 1003 at ¶ 32. In
`
`particular, Giobbi ’139 teaches:
`
`In other alternative embodiments, the communication between
`the user's physical electronic key [i.e., PDK] and the playing
`device is not wireless. Rather, in one alternative embodiment, the
`user's physical electronic key [i.e., PDK] communicates the
`activation code to the playing device [i.e., the RDC on the
`playing device] via a transmission line such as a serial cable
`that plugs into the key at one end and the playing device at the
`other end. In another alternative embodiment, the key is a smart
`card or magnetic card into which the activation code is encoded,
`and the key is configured to physically fit into a card reader slot
`on the playing device.
`Ex. 1005 at ¶¶ 41, 71-73.
`
`
`
`10
`
`

`

`
`
`
`Paper 1
`
`C. Broadcom
`E.P. Pub. No. 1536306 A1 (“Broadcom”) teaches a system for secured
`
`access to a service. Ex. 1007 at Abstract; Ex. 1003 at ¶ 33. In particular,
`
`Broadcom teaches that a user’s credentials may be stored on an RFID token,
`
`and this token may be read by an RFID reader in an Access Device. Id. The
`
`device including the RFID reader may authenticate the RFID token and permit
`
`access to the secured service after authentication. Id. This system is shown,
`
`for example, in Figure 1:
`
`
`
`Ex. 1007 at Fig. 1. As shown in the figure, Access Device 102 will
`
`request access to a service provider 110 after “verifying that the information
`
`sent from the token 104 includes a credential associated with an authorized
`
`user and or access device.” Ex. 1007 at ¶¶ 119, 113-118. Broadcom confirms
`
`
`
`11
`
`

`

`
`
`that, in some embodiments, the Access Device 102 can be a mobile phone
`
`Paper 1
`
`which facilitates access to an access point for mobile communications, as
`
`shown, for example, in Figure 6:
`
`
`
`Ex. 1007 at Fig. 6.
`
`D. Dua
`U.S. Patent No. 9,042,819 (“Dua”) teaches a hybrid device—e.g., a cell
`
`phone—which establishes wireless connections with other devices to enable
`
`functions and exchange data. Ex. 1006 at 6:46-65; Ex. 1003 at ¶ 34. Dua’s
`
`hybrid device is shown, for example, in annotated Figure 6:
`
`
`
`12
`
`

`

`
`
`
`Paper 1
`
`
`
`Ex. 1006 at Fig. 6.
`
`Dua employs an RFID system to secure data and applications on its
`
`hybrid device. Dua teaches that its RFID setup may act as an “electronic key,”
`
`e.g., for point-of-sale transactions. Ex. 1006 at 12:60-61. Dua uses an RFID
`
`Tag as an electronic “key” and an RFID Reader as the electronic “lock.” Ex.
`
`1003 at ¶ 35.
`
`Specifically, Dua teaches that its hybrid device uses RFID Tag-Reader
`
`Module (shown above in Fig. 6 in yellow), that includes both an RFID Reader
`
`Unit 304 and RFID Tag Unit 306 (Ex. 1003 at ¶ 36):
`
`
`
`13
`
`

`

`
`
`
`Paper 1
`
`
`
`Ex. 1006 at Fig. 4A. Dua’s Tag Unit 306 stores information necessary
`
`to gain access to an external device. In particular, Dua explains that its Tag
`
`Unit 306 stores information in internal tag memory. Ex. 1006 at 15:42-56.
`
`This information may be encrypted. Ex. 1006 at 16:31-34. Dua transmits this
`
`information to an external Reader. Ex. 1006 at 14:53-64. The external Reader
`
`reads the information transmitted by the Tag, i.e., the key, to establish a secure
`
`connection. Id.; see also id. at 13:9-18. As shown in the figure, Dua also
`
`teaches an integrated Reader Unit 304 for reading information transmitted by
`
`external Tag Units. Ex. 1006 at 14:53-64.
`
`VIII. DISCRETIONARY FACTORS
`A.
`35 U.S.C. § 325(d) Does Not Favor Denial
`The Board uses a two-part framework to analyze denial under 325(d):
`
`
`
`14
`
`

`

`Paper 1
`
`
`
`
`(1) whether the same or substantially the same art previously was
`presented to the Office or whether the same or substantially the
`same arguments previously were presented to the Office; and
`(2) if either condition of first part of the framework is satisfied,
`whether the petitioner has demonstrated that the Office erred in
`a manner material to the patentability of challenged claims.
`Advanced Bionics, LLC v. MED-EL Elektromedizinische Geräte GmbH,
`
`Paper 6 at 7 (PTAB Feb. 13, 2020). When considering the first prong, the
`
`PTAB considers the prosecution of the patent, and any post-issuance
`
`proceedings. Id. at 7-8. As to the second prong, the PTAB provided examples
`
`of “material errors,” including whether the office overlooked a specific
`
`teaching of the relevant prior art or an error of law, such as misconstruing a
`
`claim term. Id. at n. 9. In Advanced Bionics the Board explained that the
`
`Becton Dickinson factors are used within this framework to provide useful
`
`insight into how to apply each prong. Id. at 9.
`
`With respect to the first prong, the ’700 patent was issued with no
`
`substantive rejections. None of the prior art in this petition—Giobbi ’157,
`
`Giobbi ’139 or Broadcom—was addressed by either the Examiner or
`
`Applicant. This weighs in favor of institution. See, e.g., Digital Check Corp.
`
`d/b/a ST Imaging v. E-Imagedata Corp., IPR2017-00178, Paper 6 at 12-13
`
`(PTAB. April 25, 2017) (instituting where: “[T]here is no indication in the
`
`record that the Examiner rejected any claims based on either reference or that
`
`
`
`15
`
`

`

`
`
`the Examiner or applicant substantively discussed either reference during
`
`Paper 1
`
`prosecution[.]”).
`
`As discussed below, Giobbi ’157, Giobbi ’139, Dua and Broadcom
`
`teach each and every element of the asserted claims. Accordingly, these
`
`references are also not cumulative of the art the Examiner considered.
`
`B.
`35 U.S.C. § 314(a) Does Not Favor Denial
`The purpose of § 314(a) is to prevent serial petitions against the same
`
`patent, resulting in unnecessary harassment and wasted resources. Celltrion,
`
`Inc. v. Genentech, Inc., IPR2018-01019, Paper 11 at 13 (PTAB Oct. 30, 2018)
`
`(“Celltrion filed a concurrent motion to join the Pfizer IPR, effectively
`
`obviating any concerns of serial harassment and unnecessary expen

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket