throbber

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`___________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________
`
`
`
`SAMSUNG ELECTRONICS AMERICA, INC,
`Petitioner
`
`v.
`
`
`
`
`
`
`
`
`
`PROXENSE, LLC
`Patent Owner
`
`___________________
`
`IPR2021-_____
`Patent No. 8,352,730
`___________________
`
`
`PETITION FOR INTER PARTES REVIEW
`OF U.S. PATENT NO. 8,352,730
`UNDER 35 U.S.C § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................... 1
`
`I.
`
`II. MANDATORY NOTICES ............................................................................. 2
`
`A. Grounds for Standing (37 C.F.R. § 42.104(a)) ..................................... 2
`
`B. Real Party in Interest ................................................................................ 3
`
`C. Related Matters ......................................................................................... 3
`
`D. Lead and Back-Up Counsel (37 C.F.R. § 42.8(b)(3)) and Service
`Information (37 C.F.R. § 42.8(b)(3)-(4)) ........................................... 3
`
`E. Payment of Fees (37 C.F.R. § 42.15(a)) ................................................... 4
`
`III. LEVEL OF SKILL IN THE ART ................................................................... 4
`
`III.
`
`IDENTIFICATION OF CHALLENGE AND RELIEF REQUESTED ......... 5
`
`IV. OVERVIEW OF THE ’730 PATENT ............................................................ 6
`
`A.
`
`Prosecution History ............................................................................... 7
`
`V.
`
`CLAIM CONSTRUCTION ............................................................................ 8
`
`VI. CITED ART ..................................................................................................... 9
`
`A.
`
`Scott (WO1999056429) ........................................................................ 9
`
`B.
`
`Russell (US20040044627) ..................................................................10
`
`C.
`
`Lapsley (US2001/0000535) ................................................................11
`
`D.
`
`Robinson (US2003/0177102) ..............................................................11
`
`E.
`
`F.
`
`
`
`
`
`Rhoads (US2004/0153649) .................................................................12
`
`Berardi (US7239226) ..........................................................................12
`
`
`- i -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`G.
`
`Rosen (US6175921) ............................................................................13
`
`H.
`
`Shreve (US2002/0109580) ..................................................................13
`
`I.
`
`J.
`
`Kinoshita (US2003/0055792) .............................................................14
`
`Enablement ..........................................................................................14
`
`VII. DISCRETIONARY FACTORS ...................................................................15
`
`A.
`
`35 U.S.C. § 325(d) Does Not Favor Denial ......................................15
`
`B.
`
`35 U.S.C. § 314(a) Does Not Favor Denial ......................................16
`
`VII. DETAILED EXPLANATION OF GROUNDS FOR INVALIDITY ..........22
`
`A. Ground 1: Claims 1-2, 4-9, and 11 are rendered obvious by Scott,
`Russell, and Lapsley. ...........................................................................22
`
`B.
`
`C.
`
`Ground 2: Claims 3 and 10 are rendered obvious by Scott, Russell,
`Lapsley, and Robinson. .......................................................................43
`
`Ground 3: Claim 6 is rendered obvious by Scott, Russell, Lapsley,
`and Rhoads. .........................................................................................45
`
`D. Ground 4: Claims 1-2, 4-6, 8-9, and 11 are rendered obvious by
`Berardi, Rosen, Shreve, and Kinoshita. ..............................................46
`
`VIII. SECONDARY CONSIDERATIONS ...........................................................60
`
`IX. CONCLUSION ..............................................................................................61
`
`
`
`
`
`
`
`
`
`
`- ii -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`EXHIBIT LIST
`
`No.
`
`Exhibit
`
`1001 U.S. Patent No. 8,352,730
`
`1002 File History for U.S. Patent No. 8,352,730
`
`1003 Declaration of Andrew Wolfe, Ph.D.
`
`1004 Curriculum vitae of Andrew Wolfe, Ph.D.
`
`1005
`
`International App. No. WO 1999056429 to Scott et al.
`
`1006 U.S. Patent Pub. No. 2004/0044627 A1 to Russell et al.
`
`1007 U.S. Patent Pub. No. 2001/0000535 A1 to Lapsley et al.
`
`1008 U.S. Patent Pub. No. 2003/0177102 A1 to Robinson
`
`1009 U.S. Patent Pub. No. 2004/0153649 A1 to Rhoads et al.
`
`1010 U.S. Patent No. 7,239,226 B2 to Berardi et al.
`
`1011 U.S. Patent No. 6,175,921 B1 to Rosen
`
`1012 U.S. Patent Pub. No. 2002/0109580 A1 to Shreve et al.
`
`1013 U.S. Patent Pub. No. 2003/0055792 A1 to Kinoshita et al.
`
`1014
`
`“Applied Cryptography—Protocols, Algorithms, and Source Code in
`C” (1996) by Schneier
`
`1015 Declaration of Sylvia Hall-Ellis, Ph.D.
`
`1016 Proxense’s Infringement Contention Chart for U.S. 8,352,730
`
`
`
`
`
`
`
`
`
`
`- iii -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`LIST OF CHALLENGED CLAIMS
`
`Claim
`
`1pre
`
`U.S. Patent No. 8,352,730
`
`A method for verifying a user during authentication of an integrated
`device, comprising the steps of:
`
`1A
`
`1B
`
`1C
`
`1D
`
`1E
`
`1F
`
`1G
`
`1H
`
`2
`
`3
`
`
`
`
`persistently storing biometric data of the user and a plurality of codes
`and other data values comprising a device ID code uniquely identifying
`the integrated device and a secret decryption value in a tamper proof
`format written to a storage element on the integrated device that is
`unable to be subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a palm
`print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition;
`
`responsive to receiving a request for a biometric verification of the user,
`receiving scan data from a biometric scan;
`
`comparing the scan data to the biometric data to determine whether the
`scan data matches the biometric data;
`
`responsive to a determination that the scan data matches the biometric
`data, wirelessly sending one or more codes from the plurality of codes
`and the other data values for authentication by an agent that is a third-
`party trusted authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices,
`
`wherein the one or more codes and other data values includes the device
`ID code; and
`
`responsive to authentication of the one or more codes and the other data
`values by the agent, receiving an access message from the agent allowing
`the user access to an application,
`
`wherein the application is selected from a group consisting of a casino
`machine, a keyless lock, a garage door opener, an ATM machine, a hard
`drive, computer software, a web site and a file.
`
`The method of claim 1, wherein the one or more codes and the other data
`values are transmitted to the agent over a network.
`
`The method of claim 1, further comprising: registering an age
`
`- iv -
`
`
`
`

`

`4
`
`5
`
`6
`
`7.
`
`8pre
`
`8A
`
`8B
`
`8C
`
`8D
`
`8E
`
`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`verification for the user in association with the device ID code.
`
` The method of claim 1, wherein the one or more codes and the other
`data values indicate that the biometric verification was successful.
`
`The method of claim 1, wherein the biometric data and the scan data are
`both based on a fingerprint scan by the user.
`
`The method of claim 1, further comprising: establishing a secure
`communication channel prior to sending the one or more codes and the
`other data values for authentication.
`
`The method of claim 1, further comprising: receiving a request for the
`one or more codes and the other data values without a request for
`biometric verification; and responsive to receiving the request for the
`one or more codes and the other data values without a request for
`biometric verification, sending the one or more codes and the other data
`values without requesting the scan data.
`
`An integrated device for verifying a user during authentication of the
`integrated device, comprising:
`
`a memory stores biometric data of a user and a plurality of codes and
`other data values comprising a device ID code uniquely identifying the
`integrated device and a secret decryption value in a tamper proof format
`written to the memory that is unable to be subsequently altered;
`
`wherein the biometric data is selected from a group consisting of a palm
`print, a retinal scan, an iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition;
`
`a verification unit, in communication with the memory, receives scan
`data from a biometric scan for comparison against the biometric data,
`
`and if the scan data matches the biometric data,
`
`wirelessly sends one or more codes from the plurality of codes and the
`other data values for authentication by an agent that is a third-party
`trusted authority possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein the one or more codes
`and the other data values includes the device ID code; and
`
`8F
`
`responsive to the agent authenticating the one or more codes and the
`other data values,
`
`8G
`
`receives an access message from the agent allowing the user access to an
`
`
`
`
`- v -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`application,
`
`wherein the application is selected from a group consisting of a casino
`machine, a keyless lock, a garage door opener, an ATM machine, a hard
`drive, computer software, a web site and a file.
`
`The integrated device of claim 8, wherein the one or more codes and the
`other data values are transmitted to the agent over a network.
`
`The integrated device of claim 9, wherein an age verification is
`registered in association with the device ID code.
`
`The integrated device of claim 8, wherein the verifier comprises: an LED
`to be activated for requesting the biometric scan.
`
`
`
`
`
`- vi -
`
`
`
`8H
`
`9
`
`10
`
`11
`
`
`
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`GROUNDS OF CHALLENGE (37 C.F.R. § 42.204(b)(2))
`
`No. Ground for Challenge
`
`Scott, Russell, and Lapsley render obvious Claims 1-2, 4-9, and 11
`
`Scott, Russell, Lapsley, and Robinson render obvious Claims 3 and 10
`
`Scott, Russell, Lapsley, and Rhoads render obvious Claim 6
`
`Berardi, Rosen, Shreve, and Kinoshita render obvious Claims 1-2, 4-6, 8-9,
`and 11
`
`
`
`
`
`- vii -
`
`
`
`1
`
`2
`
`3
`
`4
`
`
`
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`I.
`
`INTRODUCTION
`
`The claims of the ’730 patent relate to preventing unauthorized use of a
`
`wireless device by verifying both biometric data and the device itself. The ’730
`
`patent describes biometric authentication of a user of a wireless device using a
`
`generic “computerized authentication” system that provides secure access to
`
`resources such as ATMs and locked areas. Ex. 1001 (’730 Patent) at 1:15-18,
`
`1:51-53. The wireless device validates a user’s biometric scan against biometric
`
`data stored on the device. Id. at 1:59-64. Next, the wireless device transmits an ID
`
`code to a third-party to indicate that the user’s identity has been verified. Id. at
`
`1:64-67. If the third-party determines that the code is authentic, access is granted
`
`to the user to a secure resource. Id. at 2:1-4. The ’730 patent purports to solve the
`
`problem of users having to “memorize or otherwise keep track of the[ir]
`
`credentials,” id. at 1:28-30, while providing security from illegitimate users
`
`“us[ing] a stolen access object to enter a secured location because the user’s
`
`identity is never checked.” Id. at 1:41-43.
`
`But this type of biometric authentication system was known years before the
`
`’730 patent was filed. For example, in 1999—five years before the ’730 patent’s
`
`earliest filing date—the Scott reference disclosed a wireless personal identification
`
`device that verified biometric data of user via a biometric scan and authenticated
`
`the user for access to protected resources such as a hotel room or an electronic
`
`
`
`
`- 1 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`transaction. Likewise, the Berardi reference also expressly discloses verifying
`
`biometric data and authenticating a user by means of a third-party trusted agent to
`
`provide access to a secure resource. In fact, numerous prior art patents teach the
`
`same concept. For example, the Russell, Shreve, and Kinoshita reference uses
`
`similar portable devices in secure authentication processes.
`
`Thus, the challenged claims merely recite the well-known concept of
`
`verifying biometric data and authenticating a user’s device using a third-party
`
`trusted agent—well-worn concepts known in the art years before the ’730 patent
`
`was filed. Accordingly, the challenged claims should be held unpatentable.
`
`II. MANDATORY NOTICES
`
`Pursuant 37 C.F.R. § 42.8(a)(1), the following mandatory notices are
`
`provided as part of this Petition.
`
`A. Grounds for Standing (37 C.F.R. § 42.104(a))
`
`Samsung Electronics America, Inc. (“Samsung” or “Petitioner”) respectfully
`
`requests inter partes review (“IPR”) of Claims 1-11 (“Challenged Claims”) of U.S.
`
`Patent No. 8,352,730 to Giobbi (“the ’730 Patent”) (Ex-1001), which is indicated
`
`as assigned to Proxense LLC. (“Patent Owner” or “Proxense”).
`
`Petitioner certifies that the ’730 Patent is available for inter partes review
`
`and Petitioner is not barred or estopped from requesting review of the Challenged
`
`Claims on the grounds identified in this Petition.
`
`
`
`
`- 2 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`B. Real Party in Interest
`
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies Samsung Electronics,
`
`Co., Ltd. and Samsung Electronics America, Inc. are the real parties-in-interest.
`
`C. Related Matters
`
`The ’730 patent has been asserted against Petitioner in: Proxense, LLC v.
`
`Samsung Electronics, Co., Ltd. et al., No. 6.21-CV-00210 (W.D. Tex. March 5,
`
`2021).
`
`Moreover, Patent Owner also has asserted U.S. Patent Nos. 9,049,188;
`
`9,298,905; 9,235,700; and 10,698,989 in the above litigation, and Petitioner also is
`
`concurrently filing a petition challenging that patent.
`
`D. Lead and Back-Up Counsel (37 C.F.R. § 42.8(b)(3)) and Service
`Information (37 C.F.R. § 42.8(b)(3)-(4))
`
`Petitioner provides the following counsel and service information. Pursuant
`
`to 37 C.F.R. § 42.10(b), a Power of Attorney accompanies this Petition. Petitioner
`
`
`
`agrees to accept electronic service at the email addresses listed below. 1
`
`LEAD COUNSEL
`
`BACK-UP COUNSEL
`
`James M. Glass (Reg. No. 46729)
`jimglass@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`
`Marissa Ducca (Reg. No. 59,807)
`marissaduca@quinnemanuel.com
`
`Richard Lowry (Reg. No. 70,306)
`
`
`1 Petitioner consents to electronic service to qe-samsung-
`
`proxense@quinnemanuel.com and the email addresses listed in the table below.
`
`
`
`
`- 3 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`QUINN EMANUEL
`URQUHART & SULLIVAN, LLP
`51 Madison Ave, 22nd Floor
`New York, New York 10010
`Tel:
`(212) 849-7000
`Fax: (212) 849-7100
`
`richardlowry@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`1300 I St. NW
`Washington, DC 20005
`Tel:
`(202) 538-8000
`Fax: (202) 538-8100
`
`Sean Gloth (Reg. No. 75,316 )
`seangloth@quinnemanuel.com
`
`Postal and Hand Delivery Address:
`QUINN EMANUEL URQUHART &
`SULLIVAN, LLP
`51 Madison Ave, 22nd Floor
`New York, New York 10010
`Tel:
`(212) 849-7000
`Fax: (212) 849-7100
`
`E. Payment of Fees (37 C.F.R. § 42.15(a))
`
`The undersigned authorizes the Office to charge the fee required for this
`
`Petition for Inter Partes Review to Deposit Account No. 50-5708. Any additional
`
`fees that might be due are also authorized.
`
`III. LEVEL OF SKILL IN THE ART
`
`Petitioner proposes that a Person of Ordinary Skill in the Art would have had
`
`a bachelor’s degree in computer or electrical engineering (or an equivalent degree)
`
`with at least three years of experience in the field of encryption and security (or an
`
`equivalent). Petitioner further proposes that more education could compensate for
`
`less experience and vice versa.
`
`
`
`
`- 4 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`III.
`
`IDENTIFICATION OF CHALLENGE AND RELIEF REQUESTED
`
`Petitioner challenges claims 1-11 of the ’730 Patent and requests that these
`
`claims be found unpatentable in view of the following references:
`
`1. PCT Application No. WO 99/56429 to Scott et al., filed April 26,
`1999 and published November 4, 1999 (Ex. 1005, hereinafter
`“Scott”);
`
`2. US Patent Application Publication No. US 2004/0044627 to Russell et
`al., filed November 29, 2000 and published March 4, 2004 (Ex. 1006,
`hereinafter “Russell”)
`
`3. US Patent Application Publication No. US 2001/0000535 to Lapsley
`et al., filed December 6, 2000 and published April 26, 2001 (Ex. 1007,
`hereinafter “Lapsley”)
`
`4. US Patent Application Publication No. US 2003/0177102 to
`Robinson, filed February 19, 2003 and published September 18, 2003
`(Ex. 1008, hereinafter “Robinson”)
`
`5. US Patent Application Publication No. US 2004/0153649 to Rhoads
`et al., filed September 4, 2003 and published August 5, 2004. (Ex.
`1009, hereinafter “Rhoads”)
`
`6. US Patent No. US 7,239,226 to Berardi et al., filed July 9, 2002 and
`published July 3, 2007. (Ex. 1010, hereinafter “Berardi”)
`
`7. US Patent No. 6,175,921 to Rosen, filed July 16, 1997 and published
`January 16, 2001. (Ex. 1011, hereinafter “Rosen”)
`
`8. US Patent Application No. US 2002/0109580 to Shreve et al., filed
`February 15, 2001 and published August 15, 2002. (Ex. 1012,
`hereinafter “Shreve”)
`
`9. US Patent Application Publication No. US 2003/0055792 to Kinoshita
`et al., filed July 19, 2002 and Published March 20, 2003. (Ex. 1013,
`hereinafter “Kinoshita”)
`
`
`
`
`- 5 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`Pursuant
`
`to §§42.22(a)(1) and 42.22(b)(1)-(2), Petitioner
`
`requests
`
`cancellation of claims 1-11 of the ’730 Patent on the following grounds:
`
`Ground 1: Claims 1-2, 4-9, and 11 are rendered obvious by Scott, Russell,
`
`and Lapsley.
`
`Ground 2: Claims 3 and 10 are rendered obvious by Scott, Russell,
`
`Lapsley, and Robinson.
`
`Ground 3: Claim 6 is rendered obvious by Scott, Russell, Lapsley, and
`
`Rhoads.
`
`Ground 4: Claims 1-2, 4-6, 8-9, and 11 are rendered obvious by Berardi,
`
`Rosen, Shreve, and Kinoshita.
`
`IV. OVERVIEW OF THE ’730 PATENT
`
`As explained herein, the ’730 patent relates to integrated wireless devices in
`
`a generic “computerized authentication” system that are used to gain access to
`
`devices, applications, or accounts through a biometric validation procedure. Ex.
`
`1001 at 1:15-18, 1:51-53. The device validates a user’s biometric scan against
`
`biometric data stored on the device. Id. at 1:59-64. After validation, a code stored
`
`on the device is transmitted to indicate that the user’s identity has been verified.
`
`Id. at 1:64-67. The device transmits the code to a third-party trusted key authority
`
`that determines if the code is authentic by checking it against a list of legitimate
`
`integrated device codes. Id. at 2:1-4. If the code is authentic, the user is allowed
`
`
`
`
`- 6 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`access to the device, application, or account they seek access to. Id. at 2:4-5. The
`
`’730 patent purports to solve for users the problem of having to “memorize or
`
`otherwise keep track of the[ir] credentials.” Id. at 1:28-30. The patents also
`
`purport to solve the problem of illegitimate users “us[ing] a stolen access object to
`
`enter a secured location because the user’s identity is never checked.” Id. at 1:41-
`
`43.
`
`A.
`
`Prosecution History
`
`The ’730 Patent was filed on December 20, 2005. Ex. 1002 at 761.
`
`On April 27, 2009, after lengthy exchange regarding various formalities, the
`
`U.S. Patent & Trademark Office (hereinafter “Patent Office”) issued the first non-
`
`final Office Action rejecting claims 1-21 under both 35 U.S.C 012 and 103 in light
`
`of Hsu et al. (US 6,041,410) in view of Saito et all (US 20040129787). Ex. 1002 at
`
`469-86.
`
`After a series of amendments and further rejections, additionally citing
`
`Stanko(US 2005/0074126) and Beenau et al. (US 2004/0230488), the Patent Office
`
`issued a Notice of Allowance on August 31, 2012. Ex. 1002 at 18-20, 102-15, and
`
`284-95.
`
`
`
`
`- 7 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`V. CLAIM CONSTRUCTION2
`
`Petitioner submits that express interpretations of the challenged claims are
`
`not required to resolve this petition. Because no constructions are necessary to
`
`resolve this petition, Petitioner proposes that the claim terms should be given their
`
`plain and ordinary meaning. Petitioner reserves its right to respond to any claim
`
`constructions raised by the Patent Owner or the Board in the future.
`
`A. “persistently storing biometric data of the user and a plurality of codes
`
`and other data values comprising a device ID code uniquely identifying the
`
`integrated device and a secret decryption value in a tamper proof format written to
`
`a storage element on the integrated device that is unable to be subsequently
`
`altered;”
`
`Patent Owner’s infringement contentions and the prosecution history
`
`indicate that “tamper proof format” applies to each of (1) “biometric data of the
`
`
`2 Petitioners reserve the right to pursue different claim constructions,
`
`including that certain claim terms are indefinite, during this and related
`
`proceedings as well as in any district court litigation concerning the ’730 Patent.
`
`See Samsung Elecs. Am., Inc. v. Prisua Eng’g Corp., 948 F.3d 1342, 1350 (Fed.
`
`Cir. 2020) (“[T]he Board may not cancel claims for indefiniteness in an IPR
`
`proceeding.”).
`
`
`
`
`- 8 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`user,” (2) “a plurality of codes and other data values comprising a device ID code
`
`uniquely identifying the integrated device,” and (3) “a secret decryption value.”
`
`Patent Owner’s infringement contentions allege that Samsung Pay preload
`
`smartphones persistently store (1) “biometric data of the user” (Ex. 1016 (’730
`
`patent Infringement Contentions) at 1-3), (2) “a device ID code uniquely
`
`identifying the smartphone (id. at 4-6), and (3) “a private key,” each “in a tamper
`
`proof format written to a storage element on the integrated device that is unable to
`
`be subsequently altered.” Id. at 6-7.
`
`The prosecution history of the ’730 patent reflects the same construction.
`
`Patent Owner distinguished prior art by stating that the biometric data and the
`
`plurality of codes and other data values are “written to a storage element on the
`
`integrated device that is unable to be subsequently altered.” Ex. 1002 at 89-90
`
`(Applicant’s Remarks of December 5, 2011 at 8-9).
`
`VI. CITED ART
`
`A.
`
`Scott (WO1999056429)
`
`Scott discloses a method for verifying a user during authentication of an
`
`integrated device (e.g., personal identification device (“PID”) 6), in order to, for
`
`example, provide secure access to protected resources such as a hotel room or a
`
`point-of-sale transaction. Ex. 1005 at Abstract, 2:5-23, 4:22-5:9, 7:24-8:12; see
`
`claims [1A]-[1H] infra.
`
`
`
`
`- 9 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`
`
`
`
`Ex. 1005 at Fig. 1. 3
`
`B. Russell (US20040044627)
`
`Russell discloses a single personal identifying device (PID) 100 that can
`
`wireless transmit communications to securely conduct transactions. Ex. 1006 at
`
`Abstract, ¶¶182, 189, 223. Russell discloses that an encryption scheme may be
`
`used to protect these communications, including the encryption techniques
`
`described in Bruce Schneier’s book titled “Applied Cryptography—Protocols,
`
`Algorithms, and Source Code in C” (1996) (Ex. 10144) which Russell incorporates
`
`by reference. Id. at ¶171. In this book, Schneier describes public and private key
`
`encryption.
`
`
`3 Annotations are added to figures unless indicated otherwise.
`
`4 Schneier was publicly available before the filing of the patent at issue.
`Ex. 1015.
`
`
`
`
`- 10 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`C. Lapsley (US2001/0000535)
`
`Lapsley discloses a
`
`third-party authentication system to validate a
`
`transaction initiated at a biometric device (i.e., Party Identification Apparatus
`
`(PIA)). Ex. 1007 at Abstract, ¶54. The PIA includes a biometric sensor that
`
`receives a user’s biometric input accompanying an electronic payment. Id. at ¶167.
`
`The PIA transmits the biometric data and a PIA hardware identification code to a
`
`trusted third-party Data Processing Center (DPC). Id. at ¶168. The DPC includes
`
`a list of hardware identification codes for PIAs, wherein each respective code
`
`“makes the PIA uniquely identifiable to the DPC in all transmissions from that
`
`device.” Id. at ¶¶85, 161. Using this list, the DPC identifies the PIA by its PIA
`
`hardware identification code. Id. at ¶¶85, 103, 104, 158, 166. Lapsley also
`
`discloses that communication security is achieved using an encryption scheme that
`
`uses public/private keys and admits doing so is “well known in the industry.” Id.
`
`at ¶82.
`
`D. Robinson (US2003/0177102)
`
`Robinson discloses that a central database 102 holds information related to
`
`users to authenticate a user’s age to access an age restricted area, for example. Ex.
`
`1008 at ¶¶27-28, 32, 66-67 Fig. 1. The central database 102 stores age verification
`
`records related to individuals seeking age verification (called “presenters”),
`
`including information such as a user’s age, date of birth, government ID number,
`
`
`
`
`- 11 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`biometric template, and at least one ID number that identifies the presenter within
`
`the system. Id. Prior to using the age-verification system, an individual presents
`
`biometric and age-verifying information. Id. at ¶¶13-15. Robinson further
`
`discloses that age-verifying information is associated with at least one ID number
`
`(SID) identifying the user.
`
`E. Rhoads (US2004/0153649)
`
`Rhoads discloses a user terminal 42 that establishes communication with a
`
`central site 46 to establish authorization for a financial transaction. Ex. 1009 at
`
`¶¶279-280. Specifically, the user terminal 42 establishes a secure communication
`
`channel prior to sending values for authentication such as an encrypted document
`
`ID, document type, unique image hash, the user terminal’s IP address, and a
`
`timestamp of the request. Id. at ¶280. Rhoads also discloses that additional
`
`security is possible by encrypting the request with a key. Id.
`
`F.
`
`Berardi (US7239226)
`
`Berardi discloses a method for verifying a user during authentication of an
`
`integrated device (e.g., portable electronic Fob 102) that engages with RFID reader
`
`104 to, for example, facilitate a point-of-sale transaction. Ex. 1010 at Abstract,
`
`3:45-4:3, 12:36-48, Fig. 2. Berardi further discloses the conventional encryption
`
`techniques may be used, such as those described in the text “Applied
`
`Cryptography: Protocols, Algorithms, and Source Code in C,” written by Bruce
`
`
`
`
`- 12 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`Schneier (second edition, 1996), which Berardi incorporates by reference. Id. at
`
`7:19-27. The fob 102 is thus useful for completing a contactless transaction and
`
`would ordinarily be carried by a user for verification. Ex. 1010 at 1:15-18, 1:32-
`
`36.
`
`G. Rosen (US6175921)
`
`Rosen discloses a tamper-proof electronic processing device referred to as a
`
`trusted agent. Ex. 1011 at 4:4-14, 11:4-11, claim 1. The tamper-proof trusted
`
`agent stores a private key to encrypt messages (id. at 7:31-42), device ID (id. at
`
`claim 1, 7:43-57, 11:12-24), and biometrics (id. at 11:24-29). Id. at Fig. 2, claims
`
`1-8. The tamper-proof agent may be composed of discrete tamper-proof
`
`components or as a tamper-proof module. Id. at 19:64-20:5.
`
`H. Shreve (US2002/0109580)
`
`Shreve discloses a transceiver/fob device 12, which is “a remote keyless
`
`entry-based transceiver device,” capable of two-way wireless communications with
`
`domain system 14 for secure access authorization based on biometrics. Ex. 1012 at
`
`Fig. 2a, ¶¶33, 35. Shreve discloses a service provider 24 with a secured database
`
`31 that provides authentication of a transaction initiated by a fob device 12. Id. at
`
`¶39. For authentication, the database 31 contains cross-references between “the
`
`key fob ID and other user specific information (e.g., accounts, access privileges,
`
`
`
`
`- 13 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`biometrics, etc) that can be used by the authentication algorithm 23 to further
`
`facilitate the authentication process.” Id. at ¶39, claim 47.
`
`I. Kinoshita (US2003/0055792)
`
`Kinoshita discloses a portable device 14 that authenticates a user before
`
`transmitting a user ID to a POS terminal 11, which forwards the user ID to a third-
`
`party payment gateway 15 to authorize a payment transaction. Ex. 1013 at ¶¶168-
`
`69, Fig. 1. Specifically, the payment gateway 15 confirms the authenticity of the
`
`portable device 14 by comparing the device ID of the portable device 14 to stored
`
`device ID in a user table 154a. Id. at ¶171. After the payment gateway 15 receives
`
`a user ID and a request for transaction, the payment gateway 15 sends an e-mail
`
`message that includes commands for direction of payment to be executed by the
`
`portable device 14. ¶¶168-69. Upon receiving the e-mail message, the portable
`
`device 14 “executes an application for payment according to the commands
`
`included in the e-mail.” Id. at ¶¶168-69, 179-83.
`
`J. Enablement
`
`The above described reference both individually and in the combinations
`
`explained below enable the systems and methods they are cited for. Ex. 1003.
`
`None of the above-mentioned references describe an aspirational or otherwise
`
`unachievable system or method. Id. To the extent Patent Owner argues that any
`
`of the above described references are not self-enabled or otherwise do not satisfy
`
`
`
`
`- 14 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`Raytheon Techs. Corp. v. Gen. Elec. Co., 993 F.3d 1374 (Fed. Cir. 2021), a
`
`POSITA would have understood how to combine the references to achieve at least
`
`the challenged claims. Id.
`
`VII. DISCRETIONARY FACTORS
`
`A.
`
`35 U.S.C. § 325(d) Does Not Favor Denial
`
`The Board uses a two-part framework to analyze denial under 325(d):
`
`(1) whether the same or substantially the same art previously was
`presented to the Office or whether the same or substantially the same
`arguments previously were presented to the Office; and
`
`(2) if either condition of first part of the framework is satisfied,
`whether the petitioner has demonstrated that the Office erred in a
`manner material to the patentability of challenged claims.
`
`Advanced Bionics, LLC v. MED-EL Elektromedizinische Geräte GmbH, Paper 6 at
`
`7 (PTAB Feb. 13, 2020). When considering the first prong, the PTAB considers
`
`the prosecution of the patent, and any post-issuance proceedings like ex parte
`
`reexams. Id. at 7-8. As to the second prong, the PTAB provided examples of
`
`“material errors,” including whether the office overlooked a specific teaching of
`
`the relevant prior art or an error of law, such as misconstruing a claim term. Id. at
`
`n. 9. In Advanced Bionics the Board explained that the Becton Dickinson factors
`
`are used within this framework to provide useful insight into how to apply each
`
`prong. Id. at 9.
`
`
`
`
`- 15 -
`
`
`
`

`

`
`
`U.S. Patent No. 8,352,730
`Petition for Inter Partes Review
`
`With respect to the first prong, the ’730 patent was issued over rejections in
`
`view of Hsu, Stanko, Saito and Beenau5. None of the prior art in this petition were
`
`cited or addres

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket