throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`ASSA ABLOY AB, ASSA ABLOY INC., ASSA ABLOY RESIDENTIAL
`GROUP, INC., AUGUST HOME, INC., HID GLOBAL CORPORATION,
`ASSA ABLOY GLOBAL SOLUTIONS, INC.,
`Petitioner,
`
`v.
`
`CPC PATENT TECHNOLOGIES PTY LTD.,
`Patent Owner.
`
`
`
`
`
`
`
`
`
`
`
`
`Case IPR2022-01094
`Patent 8,620,039
`
`
`
`
`
`
`
`
`
`
`
`
`PATENT OWNER’S RESPONSE
`
`U.S. PATENT NO. 8,620,039 (CLAIMS 3-12 AND 15-18)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`TABLE OF CONTENTS
`
`TABLE OF CONTENTS ........................................................................................... i
`
`I.
`
`II.
`
`INTRODUCTION ........................................................................................... 1
`
`’039 PATENT OVERVIEW ........................................................................... 4
`
`III. LEVEL OF ORDINARY SKILL .................................................................... 6
`
`IV. CLAIM CONSTRUCTION ............................................................................ 7
`
`A.
`
`B.
`
`Limitation 3[D(1)] Is Directed To Enrollment ..................................... 7
`
`“memory location defined by the provided card information” ............. 8
`
`V.
`
`THE PRIOR ART FAILS TO RENDER THE CHALLENGED
`CLAIMS OBVIOUS .....................................................................................10
`
`A. Ground 1 – The Combination of Hsu and Sanford Does Not
`Teach Or Suggest “storing the inputted biometric signature in a
`memory at a memory location defined by the provided card
`information” ........................................................................................10
`
`1.
`
`2.
`
`Hsu does not teach or suggest that card information
`“defines” the memory location of the fingerprint data
`during enrollment ......................................................................11
`
`Hsu’s cursory description of its database does not save
`Petitioner’s argument ................................................................14
`
`B.
`
`Ground 2 - The Combination of Hsu, Sanford and Tsukamura
`Does Not Teach Or Suggest “defining, dependent upon the
`received card information, a memory location in a local
`memory external to the card” ..............................................................16
`
`1.
`
`2.
`
`3.
`
`Tsukamura’s card information plays no part in the
`enrollment process or storage of the biometric signature .........16
`
`Tsukamura’s user-driven index system is significantly
`different from the ’039 Patent’s pointer system .......................17
`
`A POSITA would not have been motivated to combine
`Tsukamura and Hsu ..................................................................21
`
`C.
`
`Dependent Claims ...............................................................................24
`
`VI. THE PETITION IS TIME-BARRED UNDER 35 U.S.C. § 315(b) .............25
`
`A. Applicable Legal Standards ................................................................25
`
`i
`
`

`

`1.
`
`2.
`
`3.
`
`Petitioners Bear The Burden Of Persuasion .............................25
`
`RPI And Privity Standards ........................................................25
`
`a.
`
`b.
`
`Scope Of Real Parties In Interest ....................................26
`
`Scope Of Privity .............................................................27
`
`Institution Is Barred Under Section 315(b) Because
`Apple Is An RPI And Privy Of Petitioners ...............................28
`
`B.
`
`Apple Is An Unnamed RPI To This Proceeding .................................28
`
`1.
`
`2.
`
`3.
`
`4.
`
`Control Is Not A Requirement For A Non-Party To Be A
`Real-Party-In-Interest ...............................................................28
`
`Apple Has A Preexisting, Established Business
`Relationship With Petitioners ...................................................29
`
`a.
`
`b.
`
`Petitioners Admit Their Preexisting, Established
`Business Relationship With Apple .................................29
`
`The Apple Agreement Also Establishes That
`Apple Is An RPI..............................................................31
`
`i.
`
`ii.
`
`iii.
`
`iv.
`
`v.
`
`Representations And Warranties Of
`Noninfringement ..................................................34
`
`Indemnification Clauses .......................................36
`
`Product Inspection Clause ....................................37
`
`Insurance Coverage Clause ..................................38
`
`Apple Appointed As Petitioners’ Agent ..............39
`
`Apple Is A Clear Beneficiary Of The Petition ..........................40
`
`The Petitioners Filed An IPR Petition Against The ’039
`Patent For Apple’s Benefit ........................................................41
`
`C.
`
`Apple Is A Privy To This Proceeding .................................................42
`
`VII. CONCLUSION ..............................................................................................42
`
`
`
`
`
`
`
`
`
`
`
`
`ii
`
`

`

`EXHIBIT
`
`DESCRIPTION
`
`2001
`
`2002
`
`2003
`
`2004
`
`2005
`
`2006
`
`2007
`
`2008
`
`2009
`2010
`
`2011
`
`2012
`
`2013
`
`Affidavit in Support of Patent Owner’s Motion for Pro Hac Vice
`Admission of Steven M. Coyle Pursuant to 37 C.F.R. § 42.10(c)
`Affidavit in Support of Patent Owner’s Motion for Pro Hac Vice
`Admission of Nicholas A. Geiger Pursuant to 37 C.F.R. § 42.10(c)
`Complaint filed in CPC Patent Technologies Pty Ltd. v. Apple,
`Inc., No. 6:21-cv-00165 (W.D. Tex., Waco Division) (without
`exhibits)
`Affidavit of Service of Complaint filed in CPC Patent
`Technologies Pty Ltd. v. Apple, Inc., No. 6:21-cv-00165 (W.D.
`Tex., Waco Division)
`Letter dated October 18, 2021 from Patent Owner’s counsel to
`Yale Residential regarding ’705 and ’208 Patents with attached
`claim charts
`Letter dated November 4, 2021 from Patent Owner’s counsel to
`Yale Residential
`Complaint for declaratory judgment filed in ASSA ABLOY AB et
`al. v. CPC Patent Technologies Pty. Ltd. and Charter Pacific Corp
`Ltd., Civ. 3:22-cv-694 (D. Conn.) (without exhibits)
`Declaration of Kevin J. Dart filed in ASSA ABLOY AB et al. v.
`CPC Patent Technologies Pty. Ltd. and Charter Pacific Corp Ltd.,
`Civ. 3:22-cv-694 (D. Conn.) (without exhibits)
`Apple Developer Program License Agreement
`Email thread between Petitioners and Patent Owner’s respective
`counsel regarding additional discovery
`Yale product literature (Yale Assure Lock Touchscreen with Wi-Fi
`and Bluetooth) downloaded from
`[https://shopyalehome.com/products/yale-assure-lock-touchscreen-
`with-wi-fi-and-bluetooth?variant=39341913079940]
`Yale product literature (Yale Access Upgrade Kit with Wi-Fi for
`Assure Locks) downloaded from
`[https://shopyalehome.com/products/yale-access-ugrade-kit-for-
`assure-locks-with-wifi?variant=34110396006532]
`Yale product literature (Facial and Fingerprint Lock Verification
`for Yale Assure Smart Locks) downloaded from
`[https://shopyalehome.com/blogs/yale-home-blog/new-facial-and-
`fingerprint-lock-verification-for-yale-assure-smart-locks]
`
`iii
`
`

`

`EXHIBIT
`
`DESCRIPTION
`
`2014
`
`2015
`
`2016
`
`2017
`
`2018
`
`2023
`2024
`2025
`2026
`
`2027
`
`2028
`
`2029
`
`2030
`2031
`2032
`
`August product literature (August Smart Lock Pro + Connect)
`downloaded from [https://august.com/products/august-smart-lock-
`pro-connect]
`August product literature (New Biometric Verification Feature for
`August Smart Locks) downloaded from
`[https://august.com/blogs/home/introducing-biometric-
`verification-for-august-and-yale-locks]
`Apple literature regarding MiFi Program downloaded from
`https://mfi.apple.com/
`Apple literature regarding MiFi Program (How the Program
`Works) downloaded from https://mfi.apple.com/en/how-it-
`works.html.
`Apple literature regarding MiFi Program (Frequently Asked
`Questions) downloaded from https://mfi.apple.com/en/faqs.html.
`Apple Inc. iPhone SDK Agreement (dated 10/20/2008)
`Yale Access on the Apple App Store
`August Home on the Apple App Store
`Apple literature regarding Apple HomeKit (“Developing apps and
`accessories for the home”) downloaded from
`https://developer.apple.com
`Apple literature regarding Apple HomeKit and Yale Assure Lock
`Yale product literature (Yale Assure Lock SL Touchscreen
`Deadbolt – Black – Apple) downloaded from
`https://www.apple.com/shop/product/HPAR2ZM/A/yale-assure-
`lock-sl-touchscreen-deadbolt-black
`August product literature regarding Apple HomeKit (HomeKit
`FAQ) downloaded from https://support.august.com/august-smart-
`lock-homekit-enabled-faq-rJv088y0_z
`Declaratory Judgment Plaintiffs’ Opposition to Defendants’
`Motion to Dismiss filed in CPC Patent Technologies Pty Ltd. v.
`Apple, Inc., No. 6:21-cv-00165 (W.D. Tex., Waco Division)
`ASSA ABLOY Global Solutions: Mobile Access for Hotels
`HID Global: Mobile Access Solutions
`Petitioners’ Responses to Patent Owner’s Interrogatories (Nos. 1-
`5) (Petitioners’ Ex. 1022 in IPR2022-01006)
`
`iv
`
`

`

`EXHIBIT
`
`DESCRIPTION
`
`2033
`
`2034
`
`2035
`
`2036
`
`2037
`
`2038
`
`2039
`2040
`2041
`2042
`2043
`2044
`
`2045
`2046
`
`2047
`
`2048
`
`“Developing for the App Store” Website Page available at
`https://www.apple.com/app-store/developing-for-the-app-store/
`(Petitioners’ Ex. 1023 in IPR2022-01006)
`Apple MFi Authorized Manufacturers Website Page available at
`https://mfi.apple.com/account/authorized-manufacturers
`(Petitioners’ Ex. 1024 in IPR2022-01006)
`Screenshot from Apple 2022 WWDC Apple Partners available at
`https://www.youtube.com/watch?v=q5D55G7Ejs8 (20:27)
`(Petitioners’ Ex. 1025 in IPR2022-01006)
`Apple 2022 WWDC Video Excerpt available at
`https://www.youtube.com/watch?v=q5D55G7Ejs8 (Petitioners’
`Ex. 1026 in IPR2022-01006)
`HID Global Android Apps on Google Play available at
`https://play.google.com/store/search?q=HID%20global&c=apps&
`hl=en_US (Petitioners’ Ex. 1027 in IPR2022-01006)
`Petitioners’ and Patent Owner’s Joint Email Correspondence to the
`Board dated October 18, 2022 (Submitted in related IPR2022-
`01006, 01045, 01089)
`Declaration of Samuel Russ, Ph.D.
`CV of Samuel Russ, Ph.D.
`Deposition of Stuart Lipoff (April 27, 2023)
`Reserved
`Reserved
`A. K. Jain, Lin Hong, S. Pankanti and R. Bolle, "An identity-
`authentication system using fingerprints," in Proceedings of the
`IEEE, vol. 85, no. 9, pp. 1365-1388, Sept. 1997 (“Jain”)
`Excerpts from Microsoft Computer Dictionary, 5th Ed. (2002).
`(COMP 2401 Course Notes, Found at
`http://people.scs.carleton.ca/~mjhinek/W13/COMP2401/notes/Arr
`ays_and_Pointers.pdf, accessed on 5/8/2023)
`Logical Block Addressing (October 20, 2002) (via Wayback
`Machine)
`Bad Block Definition by The Linux Information Project (July 5,
`2005)
`
`
`
`
`
`
`v
`
`

`

`I.
`
`INTRODUCTION
`
`For the reasons set forth below, Petitioner has failed to demonstrate that the
`
`inventions claimed in U.S. Patent No. 8,620,039 (“the ’039 Patent”) are
`
`unpatentable.
`
`The Challenged Claims of the ʼ039 Patent (Claims 3, 15 and 18 being the
`
`independent claims) describe an improved method and system for securing a
`
`process at a verification station wherein a user’s biometric signature has been
`
`stored at a memory location “defined” by the user’s card information. As claimed
`
`in the ‘039 Patent, the method comprises the steps of: providing card information
`
`to a card reader in the verification station (representative clause 3[A]); 1 inputting a
`
`biometric signature of the user of the card to a biometric reader in the verification
`
`station (representative clause 3[B]); determining if the provided card information
`
`has been previously provided to the verification station (representative clause
`
`3[C]); and if the provided card information has not been previously provided to the
`
`verification station (representative clause 3[D(P)]), then storing the inputted
`
`biometric signature at a memory location defined by the provided card information
`
`(representative clause 3[D(1)]).
`
`
`1 These clauses refer to the alphanumeric designations used by Petitioner to label
`
`the various claim limitations in Claim 1 of the ʼ039 Patent. See, e.g., Pet. at 95.
`
`1
`
`

`

`Petitioner’s challenge fails because the asserted prior art, alone or in
`
`combination, does not teach or suggest each of the elements claimed in the ’039
`
`Patent. In particular, the asserted prior art fails to disclose or suggest that the user’s
`
`card information defines the memory location where the inputted biometric
`
`signature will be stored.
`
`In Ground 1, Petitioner relies solely on Hsu’s (EX-1003) purported teaching
`
`that the user’s card information is stored at a memory location associated with the
`
`user’s fingerprint data. See, e.g., Pet. at 27 (“Sanford does not provide specific
`
`details about how the user’s picture or fingerprint is stored in the database. … Hsu,
`
`however, discloses a specific implementation of a database where a
`
`user/account/employee number is associated with a biometric signature.”)
`
`Hsu teaches that storing the user’s card information at a memory location
`
`that is associated with the user’s fingerprint data, or which corresponds to the
`
`user’s fingerprint data, allows for fast and efficient retrieval of the fingerprint data
`
`during the verification phase. However, Limitation 3[D(1)]2 relates to enrollment,
`
`
`2 For brevity, Patent Owner refers to representative Limitation 3[D(1)] throughout
`
`this Response. Patent Owner’s arguments regarding Limitation 3[D(1)] apply
`
`equally to corresponding Limitations 15[D(1)] and 18[B(1)].
`
`2
`
`

`

`not verification, and requires more than a mere association between the fingerprint
`
`data and a memory location.
`
`Limitation 3[D(1)] requires that, during the enrollment phase, the card
`
`information sets or establishes the memory location at which the fingerprint data
`
`will be stored. Stated simply, before the fingerprint data can be stored, the card
`
`information (from which the storage location information will be obtained) must be
`
`read. Hsu fails to teach or suggest this feature. This is fatal to Petitioner’s
`
`challenge under Ground 1.
`
`Petitioner’s Ground 2 fares no better. In Ground 2, Petitioner cobbles Hsu
`
`together with Tsukamura (EX-1005) in an effort to satisfy Limitation 3[D(1)].
`
`However, this proposed combination fails for multiple reasons. For example,
`
`Tsukamura teaches an indexed-based numbering system that is fundamentally
`
`different from the pointer-based system disclosed in the ’039 Patent. Further, the
`
`Petition ignores key differences between Hsu and Tsukamura that, once
`
`considered, demonstrate that only hindsight reasoning has driven Petitioner to
`
`combine these references.
`
` Apart from the merits (or lack thereof) of the Petition, Patent Owner
`
`further maintains its position that the Petition is time-barred under 35 U.S.C. §
`
`315(b) because Apple is a real party-in-interest (“RPI”) and/or privy of one or
`
`more of the Petitioners. Patent Owner respectfully requests that the Board re-
`
`3
`
`

`

`evaluate its findings in the institution decision with full appreciation of the
`
`expansive formulation required by the Federal Circuit, including that an RPI
`
`relationship can exist even in the absence of control or financial involvement in
`
`the Petition, as more fully set forth below.
`
`II.
`
`’039 PATENT OVERVIEW
`
`The ʼ039 Patent issued on December 31, 2013 from an application claiming
`
`a priority date of August 12, 2005. The ʼ039 Patent has 20 claims, of which claims
`
`1, 3, 13, 15, 18, and 19 are independent. Representative Claim 3 of the ʼ039 Patent
`
`reads:
`
`Preamble
`3[P]
`3[A]
`
`3[B]
`
`3[C]
`
`3[D(P)]
`
`3[D(1)]
`
`3[D(2)]
`
`3[E(P)]
`
`3[E(1)]
`
`3[E(2)]
`
`A method of securing a process at a verification station, the method
`comprising the steps of:
`(a) providing card information from a card device to a card reader in
`the verification station;
`(b) inputting a biometric signature of a user of the card device to a
`biometric reader in the verification station;
`(c) determining if the provided card information has been previously
`provided to the verification station;
`(d) if the provided card information has not been previously
`provided to the verification station;
`(da) storing the inputted biometric signature in a memory at a
`memory location defined by the provided card information; and
`(db) performing the process dependent upon the received card
`information;
`(e) if the provided card information has been previously provided to
`the verification station;
`(ea) comparing the inputted biometric signature to the biometric
`signature stored in the memory at the memory location defined by the
`provided card information;
`(eb) if the inputted biometric signature matches the stored biometric
`signature, performing the process dependent upon the received card
`information; and
`
`4
`
`

`

`3[E(3)]
`
`(ec) if the inputted biometric signature does not match the stored
`biometric signature, not performing the process dependent upon the
`received card information.
`
`
`EX-1001, 12:51 – 13:11.
`
`
`
`(BCP) system intended to more efficiently and securely permit a user to store
`
`As the Board noted, “[t]he ’039 patent, … relates to a biometric card pointer
`
`biometric information during an enrollment process.” Inst. Dec. at 3 (citations
`
`omitted). “The ’039 patent explains that in the enrollment phase ‘[t]he card user’s
`
`biometric signature is automatically stored the first time the card user uses the
`
`verification station in question (this being referred to as the enrolment phase).’” Id.
`
`at 3-4 (citation omitted).
`
`The Board went on to note that “[t]he ’039 patent explains further that ‘[t]he
`
`biometric signature is stored at a memory address defined by the (‘unique’) card
`
`information on the user’s card as read by the card reader of the verification
`
`station.’” Id. at 4 (citations omitted). “[T]he ’039 patent explains further that ‘in
`
`later verification phases, . . . [t]his signature is compared to the signature stored at
`
`the memory location 607 in the memory 124, the memory location 607 being
`
`defined by the card data 604 read from their card 601 by the card reader 112.” Id.
`
`at 5-6 (citations omitted).
`
`As the Board observed, the verification and enrollment processes of the ’039
`
`Patent are distinct procedures. See Inst Dec. at 7
`
`5
`
`

`

`A difference between verification process 205 and enrollment process 207 is
`that the enrollment process includes step 401, which stores the biometric
`signature “at a memory address defined by the card data 604,” whereas in
`verification process 205 “step 204 reads the contents stored at a single
`memory address defined by the card data 604” and compares the stored
`biometric signature with the input biometric signature. Id. at 9:65–66, 8:24–
`26.
`
`[Emphasis added by the Board.]
`
`
`
`In the Notice of Allowance, the Examiner concluded that “[d]one of the
`
`prior art teaches or suggests defining a memory location in a local memory
`
`external to a card in dependence on information received from the card and when
`
`that memory location is determined to be unoccupied, storing a received biometric
`
`signature therein, as variously required by claims 1 and 11.” EX-1002 at 292. The
`
`Examiner further concluded that “none of the prior art teaches or suggests that a
`
`verification station determines if card information provided to a verification station
`
`has previously been provided to that verification station, as required, in part, by
`
`claims 3 and 13.” Id.
`
`III. LEVEL OF ORDINARY SKILL
`
`For purposes of this proceeding Patent Owner does not object to the
`
`definition of ordinary skill in the art as adopted in co-pending IPR2022-00600
`
`challenging the ’039 Patent. There, the Board adopted the following level of skill
`
`in the art:
`
`A person of ordinary skill in the art at the time of the ’039 Patent] would
`have had at least a bachelor’s degree in computer engineering, computer
`
`6
`
`

`

`science, electrical engineering, or a related field, with at least one year of
`experience in the field of human-machine interfaces and device access
`security. Additional education or experience might substitute for the above
`requirements.
`
`
`See IPR2022-00600, Paper 8 at 9. For the purposes of this proceeding, Patent
`
`Owner does not dispute this characterization of the level of ordinary skill in the art,
`
`and applies it in its analysis.
`
`IV. CLAIM CONSTRUCTION
`
`A. Limitation 3[D(1)] Is Directed To Enrollment
`
`A POSITA would clearly understand that Limitation 3[D[1)] is directed to
`
`enrollment. EX-2039 at ¶39. In particular, Limitations 3[D(P)]-3[D[1)], when read
`
`together, require “storing” a biometric signature if the card information “has not
`
`been previously provided to the verification station.” EX-1001 at 12:59-63. A
`
`POSITA would understand this to be an enrollment process because the user’s
`
`card information has not previously been entered into the system and the user’s
`
`biometric data has not previously been stored in the system’s memory. EX-2039 at
`
`¶39. As the Board has already observed,
`
`A difference between verification process 205 and enrollment process 207 is
`that the enrollment process includes step 401, which stores the biometric
`signature “at a memory address defined by the card data 604,” whereas in
`verification process 205 “step 204 reads the contents stored at a single
`memory address defined by the card data 604” and compares the stored
`biometric signature with the input biometric signature. Id. at 9:65–66, 8:24–
`26.
`
`
`7
`
`

`

`Inst Dec. at 7 (emphasis added by the Board). Limitation 3[D[1)] requires
`
`“storing” the biometric signature at a memory location defined by” the card
`
`information, which is the natural end result of an enrollment process. EX-2039 at
`
`¶39. Accordingly, a POSITA would understand that Limitation 3[D[1)] is directed
`
`to enrollment. Id.
`
`B.
`
`“memory location defined by the provided card information”
`
`For the reasons set forth below, the proper construction of claim term is:
`
`“the system sets or establishes a memory location in a memory, said location
`
`being contingent upon or determined by the provided card information.”
`
`As discussed above, Limitation 3[D[1)] is directed to an enrollment step.
`
`Therefore, “defined,” as used in Limitation 3[D[1)], does not (and cannot) mean
`
`merely looking up or identifying something that has already been defined. EX-
`
`2039 at ¶39. Nor can it mean that the memory location merely corresponds to, but
`
`is not contingent upon or determined by, the provided card information. Id. Rather,
`
`a POSITA would interpret the word “defined,” especially in the context of
`
`enrollment, to mean “setting” or “establishing.” Id.
`
`This construction is supported by the disclosure of the ʼ039 Patent’s
`
`specification. EX-2039 at ¶42. For example, col. 2, lines 64-67 states “[t]he
`
`biometric signature is stored at a memory address defined by the card as read by
`
`the (‘unique’) card information on the user’s card as read by the card reader of
`
`8
`
`

`

`the verification station.” EX-1001 at 2:64-67 (emphasis added). Similarly, the
`
`’039 Patent teaches that “[i]n an enrollment phase … [t]he card data 604 defines
`
`the location 607 in the memory 124 where the unique biometric signature is
`
`stored.” Id. 7:43-49 (emphasis added). The ʼ039 Patent repeatedly refers to the
`
`memory address as “defined by the card [information/data],” confirming that the
`
`received card information is the basis for the “defining” (i.e., the setting or
`
`establishing) of a memory location. See, e.g., id. at Abstract, 3:4-11, 7:53-56, 9:23-
`
`25, 9:62-67.
`
`With respect to the Petitioner’s two proposed constructions (Pet. at 9) and
`
`the construction articulated by the Board in the Institution Decision (Inst. Dec. at
`
`39), Petitioner’s Second Proposed Construction and the Board’s construction
`
`would, for the purposes of this proceeding, be reasonable so long as it is
`
`understood that the claimed “defining” step does not include a process that occurs
`
`after enrollment has already occurred. As discussed above, Limitation 3[D[1)]
`
`cannot be construed to cover a procedure after enrollment, such as verification,
`
`wherein the system is merely looking up or identifying a memory location that has
`
`already been defined. 3
`
`
`3 For example, Petitioner’s First Proposed Construction is clearly incorrect at least
`
`because, according to Petitioner, “the system can look up or otherwise determine a
`
`9
`
`

`

`
`
`Patent Owner respectfully submits that its proposed construction is less
`
`prone to ambiguity than the Petitioner’s Second Proposed Construction or the
`
`Board’s construction because it more clearly requires that the memory location for
`
`the biometric signature is defined during enrollment. But, so long as it is
`
`understood that the claimed “defining” step does not include a process that occurs
`
`after enrollment has already occurred, then the Petitioner’s challenges under
`
`Grounds 1 & 2 regardless of which construction is used.
`
`V. THE PRIOR ART FAILS TO RENDER THE CHALLENGED
`CLAIMS OBVIOUS
`
`A. Ground 1 – The Combination of Hsu and Sanford Does Not Teach
`Or Suggest “storing the inputted biometric signature in a memory
`at a memory location defined by the provided card information”
`
`In Ground 1, Petitioner relies exclusively on Hsu as allegedly disclosing
`
`storing a biometric signature at a memory location “defined” by the card
`
`
`specific memory location from a user’s card information.” Pet. at 11-12 (emphasis
`
`added). However, a memory location must first be defined, before it can be looked
`
`up. EX2039 at ¶¶37-38. Thus, Petitioner’s First Proposed Construction includes a
`
`scenario (e.g., during verification) that may occur after enrollment has occurred
`
`and the biometric signature has already been stored at the defined memory
`
`location. Id.
`
`
`
`10
`
`

`

`information. See, e.g., Pet. at 27 (“Sanford does not provide specific details about
`
`how the user’s picture or fingerprint is stored in the database. … Hsu, however,
`
`discloses a specific implementation of a database where a user/account/employee
`
`number is associated with a biometric signature.”)
`
`Hsu, titled “Controlled Access to Doors and Machines Using Fingerprint
`
`Matching,” relates to “[a] system and related method for controlling access to
`
`building doors or to machines, such as automatic teller machines (ATMs).”
`
`EX1003, Abstract. According to Hsu, “[t]he present invention resides in a
`
`combination of fingerprint matching and a carried form of personal identification
`
`[e.g., card information], for access to buildings or machines such as automatic
`
`teller machines (ATMs).” Id. at 1:52-55.
`
`1. Hsu does not teach or suggest that card information “defines”
`the memory location of the fingerprint data during enrollment
`
`Hsu is devoid of any teaching or suggestion that the user’s card information
`
`sets or establishes (i.e., defines) the memory location for the user’s fingerprint data
`
`during enrollment. EX-2039 at ¶46. To the contrary, Hsu expressly discloses that,
`
`during enrollment, the user’s fingerprint data and account number (or employee
`
`number or similar identity number) are presented together, simultaneously, and
`
`then are merely stored in association with each other, as follows.
`
`The enrollment procedure requires that each user enroll by presenting a
`finger to the fingerprint sensor 16, which generates a fingerprint image for
`a fingerprint enrollment analyzer 64. At the same time, the user's identity
`
`11
`
`

`

`has to be independently verified, by some 5 means other than fingerprint
`matching, as indicated in block 66, and the user also presents an account
`number, employee number or similar identity number. If the user does not
`have such a number, one is assigned at this stage. The account number is
`stored in the database 44 in association with the user's fingerprint image
`data.
`
`EX-1003 at col. 7:1-12 (emphasis added). Similarly, Hsu separately describes that
`
`“the reference fingerprint data are associated with corresponding user numbers, or
`
`employee or customer account numbers.” Id. at col. 6:56-58 (emphasis added).
`
`Thus, the memory location of Hsu is not “defined by” (i.e., set or established by)
`
`the card information; rather the card information (e.g., an account number) is
`
`merely stored at a memory location “in association with” the user’s fingerprint
`
`data. EX-2039 at ¶47.
`
`
`
`This is the extent of Hsu’s disclosure of the method by which the fingerprint
`
`data is stored in the database during enrollment. EX-2039 at ¶48. There is
`
`definitively no teaching or suggestion that the user’s account number (or similar
`
`identity number) sets or establishes the memory location for the fingerprint data
`
`during enrollment. Id. Rather, Hsu expressly discloses that the user’s fingerprint
`
`data and account number are presented at the same time, and then are merely
`
`stored in association with each other. Id.
`
`
`
`A POSITA would have understood that, in Hsu’s enrollment procedure, the
`
`user’s account number specifically does not set or establish the memory location
`
`for the fingerprint data as required by Limitation 3[D(1)]. EX-2039 at ¶49.
`
`12
`
`

`

`Petitioner’s own expert agreed that, in the enrollment method claimed in the ’039
`
`Patent, the biometric signature (e.g., fingerprint image data) cannot be stored at a
`
`memory location until after the memory location is set or established (i.e.,
`
`“defined”) by the card information. See EX-2040 at 19:8 – 20:19. In contrast to the
`
`claimed method, Hsu teaches that the user’s fingerprint data and account number
`
`are presented at the same time and are then stored in the database in association
`
`with each other. EX-2039 at ¶49. In other words, in Hsu, the fingerprint data and
`
`the account number are presented together and are then stored together. Id. There is
`
`no step in Hsu wherein the account number (or the “card information”) first sets or
`
`establishes the memory location. Id. Nor is there a step wherein after—and only
`
`after—the account number sets or establishes the memory location, the fingerprint
`
`data is then stored at that location. Id. Therefore, Hsu fails to teach or suggest
`
`Limitation 3[D(1)].
`
`
`
`Petitioner argues that the biometric signature in the Sanford-Hsu system is
`
`“not stored at any memory location in the database—rather, it is stored at the
`
`memory location associated with the corresponding credit card number (Hsu’s
`
`user/employee number) received from a card.” Pet. at 28 (emphasis in Petition).
`
`However, even if this characterization of Hsu is accurate (which Patent Owner
`
`does not concede), it still does not satisfy Limitation 3[D(1)]. EX-2039 at ¶50. As
`
`discussed in Section IV, Limitation 3[D(1)] requires that the memory location be
`
`13
`
`

`

`“contingent upon or determined by” the card information. Thus, a memory location
`
`as in Hsu which merely corresponds to, but is not contingent upon or determined
`
`by, the received card information does not satisfy Limitation 3[D(1)]. EX-2039 at
`
`¶50.
`
`
`
`Hsu does not teach or suggest that the memory location for the fingerprint
`
`data is contingent upon or determined by the user’s account number itself during
`
`enrollment. Id. at ¶51. To the contrary, Hsu expressly discloses that the user’s
`
`account number and fingerprint are presented to the system at the same time, and
`
`then are merely stored in the database in association with each other. Id.
`
`Accordingly, the combination of Hsu and Sanford does not render the Challenged
`
`Claims obvious.
`
`2. Hsu’s cursory description of its database does not save
`Petitioner’s argument
`
`
`
`Hsu describes its database as “basically a table that associates each user
`
`number with a stored fingerprint image, or with selected distinctive attributes or
`
`features of the user’s fingerprint image.” EX-1003 at 4:53-57 (in ¶0020). This
`
`language merely teaches that the user number (e.g., the user’s account number) is
`
`stored at a memory location in the database in association with the user’s
`
`fingerprint data. EX-2039 at ¶52. There is no teaching or suggestion that the
`
`memory location is contingent on, or determined by the user number, nor is there
`
`14
`
`

`

`any teaching or suggestion that the user number sets or establishes the memory
`
`location. Id.
`
`In his deposition, Mr. Lipoff suggested that Hsu’s one-sentence description
`
`of its database in ¶ 0020 (discussed above) somehow teaches that “the user number
`
`is defining the memory location in which the stored fingerprint image will be
`
`stored.” See EX2040 at 33:16 – 34:12. This argument is not clearly articulated in
`
`the Petition, but even if it were, it would do nothing to advance Ground 1. The
`
`language in Hsu’s ¶ 0020 essentially tr

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket