throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`———————
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`———————
`
`APPLE INC,
`Petitioner,
`
`v.
`
`CARBYNE BIOMETRICS, LLC,
`
`Patent Owner
`
`———————
`IPR2023-00333
`U.S. Patent No. 11,475,105
`_____________________
`
`DECLARATION OF PATRICK MCDANIEL,
`UNDER 37 C.F.R. § 1.68 IN SUPPORT OF PETITION FOR
`INTER PARTES REVIEW
`
`1
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`TABLE OF CONTENTS
`
`I.
`
`Introduction ...................................................................................................... 6
`
`II.
`
`Qualifications and Professional Experience .................................................... 8
`
`III. Level of Ordinary Skill in the Art ................................................................. 12
`
`IV. Relevant Legal Standards .............................................................................. 14
`
`V. Overview of the ’105 Patent .......................................................................... 18
`
`VI. Technology Background ................................................................................ 27
`
`A. AUTHENTICATION .......................................................................... 27
`
`B.
`
`C.
`
`CREDENTIALS AND CREDENTIAL MANAGEMENT ................ 28
`
`CRYPTOGRAPHY ............................................................................. 32
`
`D.
`
`CRYPTOGRAPHY IN WEB TRANSACTIONS .............................. 33
`
`E.
`
`TRUSTED PLATFORM MODULES ................................................ 34
`
`VII. Claim Construction ........................................................................................ 36
`
`A.
`
`“restricted interface” (Claims 9-11 and 28-30) ................................ 37
`
`VIII. Claims 1, 9-11, 14, 18, 28-30, 33 and 35 are Unpatentable .......................... 38
`
`A. Ground 1: Claims 1, 14, 18, 33, and 35 are obvious under 35
`U.S.C. § 103 over Kesanupalli, Cheng and Kodama. ......................... 40
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`a)
`
`Summary of Kesanupalli ..................................................................... 40
`
`Summary of Cheng .............................................................................. 43
`
`Summary of Kodama .......................................................................... 46
`
`Reasons to Combine Kesanupalli, Cheng and Kodama ...................... 48
`
`Claim 1 ................................................................................................ 56
`
`[1.0] A system, comprising: ................................................................. 56
`
`
`
`
`2
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`b)
`
`c)
`
`d)
`
`e)
`
`f)
`
`g)
`
`h)
`
`i)
`
`j)
`
`k)
`
`
`[1.1] one or more processors configured to: ...................................... 57
`
`[1.2] receive, at a first device, a request to access a resource
`external to the first device, wherein the resource external to the
`first device is associated with a user; ................................................. 59
`
`[1.3a] access at least one record stored on the first device, the
`at least one record including authentication information
`associated with the user and credential information associated
`with the external resource to which the user has requested
`access, .................................................................................................. 64
`
`[1.3b] wherein the credential information comprises a
`cryptographic key; ............................................................................... 72
`
`[1.4] receive authentication input from the user; ............................... 74
`
`[1.5] determine that the authentication input from the user
`matches the authentication information associated with the user
`included in the at least one record stored on the first device; ............ 75
`
`[1.6] retrieve at least a portion of the credential information
`from the at least one record stored on the first device; ...................... 78
`
`[1.7] facilitate access of the user to the external resource at
`least in part by transmitting, on behalf of the user, from the first
`device, output based at least in part on the at least portion of
`the credential information retrieved from the at least one
`record, wherein the user of the first device is granted access to
`the external resource based at least in part on the output
`transmitted from the first device on behalf of the user; and ............... 80
`
`[1.8] based at least in part on the first device being a same
`brand as a second device, initiate a backup, to the second
`device, of at least a portion of the at least one record; and ............... 84
`
`[1.9] a memory coupled to the one or more processors and
`configured to provide the one or more processors with
`instructions. ......................................................................................... 88
`
`6.
`
`Claim 14 .............................................................................................. 89
`
`
`
`
`3
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`7.
`
`8.
`
`B.
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`C.
`
`1.
`
`2.
`
`3.
`
`a)
`
`b)
`
`c)
`
`d)
`
`
`Claims 18 and 33 ................................................................................. 90
`
`Claim 35 .............................................................................................. 92
`
`Ground 2: Claims 9-11 and 28-30 are obvious under 35 U.S.C.
`§ 103 over Kesanupalli, Cheng, and Kodama and in further
`view of Challener. ............................................................................... 94
`
`Summary of Challener ........................................................................ 94
`
`Reasons to Combine Kesanupalli in view of Cheng and
`Kodama and Challener ........................................................................ 99
`
`Claim 9 .............................................................................................. 103
`
`Claim 10 ............................................................................................ 108
`
`Claim 11 ............................................................................................ 109
`
`Claims 28-30 ..................................................................................... 109
`
`Ground 3: Claims 1, 9-11, 14, 18, 28-30, 33 and 35 are obvious
`under 35 U.S.C. § 103 over Jakobsson 351 and Kodama. ................ 111
`
`Jakobsson 351 and Kodama .............................................................. 111
`
`Reasons to Combine Jakobsson 351 and Kodama ............................ 111
`
`Claim 1 .............................................................................................. 115
`
`[1.0] A system, comprising: ............................................................... 115
`
`[1.1] one or more processors configured to: ..................................... 115
`
`[1.2] receive, at a first device, a request to access a resource
`external to the first device, wherein the resource external to the
`first device is associated with a user; ................................................ 115
`
`[1.3a] access at least one record stored on the first device, the
`at least one record including authentication information
`associated with the user and credential information associated
`with the external resource to which the user has requested
`access, ................................................................................................ 116
`
`
`
`
`4
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`e)
`
`f)
`
`g)
`
`h)
`
`i)
`
`j)
`
`k)
`
`4.
`
`5.
`
`6.
`
`7.
`
`8.
`
`9.
`
`[1.3b] wherein the credential information comprises a
`cryptographic key; ............................................................................. 117
`
`
`
`[1.4] receive authentication input from the user; .............................. 117
`
`[1.5] determine that the authentication input from the user
`matches the authentication information associated with the user
`included in the at least one record stored on the first device; .......... 117
`
`[1.6] retrieve at least a portion of the credential information
`from the at least one record stored on the first device; .................... 118
`
`[1.7] facilitate access of the user to the external resource at
`least in part by transmitting, on behalf of the user, from the first
`device, output based at least in part on the at least portion of
`the credential information retrieved from the at least one
`record, wherein the user of the first device is granted access to
`the external resource based at least in part on the output
`transmitted from the first device on behalf of the user; and ............. 118
`
`[1.8] based at least in part on the first device being a same
`brand as a second device, initiate a backup, to the second
`device, of at least a portion of the at least one record; and ............. 119
`
`[1.9] a memory coupled to the one or more processors and
`configured to provide the one or more processors with
`instructions. ....................................................................................... 122
`
`Claim 9 .............................................................................................. 122
`
`Claim 10 ............................................................................................ 123
`
`Claim 11 ............................................................................................ 124
`
`Claim 14 ............................................................................................ 125
`
`Claims 18, 28-30, and 33 .................................................................. 125
`
`Claim 35 ............................................................................................ 127
`
`IX. Conclusion ................................................................................................... 130
`
`
`
`
`
`
`5
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`I, Patrick McDaniel, do hereby declare as follows:
`
`I.
`
`INTRODUCTION
`
`1.
`
`I make this declaration based upon my own personal knowledge and,
`
`if called upon to testify, would testify competently to the matters stated herein.
`
`2.
`
`I have been asked by Apple Inc. (“Apple”) to provide my expert
`
`opinion connection with the Inter Partes Review of U.S. Patent No. 11,475,105
`
`(“’105 patent”) concerning whether the ’105 patent is unpatentable over certain
`
`prior art. This declaration is a statement of my opinions on issues relating to the
`
`patentability of Claims 1, 9-11, 14, 18, 28-30, 33, and 35 (“the Challenged
`
`Claims”) of the ’105 patent. As I explain more fully below, it is my opinion that all
`
`the Challenged Claims would have been obvious to a person of ordinary skill in the
`
`art (“POSITA”) at the time of the alleged invention.
`
`3.
`
`I am being compensated for my work in this matter at my standard
`
`hourly rate. I am also being reimbursed for reasonable and customary expenses
`
`associated with my work and testimony in this investigation. My compensation is
`
`not contingent on the outcome of this matter or the specifics of my testimony. I
`
`have no other financial interest in this proceeding.
`
`4.
`
`I have reviewed and considered the following documents in
`
`connection with my analysis of the ’105 patent:
`
`a) the ’105 patent, APPL-1001;
`
`
`
`
`6
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`b) the prosecution history of the ’105 patent (“’105 File History”),
`
`
`
`APPL-1002;
`
`c) U.S. Patent No. 8,799,666 to Kesanupalli et al. (“Kesanupalli”),
`
`APPL-1006;
`
`d) U.S. Patent No. 8,099,789 to Challener et al. (“Challener”),
`
`APPL-1007;
`
`e) U.S. Patent Publication No. 2004/0117636 to Cheng et al.
`
`(“Cheng”), APPL-1008;
`
`f) European Patent Application EP 2 079 023 A2 published
`
`15.07.2015 (“Kodama”), APPL-1010; and
`
`g) U.S. Patent 10,360,351 (“Jakobsson ’351”), APPL-1011.
`
`5.
`
`In forming the opinions expressed below, I have considered:
`
`a) the documents listed above;
`
`b) the relevant legal standards, including the standard for
`
`obviousness, and any additional authoritative documents as cited in the body of
`
`this declaration; and
`
`c) my own knowledge and experience based upon my work in the
`
`field of authentication and distributed computing as described below, as well as the
`
`following materials:
`
`APPL-1009
`
`U.S. Patent No. 9,652,629 (“Brown”)
`
`
`
`
`7
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`APPL-1012
`
`APPL-1013
`
`Patrick McDaniel, Authentication, Handbook of Computer
`Networks, Volume 3, Part 2, pp. 570-580, John Wiley and
`Sons, 2008. Ed. Hossein Bidgoli.
`
`IBM Introducing Fingerprint Reader Into Laptop. Jack
`Germain. 2004 at https://www.technewsworld.com/story/ibm-
`introducing-fingerprint-reader-into-laptop-37017.html
`
`APPL-1014
`
`U.S. Patent Publication 2008/0059804 to Shah et al.
`
`APPL-1015
`
`APPL-1016
`
`APPL-1017
`
`Kerberos: An Authentication Service for Computer Networks.
`B. Clifford Neuman et al. 1994 at
`https://gost.isi.edu/publications/kerberos-neuman-tso.html
`
`ISO/IEC 11889-1:2009 Information technology Trusted
`Platform Module Part 1: Overview at
`https://www.iso.org/standard/50970.html
`
`TPM Main Part 3 Commands Specification Version 1.2 1
`March 2011 at https://trustedcomputinggroup.org/wp-
`content/uploads/TPM-Main-Part-3-
`Commands_v1.2_rev116_01032011.pdf
`
`APPL-1019
`
`Computer Dictionary, Second Edition, entry “data record”
`(1994)
`
`APPL-1020
`
`How to Restore Your Data After a Hard Drive Crash, Glenn
`Derene, Aug 4, 2011 at
`https://www.popularmechanics.com/technology/gadgets/how-
`to/a6819/how-to-restore-your-data-after-a-hard-drive-crash/
`
`APPL-1021
`
`Redline comparison of U.S. Patent No. 10,360,351 patent
`specification and the ’105 patent
`
`APPL-1023
`
`RFC2818, HTTP Over TLS (May 2000)
`
`APPL-1024
`
`https://trustedcomputinggroup.org/wp-content/uploads/TPM-
`Applications-Whitepaper.pdf
`
`6.
`
`Unless otherwise noted, all emphasis in any quoted material has been
`
`added.
`
`II. QUALIFICATIONS AND PROFESSIONAL EXPERIENCE
`
`7. My Curriculum Vitae (CV) is attached as APPL-1004. This exhibit
`
`
`
`
`8
`
`
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`also includes a list of my publications and the cases in which I have testified at
`
`deposition, hearing, or trial within the past four years.
`
`8.
`
`I earned a Ph.D. in Computer Science from the Computer Science and
`
`Engineering Department at University of Michigan, Ann Arbor in 2001. I earned a
`
`Bachelor of Science degree in Computer Science from Ohio University in 1989,
`
`and a Master of Science degree, also in Computer Science, from Ball State
`
`University in 1991.
`
`9.
`
`Since 2022, I have been Tsun-Ming Shih Professor of Computer
`
`Sciences in the School of Computer, Data and Information Sciences at the
`
`University of Wisconsin-Madison. Prior to my move to Wisconsin, I was the
`
`William L. Weiss Professor of Information and Communications Technology in
`
`the School of Electrical Engineering and Computer Science at the Pennsylvania
`
`State University in University Park, PA. I was also the director of the Institute for
`
`Network and Security Research, and founder and co-director of the Systems and
`
`Internet Infrastructure Security Laboratory, a research laboratory focused on the
`
`study of security in diverse network and computer environments. My research
`
`efforts primarily involve computer systems (including authentication), network
`
`management and authentication, systems security, and technical public policy.
`
`10. Prior to 2017 I was an Assistant Professor (2004-2007), Associate
`
`Professor (2007-2011), Full Professor (2011-2015), and Distinguished Professor
`
`
`
`
`9
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`(2016-2017) of Computer Science and Engineering and the William L. Weiss
`
`Professor of Information and Communications Technology (2017-2022) at the
`
`Pennsylvania State University. Since 2004, I have taught courses in the field of
`
`computer systems, systems programming, mobile device security, networks, and
`
`network and computer security at both the undergraduate and graduate level. I
`
`created and maintained several of these courses at Penn State and Wisconsin.
`
`11. From 2003-2009, I was also an Adjunct Professor at the Stern School
`
`of Business at New York University in New York, NY. At the Stern School of
`
`Business, I taught courses in computer and network security and online privacy.
`
`12.
`
`I am a Fellow of the Association for Computing Machinery (ACM,
`
`the leading professional association for computer science), a Fellow Institute for
`
`Electrical and Electronics Engineering (IEEE, the leading professional association
`
`for engineering), and Fellow of the American Association for the Advancement of
`
`Science (AAAS, the leading professional association for science).
`
`13.
`
`I am the director of the NSF Frontier Center for Trustworthy Machine
`
`Learning (CTML), a research organization exploring security and privacy of
`
`machine learning (and AI in general). Funded by the US National Science
`
`Foundation, the CTML is led by the University of Wisconsin-Madison and has
`
`members from Stanford, the University of California, Berkeley, The University of
`
`California-San Diego, and the University of Virginia.
`
`
`
`
`10
`
`
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`14. From 2013 to 2018 I was the Program Manager (PM) and lead
`
`
`
`scientist for the Cyber Security Collaborative Research Alliance (CRA). The CRA
`
`is led by Penn State University and includes faculty and researchers the Army
`
`Research Laboratory, Carnegie Mellon University, Indiana University, the
`
`University of California-Davis, and the University of California-Riverside. This
`
`initiative is a major research project aimed at developing a new science of cyber-
`
`security for military networks, computers, and installations.
`
`15.
`
`I regularly advise students on research projections covering aspects of
`
`computer systems security. In this role, I regularly serve as an advisor to Ph.D.
`
`and master’s degree candidates, several of whom have gone on to become
`
`professors at various institutions such as North Carolina State University, Purdue
`
`University, the University of Toronto, the University of Oregon, the Georgia
`
`Institute of Technology and the University of Florida.
`
`16. Before joining Pennsylvania State University as a professor, from
`
`1991 - 1996 I was a software developer and project manager for companies in the
`
`networking industry including Applied Innovation, Inc., and Primary Access
`
`Corporation. I was also a senior researcher at AT&T Research-Labs. As part of my
`
`duties in these industrial positions, I informed, reviewed, and formed corporate
`
`policies and practices relating to the security of mobile devices, networks, and
`
`software systems.
`
`
`
`
`11
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`17.
`
`I have published extensively in the field of authentication, mobile
`
`
`
`security, network and security management, computer systems, authentication,
`
`systems security, applied cryptography and network security. In addition to writing
`
`several articles for industry journals and conferences, I have authored portions of
`
`numerous books related to computer systems (including authentication), applied
`
`cryptography and network security. I have served on the editorial boards of several
`
`peer-reviewed journals including ACM Transactions on Internet Technology, for
`
`which I was the Editor-in-Chief. I was also an Associate Editor for ACM
`
`Transactions on Information and System Security and IEEE Transactions of
`
`Software Engineering, two highly regarded journals in the field.
`
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`18.
`
`I understand there are multiple factors relevant to determining the
`
`level of ordinary skill in the pertinent art, including (1) the levels of education and
`
`experience of persons working in the field at the time of the invention; (2) the
`
`sophistication of the technology; (3) the types of problems encountered in the field;
`
`and (4) the prior art solutions to those problems.
`
`19.
`
`I understand that the ’105 patent was filed December 15, 2020 and
`
`claims priority as a continuation in part through various applications to provisional
`
`applications filed January 17, 2012 and December 9, 2011 As I discuss below (see
`
`Section V.), the effective filing date of the claims of the ’105 patent is the actual
`
`
`
`
`12
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`filing date (December 15, 2020) of the continuation-in-part application (U.S. Appl.
`
`17/123,018) that issued as the ’105 patent. While the ’105 patent claims priority
`
`through a chain of earlier filed application, those claims of priority are unsupported
`
`due to the absence of disclosure in the documents to which priority is claimed for a
`
`“based at least in part on the first device being a same brand as a second device”
`
`limitation.
`
`20. Here, a POSITA at the time of the claimed invention would have had
`
`a bachelor’s degree in an electrical engineering, computer engineering, computer
`
`science, or a related field, and at least two years of experience in the research,
`
`design, development, and/or testing of authentication techniques, and related
`
`firmware and software, or the equivalent, with additional education substituting for
`
`experience and vice versa. A person with less formal education but more
`
`experience, or more formal education but less experience, could have also met the
`
`relevant standard for a POSITA. For purposes of this Declaration, in general, and
`
`unless otherwise noted, my statements and opinions, such as those regarding my
`
`experience and the understanding of a POSITA generally (and specifically related
`
`to the references I consulted herein), reflect the knowledge that existed in the field
`
`as of the actual filing date of the ’105 patent (i.e., December 15, 2020), but I have
`
`also considered the knowledge that existed as of the earliest possible priority date
`
`(i.e., December 9, 2011).
`
`
`
`
`13
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`21. Unless otherwise stated, when I provide my analysis below, the
`
`
`
`relevant knowledge and understanding is consistent with the that of a POSITA just
`
`prior to the earliest possible priority date of the ’105 patent—December 9, 2011—
`
`as well as that at the actual filing date of the ’105 patent—December 15, 2020.
`
`Unless specifically stated, none of my analysis relies on a greater level of POSITA
`
`knowledge or understanding as of the later date.
`
`22.
`
`I met the definition of a POSITA in 2011 and 2020. I also had a
`
`greater knowledge and experience than a POSITA. In my work discussed above,
`
`including as a professor, I worked with graduate students and others who had the
`
`knowledge and experience of a POSITA in 2011 and 2020, and I am able to render
`
`opinions from the perspective of a POSITA based on my knowledge and
`
`experience.
`
`IV. RELEVANT LEGAL STANDARDS
`
`23.
`
`I am not an attorney. In preparing and expressing my opinions and
`
`considering the subject matter of the ’105 patent, I am relying on certain basic
`
`legal principles that counsel have explained to me. These principles are discussed
`
`below.
`
`24. Obviousness: I have been informed that a claimed invention is
`
`unpatentable under 35 U.S.C. § 103 if the differences between the invention and
`
`the prior art are such that the subject matter as a whole would have been obvious at
`
`
`
`
`14
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`the time the invention was made to a person having ordinary skill in the art to
`
`which the subject matter pertains. I have also been informed by counsel that the
`
`obviousness analysis takes into account factual inquiries including the level of
`
`ordinary skill in the art, the scope and content of the prior art, and the differences
`
`between the prior art and the claimed subject matter.
`
`25.
`
`I have been informed by counsel that the Supreme Court has
`
`recognized several rationales for combining references or modifying a reference to
`
`show obviousness of claimed subject matter. Some of these rationales include the
`
`following: (a) combining prior art elements according to known methods to yield
`
`predictable results; (b) simple substitution of one known element for another to
`
`obtain predictable results; (c) use of a known technique to improve a similar device
`
`(method, or product) in the same way; (d) applying a known technique to a known
`
`device (method, or product) ready for improvement to yield predictable results; (e)
`
`choosing from a finite number of identified, predictable solutions, with a
`
`reasonable expectation of success; and (f) some teaching, suggestion, or motivation
`
`in the prior art that would have led one of ordinary skill to modify the prior art
`
`reference or to combine prior art reference teachings to arrive at the claimed
`
`invention.
`
`26.
`
`I further understand that certain factors may support or rebut the
`
`obviousness of a claim. I understand that such secondary considerations include,
`
`
`
`
`15
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`among other things, commercial success of the patented invention, skepticism of
`
`those having ordinary skill in the art at the time of invention, unexpected results of
`
`the invention, any long-felt but unsolved need in the art that was satisfied by the
`
`alleged invention, the failure of others to make the alleged invention, praise of the
`
`alleged invention by those having ordinary skill in the art, and copying of the
`
`alleged invention by others in the field. I understand that there must be a nexus—a
`
`connection—between any such secondary considerations and the alleged invention.
`
`I also understand that contemporaneous and independent invention by others is a
`
`secondary consideration tending to show obviousness.
`
`27.
`
`I am not aware of any allegations by the named inventor of the ’105
`
`patent or any assignee of the ’105 patent that any secondary considerations are
`
`relevant to the obviousness analysis of any Challenged Claim of the ’105 patent.
`
`28. Priority Date: I understand that, for any given claim of the ’105
`
`patent, prior art includes patents and printed publications in the relevant art that
`
`predate the effective filing date of that claim. I understand that, subject to the next
`
`paragraphs, the “priority date” of a patent is the earlier of: (a) the date on which a
`
`patent application that later issues as the patent is actually filed; or (b) the date on
`
`which an earlier-filed patent application is filed if the patentee properly claims the
`
`benefit of priority to the earlier-filed patent application.
`
`29.
`
`I understand that merely claiming the benefit of an earlier-filed
`
`
`
`
`16
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`application is insufficient. In particular, in order for the earlier priority date to be
`
`applicable, the prior application must describe the claimed invention, and must do
`
`so in sufficient detail that one skilled in the art can clearly conclude that the
`
`inventor had possession of the claimed invention as of the filing date sought. I am
`
`told that the priority-date analysis is on a claim-by-claim basis. I understand that
`
`in order for a patent claim of a later-filed application to be entitled to the filing date
`
`of an earlier-filed patent application, the earlier-filed patent application must meet
`
`both a written-description and an enablement requirement for that patent claim as
`
`of the filing date of the earlier-filed patent application. I also understand that this
`
`analysis may be referred to as an analysis of compliance with 35 U.S.C. § 112. I
`
`understand that it is not sufficient that the claim would have been obvious from the
`
`earlier application, rather the earlier-filed patent application itself must describe the
`
`claimed invention.
`
`30.
`
`I understand to satisfy the written description requirement the earlier-
`
`filed patent application must reasonably convey to those skilled in the art that the
`
`inventors had possession of the subject matter of sought to be claimed by the later-
`
`filed patent as of the filing date of the earlier-filed patent application. I have been
`
`informed that it is disclosures of the earlier-filed patent application that count, and
`
`that while the meaning of terms, phrases, or diagrams in the earlier-filed patent
`
`application must be interpreted from the vantage point of a POSITA, all of the
`
`
`
`
`17
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`claimed limitations must be disclosed in the manner later claimed. Further, I
`
`understand that this analysis is not a question of whether one skilled in the art
`
`might be able to construct the later-filed patent application’s claimed invention
`
`from the teachings of the disclosure or whether that claimed invention is an
`
`obvious variant of that which is actually disclosed in the specification of the
`
`earlier-filed patent application; rather, I understand that the earlier-filed patent
`
`application must itself describe each of the claim limitations expressly or
`
`inherently. I also understand that in order to satisfy the enablement requirement,
`
`the earlier application must enable a person of ordinary skill in the art to practice
`
`the claimed invention of the later-filed patent application without undue
`
`experimentation.
`
`V. OVERVIEW OF THE ’105 PATENT
`
`31. The ’105 patent is directed to an environment that includes a client
`
`device, such as a notebook computer, smartphone, or tablet, which is connected via
`
`a network such as the Internet to a service such as a website. (’105 patent) APPL-
`
`1001, 2:62-3:14. FIG. 1 the ’105 patent illustrates such an environment including
`
`client devices (102-108) connected to services (120-124).
`
`
`
`18
`
`
`
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`
`
`(’105 patent) APPL-1001, FIG. 1, annotated
`
`
`
`32. The ’105 patent describes authentication techniques to provide user
`
`credentials (e.g., a password) from a client device to a service with a goal of
`
`avoiding reliance on a user’s input of the credential, which is tedious for the user
`
`and leads to poor security practices. (’105 patent) APPL-1001, 1:43-52. The ’105
`
`patent describes users “need not type such usernames and passwords into their
`
`devices whenever required by a service. Instead, users can authenticate themselves
`
`to an ‘authentication translator’ ...and the authentication translator will provide the
`
`appropriate credentials to the implicated service on the user’s behalf.” (’105
`
`patent) APPL-1001, 3:20-26. FIG. 5 of the ’105 patent illustrates a process for
`
`
`
`
`19
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`performing this authentication translation. (’105 patent) APPL-1001, 1:66-67.
`
`(’105 patent) APPL-1001, FIG. 5
`
`
`
`33. The ’105 patent describes an example of FIG. 5 where a user, Alice,
`
`wishes to sign onto a social networking website 120. Alice is prompted by her
`
`client device, in this example her laptop, to provide biometric information using an
`
`“integrated fingerprint reader on her laptop.” (’105 patent) APPL-1001, 6:50-7:3.
`
`Alice provides her biometric information in response to the prompt. Id. A
`
`translation module such as provided in her laptop compares her provided biometric
`
`information with a template stored on the computer. (’105 patent) APPL-1001,
`
`7:3-10. If a match is found, a previously stored credential associated with the
`
`resource is provided to the resource. (’105 patent) APPL-1001, 7:11-16. These
`
`techniques for authentication translation were well-known by 2011.
`
`34.
`
`’105 Prosecution History: I have reviewed the file history of the ’105
`
`
`
`
`20
`
`
`
`APPL-1003
`
`

`

`McDaniel Declaration
`
`
`Inter Partes Review of U.S. 11,475,105
`
`
`
`patent, which I understand is attached as APPL-1002. In an office action, the
`
`Examiner rejected many of the pending claims as obvious indicating a then
`
`pending dependent claim reciting “the backup is performed in response to a
`
`determination t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket