throbber

`
`
`
`
`
`
`
`Filed on behalf of Unified Patents, LLC
`By:
`Jordan M. Rossen, Reg. No. 74,064
`
`Ashraf Fawzy, Reg. No. 67,914
`
`Unified Patents, LLC
`4445 Willard Ave., Suite 600
`Chevy Chase, MD, 20815
`Email: jordan@unifiedpatents.com
`
` afawzy@unifiedpatents.com
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`UNIFIED PATENTS, LLC
`Petitioner
`
`v.
`
`DYNAPASS IP HOLDINGS LLC
`Patent Owner
`
`IPR2023-00425
`
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT 6,993,658
`
`
`
`
`
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`TABLE OF CONTENTS
`
`Introduction ......................................................................................................... 1
`I.
`II. Overview of Challenge and Relief Requested .................................................... 1
`A. Prior Art ........................................................................................................... 1
`B. Grounds for Challenge ..................................................................................... 1
`C. U.S. 6,993,658 ................................................................................................. 2
`D. Prosecution History ......................................................................................... 4
`E. Level of Ordinary Skill in the Art ................................................................... 5
`F. Claim Construction .......................................................................................... 5
`1. “a control module…configured
`to…”; “a communication module
`configured to…”; “an authentication module configured to…” ......................... 6
`2. “Cell phone network” ................................................................................... 9
`3. “Not known to the user” ............................................................................. 10
`III. Grounds of Unpatentability ............................................................................... 13
`A. Ground 1: Claim 5 Is Obvious over Veneklase in view of Jonsson .............. 13
`1. Overview of Veneklase............................................................................... 13
`2. Overview of Jonsson .................................................................................. 15
`3. Claim 5 ....................................................................................................... 17
`Motivations to Combine Veneklase and Jonsson.............................................. 31
`B. Ground 2: Claims 1, 3-6 Are Obvious over Kew in view of Sormunen ........ 46
`1. Overview of Kew ........................................................................................ 46
`2. Overview of Sormunen .............................................................................. 49
`3. Claim 5 ....................................................................................................... 50
`Motivations to Combine Kew and Sormunen ................................................... 58
`4. Claim 6 ....................................................................................................... 71
`5. Claim 1 ....................................................................................................... 72
`6. Claim 3 ....................................................................................................... 75
`7. Claim 4 ....................................................................................................... 77
`C. Analogous Art ................................................................................................ 78
`IV. Mandatory Notices ............................................................................................ 79
`A. Real Party-in-Interest ..................................................................................... 79
`B. Related Matters .............................................................................................. 79
`
`
`
`i
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`C. Petitioner is aware that the ’658 Patent has been challenged in IPR2023-
`00367 on January 3, 2022.Lead and Back-up Counsel ........................................ 81
`D. Service Information, Email, Hand Delivery, and Postal ............................... 81
`V. Certification of Grounds for Standing .............................................................. 81
`VI. Discretionary Institution ................................................................................... 81
`VII. Conclusion ......................................................................................................... 85
`
`
`
`
`
`
`
`
`ii
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`TABLE OF EXHIBITS
`
`
`
`Exhibit No.
`
`Description
`
`1001
`
`U.S. Patent 6,993,658
`
`1002
`
`Prosecution History File of Application 09/519,829
`
`1003
`
`Declaration of Bruce McNair (¶¶1-168)
`
`1004
`
`Curriculum Vitae of Bruce McNair
`
`1005
`
`1006
`
`European Patent Application No. 084451
`(“Veneklase”)
`PCT Patent Publication No. WO 96/00485 to Jonsson (“Jonsson”)
`
`to Veneklase
`
`1007
`
`PCT Patent Publication No. WO 95/19593 to Kew (“Kew”)
`
`1008
`
`1009
`
`1010
`
`1011
`
`to Sormunen
`
`PCT Patent Publication No. WO 97/31306
`(“Sormunen”)
`Li Gong, “Optimal Authentication Protocols Resistant to Password
`Guessing Attacks," Proceedings The Eighth IEEE Computer
`Security Foundations Workshop, 1995, pp. 24-29, doi:
`10.1109/CSFW.1995.518549.
`U.S. Patent 3,938,091
`
`IETF RFC2289, “A One-Time Password System,” February 1989,
`available at https://www.rfc-editor.org/rfc/rfc2289.html
`
`
`
`iii
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`1012
`
`U.S. Patent 5,276,444
`
`1013
`
`1014
`
`1015
`
`1016
`
`1017
`
`S.A. Sherman, R. Skibo, R.S. Murray, “Secure Network Access
`Using Multiple Applications of AT&T’s Smart Card,” AT&T
`Technical Journal, September/October 1994
`Lt. Gen. Charles R. Myers, “Vietnam Studies: Division-Level
`Communications, 1962-1973”, US Department of the Army, 1982,
`Ch. 8, retrieved from https://history.army.mil/catalog/pubs/90/90-
`11.html December 13, 2022.
`Z. J. Haas and S. Paul, "Limited-lifetime shared-access in mobile
`systems," Proceedings
`IEEE
`International Conference on
`Communications ICC '95, 1995, pp. 1404-1408 vol.3, doi:
`10.1109/ICC.1995.524434
`Mobivity, A Brief History of Text Messaging, Sept. 27, 2012,
`available
`at https://www.mobivity.com/mobivity-blog/a-brief-
`history-of-text-messaging
`Declaration of Kevin Jakel (¶¶115)
`
`
`
`
`
`iv
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`INTRODUCTION
`
`Unified Patents, LLC (“Petitioner” or “Unified”) respectfully submits this
`
`I.
`
`
`
`Petition for Inter Partes Review (“IPR”) of claims 1, 3-6 (“Challenged Claims”) of
`
`U.S. Patent 6,993,658 (“the ’658 Patent”) (EX1001).
`
`II. OVERVIEW OF CHALLENGE AND RELIEF REQUESTED
`
`A.
`
`Prior Art
`
`The ’658 Patent was filed March 6, 2000.
`
`Veneklase (EX1005) was filed October 22, 1997 and published May 27, 1998.
`
`Therefore, Veneklase qualifies as prior art under at least 35 U.S.C. §§ 102(a) and
`
`(b).
`
`Jonsson (EX1006) was filed June 24, 1994 and published January 4, 1996.
`
`Therefore, Jonsson qualifies as prior art under at least 35 U.S.C. §§ 102(a) and (b).
`
`Kew (EX1007) was filed January 12, 1995 and published July 20, 1995.
`
`Therefore, Kew qualifies as prior art under at least 35 U.S.C. §§ 102(a) and (b).
`
`Sormunen (EX1008) was filed February 6, 1997 and published August 28,
`
`1997. Therefore, Sormunen qualifies as prior art under at least 35 U.S.C. §§ 102(a)
`
`and (b).
`
`B. Grounds for Challenge
`
`Petitioner requests IPR under 35 U.S.C. § 311 of the Challenged Claims. They
`
`are unpatentable under 35 U.S.C. § 103.
`
`
`
`1
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`The grounds for challenge include:
`
`Ground References
`
`Challenged Claims
`
`Veneklase in view of Jonsson
`
`Kew in view of Sormunen
`
`5
`
`1, 3-6
`
`1
`
`2
`
`
`
`C. U.S. 6,993,658
`
`The ’658 Patent is directed to “the authentication of users of secure systems,
`
`and, more particularly, the invention relates to a system through which user tokens
`
`required for user authentication are supplied through personal communication
`
`devices such as mobile telephones and pagers.” EX1001, 1:7-11. Specifically, the
`
`’658 Patent describes an authentication system in which “access to the system is
`
`based upon: nonsecret information known to the user, such as the user ID; secret
`
`information known to the user, such as the passcode; and information provided to
`
`the user through an object possessed by the user, such as the token.” Id., 2:11-15.
`
`As shown in Figure 1, the ’658 Patent teaches that “the user token server 116
`
`generates a token,” and then creates the new password 158 based on the user’s
`
`passcode 154 and the newly generated token 156. Id., 6:59-63.
`
`
`
`2
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
`Id., Fig. 1. “The token server 116 transmits the token 156 to the user’s personal
`
`communication device 106 via the token delivery communication link 105.”
`
`EX1001, 7:31-33. The ’658 Patent discloses that “[t]he communication module 118
`
`forwards tokens 156 to a text messaging service provider 104, which may be a pager
`
`or mobile phone service provider,” which “then forwards the token 156…to the
`
`personal communication device 106.” Id., 5:34-41.
`
`After receiving the token, “the user 108 logs into the secure system 110 using
`
`the user ID 152 and the password 158,” where the password either “combines the
`
`passcode 154 and the token 152” or they are “submitted separately.” Id., 7:40-45.
`
`
`
`3
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`Once this information is entered into the system by the user, “the secure system 110
`
`transmits login data 159 to the user authentication server 102 over the computer
`
`network 103 for authentication of the user 108” and “[i]n order to authenticate the
`
`user 108, the authentication server 102 preferably compares the login data to the
`
`password 158 (hashed or unhashed) or the passcode 154 and token 156 (hashed or
`
`unhashed) corresponding to the user ID 152 stored in the user database 114.” Id.,
`
`7:46-63. Finally, “[i]f the token has an expiry time, the token 156 expires,” and
`
`“upon expiration of the token 156, the control module 402 deactivates the user
`
`account in the user database 114.” Id., 9:60-64.
`
`The ’658 Patent has seven claims, including two independent claims. Claim
`
`5 is the broadest claim and will thus be considered first. It is generally directed to
`
`an authentication system involving sending a token over a cell phone network and
`
`receiving a password based on the token and a passcode over a second network.
`
`EX1001, 12:12:20-49. Claim 1 is a method claim with similar elements, which also
`
`requires that the system receive a request via a token over the cell phone network.
`
`Id., 11:43-12:13. EX1003, ¶¶52-59.
`
`D.
`
`Prosecution History
`
`The ’658 Patent was filed on March 6, 2000. On March 11, 2004, Applicant
`
`responded to a rejection by arguing that Menezes could not meet the claimed element
`
`“generating a new password based at least upon a token and a passcode” and
`
`
`
`4
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`“receiving the password from the user,” because Menezes’ system did not use a new
`
`token each time a login was requested and because the token was never sent to the
`
`user. EX1002, 109-124.
`
`On May 12, 2005, Applicant responded to a final rejection by filing an RCE
`
`and heavily amending the claims to require additional elements, including a cell
`
`phone network, activation in response to the password, and deactivation within a
`
`predetermined amount of time. EX1002, 59-64.
`
`On July 21, 2005, the Examiner issued a Notice of Allowance with an
`
`examiner’s amendment adding “a computer processor” and noting that “no art could
`
`be found wherein the transaction for determining the password in the setting up of a
`
`new calling-card-derived temporary network account is performed entirely over a
`
`connection other than that used by eventual network account. EX1002, 45-49.
`
`EX1003, ¶¶60-62.
`
`E.
`
`Level of Ordinary Skill in the Art
`
`A POSITA for the ’658 Patent would have had at least (1) an undergraduate
`
`degree in electrical and computer engineering or a closely related field; and (2) two
`
`or more years of experience in security. EX1001, generally; EX1003, ¶¶49-51.
`
`F. Claim Construction
`In post-grant proceedings, claims are construed under the same standard as
`
`they would be construed by Article III courts. See 37 C.F.R. § 42.100(b). At this
`
`
`
`5
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`time, Petitioner submits that the claims are obvious under any reasonable
`
`construction, but submits that all terms should be given their plain meaning.
`
`EX1003, ¶¶22-24. Petitioner addresses certain limitations below.
`
`1.
`“a control module…configured to…”; “a communication
`module configured to…”; “an authentication module configured to…”
`Some limitations recite a specific module that is “configured to” perform
`
`certain functions, such as create a new password based on certain factors, transmit a
`
`token, or receive a password and activate access to an account. Since “means” is not
`
`used, there is a rebuttable presumption against applying 35 U.S.C. § 112 ¶6
`
`(“Paragraph 6”) to these limitations. Williamson v. Citrix Online, LLC, 792 F.3d
`
`1339, 1346 (Fed. Cir. 2015) (en banc). Given the absence of evidence showing that
`
`the claims lack sufficient structure, Paragraph 6 should not apply. Dyfan, LLC v.
`
`Target Corp., 28 F.4th 1360 (Fed. Cir. 2022).
`
`The Board may reach obviousness whether Paragraph 6 applies and even if
`
`the claims are indefinite. Intel Corp. v. Qualcomm Inc., 21 F.4th 801, 813-14 (Fed.
`
`Cir. 2021) (obviousness determination of indefinite means-plus-function claims
`
`possible, as indefiniteness precludes a patentability finding “only when the
`
`indefiniteness renders it logically impossible” to assess obviousness); see also
`
`Huawei Techs. Co. v. WSOU Invs., LLC, IPR2021-00226, Paper 10, 22 (P.T.A.B.,
`
`June 10, 2021) (construction of potential means-plus-function terms unnecessary at
`
`
`
`6
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`the institution stage).1 And Paragraph 6 is inapplicable if the limitations have
`
`sufficient structure. Here, the claims recite algorithms that comprise receiving data,
`
`sending data, and storing data—all features of generic computers. See In re Katz
`
`Interactive Call Processing Patent Litig., 639 F.3d 1303, 1316 (Fed. Cir. 2011)
`
`(algorithms unnecessary for functions like receiving, storing, and processing). In
`
`addition, the claimed modules “describe[] adequate structure for transmitting that
`
`motion data through conventional software and hardware.” Blast Motion v. Zepp
`
`Labs, 2017 WL 476428, *17 (Fed. Cir. 2017) (finding communications module not
`
`governed by 112(f)).
`
`To the extent that it is determined that the module terms are means-plus-
`
`function, they should be given the following constructions:
`
`a.
`“a control module…configured to”
`The ’658 Patent claims “a control module executed on the computer processor
`
`configured to” perform the following function: “create a new password based at least
`
`upon a token and a passcode” and “set a password associated with the user to be the
`
`
`1 Here, the prior art teachings are consistent with the specification’s disclosure for
`
`these claims, and the general public has an interest in the determination of
`
`patentability of the method claims, to which Paragraph 6 does not apply. Therefore,
`
`Petitioner requests IPR even if some claims are indefinite.
`
`
`
`7
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`new password.” EX1001, 12:27-33. The specification provides the corresponding
`
`structure for the claimed function to be software executed on a “server” that performs
`
`the following algorithm: (1) associates user ID with passcode and phone number of
`
`user’s personal communication device, (2) generates a new password, and (3) sets
`
`or rests the password associated with the user ID. See, e.g., EX1001, 2:32-48, 8:2-
`
`8, 8:53-9:44, Figs. 1, 4, 5; see also WMS Gaming v. International Game Technology,
`
`184 F.3d 1339, 1349 (Fed. Cir. 1999). EX1003, ¶¶29-30.
`
`b.
`“a communication module configured to”
`The ’658 Patent claims “a communication module configured to” perform the
`
`following function: “transmit the token to the personal communication device
`
`through the cell phone network.” EX1001, 12:34-36. The specification provides
`
`the corresponding structure for the claimed function to be one of: (1) a mobile device
`
`with messaging capabilities, (2) a phone dialer, or (3) a connection card connected
`
`to a messaging service provider. See, e.g., EX1001, 2:39-42, 5:66-6:1, 6:18-20,
`
`10:14-41, Fig. 1. EX1003, ¶31.
`
`c.
`“an authentication module configured to”
`The ’658 Patent claims “an authentication module configured to” perform the
`
`following function: “receive the password from the user through a secure computer
`
`network” and “activate[] access to the account in response to the password and
`
`deactivates the account within a predetermined amount of time after activating the
`
`
`
`8
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`account.” EX1001, 12:37-45. The specification provides the corresponding
`
`structure for the claimed function to be software similar to that provided with
`
`operating systems executed on a “server” that performs the following algorithm: (1)
`
`receive a submitted password in response to a request for authentication and (2) grant
`
`access to the user if the submitted password matches the valid password. See, e.g.,
`
`EX001, 3:4-25, 5:3-10. Fig. 1. EX1003, ¶32.
`
`2.
`“Cell phone network”
`Claims 1 and 5 of the ’658 Patent require that the personal communication
`
`device communicates over a cell phone network. The ’658 Patent does not use the
`
`term cell phone network in the specification, but it does disclose that “[t]he
`
`communication module 118 forwards tokens 156 to a text messaging service
`
`provider 104, which may be a pager or mobile phone service provider.” EX1001,
`
`5:32-40; see also 9:45-54, 4:13-17, 3:1-3, 2:28-31, 2:6-8, 1:7-11. Indeed, the ’658
`
`Patent discloses an embodiment in which “the communication module 118 is a
`
`phone dialer 622, the personal communication device 106 is a pager 624, and the
`
`text messaging service provider is a paging service 626.” EX1001, 10:31-34.
`
`Furthermore, Claim 1 requires a personal communication device be
`
`in
`
`communication over a “cell phone network” and dependent claims 3 and 4 require
`
`that the personal communication device be a “mobile phone” and a “pager,”
`
`respectively. EX1001, 11:47-50, 12:16-19. Thus, a POSITA would have
`
`
`
`9
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`understood that the cell phone network, as claimed by the ’658 Patent, must at least
`
`include mobile device and pager service provider communication networks.
`
`EX1003, ¶25.
`
`3.
`“Not known to the user”
`Claims 1 and 5 of the ’658 Patent require that the token is not known to the
`
`user. While the specification never explicitly discusses this limitation, it is clear
`
`from the embodiments disclosed in the ’658 Patent that this term must mean “not
`
`known to the user before being sent to the user as part of the authentication process.”
`
`EX1003, ¶¶26-28. This is because the ’658 Patent distinguishes between “secret
`
`information known to the user, such as the passcode” and “information provided to
`
`the user through an object possessed by the user, such as the token.” EX1005, 2:11-
`
`15. The ’658 Patent further discloses that “token 156 is preferably provided only to
`
`the user 108 by the user authentication server 102 through the user’s personal
`
`communication device 106 on an as needed basis,” and in certain embodiments, “the
`
`user 108 combines the token 156 with the passcode 154 to form a password 158.”
`
`EX1005, 4:41-44, 4:52-53. Furthermore, the claims require the user to receive the
`
`token and input the password, which is based on the token and passcode. Therefore,
`
`a POSITA would have understood that the token would eventually need to be known
`
`to the user. EX1003, ¶¶26-28). Indeed, Figures 2A-D of the ’658 Patent disclose
`
`“login screens that can be used in conjunction with various embodiments of the
`10
`
`
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`invention,” and all three of the embodiments require the user to eventually be
`
`provided the token in order to input it into the computer, either by itself (e.g., Figs.
`
`B and C-D) or combined with the passcode (e.g., Fig. A). EX1005, Figs. 2A-D.
`
`
`
`11
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
`12
`
`
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`Thus, a POSITA would have understood that not known to the user, as claimed
`
`by the ’658 Patent, must include information that is not known to the user at the start
`
`of the process, but is eventually provided to the user. EX1003, ¶¶26-28.
`
`III. GROUNDS OF UNPATENTABILITY
`
`Pursuant to Rule 42.104(b)(4)-(5), the following sections (supported by Bruce
`
`McNair’s Declaration, EX1003, ¶¶1-168) explain the grounds of unpatentability, the
`
`limitations of the Challenged Claims, and how these claims were obvious.
`
`A. Ground 1: Claim 5 Is Obvious over Veneklase in view of Jonsson
`1. Overview of Veneklase
`Veneklase discloses a computer authentication system which is “adapted to
`
`grant an authorized individual access to a secured domain, such as a computer or
`
`data stream.” EX1005, Abstract. In particular, Veneklase discloses that a user
`
`contacts the host computer 402 and it “checks the received identification code and
`
`cross references the received password code against a pager phone number list
`
`resident within the user table 414.” EX1005, 8:1-5, Fig. 6.
`
`
`
`13
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
`If a match is made, it “causes the ‘code generator’ software subroutine 415
`
`resident within computer 402, to generate a pseudo-random number code and passes
`
`the received code along with the authorized user’s pager number to the commercially
`
`available and conventional automatic dialer 41B,” which telephones a “pager 420
`
`by means of conventional and commercially available communication channel 422
`
`(e.g., voice line) and transmits the code to the user’s pager.” Id. 8:5-15. This
`
`communication and the initial sending of the random code to the personal device
`
`
`
`14
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`“utilize[] two distinct communication channels.” EX1006, 7:11-28; see also 3:50-
`
`4:3. The user 404 “now enters the code he or she has received from the pager
`
`420…and sends this password or pseudo-random code back to computer 402, where
`
`it is compared with the software subroutine module denoted as ‘code compare’ 416.”
`
`Id., 8:18-24. “If the comparison yields a match, the user 404 is allowed access to
`
`computer 402 and/or a portion of computer 402.” Id., 8:24-27. EX1003, ¶¶65-66.
`
`2. Overview of Jonsson
`Jonsson discloses a system for providing “[a]uthorization for a user to use a
`
`service” via “a modified pager which calculates a unique response code to a
`
`transmitted challenge code based on the challenge code, an input personal
`
`identification number, and an internal key.” EX1006, Abstract. As shown in Figure
`
`3, “a user initiates communication to a service node 26 via the service access network
`
`24,” e.g., by dialing an appropriate telephone number stored in their personal unit.
`
`EX1007, 10:13-18, Fig. 3.
`
`
`
`15
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
`In response to this request, the system “requests authentication via an
`
`authentication challenge network 28 by sending a challenge code…to the user’s
`
`personal unit 20.” Id., 10:23-27. Then the user is prompted “to input, for example,
`
`a security code, such as a PIN,” and once entered, “the algorithm unit 21b of the
`
`personal unit 20 calculates and sends a response code…to the display.” Id., 10:29-
`
`
`
`16
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`33. Jonsson discloses that the algorithm “calculates a response code based on the
`
`received challenge code, the user input (e.g., PIN), and optionally the secret key.”
`
`EX1006, 8:12-14; see also 7:5-10, 9:23-25. Finally, the user “manually inputs the
`
`displayed response code to the terminal 22,” and it is transmitted via the service
`
`access network 24 to the service node 26, where “the authentication center 30
`
`performs the comparison of the received response code to the expected response
`
`code.” Id., 11:4-20. EX1003, ¶¶67-68.
`
`3.
`
`Claim 5
`[5.0] A user authentication system comprising
`To the extent the preamble is deemed limiting,2 Veneklase teaches it; any
`
`alleged differences would have been obvious. EX1003, ¶¶71-72. Veneklase
`
`discloses that “[s]everal embodiments of computer security systems are described
`
`and which are adapted to grant an authorized individual access to a secured domain,
`
`such as a computer or data stream.” EX1005, Abstract, Fig. 6.
`
`
`2 Pacing Techs., LLC v. Garmin Intern., Inc., 778 F. 3d 1021, 1023–1024 (Fed. Cir.
`
`2015) (preambles stating purpose or intended not normally limiting).
`
`
`
`17
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`Thus, Veneklase teaches user authentication system (e.g., system adapted to
`
`grant an authorized individual access). EX1003, ¶¶71-72.
`
`[5.1] a computer processor;
`Veneklase teaches this limitation; any alleged differences would have been
`
`obvious. EX1003, ¶¶73-76. Specifically, Veneklase discloses that analyzing means
`
`12 may comprise a microprocessor and/or similar type of computer.” EX1005,
`
`5:35-37, Fig. 1.
`
`
`
`18
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
`
`
`19
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`Veneklase also discloses that the operations of its authentication system occur
`
`in host computer 402. See, e.g., EX1005, 7:29-8:27, Fig. 6.
`
`
`
`A POSITA would have understood that a computer capable of all of these actions,
`
`including checking codes against a database and generating random numbers would
`
`necessarily contain a computer processor. EX1003, ¶¶73-76.
`
`Thus, Veneklase teaches a computer processor (e.g., microprocessor). Id.
`
`[5.2] a user database configured to associate a user with a
`personal communication device possessed by the user, said
`20
`
`
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`personal communication device configured to communicate
`over a cell phone network with the user authentication
`system;
`Veneklase teaches this limitation; any alleged differences would have been
`
`obvious. EX1003, ¶¶77-82. Veneklase discloses that “host computer 402 checks
`
`the received identification code and cross references the received password code
`
`against a pager phone number list resident within the user table 414 which is
`
`stored within computer 402.” EX1005, 8:1-5, Fig. 6; see also 6:15-26 (“each
`
`authorized password 202, contained in this master password list 200, has a unique
`
`first entry 204 associated with it and which identifies the name of the authorized
`
`user who has been assigned that corresponding password and at least one
`
`telephone number 206 and/or network address associated with the identified
`
`user”), Fig. 5 (showing the telephone number 206 associated with the user
`
`identification 204).
`
`
`
`
`
`21
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`Furthermore, Veneklase discloses that the telephone number associated with
`
`the user identification is associated with a personal communication device, such as
`
`pager. EX1005, 8:1-5. This type of associating the user identification with a
`
`telephone number is exactly what is disclosed in the’658 Patent. See, e.g., EX1001,
`
`2:17-18 (“[t]he method includes associating a user ID with a phone number of a
`
`personal communication device”). Upon determining that the received identification
`
`code is matched with a pager phone number, “[t]he automatic dialer 418 telephones
`
`the conventional and commercially available pager 420 by means of conventional
`
`and commercially available communication channel 422 (e.g. voice line).”
`
`EX1005, 8:5-14.
`
`Veneklase additionally teaches a personal communication device configured
`
`to communicate over a cell phone network with the user authentication system. For
`
`example, communication channel 422 allows the personal communication device
`
`(e.g., pager 420) to communicate with the user authentication system (e.g., host
`
`computer 402, which includes automatic phone/pager dialer 418). See, e.g.,
`
`EX1005, Fig. 6.
`
`
`
`22
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`
`
`
` POSITA would have understood that the “conventional and commercially
`
` A
`
`available communication channel 422” described in Veneklase is the same type of
`
`cell phone network disclosed in the ’658 patent, which repeatedly makes clear that
`
`it covers both networks that communicate with cell phones and those that
`
`communicate with pagers. EX1003, ¶80. For instance, the ’658 Patent discloses
`
`that “[t]he communication module 118 forwards tokens 156 to a text messaging
`
`
`
`23
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`service provider 104, which may be a pager or mobile phone service provider.”
`
`EX1001, 5:32-40; see also Abstract, 1:10-11, 2:6-8, 2:28-31, 3:1-3, 4:13-17, 9:45-
`
`54. Furthermore, Veneklase discloses that the communication channel over which
`
`the random code is sent could be a pager or a cell phone, stating that “the
`
`predetermined period of time would be shorter when communications channel 84
`
`comprises a pager or cellular phone, since the owner has immediate access to the
`
`code upon transmission.” EX1005, 8:55-58. Thus, a POSITA would have
`
`understood that communication channel 422 meets the requirements of a cell phone
`
`network as claimed in the ’658 Patent, i.e., a mobile device or pager service provider
`
`communication network. EX1003, ¶¶77-80.
`
`To the extent it is argued that the pager network disclosed in Veneklase does
`
`not satisfy the cell phone network limitation, a POSITA would have found it obvious
`
`to implement the authentication system of Veneklase using a cell phone network.
`
`EX1003, ¶81; KSR Intern. Co. v. Teleflex Inc., 550 U.S. 398, 418-19 (2007). Indeed,
`
`Veneklase explicitly contemplates such a system, thus providing a teaching,
`
`suggestion, or motivation to modify it in such a way, as it notes that “the
`
`predetermined period of time would be shorter when communications channel 84
`
`comprises a pager or cellular phone, since the owner has immediate access to the
`
`code upon transmission.” EX1005, 8:55-58. In addition, it would have been obvious
`
`to use a cell phone network to send Veneklase’s random code because doing so
`
`
`
`24
`
`

`

`U.S. Patent 6,993,658
`IPR2023-00425 – Petition for Inter Partes Review
`
`would be a simple substitution of one known element for another and would have
`
`made the system available to even more users in more locations, which is one of the
`
`intentions of the reference. EX1003, ¶81. It would also have been obvious because
`
`it would have enabled users to use their cell phones to authenticate their access,
`
`which many users would prefer because they provide for larger screens and are thus
`
`easier to view. Id. A POSITA would have had a reasonable expectation of success
`
`in modifying Veneklase’s authentication system to use a cellular network instead of
`
`a pager network because they operate similarly, many times using the same
`
`protocols, and would just involve swapping out devices and making some software
`
`configuration changes. Id.
`
`Thus, Veneklase teaches a user database c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket