throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`APPLE INC.,
`Petitioner
`v.
`CARBYNE BIOMETRICS, LLC,
`Patent Owner
`
`———————
`IPR2024-00333
`U.S. Patent No. 11,475,105
`_____________________
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`I. CONTENTS
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`I.
`INTRODUCTION .................................................................................... 1
`II. MANDATORY NOTICES ........................................................................ 1
`A.
`Real Party-in-Interest ............................................................................ 1
`B.
`Related Matters ...................................................................................... 1
`C.
`Lead and Back-up Counsel and Service Information ........................... 2
`III. GROUNDS FOR STANDING .................................................................. 2
`IV. THE ’105 PATENT ................................................................................... 3
`A.
`Summary of the ’105 patent .................................................................. 3
`B.
`Prosecution History ............................................................................... 4
`C.
`Effective Filing Date ............................................................................. 5
`LEVEL OF ORDINARY SKILL IN THE ART ......................................... 8
`V.
`VI. CLAIM CONSTRUCTION ...................................................................... 9
`A.
`“restricted interface” (Claims 9-11, and 28-30) .................................... 9
`VII. REQUESTED RELIEF ........................................................................... 11
`VIII. OVERVIEW OF CHALLENGES ........................................................... 11
`A.
`Challenged Claims ..............................................................................11
`B.
`Statutory Grounds for Challenges .......................................................12
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE .. 13
`A. Ground 1: Claims 1, 14, 18, 33 and 35 are obvious under 35 U.S.C.
`§103 over Kesanupalli, Cheng and Kodama. ......................................13
`1.
`Kesanupalli ................................................................................13
`2.
`Cheng ........................................................................................15
`3.
`Kodama .....................................................................................18
`4.
`Combination of Kesanupalli, Cheng and Kodama ...................19
`5.
`Claim 1 ......................................................................................23
`6.
`Claim 14 ....................................................................................43
`7.
`Claims 18 and 33.......................................................................43
`
`IX.
`
`
`
`- i -
`
`

`

`B.
`
`C.
`
`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`8.
`Claim 35 ....................................................................................45
`Ground 2: Claims 9-11 and 28-30 are obvious under 35 U.S.C.
`§103 over Kesanupalli, Cheng, Kodama and in further view of
`Challener. ............................................................................................47
`1.
`Challener ...................................................................................47
`2.
`Reasons to Combine Kesanupalli, Cheng, Kodama and
`Challener ...................................................................................49
`Claim 9 ......................................................................................52
`3.
`Claim 10 ....................................................................................56
`4.
`Claim 11 ....................................................................................57
`5.
`Claims 28-30 .............................................................................58
`6.
`Ground 3: Claims 1, 9-11, 14, 18, 28-30, 33 and 35 are obvious
`under 35 U.S.C. §103 over Jakobsson ’351 and Kodama. .................58
`1.
`Jakobsson ’351 and Kodama ....................................................58
`2.
`Reasons to Combine Jakobsson ’351 and Kodama ..................58
`3.
`Claim 1 ......................................................................................61
`4.
`Claims 9-11 ...............................................................................67
`5.
`Claim 14 ....................................................................................68
`6.
`Claims 18, 28-30 and 33 ...........................................................69
`7.
`Claim 35 ....................................................................................70
`X. DISCRETIONARY DENIAL IS NOT WARRANTED ........................... 71
`A.
`The Fintiv factors favor institution. ....................................................71
`B.
`The Board should not deny under General Plastic ..............................73
`C.
`Advanced Bionics Test Favors Institution. ..........................................73
`XI. CONCLUSION ....................................................................................... 74
`XII. CERTIFICATE OF WORD COUNT ...................................................... 75
`CERTIFICATE OF SERVICE ...................................................................... 76
`
`
`
`
`- ii -
`
`

`

`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`PETITIONER’S EXHIBIT LIST
`January 19, 2023
`
`APPL-1001 U.S. Patent No. 11,475,105 (“the ’105 patent”)
`APPL-1002
`Prosecution History of the ’105 patent
`APPL-1003 Declaration of Dr. Patrick McDaniel
`APPL-1004
`Curriculum Vitae of Dr. Patrick McDaniel
`APPL-1005
`Priority Chain Applications
`APPL-1006 U.S. Patent No. 8,799,666 (“Kesanupalli”)
`APPL-1007 U.S. Patent No. 8,099,789 (“Challener”)
`APPL-1008 U.S. Patent Publication No. 2004/0117636 (“Cheng”)
`APPL-1009 U.S. Patent No. 9,652,629 (“Brown”)
`APPL-1010
`European Patent Application EP 2 079 023 A2 (“Kodama”)
`APPL-1011 U.S. Patent 10,360,351 (“Jakobsson ’351”)
`APPL-1012
`Patrick McDaniel, Authentication, Handbook of Computer
`Networks, Volume 3, Part 2, pp. 570-580, John Wiley and
`Sons, 2008. Ed. Hossein Bidgoli.
`IBM Introducing Fingerprint Reader Into Laptop. Jack
`Germain. 2004 at https://www.technewsworld.com/story/ibm-
`introducing-fingerprint-reader-into-laptop-37017.html
`APPL-1014 U.S. Patent Publication 2008/0059804 to Shah et al.
`APPL-1015 Kerberos: An Authentication Service for Computer Networks.
`B. Clifford Neuman et al. 1994 at
`https://gost.isi.edu/publications/kerberos-neuman-tso.html
`ISO/IEC 11889-1:2009 Information technology Trusted
`Platform Module Part 1: Overview at
`https://www.iso.org/standard/50970.html
`TPM Main Part 3 Commands Specification Version 1.2 1
`March 2011 at https://trustedcomputinggroup.org/wp-
`content/uploads/TPM-Main-Part-3-
`Commands_v1.2_rev116_01032011.pdf
`RESERVED
`
`APPL-1018
`
`
`
`- iii -
`
`APPL-1013
`
`APPL-1016
`
`APPL-1017
`
`

`

`
`
`
`
`
`APPL-1021
`
`APPL-1023
`APPL-1024
`
`APPL-1025
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`Computer Dictionary, Second Edition, entry “record” (1994)
`APPL-1019
`APPL-1020 How to Restore Your Data After a Hard Drive Crash, Glenn
`Derene, Aug 4, 2011 at
`https://www.popularmechanics.com/technology/gadgets/how-
`to/a6819/how-to-restore-your-data-after-a-hard-drive-crash/
`Redline comparison of U.S. Patent No. 10,360,351 patent
`specification and the ’105 patent.
`APPL-1022 U.S. Patent Application No. 2008/0104416 to Challener et al.
`(“Challener’s PG-PUB”)
`RFC2818, HTTP Over TLS (May 2000)
`https://trustedcomputinggroup.org/wp-content/uploads/TPM-
`Applications-Whitepaper.pdf (retrieved Jan. 2, 2024)
`Interim Procedure for Discretionary Denials in AIA Post-
`Grant Proceedings with Parallel District Court Litigation,
`(June 21, 2022) (“Director Memo)
`Preliminary Constructions, Carbyne Biometrics v. Apple Inc.,
`WDTX-1:23-cv-00324 (December 11, 2023)
`
`APPL-1026
`
`APPL-1027 United States District Courts—National Judicial Caseload
`Profile (September 30, 2023),
`https://www.uscourts.gov/statistics/table/na/federal-court-
`management-statistics/2023/09/30 (retrieved Dec. 14, 2023)
`Scheduling Order, Carbyne Biometrics, LLC v. Apple Inc.,
`WDTX-1:23-cv-00324 (July 14, 2023)
`
`APPL-1028
`
`APPL-1029
`
`Plaintiff Carbyne Biometrics, LLC’s Preliminary Infringement
`Contentions, Carbyne Biometrics v. Apple, Inc., 1:23-cv-
`00324 (June 21, 2023)
`
`
`
`
`- iv -
`
`

`

`
`
`
`I.
`
`
`
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`INTRODUCTION
`U.S. Patent No. 11,475,105 (the “’105 patent”) relates to “Authentication
`
`Translation” where a request to access a resource and an authentication input is
`
`received, and in response, “a previously stored credential associated with the
`
`resource is accessed” and provided to the resource. APPL-1001, Title, Abstract.
`
`Apple Inc. (“Petitioner” or “Apple”) respectfully requests the Board review and
`
`cancel as unpatentable under 35 U.S.C. §103(a) claims 1, 9-11, 14, 18, 28-30, 33,
`
`and 35 (“Challenged Claims”) of the ’105 patent.
`
`II. MANDATORY NOTICES
`A. Real Party-in-Interest
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies that the real party-in-
`
`interest is Apple Inc.
`
`B. Related Matters
`Pursuant to 37 C.F.R. §42.8(b)(2), the ’105 patent is or was involved in the
`
`following matters, which may affect, or be affected by, this proceeding:
`
`• Carbyne Biometrics, LLC v. Apple Inc., 1:23-cv-00324 (WDTX), filed
`
`March 24, 2023 (Pending) (“Parallel District Court Proceeding”)
`
`Apple is not aware of any disclaimers, reexamination certificates or other IPR
`
`petitions addressing the ’105 patent; however, the following matter involved a
`
`related application and may affect this proceeding:
`
`
`
`- 1 -
`
`

`

`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`• Samsung Electronics Co., Ltd. et al v. RightQuestion, LLC, IPR2022-
`
`00244 (PTAB), filed December 1, 2021 (terminated July 26, 2022)
`
`(“Samsung ’696 Patent IPR”)
`
`C. Lead and Back-up Counsel and Service Information
`Lead Counsel
`
`David W. O’Brien
`Phone: (512) 867-8457
`HAYNES AND BOONE, LLP
`Fax: (214) 200-0853
`2801 N. Harwood St. Suite 2300
`david.obrien.ipr@haynesboone.com
`Dallas, TX 75201
`USPTO Reg. No. 40,107
`
`
`Back-up Counsel
`
`Phone: (512) 867-8528
`Kelly Gehrke Lyle
`Fax: (214) 200-0853
`HAYNES AND BOONE, LLP
`kelly.lyle.ipr@haynesboone.com
`2801 N. Harwood St. Suite 2300
`Dallas, TX 75201
`USPTO Reg. No. 62,332
`
`
`Hong Shi
`Phone: (512) 867-8440
`Fax: (214) 200-0853
`HAYNES AND BOONE, LLP
`hong.shi.ipr@haynesboone.com
`2801 N. Harwood St. Suite 2300
`USPTO Reg. No. 69,009
`Dallas, TX 75201
`
`Please address all correspondence to lead and back-up counsel. Petitioner
`
`consents to electronic service and asks Patent Owner to do the same.
`
`III. GROUNDS FOR STANDING
`Petitioner certifies that the ’105 patent is eligible for IPR, and that Petitioner
`
`is not barred or estopped from requesting IPR challenging the patent claims. 37
`
`C.F.R. § 42.104(a).
`
`
`
`- 2 -
`
`

`

`
`
`IV. THE ’105 PATENT
`Summary of the ’105 patent
`A.
`The ’105 patent is directed to an environment including a client device, such
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`
`
`
`as a notebook computer or tablet, which is connected via a network to a service
`
`such as a website. APPL-1001, 2:62-3:14. FIG. 1 is illustrative:
`
`APPL-1001, FIG. 1, annotated
`
`
`
`The ’105 patent describes authentication techniques to provide user
`
`credentials (e.g., a password) from a client device to a service with a goal of
`
`avoiding reliance on a user’s input of the credential, which is tedious for the user
`
`and leads to poor security practices. APPL-1001, 1:43-52. The ’105 patent
`
`
`
`- 3 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`describes users “need not type such usernames and passwords into their devices
`
`whenever required by a service. Instead, users can authenticate themselves to an
`
`‘authentication translator’...and the authentication translator will provide the
`
`appropriate credentials to the implicated service on the user’s behalf.” APPL-
`
`1001, 3:20-26. FIG. 5 illustrates this authentication translation. APPL-1001, 1:66-
`
`67.
`
`APPL-1001, FIG. 5
`
`
`
`However, these techniques for authentication translation and the systems
`
`performing them were well-known at the time of the claimed invention. APPL-
`
`1003, ¶¶31-35.
`
`Prosecution History
`B.
`The Office rejected all claims as obvious but indicated that then-pending
`
`claim 16 reciting “the backup is performed in response to a determination that the
`- 4 -
`
`
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`first device is of a same brand as the second device” was allowable. APPL-1002,
`
`89-104 (Office Action dated 01-28-2022). The Office also rejected the claims on
`
`obviousness-type double-patenting grounds over various patents including U.S.
`
`Patent 10,360,351 (“Jakobsson ’351”). APPL-1002, 88-89. In a response with
`
`accompanying Terminal Disclaimer, Applicant amended each of its independent
`
`claims to require initiating backup to a second device is “based at least in part on
`
`the first device being a same brand as a second device.” APPL-1002, 69-70, 76-
`
`79. This also was well-known by the earliest claimed invention date. APPL-1003,
`
`¶¶34-35.
`
`C. Effective Filing Date
`The ’105 Patent issued on a continuation-in-part (CIP) application (US
`
`Application 17/123,018 (“the ’018 App”)) filed December 15, 2020. APPL-1001,
`
`(22), (63); see also APPL-1002, 353-54 (ADS-Domestic Benefit), 397. The ’018
`
`App claims priority as a CIP to U.S. Application 17/027,481, which claims priority
`
`through a chain of five (5) continuation applications originating with US
`
`Application 13/706,254 (“the pre-AIA ’254 App”), filed December 5, 2012. Id.
`
`Applicable Law: Because the ’018 App was filed after March 16, 2013, but
`
`purports to claim benefit of a filing date before March 16, 2013, it is a “transition
`
`application.” The America Invents Act provides that its amendment of 35 U.S.C.
`
`§§102, 103 applies to “any application for patent, and to any patent issuing
`
`
`
`- 5 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`thereon, that contains or contained at any time—(A) a claim to a claimed invention
`
`that has an effective filing date as defined in Section 100(i) of title 35, United
`
`States Code, that is [after March 15, 2013].” AIA §3(n)(1).
`
`Here, the ’018 App contained (on filing) dependent claim 16, which
`
`contained the language “the backup is performed in response to a determination
`
`that the first device is of the same brand as the second device.” APPL-1002, 417.
`
`As confirmed by Dr. McDaniel, no disclosure exists in any application to which
`
`the ’018 App claims priority—including the pre-AIA ’254 App—that provides
`
`written description support for a backup being performed in response to a
`
`determination that the first device is of the same brand as the second device.
`
`APPL-1003, ¶¶36-41. Accordingly, AIA §3(n)(1) dictates the ’105 patent be
`
`evaluated under post-AIA §§102, 103.
`
`Effective Filing Date: The claims are only entitled to the actual filing date of
`
`the ’018 App where description of the initiating a backup based at least in part on a
`
`first device being a same brand as a second device (a limitation of each claim) was
`
`first presented.
`
` APPL-1003, ¶¶36-41; APPL-1021 (redline ’105 patent
`
`specification and U.S. Patent 10,360,351 specification). For a claim in a later-filed
`
`application to be entitled to the filing date of an earlier application, the earlier
`
`application must provide written description support for the claimed subject matter.
`
`Anascape, Ltd. v. Nintendo of Am. Inc., 601 F.3d 1333, 1337 (Fed. Cir. 2010). The
`
`
`
`- 6 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`written description requirement “guards against the inventor’s overreaching by
`
`insisting that he recount his invention in such detail that his [or her] future claims
`
`can be determined to be encompassed within his original creation.” Vas-Cath Inc.
`
`v. Mahurkar, 935 F.2d 1555, 1561 (Fed. Cir. 1991). To satisfy the written
`
`description requirement, “the disclosure of the earlier application, the parent, must
`
`reasonably convey to one of skill in the art that the inventor possessed the later-
`
`claimed subject matter at the time the parent application was filed.” Tronzo v.
`
`Biomet, Inc., 156 F.3d 1154, 1158 (Fed. Cir. 1998).
`
`As confirmed by Dr. McDaniel, no written description exists in any
`
`application to which the ’018 App claims priority for initiating backup to a second
`
`device based at least in part on the first device being a same brand as a second
`
`device. APPL-1003, ¶¶36-41. To the extent passages of the ’018 App discuss the
`
`term “brand” (i.e., those portions corresponding to 13:28-33 and/or 19:29-35 of the
`
`’105 patent), these passages are not found in any application to which the ’018 App
`
`claims priority. APPL-1003, ¶¶39-41. These passages fall under a heading
`
`“ADDITIONAL EMBODIMENTS.” APPL-1001, 11:30; APPL-1002, 18. This
`
`heading begins a portion of the ’018 App’s specification that spans pages
`
`numbered 18 to 36; in contrast, the originally filed specification of the U.S.
`
`Application 17/027,481 of which the ’018 App is a CIP, does not include this
`
`heading and begins its claim recitation at its page 17. APPL-1002, 395-414;
`
`
`
`- 7 -
`
`

`

`
`
`APPL-1005, 38.
`
`
`
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`Accordingly, the effective filing date of each of the claims of the ’105 patent
`
`is no earlier than December 15, 2020. For avoidance of doubt, only Ground 3
`
`depends on this priority analysis.
`
`V. LEVEL OF ORDINARY SKILL IN THE ART
`The level of ordinary skill in the art may be reflected by the prior art of
`
`record. See Okajima v. Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001). Here,
`
`Persons of Ordinary Skill in the Art (“POSITA”) at the time of the claimed
`
`invention 1 would have had a bachelor’s degree in an electrical engineering,
`
`computer engineering, computer science, or a related field, and at least two years
`
`of experience in the research, design, development, and/or testing of authentication
`
`techniques, and related firmware and software, or the equivalent, with additional
`
`education substituting for experience and vice versa. APPL-1003, ¶¶18-22.
`
`Furthermore, a person with less formal education but more experience, or more
`
`formal education but less experience, could have also met the relevant standard for
`
`POSITA. Id. However, Petitioner does not imply a person having an
`
`extraordinary level of skill should be regarded as POSITA.
`
`
`
`1 This discussion applies to POSITA both at the earliest claimed priority date
`
`(2011) and at the filing date of the ’105 patent (2020).
`
`
`
`- 8 -
`
`

`

`
`
`VI. CLAIM CONSTRUCTION
`During IPR, claims are construed according to the standard as set forth in
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`
`
`
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). 37 C.F.R.
`
`§42.100(b) (Nov. 13, 2018). The claims are construed to the extent necessary to
`
`resolve the underlying controversy. Nidec Motor Corp. v. Zhongshan Broad
`
`Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017). Petitioner submits for
`
`purposes of this proceeding, and as set forth below, terms of the challenged claims
`
`should be given their plain and ordinary meaning. Phillips, 415 F.3d at 1314-17;
`
`APPL-1003, ¶¶62-64.
`
`“restricted interface” (Claims 9-11 and 28-30)
`A.
`A “restricted interface” is an interface that limits accessibility. APPL-1003,
`
`¶¶63-64. As described above (see Section IV.C.), the ’105 patent issued on a CIP
`
`application that adds description beyond that appearing in the applications to which
`
`it claims priority including new disclosure providing examples of a “restricted
`
`interface.” See APPL-1001, 11:30-24:39 (“Additional Embodiments”).
`
`Turning first to the original disclosure, the ’105 patent (like US 11,514,138,
`
`to which the ’105 patent claims priority as a CIP, and its parent US 10,929,512)
`
`describes an example device including “a fast processor 304, and a smaller but
`
`secure storage 306 attached to a dedicated processor 308 and a sensor 310 (e.g., a
`
`camera or a fingerprint reader),” the specification refers to access limitations in the
`
`
`
`- 9 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`device in connection with an application programming interface (API). APPL-
`
`1001, 4:29-33 (“users cannot access the secure storage area, and the fast processor
`
`can only communicate with the dedicated processor/sensor via a restricted API”).
`
`Thus, POSITA would understand restricted interface to at least include an API that
`
`limits accessibility to secure storage, a fingerprint sensor, or dedicated processor.
`
`APPL-1003, ¶63.
`
`In addition to this originally described form of restricted interface, the ’105
`
`patent adds examples including “dedicated physical connection from a processor
`
`permitted to access the secure storage,” such as “a bus” or secure storage
`
`“integrated with the processor” such as “a SoC (System on a Chip)” as well as
`
`forms of “an API (Application Programming Interface)” having
`
`limited
`
`accessibility. APPL-1001, 18:45-61 (added description in CIP).
`
`In the Parallel District Court Proceeding and without differentiating between
`
`patents, Patent Owner proposed (and the court issued a preliminary construction)
`
`that the term restricted interface is to be understood in accord with plain and
`
`ordinary meaning. APPL-1026, 1. Nonetheless, Petitioner is mindful that, in
`
`review of a related patent, the term restricted interface was central to a non-
`
`institution decision that found another petitioner and its expert failed to explain
`
`how prior art teachings disclosed a “restricted interface” in part because no express
`
`construction was offered. See IPR2022-00251, Paper 17, 23, 25 (PTAB 2002).
`
`
`
`- 10 -
`
`

`

`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`Plain and ordinary meaning of “restricted interface” is an interface that
`
`limits accessibility. Petitioner also demonstrates in the following analysis that the
`
`prior art renders obvious a restricted interface including configurations explicitly
`
`described in the ’105 patent in hardware and API examples that limit accessibility
`
`to secure storage, a fingerprint sensor or a dedicated physical connection, which is
`
`included within the meaning of the term regardless of how it is construed.
`
`VII. REQUESTED RELIEF
`Petitioner asks the Board to institute trial and cancel the Challenged Claims.
`
`VIII. OVERVIEW OF CHALLENGES
`A. Challenged Claims
`Claims 1, 9-11, 14, 18, 28-30, 33 and 35 (“Challenged Claims”) of the ’105
`
`patent are challenged.
`
`
`
`- 11 -
`
`

`

`
`
`
`B.
`Grounds
`#1
`#2
`
`
`
`Statutory Grounds2 for Challenges
`Claim(s)
`1, 14, 18, 33, 35
`9-11, 28-30
`
`#3
`
`1, 9-11, 14, 18, 28-30,
`33, 35
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`Basis
`§103 over Kesanupalli, Cheng and Kodama
`§103 over Kesanupalli, Cheng and Kodama in
`further view of Challener
`§103 over Jakobsson ’351 and Kodama
`
`Kesanupalli was filed March 24, 2010, published April 7, 2011, and issued
`
`August 5, 2014. Challener was filed September 29, 2006, published May 1, 2008
`
`(APPL-1022), and issued January 17, 2012. Cheng was filed September 24, 2003
`
`and published June 17, 2004. Kodama published July 15, 2009. Kesanupalli and
`
`Challener are prior art under at least §102(a)(2); Cheng and Kodama are prior art
`
`under at least §102(a)(1).
`
`
`
`2 As demonstrated above, the ’105 patent is an AIA patent. See supra, Section
`
`VII.C; AIA § 3(n)(1). Were Patent Owner to contest that, it would be understood
`
`that Kesanupalli also qualifies as prior art under pre-AIA §§102(a), (e), Challener
`
`(or Challener’s PG-PUB) also qualifies under pre-AIA §§102(a), (b), (e), and that
`
`Cheng and Kodama also qualify under pre-AIA §102(b).
`
`
`
`- 12 -
`
`

`

`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`Jakobsson ‘351 issued July 23, 2019 and qualifies as prior art under at least
`
`§102(a)(1). Only Ground 3 depends on the priority date of the Challenged Claims.
`
`See APPL-1003, ¶¶65-69.
`
`IX.
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`A. Ground 1: Claims 1, 14, 18, 33 and 35 are obvious under 35
`U.S.C. §103 over Kesanupalli, Cheng and Kodama.
`1. Kesanupalli
`Kesanupalli is entitled “Secure User Authentication Using Biometric
`
`Information” and is directed to a secure authentication system using biometric
`
`information to “provide[] a more secure authentication of the user than commonly
`
`used password-based methods and systems.” APPL-1006, (54), 1:59-62. See
`
`APPL-1003, ¶¶70-75. Based on a match between a fingerprint template stored for
`
`a particular user and fingerprint information read from a finger presented at a
`
`fingerprint reader, Kesanupalli’s methods retrieve credentials associated with the
`
`user and communicate those credentials to an external system or process. APPL-
`
`1006, FIGS. 8-9, 3:14-4:11.
`
`During an enrollment process with a resource such as a website, “a user
`
`swipes [or places] their finger [on] a fingerprint sensor several times to create [the]
`
`fingerprint template. The fingerprint template allows the user’s fingerprint to be
`
`distinguished from fingerprints associated with other users.” APPL-1006, 3:33-41.
`
`The user (or system) also “provides user credentials, such as a password,
`
`
`
`- 13 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`cryptographic key…or the like,” and the systems and methods described in
`
`Kesanupalli “bind the user’s fingerprint template with the user credentials.”
`
`APPL-1006, 3:15-18, 3:41-46. To protect user credentials, “[t]he fingerprint
`
`template and user credentials are then stored in a secure storage of the user’s
`
`device.” APPL-1006, 3:46-47, see also, APPL-1006, 8:29-53.
`
`During a subsequent user identification or verification for the website, a user
`
`presents her biometric information (e.g., places a finger on a fingerprint sensor)
`
`and if the presented fingerprint “matches a fingerprint template, the user’s
`
`credentials are released to the user and/or [the] service or process requesting the
`
`user verification.” APPL-1006, 3:52-61. “[T]he user credentials released after
`
`finding a matching fingerprint template may include an OTP (One Time Password)
`
`token, RSA signature and the like,” such as a “cryptographic key.” APPL-1006,
`
`3:41-44, 3:65-4:1, FIG. 12.
`
`FIG. 9 of Kesanupalli illustrates these steps of authenticating a user in the
`
`context of an embodiment in which user credentials are cryptographically secured
`
`in storage. FIG. 2 illustrates an example system 200 in which user enrollment and
`
`authentication processes are performed using a biometric sensor 204, secure
`
`storage 206 and a Host PC 202. APPL-1006, 6:26-49, 9:10-24.
`
`
`
`- 14 -
`
`

`

`
`
`
`
`
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`
`
`APPL-1006, FIGS. 9 and 2
`
`In an authentication process, sensor 204 receives a biometric input from a user and
`
`releases the user’s credentials from secure storage 206 upon a successful match of
`
`the input with the user’s stored biometric template. APPL-1006, 6:31-45. The
`
`released credentials are then communicated to the external resource by an
`
`application 214 of the Host PC 202. APPL-1006, 5:9-58, 6:11-31.
`
`2. Cheng
`Cheng is entitled “System, Method and Apparatus for Secure Two-Tier
`
`Backup and Retrieval of Authentication Information” and provides ways to
`
`“securely backup and restore” a user’s authentication-based device without
`
`compromising the security thereof. APPL-1008, (54), Abstract.
`
`
`
`- 15 -
`
`

`

`
`
`
`IPR2024-00333 Petition
`
`U.S. Patent No. 11,475,105
`
`Cheng recognizes because “[b]iometrics-based authentication” is commonly
`
`implemented portable devices
`
`include “user’s authentication
`
`information,
`
`electronic identity and any data associated therewith.” APPL-1008, [0004],
`
`[0006]. Cheng securely backs-up this data to avoid costs of creating the data on
`
`new device from scratch should a first device containing the data be lost or stolen.
`
`See APPL-1008, Abstract, [0006]. An exemplary backup process is illustrated in
`
`Cheng’s FIGS. 3A-3B where a backup of a first user’s device data is performed
`
`through secure communication between a user service bureau (a storage service)
`
`and the device. APPL-1008, [0029]-[0030]. Cheng’s backup process includes a
`
`two-tier encryption procedure. APPL-1008, [0031]-[0039].
`
`
`
`- 16 -
`
`

`

`
`
`
`
`
`
`IPR2024-00333 Petition
`U.S. Patent No. 11,475,105
`
`APPL-1008, FIG. 3A – 3B (portion), annotated
`
`
`
`
`
`- 17 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`See APPL-1003, ¶¶76-79. Cheng describes a use case of a user’s first device,
`
`having been backed up, becoming unavailable. A second device connects to the
`
`user service to download the data. APPL-1008, [0044]–[0050], FIGS. 4A-4C.
`
`3. Kodama
`Kodama is also directed to backing up data in an electronic device. APPL-
`
`1010, (57), [0040], [0041]. While Kodama centers around examples applying to a
`
`hard disk device (HDD), Kodama explains that its teachings are “not limited to an
`
`HDD recorder” and “can be applied to any electronic appliance such as a mobile
`
`phone, a PDA or a PC” and “there is no particular limitation in the backup target
`
`data upon applying the present invention.” APPL-1010, [0040], [0041].
`
`Like Cheng, Kodama teaches registering a first device with a backup service
`
`(storage). APPL-1010, [0101]. Kodama’s registration includes providing “device
`
`information including the manufacturer name.” Id. Kodama continues to describe
`
`sending data of the registered first device to the backup service. See APPL-1010,
`
`[0106]–[0107].
`
`Kodama explains previously stored data of the backup service is restored
`
`onto another device (e.g., a “new” device) and to start the restoration process
`
`“device information including the manufacturer name” of the second device is sent
`
`to the backup service system. APPL-1010, [0135]–[0136]. The backup service
`
`system verifies this new device information–including the manufacturer name–
`
`
`
`- 18 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`coincides with the first device before permitting the backup of data to the new
`
`device. See APPL-1010, [0137-[0144]. See also, APPL-1003, ¶¶80-82.
`
`4. Combination of Kesanupalli, Cheng and Kodama
`POSITA would have been motivated to apply Cheng’s data backup
`
`teachings to Kesanupalli’s device including biometric information and credentials
`
`for user authentication. APPL-1003, ¶¶83-92. Kesanupalli’s device and its stored
`
`biometric information and credentials, which are a user’s personal data, combined
`
`with Cheng’s data backup teachings would produce obvious, beneficial, and
`
`predictable results of reducing the need to recreate the user’s personal data when
`
`using a new device (e.g., a device replacing one having been lost or stolen). Id.
`
`POSITA would have been further motivated to apply Kodama’s teachings of
`
`ensuring devices implementing the backup are the same brand, which provides the
`
`obvious, beneficial, and predictable result of mitigating compatibility and security
`
`issues. Id.
`
`Kesanupalli, Cheng, Kodama and the ’105 patent, are all in the same field
`
`of endeavor—security arrangements and procedures for protecting data in
`
`computer systems. APPL-1003, ¶85; see, e.g., APPL-1006, 30-38 (“[S]ystems and
`
`methods described herein relate to biometric authentication of users…biometric
`
`information provides an additional level of security when used in systems and
`
`procedures related to authentication of a user.”), 2:48-50 (“client device, such as a
`
`
`
`- 19 -
`
`

`

`IPR2024-00333 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`computer, cellular phone, and so forth”); APPL-1008, [0003], [0004] (“computers,
`
`electronics, communications, networks, and the Internet, access control in general
`
`and network security in particular have come increasingly important…To satisfy
`
`different security needs, various authentication systems, methods, and devices exist
`
`today and new ones

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket