throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`UNIFIED PATENTS, LLC
`
`Petitioner
`
`- v. –
`
`DYNAPASS HOLDINGS, LLC
`
`Patent Owner
`
`———————
`
`IPR2023-00425
`
`U.S. Patent 6,993,658
`
`SUPPLEMENTAL DECLARATION OF BRUCE MCNAIR
`
`
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 1 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`TABLE OF CONTENTS
`Introduction ..................................................................................................... 3
`
`GROUND 1 ..................................................................................................... 5
`
`I.
`
`II.
`
`A.
`
`B.
`
`C.
`
`Limitation [5.3] “a control module . . . configured to create a
`new password based at least upon a token and a passcode” ................. 5
`Limitation [5.4] “a communication module configured to
`transmit the token to the personal communication device
`through the cell phone network;” ......................................................... 9
`Limitation [5.5] “an authentication module configured to
`receive the password from the user through a secure computer
`network,” ............................................................................................ 10
`Limitation [5.6] “wherein the authentication module activates
`access to the account in response to the password and
`deactivates the account within a predetermined amount of time
`after activating the account, such that said account is not
`accessible through any password via the secure computer
`network,” ............................................................................................ 11
`III. GROUND 2 ................................................................................................... 15
`
`D.
`
`A.
`
`B.
`
`C.
`
`Limitation [5.3]- the “passcode” ......................................................... 15
`Limitation [5.6] “activates access to the account in response to
`the password” ...................................................................................... 20
`Limitation [5.6] “deactivates the account within a
`predetermined amount of time after activating the account, such
`that said account is not accessible through any password via the
`secure computer network” .................................................................. 21
`Limitation [1.2] “receiving a request from the user for a token
`via the personal communication device, over the second
`network” ............................................................................................. 27
`IV. Conclusion .................................................................................................... 28
`
`D.
`
`i
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 2 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`I, Bruce McNair, do hereby declare as follows:
`
`I.
`
`INTRODUCTION
`
`1.
`
`I have been asked to respond to certain opinions in Patent Owner’s
`
`Response (POR), Paper 13, in this proceeding. As with my previous declaration,
`
`EX1003, in forming the opinions expressed in this declaration, I relied upon my
`
`education and experience in the relevant field of art and have considered the
`
`viewpoint of a Person of Ordinary Skill in the Art (“POSITA”), as of March 6, 2000,
`
`the priority date of U.S. Patent 6,993,658 (“the ’658 patent”). I have also relied on
`
`the following exhibits:
`
`Exhibit No.
`
`Description
`
`1001
`
`U.S. Patent 6,993,658
`
`1002
`
`Prosecution History File of Application 09/519,829
`
`1005
`
`1006
`
`European Patent Application No. 084451 to Veneklase
`(“Veneklase”)
`PCT Patent Publication No. WO 96/00485 to Jonsson (“Jonsson”)
`
`1007
`
`PCT Patent Publication No. WO 95/19593 to Kew (“Kew”)
`
`1008
`
`1009
`
`PCT Patent Publication No. WO 97/31306 to Sormunen
`(“Sormunen”)
`Li Gong, “Optimal Authentication Protocols Resistant to
`Password Guessing Attacks," Proceedings The Eighth IEEE
`
`1
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 3 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`Computer Security Foundations Workshop, 1995, pp. 24-29, doi:
`10.1109/CSFW.1995.518549.
`U.S. Patent 3,938,091
`
`IETF RFC2289, “A One-Time Password System,” February 1989,
`available at https://www.rfc-editor.org/rfc/rfc2289.html
`U.S. Patent 5,276,444
`
`S.A. Sherman, R. Skibo, R.S. Murray, “Secure Network Access
`Using Multiple Applications of AT&T’s Smart Card,” AT&T
`Technical Journal, September/October 1994
`Lt. Gen. Charles R. Myers, “Vietnam Studies: Division-Level
`Communications, 1962-1973”, US Department of the Army, 1982,
`Ch. 8, retrieved from https://history.army.mil/catalog/pubs/90/90-
`11.html December 13, 2022.
`Z. J. Haas and S. Paul, "Limited-lifetime shared-access in mobile
`systems," Proceedings IEEE International Conference on
`Communications ICC '95, 1995, pp. 1404-1408 vol.3, doi:
`10.1109/ICC.1995.524434
`Mobivity, A Brief History of Text Messaging, Sept. 27, 2012,
`available at https://www.mobivity.com/mobivity-blog/a-brief-
`history-of-text-messaging
`Microsoft Computer Dictionary (5th ed. 2002)
`
`1010
`
`1011
`
`1012
`
`1013
`
`1014
`
`1015
`
`1016
`
`1018
`
`1019
`
`U.S. Patent 7,058,974
`
`1020
`
`U.S. Patent 5,559,505
`
`1021
`
`“Viet Nam Studies – Division-Level Communications 1962-
`1973,” Department of the Army, CMH PUB 90-11, 1982.
`
`2
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 4 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`1022
`
`1023
`
`"Recent-secure authentication: enforcing revocation in distributed
`systems," Proceedings 1995 IEEE Symposium on Security and
`Privacy, Oakland, CA, USA, 1995, pp. 224-235, doi:
`10.1109/SECPRI.1995.398935
`"A class of flexible and efficient key management protocols,"
`Proceedings 9th IEEE Computer Security Foundations Workshop,
`Kenmare, Ireland, 1996, pp. 2-8, doi:
`10.1109/CSFW.1996.503685
`
`II. GROUND 1
`
`2.
`
`Patent Owner makes several arguments in an attempt to distinguish
`
`from the Veneklase/Jonsson combination. However, the fundamental error in Patent
`
`Owner’s analysis is that it fails to understand the cited references from the
`
`perspective of a POSITA. As I explained in my previous declaration, EX1003, when
`
`the combination of the disclosure of Veneklase and Jonsson is viewed from the
`
`perspective of a POSITA, claim 5 is obvious.
`
`3.
`
`Patent Owner disputes the application of Venkelase and Jonsson to
`
`certain limitations of claim 5. I address each of the challenged limitations below.
`
`Limitation [5.3] “a control module . . . configured to create a new
`A.
`password based at least upon a token and a passcode”
`
`4.
`
`Patent Owner alleges that modifying Veneklase with the teaching of
`
`Jonsson to allow for the transmission of the password only one time would “violate
`
`Veneklase’s principle of operation” because the two-step authentication is a “key
`
`3
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 5 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`feature” of Veneklase. I disagree. The modified system would still allow for
`
`multiple levels of security. In particular, the modified system includes entering the
`
`PIN (e.g., passcode) only one time after a request for authorization is initiated.
`
`However, the entry of the PIN is only done after the receipt of a challenge code, as
`
`taught by Jonsson. Thus, the PIN is only entered once into the personal unit 20 and
`
`is not transmitted, which prevents interception. Rather, the PIN is entered into the
`
`user’s device and a response code is generated based on the received challenge
`
`code, [and] the user input (e.g., PIN) .” EX1006, 8:12-14. To be clear, this method
`
`is more efficient than the process of Veneklase because it saves the user from
`
`having to manually enter both the PIN and the challenge code. That is, the method
`
`of Jonsson calculates and sends the response code (e.g., password) after receipt of
`
`the challenge code and the single entry of the PIN.
`
`5. While the modification necessarily changes how Veneklase would
`
`operate, it still accomplishes Veneklase’s goal of preventing unauthorized access
`
`and adds advantages. In particular, I note that incorporating Jonsson’s teaching to
`
`only require entry of the PIN to the user’s device provides added security over
`
`sending the PIN over a communication channel where it can be intercepted.
`
`6.
`
`The portion of Veneklase cited by Patent Owner relates to notifying
`
`the user that someone is seeking access to the system with the password. The
`
`proposed modification would also notify the user that someone is seeking access
`
`4
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 6 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`because the user would receive a challenge code (e.g., token), which would alert
`
`the user that someone is seeking access to the account.
`
`7.
`
`Patent Owner also concludes that the combined system would be
`
`“more prone to Denial of Service (DoS) attacks.” This argument is a red herring.
`
`For example, a POSITA would have understood a a DoS attack as:
`
`characterized by an explicit attempt by attackers to prevent
`legitimate users of a service from using that service. DoS attacks are
`aimed at devices and networks with exposure to the Internet. Their
`goal is to cripple a device or network so that external users no longer
`have access to network resources. Without hacking password files
`or stealing sensitive data, a denial-of-service hacker simply fires
`up a program that will generate enough traffic to a particular site that
`it denies service to the site's legitimate users.
`
`EX1019, 1:14-23. Patent Owner’s own evidence confirms this understanding:
`
`Computerized assault, usually planned, that seeks to disrupt Web
`access. A denial of service attack can occur in a number of forms.
`The most common form of attack is to overwhelm an Internet
`server with connection requests that cannot be completed. This
`causes the server to become so busy attempting to respond to the
`attack that it ignores legitimate requests for connections. One
`example of this type of attack, known as a SYN flood, inundates the
`server’s entry ports with false connection messages. Another,
`known as the Ping of Death, sends a ping command with an
`oversized IP packet that causes the server to freeze, crash, or restart.
`
`5
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 7 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`Other forms of denial of service attacks include the destruction or
`alteration of a server’s configuration data, such as router
`information; unauthorized access to physical components of a
`system; and the sending of large or invalid data that causes a system
`to crash or freeze. See also packet, Ping of Death, SYN flood.
`
`EX1018, p. 173.
`
`8.
`
`The problems of DoS attacks on authentication systems have been
`
`known long before either of the prior art references or the patent filing. I have
`
`personal experience in addressing the long-known problem of attackers creating a
`
`DoS by repeated invalid access attempts. See, e.g., McNair, US Patent 5,559,505
`
`“Security System for Providing Lockout for Invalid Access Attempts,” granted
`
`September 24, 1996, EX1020. Jonsson does not exacerbate this problem but, in
`
`fact, acknowledges the fact that there may very well be invalid access attempts,
`
`e.g., in Claim 22 “permitting access to said service only when a result of said
`
`comparison of said response code generated by said personal unit to said expected
`
`response code is acceptable.” The ’658 patent only appears to address how to
`
`process access requests when the requests are valid. Only in the Background
`
`(1:29-31) does the ’658 patent even briefly acknowledge the actions of hackers
`
`guessing passwords. Nowhere, not in the flow chart diagrams, in the written
`
`description, or claims does it address the necessary system actions when an invalid
`
`access attempt is made, thus failing to consider or address any potential DoS issues
`
`6
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 8 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`- well known, unfortunate side effects of authentication systems.
`
`9.
`
`I note that Veneklase fairs no better in dealing with the problem of
`
`DoS attacks. There is no disclosure in Veneklase that would lessen the chances of a
`
`DoS attack. The use of Veneklase’s two passwords does not lessen the chance of a
`
`DoS attack because a hacker would still trigger DoS through repeated invalid
`
`access attempts, thereby overwhelming the system and preventing authorized users
`
`from gaining access, i.e., a DoS attack.
`
`10.
`
`Finally, Patent Owner asserts that Veneklase’s teaching of an
`
`algorithm for additional security is not an explicit teaching, suggestion, or
`
`motivation for combining Veneklase with Jonsson’s teachings. I disagree. A
`
`POSITA would have understood that Veneklase’s specific teaching of using
`
`algorithms to enhance security would have provided a suggestion to employ other
`
`algorithms related to security in order to further Veneklase’s explicitly stated goal
`
`to “ensure that only authorized users gain access to a computer system.” EX1005,
`
`3:31-33. Patent Owner’s rationale is akin to saying that a POSITA would not be
`
`motivated to modify a security system that utilizes one type of lock, e.g., a
`
`padlock, by using another type of lock, e.g., a combination lock.
`
`Limitation [5.4] “a communication module configured to transmit
`B.
`the token to the personal communication device through the cell phone
`network;”
`
`11.
`
`I note that this limitation is directed to the communication module, but
`
`7
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 9 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`Patent Owner appears to attack the method of identifying a user’s device. In
`
`particular, Patent Owner argues that the inability to look up a phone number
`
`somehow negates the combination. I do not agree with this assertion as there
`
`would not be a requirement to look up a phone number in the combination with
`
`Jonsson. In particular, Jonsson discloses:
`
`A user initiates a service access through terminal 22 by transmitting
`the request over a service access network 24 to a service node 26.
`The service node 26 does not immediately initiate the services
`offered. Rather, it generates a challenge code or causes a challenge
`code to be generated in an authentication center 30. The challenge
`code is sent over an authentication challenge network 28 to the
`personal unit.
`
`Ex. 1006, 9:2–8; also 10:13–27, Fig. 3. Thus, in the combination, there is no need
`
`to look up a phone number in the combination.
`
`12.
`
`Patent Owner also reiterates its arguments regarding DoS attacks. For
`
`the same reasons I discuss above, a POSITA would not have understood that
`
`Veneklase was any more effective at avoiding or stopping DoS attacks.
`
`Limitation [5.5] “an authentication module configured to receive
`C.
`the password from the user through a secure computer network,”
`
`13.
`
`Patent Owner states that because Veneklase’s system uses “off the
`
`shelf” and readily available components, that it would not be capable of
`
`performing the software implemented methods of Jonnson. This is contradicted by
`
`8
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 10 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`the express disclosure of Jonnson that “the capacity for performing the necessary
`
`calculations exists in conventional cellular telephones and personal communication
`
`units, allowing the present invention to be implemented through software.”
`
`EX1006, 7:21-31. Patent Owner attempts to distinguish from this clear teaching
`
`by citing the preceding sentence describing a preferred embodiment where the
`
`personal unit is a separate unit. However, a POSITA would have understood from
`
`the express teachings of Jonsson that conventional pagers are capable of running
`
`software to execute algorithms, such as Jonsson’s. Further, Veneklase already
`
`discloses that its pager unit executes algorithms. EX1005, 9:26-10:11. Thus, a
`
`POSITA would have understood that the pager of Veneklase was capable of
`
`performing the algorithms of Jonsson.
`
`Limitation [5.6] “wherein the authentication module activates
`D.
`access to the account in response to the password and deactivates the
`account within a predetermined amount of time after activating the
`account, such that said account is not accessible through any password
`via the secure computer network,”
`
`14.
`
`Patent Owner makes four separate arguments with respect to this
`
`limitation. I address each below.
`
`15. First, Patent Owner alleges that Veneklase does not activate access in
`
`response to the creation of the password. As an initial matter, the claim does not
`
`include the language “creation of” or any variation thereof. Thus, my previous
`
`declaration demonstrated how Veneklase activates access to the account (e.g.,
`
`9
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 11 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`allows access) in response to the entry of the password. I am informed that a
`
`district court has interpreted this limitation to include the words “the creation of”
`
`such that the court’s interpretation of this limitation is “activates access to the
`
`account in response to the creation of the password.” While I disagree with this
`
`interpretation injecting extraneous words into the claim, it does not change the fact
`
`that the combination of Veneklase and Jonnson discloses this limitation even under
`
`the court’s interpretation.
`
`16. Patent Owner is taking the position that “activates access” is
`
`something that happens before access is granted. However, this is a gratuitous
`
`point, as access to the account has to be activated in order for the created password
`
`to work, i.e, the account is accessed. In other words, the account cannot be used
`
`when the account is deactivated. I am not aware of any system that does not
`
`“activate access” to the account when generating a new password as this would
`
`undermine the purpose of generating a new password, i.e., accessing an account.
`
`17.
`
`Jonsson discloses creating “an expected response code,” (e.g.,
`
`password) , at which point access to the account is activated, and access is granted
`
`when the “expected response code” matches the received response code. Ex.1006,
`
`10:2-5. In particular, a POSITA would have understood that the “expected”
`
`response code indicates that the account access is activated because it is awaiting a
`
`response. As such, Jonsson teaches activating access to the account in response to
`
`10
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 12 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`the creation of the password under the district court’s interpretation.
`
`18.
`
`In addition, Jonsson discloses that “the challenge code and the
`
`response is unique for each transaction.” EX1006, 3:16-18. A POSITA would have
`
`understood this disclosure to mean that account access is not activated prior to the
`
`sending of the challenge code to the user and the creation of the expected response
`
`code (e.g., password) because prior response codes would not have worked. In
`
`other words, until the unique challenge code and unique expected response code
`
`are created and sent for a particular transaction, there is no access to the account.
`
`19. Second, Patent Owner alleges that the claimed predetermined amount
`
`of time is the timeframe between activation and deactivation of the account.
`
`However, Patent Owner mistakes the “predetermined amount of time after
`
`activating the account” to mean the entire period after account access is activated.
`
`Rather, a POSITA would have understood that this claim limitation simply means
`
`any predetermined period after activation. In the combined system of Veneklase
`
`and Jonsson, the predetermined period would include the time from receiving the
`
`challenge code (at or after account activation, as discussed above) and the sending
`
`of the response code, which would be governed by Veneklase’s teaching that the
`
`password must be “received within a predetermined period of time.” EX1005,
`
`8:40-49.
`
`11
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 13 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`20. Third, Patent Owner alleges that “because the Petition alleges that the
`
`“predetermined period of time” begins with “receipt of the token (e.g., randomly
`
`generated challenge code) ” by “pager 420,” it would be the “personal
`
`communication device,” not the “authentication module” (i.e., “code compare
`
`module 416” in the “host computer”) that activates access to the account.” This is
`
`again based on a misunderstanding of the claim limitation that the predetermined
`
`amount of time must include the entire time from activation of the account to
`
`deactivation of the account. However, as discussed above, this is simply not what
`
`the claim recites. Rather, the claim recites “deactivates the account within a
`
`predetermined amount of time after activating the account.” Thus, the
`
`predetermined amount of time begins at some point after activation. Accordingly,
`
`this limitation is met by Veneklase’s teaching that the password must be “received
`
`within a predetermined period of time” (EX1005, 8:40-49) applied to Jonsson’s
`
`sending of the response code after receiving the challenge code EX1005, 8:40-49.
`
`Thus, the “authentication module” (i.e., “code compare module 416” in the “host
`
`computer”) is responsible for account deactivation.
`
`21. Finally, Patent Owner alleges that “the predetermined period of time”
`
`varies by when the user decides to send back the response code. This completely
`
`ignores Veneklase’s teaching that the password must be “received within a
`
`predetermined period of time.” As explained above, the combination of Veneklase
`
`12
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 14 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`and Jonsson meets the deactivation limitation. EX1005, 8:40-49.
`
`III. GROUND 2
`
`22.
`
`Patent Owner makes several arguments in an attempt to distinguish
`
`from the combination of Kew and Sormunen. Again, Patent Owner’s analysis fails
`
`to understand and apply the teachings of the cited references from the perspective of
`
`a POSITA. Patent Owner’s arguments are limited to limitations [5.3], [5.6], and
`
`[1.2], which I address below.
`
`A.
`
`23.
`
`Limitation [5.3]- the “passcode”
`
`In my previous declaration, I identified the User ID/IdentityCode as the
`
`“passcode” limitation. The reason for this is simple, as the disclosure of Kew
`
`requires the use of a user-known “identification code” to allow for the identification
`
`of the correct “identity code,” which is used to generate the password. In particular,
`
`a POSITA would have understood that the “identity code” “corresponds” to a user-
`
`known identification code, which is entered by the user during the authentication
`
`process. EX1007, 3:1-6; 8:2-9. For example, Kew states:
`
`When the user enters his user identification code, the host
`computer system identifies the corresponding transformation
`algorithm in a database from the code and transforms the random
`code (Code A) to a new Code B in such a manner that the Code C,
`produced by the user's receiver from the transmitted code, will be
`identical to Code B with which it is compared. Thus, only a user
`both with knowledge of the user identification code and holding the
`
`13
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 15 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`corresponding receiver can gain access to the host system. The
`transformation algorithms associated with each receiver may be
`completely different, or may be the same base algorithm which is
`convoluted with a code corresponding to the user's identification
`code so as to generate characteristic transformed codes.
`EX1006, 2:28-3:6.
`When the user seeks access to the host system 1 via the terminal 2 ,
`he enters his user identification code. This code may take any
`suitable form, for example his actual name or preferably a more
`secure code such as a PIN. The security server 5 includes a database
`of all authorised users and their authorised receiver units 6, and
`identifies the corresponding identity code for the appropriate
`receiver unit 6. The security server 5 then generates a random
`code (Code A) and subjects this number to an encryption using the
`same one-way algorithm as is stored in the user's receiver 6
`together with the corresponding identity code. In this way a
`transformed code (Code B) is produced.
`
`EX1006, 7:34-8:10.
`
`24. A POSITA would have readily understood that both the user ID and the
`
`“corresponding identity code” are used to generate a password in the event that they
`
`are not identical. In particular, I cited both the user identity code (user ID) and the
`
`corresponding identity code to demonstrate that a Code B (e.g., password) is
`
`generated based on: 1) Code A (e.g., token) and 2) the user ID and the
`
`“corresponding identity code” (e.g., passcode) . A POSITA would have understood
`
`14
`
`
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 16 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`that the “corresponding identity code” is linked with the user ID such that the user
`
`ID (known to the user) is necessary to identify the identity code in instances when
`
`they are not the same. Thus, in order for the process of Kew to function, the
`
`password (Code B) must be based on at least the user ID provided by the user.
`
`25.
`
`This process is illustrated in Ex. 1007, Fig. 2, which I previously
`
`cited:
`
`26. As shown above, and explained in Kew, FIG. 2 shows how new
`
`password Code B is created based on both the User ID/Identity Code (passcode) and
`
`randomly generated Code A. A POSITA would appreciate that the User ID is
`
`involved in the generation of the password, as the process of generating Code B
`
`cannot begin without the User ID to identify the correct algorithm associated with
`
`the Identity Code of the device. Thus, a POSITA would have understood that the
`
`password generated by Kew is “based on” the User ID at least because it cannot be
`
`generated without out the User ID, and is also “based on” the identity code because
`
`that is what is used to identify the algorithm used by the receiver.
`
`15
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 17 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`27.
`
`Patent Owner also asserts that “identity code” would not be known to
`
`the user. However, Patent Owner’s arguments relate to the programming of the
`
`receiver and do not support a conclusion that the identity code would not be known
`
`to the user. The programming of the receiver and storage of the identify code in the
`
`EPROM is not relevant to whether the user has knowledge of the identity code.
`
`Also, the reprogramming of the EPROM using ultraviolet light is similarly
`
`irrelevant to whether the user knows the identity code. EPROM means “erasable
`
`programmable read-only memory.” This meaning says nothing about who can
`
`read the memory, just that it cannot be written to (without having been first erased
`
`using ultraviolet light) . Nothing about the design of the EPROM storage of the
`
`“identity code” prevents the user from knowing its contents or value. Indeed, as the
`
`name indicates, EPROM is necessarily readable.
`
`28. Kew does not say that the identity code is unknown to the user, and
`
`Patent Owner does not give any reason why the identity code would be secret or
`
`hidden from the user. Rather, a POSITA would have understood that it would be
`
`practical for the user know the identity code. For example, if the user were to
`
`forget his user ID, the user would need to use the identity code as a back-up
`
`verification in order for the system to locate the correct algorithm to produce a
`
`password. Otherwise, the receiver would be useless and the user would not be able
`
`to access the system. As noted by Patent Owner, reprogramming the EPROM
`
`16
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 18 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`requires exposing the chip to ultraviolet light, which is a process that would be
`
`impractical for a layperson user. Further, as Patent Owner indicates, changing the
`
`identity code would also require updating the database to also include the new
`
`identity code. As such, a POSITA reading Kew would not have concluded that the
`
`identity code was a secret, as such an interpretation would be impractical and
`
`provide no benefit to the user. Instead, a POSITA would have understood that it
`
`would have been beneficial for the user to know the identity code of the device to
`
`avoid the burdensome process of reprogramming the receiver in the event that the
`
`user forgets the PIN.
`
`29.
`
`I also note that there is no disclosure in Kew that prevents the user
`
`identification code from being the same as the identity code. In fact, Claim 1 of
`
`Kew supports such a situation, as the “input user identification code” is performing
`
`the same function as the identity code of identifying the transformation algorithm
`
`to generate Code B.
`
`1. A method of preventing unauthorised access to a host
`computer system (1) by a user at a remote terminal (2)
`comprising the steps of accepting a user identification code input
`to the terminal by the user; generating a random code (Code A) ;
`subjecting Code A to a transformation characteristic of a
`transformation algorithm identified by the input user
`identification code so as to generate a transformed code
`(Code B); transmitting Code A via a paging system (7) , to a
`receiver (6) held by the user, the receiver (6) comprising
`transformation means adapted to transform the received Code
`
`17
`
`UNIFIED PATENTS EXHIBIT 1024
`UNIFIED PATENTS, LLC v. DYNAPASS IP HOLDINGS LLC
`IPR2023-00425
`Page 19 of 29
`
`

`

`Supplemental Declaration of Bruce McNair
`U.S. Patent No. 6,993,658
`
`Thus, claim 1 of Kew supports the user ID as the same as the identity code.
`
`B.
`
`Limitation [5.6] “activates access to the account in response to the
`password”
`
`30.
`
`In my previous declaration, I demonstrated how Kew discloses that
`
`access to the account is activated in response to the password, as claimed. I am
`
`informed that a district court has interpreted this limitation to include the words
`
`“the creation of” such that the court’s interpretation of this limitation is “activates
`
`access to the account in response to the creation of the password.” While I disagree
`
`with this interpretation injecting extraneous words into the claim, it does not
`
`change the fact that Kew discloses this limitation even under the court’s
`
`interpretation. In particular, it appears that Patent Owner is taking the position that
`
`“activates access” is something that happens before access is granted. However,
`
`this is a gratuitous point, as access to the account has to be activated in order for
`
`the created password to work, i.e, access is granted. In other words, the account
`
`cannot be used when the account is deactivated. I am not aware of any system that
`
`does not “activate access” to the account when generating a new password as this
`
`would undermine the purpose of generating a new password, i.e., accessing an
`
`account.
`
`31. Kew disclos

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket