throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`_______________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`_____________
`
`
`APPLE INC.,
`Petitioner
`v.
`CARBYNE BIOMETRICS, LLC,
`Patent Owner
`
`———————
`IPR2024-00507
`U.S. Patent No. 11,475,105
`_____________________
`
`PETITION FOR INTER PARTES REVIEW
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`I. CONTENTS
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`I.
`INTRODUCTION .................................................................................... 1
`II. MANDATORY NOTICES ........................................................................ 1
`A.
`Real Party-in-Interest ............................................................................ 1
`B.
`Related Matters ...................................................................................... 1
`C.
`Lead and Back-up Counsel and Service Information ........................... 2
`III. GROUNDS FOR STANDING .................................................................. 2
`IV. THE ’105 PATENT ................................................................................... 3
`A.
`Summary of the ’105 patent .................................................................. 3
`B.
`Prosecution History ............................................................................... 4
`C.
`Effective Filing Date ............................................................................. 5
`LEVEL OF ORDINARY SKILL IN THE ART ......................................... 8
`V.
`VI. CLAIM CONSTRUCTION ...................................................................... 8
`VII. REQUESTED RELIEF ............................................................................. 9
`VIII. OVERVIEW OF CHALLENGES ............................................................. 9
`A.
`Challenged Claims ................................................................................ 9
`B.
`Statutory Grounds for Challenges .......................................................10
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE .. 11
`A. Ground 1: Claims 2, 4, 12, 15, 21, 23, 31, and 34 are obvious
`under 35 U.S.C. §103 over Kesanupalli, Cheng and Kodama. ...........11
`1.
`Kesanupalli ................................................................................11
`2.
`Cheng ........................................................................................13
`3.
`Kodama .....................................................................................16
`4.
`Combination of Kesanupalli, Cheng and Kodama ...................16
`5.
`Independent Claim 1 (base claim to challenged claims) ..........20
`6.
`Claim 2 ......................................................................................35
`7.
`Claim 4 ......................................................................................36
`8.
`Claim 12 ....................................................................................37
`
`IX.
`
`
`
`- i -
`
`

`

`
`
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`9.
`Claim 15 ....................................................................................38
`10. Claims 21, 23, 31 and 34 ..........................................................40
`Ground 2: Claims 5, 6, 24 and 25 are obvious under 35 U.S.C.
`§103 over Kesanupalli, Cheng, Kodama and Hubner. ........................42
`1.
`Hubner .......................................................................................42
`2.
`Combination of Kesanupalli, Cheng, Kodama and Hubner .....44
`3.
`Claim 5 ......................................................................................49
`4.
`Claim 6 ......................................................................................52
`5.
`Claims 24 and 25.......................................................................55
`Ground 3: Claims 2, 4, 12, 15, 21, 23, 31, and 34 are obvious
`under 35 U.S.C. §103 over Jakobsson ’351 and Kodama. .................55
`1.
`Jakobsson ’351 and Kodama ....................................................55
`2.
`Reasons to Combine Jakobsson ’351 and Kodama ..................55
`3.
`Independent Claim 1 (base claim to challenged claims) ..........57
`4.
`Claim 2 ......................................................................................63
`5.
`Claim 4 ......................................................................................64
`6.
`Claim 12 ....................................................................................64
`7.
`Claim 15 ....................................................................................65
`8.
`Claims 21, 23, 31, 34 ................................................................66
`D. Ground 4: Claims 5-6 and 24-25 are obvious under 35 U.S.C. §103
`over Jakobsson ’351, Kodama and Hubner.........................................67
`1.
`Hubner .......................................................................................67
`2.
`Combination of Jakobsson ’351, Kodama and Hubner ............67
`3.
`Claim 5 ......................................................................................72
`4.
`Claim 6 ......................................................................................72
`5.
`Claims 24-25 .............................................................................73
`X. DISCRETIONARY DENIAL IS NOT WARRANTED ........................... 73
`A.
`The Fintiv factors favor institution. ....................................................74
`B.
`The Board should not deny under General Plastic ..............................76
`
`B.
`
`C.
`
`
`
`- ii -
`
`

`

`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`C.
`Advanced Bionics Test Favors Institution. ..........................................76
`XI. CONCLUSION ....................................................................................... 77
`XII. CERTIFICATE OF WORD COUNT ...................................................... 78
`CERTIFICATE OF SERVICE ...................................................................... 79
`
`
`
`
`
`
`- iii -
`
`

`

`
`
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`PETITIONER’S EXHIBIT LIST
`January 31, 2024
`
`APPL-1001 U.S. Patent No. 11,475,105 (“the ’105 patent”)
`APPL-1002
`Prosecution History of the ’105 patent
`APPL-1003 Declaration of Dr. Patrick McDaniel
`APPL-1004
`Curriculum Vitae of Dr. Patrick McDaniel
`APPL-1005
`Priority Chain Applications
`APPL-1006 U.S. Patent No. 8,799,666 (“Kesanupalli”)
`APPL-1007 U.S. Patent No. 8,099,789 (“Challener”)
`APPL-1008 U.S. Patent Publication No. 2004/0117636 (“Cheng”)
`APPL-1009 U.S. Patent No. 9,652,629 (“Brown”)
`APPL-1010
`European Patent Application EP 2 079 023 A2 (“Kodama”)
`APPL-1011 U.S. Patent 10,360,351 (“Jakobsson ’351”)
`APPL-1012
`Patrick McDaniel, Authentication, Handbook of Computer
`Networks, Volume 3, Part 2, pp. 570-580, John Wiley and
`Sons, 2008. Ed. Hossein Bidgoli
`IBM Introducing Fingerprint Reader Into Laptop. Jack
`Germain. 2004 at https://www.technewsworld.com/story/ibm-
`introducing-fingerprint-reader-into-laptop-37017.html
`APPL-1014 U.S. Patent Publication 2008/0059804 to Shah et al.
`APPL-1015 Kerberos: An Authentication Service for Computer Networks.
`B. Clifford Neuman et al. 1994 at
`https://gost.isi.edu/publications/kerberos-neuman-tso.html
`ISO/IEC 11889-1:2009 Information technology Trusted
`Platform Module Part 1: Overview at
`https://www.iso.org/standard/50970.html
`TPM Main Part 3 Commands Specification Version 1.2 1
`March 2011 at https://trustedcomputinggroup.org/wp-
`content/uploads/TPM-Main-Part-3-
`Commands_v1.2_rev116_01032011.pdf
`RESERVED
`
`APPL-1018
`
`
`
`- iv -
`
`APPL-1013
`
`APPL-1016
`
`APPL-1017
`
`

`

`
`
`
`
`
`
`APPL-1021
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`Computer Dictionary, Second Edition, entry “record” (1994)
`APPL-1019
`APPL-1020 How to Restore Your Data After a Hard Drive Crash, Glenn
`Derene, Aug 4, 2011 at
`https://www.popularmechanics.com/technology/gadgets/how-
`to/a6819/how-to-restore-your-data-after-a-hard-drive-crash/
`Redline comparison of U.S. Patent No. 10,360,351 patent
`specification and the ’105 patent.
`Reserved
`RFC2818, HTTP Over TLS (May 2000)
`https://trustedcomputinggroup.org/wp-content/uploads/TPM-
`Applications-Whitepaper.pdf (retrieved Jan. 2, 2024)
`Interim Procedure for Discretionary Denials in AIA Post-
`Grant Proceedings with Parallel District Court Litigation,
`(June 21, 2022) (“Director Memo)
`Preliminary Constructions, Carbyne Biometrics v. Apple Inc.,
`WDTX-1:23-cv-00324 (December 11, 2023)
`
`APPL-1022
`APPL-1023
`APPL-1024
`
`APPL-1025
`
`APPL-1026
`
`APPL-1027 United States District Courts—National Judicial Caseload
`Profile (September 30, 2023),
`https://www.uscourts.gov/statistics/table/na/federal-court-
`management-statistics/2023/09/30 (retrieved Dec. 14, 2023)
`Scheduling Order, Carbyne Biometrics, LLC v. Apple Inc.,
`WDTX-1:23-cv-00324 (July 14, 2023)
`
`APPL-1028
`
`APPL-1029
`
`Plaintiff Carbyne Biometrics, LLC’s Preliminary Infringement
`Contentions, Carbyne Biometrics v. Apple, Inc., 1:23-cv-
`00324 (June 21, 2023)
`APPL-1030 U.S. Patent Application No. 2012/0150808 to Hubner et al.
`filed December 13, 2010 and published June 14, 2012
`(“Hubner”)
`(https://www.ietf.org/rfc/rfc2246.txt),
`The TLS Protocol
`January 1999 (retrieved January 30, 2024)
`
`APPL-1031
`
`APPL-1032
`
`
`
`The Secure Sockets Layer (SSL) Protocol Version 3.0
`(https://datatracker.ietf.org/doc/html/rfc6101), August 2011
`(retrieved January 30, 2024)
`- v -
`
`

`

`APPL-1034
`
`APPL-1035
`
`APPL-1037
`
`APPL-1033
`
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`The Kerberos Network Authentication Service
`(VS)
`(https://www.ietf.org/rfc/rfc4120.txt), July 2005
`(retrieved January 30, 2024)
`Tseitlin, Ariel, “Embracing Failure to Improve Resilience and
`Maximize Availability”, acmqueue The Antifragile
`Organization
`Batten et al., “pStore: A Secure Peer-to-Peer Backup System,”
`https://dspace.mit.edu/handle/1721.1/149321?show=full,
`October, 2002
`
`APPL-1036 Varshavsky et al., “Amigo: Proximity-Based Authentication of
`Mobile Devices,” UbiComp 2007, LNCS 4714, pp. 253-270,
`2007
`Chervenak, Ann & Vellanki, Vivekanand & Kurmas, Zack.
`(1998). Protecting File Systems: A Survey of Backup
`Techniques
`APPL-1038 Guide to Bluetooth Security: Recommendations of the
`National Institute of Standards and Technology, National
`Institute of Standards and Technology, Sept. 2008
`
`
`
`
`
`
`
`
`- vi -
`
`

`

`
`
`
`I.
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`INTRODUCTION
`U.S. Patent No. 11,475,105 (the “’105 patent”) relates to “Authentication
`
`Translation” where a request to access a resource and an authentication input is
`
`received, and in response, “a previously stored credential associated with the
`
`resource is accessed” and provided to the resource. APPL-1001, Title, Abstract.
`
`Apple Inc. (“Petitioner” or “Apple”) respectfully requests the Board review and
`
`cancel as unpatentable claims 2, 4-6, 12, 15, 21, 23-25, 31, and 34 (“Challenged
`
`Claims”) of the ’105 patent.
`
`II. MANDATORY NOTICES
`A. Real Party-in-Interest
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies that the real party-in-
`
`interest is Apple Inc.
`
`B. Related Matters
`Pursuant to 37 C.F.R. §42.8(b)(2), the ’105 patent is or was involved in the
`
`following matters, which may affect, or be affected by, this proceeding:
`
`• Carbyne Biometrics, LLC v. Apple Inc., 1:23-cv-00324 (WDTX), filed
`
`March 24, 2023 (Pending) (“Parallel District Court Proceeding”)
`
`Apple is not aware of any disclaimers, reexamination certificates or other IPR
`
`petitions addressing the ’105 patent; however, the following matter involved a
`
`related application and may affect this proceeding:
`
`
`
`- 1 -
`
`

`

`
`
`
`IPR2024-00507 Petition
`
`U.S. Patent No. 11,475,105
`
`• Samsung Electronics Co., Ltd. et al v. RightQuestion, LLC, IPR2022-
`
`00244 (PTAB), filed December 1, 2021 (terminated July 26, 2022)
`
`(“Samsung ’696 Patent IPR”)
`
`
`
`C. Lead and Back-up Counsel and Service Information
`Lead Counsel
`
`
`David W. O’Brien
`Phone: (512) 867-8457
`HAYNES AND BOONE, LLP
`Fax: (214) 200-0853
`2801 N. Harwood St. Suite 2300
`david.obrien.ipr@haynesboone.com
`Dallas, TX 75201
`USPTO Reg. No. 40,107
`
`
`Back-up Counsel
`
`Phone: (512) 867-8528
`Kelly Gehrke Lyle
`Fax: (214) 200-0853
`HAYNES AND BOONE, LLP
`kelly.lyle.ipr@haynesboone.com
`2801 N. Harwood St. Suite 2300
`Dallas, TX 75201
`USPTO Reg. No. 62,332
`
`
`Hong Shi
`Phone: (512) 867-8440
`Fax: (214) 200-0853
`HAYNES AND BOONE, LLP
`hong.shi.ipr@haynesboone.com
`2801 N. Harwood St. Suite 2300
`USPTO Reg. No. 69,009
`Dallas, TX 75201
`
`Please address all correspondence to lead and back-up counsel. Petitioner
`
`
`
`consents to electronic service and asks Patent Owner to do the same.
`
`III. GROUNDS FOR STANDING
`Petitioner certifies that the ’105 patent is eligible for IPR, and that Petitioner
`
`is not barred or estopped from requesting IPR challenging the patent claims. 37
`
`C.F.R. §42.104(a).
`
`
`
`- 2 -
`
`

`

`
`
`IV. THE ’105 PATENT
`Summary of the ’105 patent
`A.
`The ’105 patent is directed to an environment including a client device, such
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`
`
`
`as a notebook computer or tablet, which is connected via a network to a service
`
`such as a website. APPL-1001, 2:62-3:14. FIG. 1 is illustrative:
`
`APPL-1001, FIG. 1, annotated
`
`
`
`The ’105 patent describes authentication techniques to provide user
`
`credentials (e.g., a password) from a client device to a service with a goal of
`
`avoiding reliance on a user’s input of the credential, which is tedious and leads to
`
`poor security practices. APPL-1001, 1:43-52. The ’105 patent describes users
`
`
`
`- 3 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`“need not type such usernames and passwords into their devices whenever required
`
`by a service. Instead, users can authenticate themselves to an ‘authentication
`
`translator’...and
`
`the authentication
`
`translator will provide
`
`the appropriate
`
`credentials to the implicated service on the user’s behalf.” APPL-1001, 3:20-26.
`
`FIG. 5 illustrates this authentication translation. APPL-1001, 1:66-67.
`
`APPL-1001, FIG. 5
`
`
`
`However, these techniques for authentication translation and the systems
`
`performing them were well-known at the time of the claimed invention. APPL-
`
`1003, ¶¶42-61, 31-35.
`
`Prosecution History
`B.
`The Office rejected all claims as obvious but indicated that then-pending
`
`claim 16 reciting “the backup is performed in response to a determination that the
`
`first device is of a same brand as the second device” was allowable. APPL-1002,
`- 4 -
`
`
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`89-104 (Office Action dated 01-28-2022). The Office also rejected the claims on
`
`obviousness-type double-patenting grounds over various patents including U.S.
`
`Patent 10,360,351 (“Jakobsson ’351”). APPL-1002, 88-89. In a response with
`
`accompanying Terminal Disclaimer, Applicant amended each of its independent
`
`claims to require that initiating backup to a second device is “based at least in part
`
`on the first device being a same brand as a second device.” APPL-1002, 69-70,
`
`76-79. This also was well-known by the earliest claimed invention date. APPL-
`
`1003, ¶¶34-35.
`
`C. Effective Filing Date
`The ’105 Patent issued on a continuation-in-part (CIP) application (US
`
`Application 17/123,018 (“the ’018 App”)) filed December 15, 2020. APPL-1001,
`
`(22), (63); see also APPL-1002, 353-54 (ADS-Domestic Benefit), 397. The ’018
`
`App claims priority as a CIP to U.S. Application 17/027,481, which claims priority
`
`through a chain of five (5) continuation applications originating with US
`
`Application 13/706,254 (“the pre-AIA ’254 App”), filed December 5, 2012. Id.
`
`Applicable Law: Because the ’018 App was filed after March 16, 2013, but
`
`purports to claim benefit of a filing date before March 16, 2013, it is a “transition
`
`application.” The America Invents Act provides that its amendment of 35 U.S.C.
`
`§§102, 103 applies to “any application for patent, and to any patent issuing
`
`thereon, that contains or contained at any time—(A) a claim to a claimed invention
`
`
`
`- 5 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`that has an effective filing date as defined in Section 100(i) of title 35, United
`
`States Code, that is [after March 15, 2013].” AIA §3(n)(1).
`
`The ’018 App contained (on filing) dependent claim 16, which contained the
`
`language “the backup is performed in response to a determination that the first
`
`device is of the same brand as the second device.” APPL-1002, 417. As
`
`confirmed by Dr. McDaniel, no disclosure exists in any application to which the
`
`’018 App claims priority—including the pre-AIA ’254 App—that provides written
`
`description support for a backup being performed in response to a determination
`
`that the first device is of the same brand as the second device. APPL-1003, ¶¶36-
`
`41. Accordingly, AIA §3(n)(1) dictates the ’105 patent be evaluated under post-
`
`AIA §§102, 103.
`
`Effective Filing Date: The claims are only entitled to the actual filing date of
`
`the ’018 App where description of the initiating a backup based at least in part on a
`
`first device being a same brand as a second device (a limitation of each claim) was
`
`first presented. APPL-1003, ¶¶36-41; APPL-1021 (redline of ’105 patent
`
`specification and U.S. Patent 10,360,351 specification). For a claim in a later-filed
`
`application to be entitled to the filing date of an earlier application, the earlier
`
`application must provide written description support for the claimed subject matter.
`
`Anascape, Ltd. v. Nintendo of Am. Inc., 601 F.3d 1333, 1337 (Fed. Cir. 2010). To
`
`satisfy the written description requirement, “the disclosure of the earlier
`
`
`
`- 6 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`application, the parent, must reasonably convey to one of skill in the art that the
`
`inventor possessed the later-claimed subject matter at the time the parent
`
`application was filed.” Tronzo v. Biomet, Inc., 156 F.3d 1154, 1158 (Fed. Cir.
`
`1998).
`
`As confirmed by Dr. McDaniel, no written description exists in any
`
`application to which the ’018 App claims priority for initiating backup to a second
`
`device based at least in part on the first device being a same brand as a second
`
`device. APPL-1003, ¶¶36-41. To the extent passages of the ’018 App discuss the
`
`term “brand” (i.e., those portions corresponding to 13:28-33 and/or 19:29-35 of the
`
`’105 patent), these passages are not found in any application to which the ’018 App
`
`claims priority. Id. These passages fall under a heading “ADDITIONAL
`
`EMBODIMENTS.” APPL-1001, 11:30; APPL-1002, 18. This heading begins a
`
`portion of the ’018 App’s specification that spans pages numbered 18 to 36; in
`
`contrast, the originally filed specification of the U.S. Application 17/027,481 of
`
`which the ’018 App is a CIP, does not include this heading and begins its claim
`
`recitation at its page 17. APPL-1002, 395-414; APPL-1005, 38.
`
`Accordingly, the effective filing date of each of the claims of the ’105 patent
`
`is no earlier than December 15, 2020. For avoidance of doubt, only Grounds 3-4
`
`depend on this priority analysis.
`
`
`
`- 7 -
`
`

`

`
`
`
`IPR2024-00507 Petition
`
`U.S. Patent No. 11,475,105
`
`V. LEVEL OF ORDINARY SKILL IN THE ART
`The level of ordinary skill in the art may be reflected by the prior art of
`
`record. See Okajima v. Bourdeau, 261 F.3d 1350, 1355 (Fed. Cir. 2001). Here,
`
`Persons of Ordinary Skill in the Art (“POSITA”) at the time of the claimed
`
`invention 1 would have had a bachelor’s degree in an electrical engineering,
`
`computer engineering, computer science, or a related field, and at least two years
`
`of experience in the research, design, development, and/or testing of authentication
`
`techniques, and related firmware and software, or the equivalent, with additional
`
`education substituting for experience and vice versa. APPL-1003, ¶¶18-22.
`
`Furthermore, a person with less formal education but more experience, or more
`
`formal education but less experience, could have also met the relevant standard for
`
`POSITA. Id. However, Petitioner does not imply a person having an
`
`extraordinary level of skill should be regarded as POSITA.
`
`VI. CLAIM CONSTRUCTION
`During IPR, claims are construed according to the standard as set forth in
`
`Phillips v. AWH Corp., 415 F.3d 1303 (Fed. Cir. 2005) (en banc). 37 C.F.R.
`
`§42.100(b) (Nov. 13, 2018). The claims are construed to the extent necessary to
`
`
`
`1 This discussion applies to POSITA both at the earliest claimed priority date
`
`(2011) and at the filing date of the ’105 patent (2020).
`
`
`
`- 8 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`resolve the underlying controversy. Nidec Motor Corp. v. Zhongshan Broad
`
`Ocean Motor Co., 868 F.3d 1013, 1017 (Fed. Cir. 2017). Petitioner submits for
`
`purposes of this proceeding, and as set forth below, terms of the challenged claims
`
`should be given their plain and ordinary meaning. Phillips, 415 F.3d at 1314-17;
`
`APPL-1003, ¶62.
`
`VII. REQUESTED RELIEF
`Petitioner asks the Board to institute trial and cancel the Challenged Claims.
`
`VIII. OVERVIEW OF CHALLENGES
`A. Challenged Claims
`Claims 2, 4-6, 12, 15, 21, 23-25, 31, and 34 (“Challenged Claims”) of the
`
`’105 patent are challenged.
`
`
`
`- 9 -
`
`

`

`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`
`
`Statutory Grounds2 for Challenges
`B.
`Grounds Claim(s)
`Basis
`#1
`2, 4, 12, 15, 21, 23, 31, and 34 §103 over Kesanupalli, Cheng and
`Kodama
`§103
`over Kesanupalli, Cheng,
`Kodama and Hubner
`2, 4, 12, 15, 21, 23, 31, and 34 §103 over Jakobsson ’351 and Kodama
`5, 6, 24, 25
`§103 over Jakobsson ’351, Kodama
`and Hubner
`
`5-6, 24-25
`
`#2
`
`#3
`#4
`
`Kesanupalli was filed March 24, 2010, published April 7, 2011, and issued
`
`August 5, 2014. Cheng was filed September 24, 2003 and published June 17,
`
`2004. Kodama published July 15, 2009. Hubner was filed December 13, 2010 and
`
`published June 14, 2012. Kesanupalli is prior art under at least §102(a)(2); Cheng,
`
`Kodama and Hubner are prior art under at least §102(a)(1).
`
`
`
`2 As demonstrated above, the ’105 patent is an AIA patent. See supra, IV.C; AIA
`
`§3(n)(1). Were Patent Owner to contest that, it would be understood that
`
`Kesanupalli also qualifies as prior art under pre-AIA §§102(a), (e), Hubner
`
`qualifies under pre-AIA §102(e), and Cheng and Kodama qualify under pre-AIA
`
`§102(b). See also, APPL-1003, ¶¶63-67.
`
`
`
`- 10 -
`
`

`

`
`
`
`IPR2024-00507 Petition
`
`U.S. Patent No. 11,475,105
`
`Jakobsson ’351 issued July 23, 2019 and qualifies as prior art under at least
`
`§102(a)(1). Only Grounds 3-4 depend on the priority date of the Challenged
`
`Claims.
`
`IX.
`
`IDENTIFICATION OF HOW THE CLAIMS ARE UNPATENTABLE
`A. Ground 1: Claims 2, 4, 12, 15, 21, 23, 31, and 34 are obvious
`under 35 U.S.C. §103 over Kesanupalli, Cheng and Kodama.
`1. Kesanupalli
`Kesanupalli is entitled “Secure User Authentication Using Biometric
`
`Information” and is directed to a secure authentication system using biometric
`
`information to “provide[] a more secure authentication of the user than commonly
`
`used password-based methods and systems.” APPL-1006, (54), 1:59-62. See
`
`APPL-1003, ¶¶68-73. Based on a match between a fingerprint template stored for
`
`a particular user and fingerprint information read from a finger presented at a
`
`fingerprint reader, Kesanupalli’s methods retrieve credentials associated with the
`
`user and communicate those credentials to an external system or process. APPL-
`
`1006, FIGS. 8-9, 3:14-4:11.
`
`During an enrollment process with a resource such as a website, “a user
`
`swipes [or places] their finger [on] a fingerprint sensor several times to create [the]
`
`fingerprint template. The fingerprint template allows the user’s fingerprint to be
`
`distinguished from fingerprints associated with other users.” APPL-1006, 3:33-41.
`
`The user (or system) also “provides user credentials, such as a password,
`
`
`
`- 11 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`cryptographic key…or the like,” and the systems and methods described in
`
`Kesanupalli “bind the user’s fingerprint template with the user credentials.”
`
`APPL-1006, 3:15-18, 3:41-46. To protect user credentials, “[t]he fingerprint
`
`template and user credentials are then stored in a secure storage of the user’s
`
`device.” APPL-1006, 3:46-47, 8:29-53.
`
`During a subsequent user identification or verification for the website, a user
`
`presents her biometric information (e.g., places a finger on a fingerprint sensor)
`
`and if the presented fingerprint “matches a fingerprint template, the user’s
`
`credentials are released to the user and/or [the] service or process requesting the
`
`user verification.” APPL-1006, 3:52-61. “[T]he user credentials released after
`
`finding a matching fingerprint template may include an OTP (One Time Password)
`
`token, RSA signature and the like,” such as a “cryptographic key.” APPL-1006,
`
`3:41-44, 3:65-4:1, FIG. 12.
`
`FIG. 9 of Kesanupalli illustrates these steps of authenticating a user in the
`
`context of an embodiment in which user credentials are cryptographically secured
`
`in storage. FIG. 2 illustrates an example system 200 in which user enrollment and
`
`authentication processes are performed using a biometric sensor 204, secure
`
`storage 206 and a Host PC 202. APPL-1006, 6:26-49, 9:10-24.
`
`
`
`- 12 -
`
`

`

`
`
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`APPL-1006, FIGS. 9 and 2
`
`
`
`In an authentication process, sensor 204 receives a biometric input from a user and
`
`releases the user’s credentials from secure storage 206 upon a successful match of
`
`the input with the user’s stored biometric template. APPL-1006, 6:31-45. The
`
`released credentials are then communicated to the external resource by an
`
`application 214 of the Host PC 202. APPL-1006, 5:9-58, 6:11-31.
`
`2. Cheng
`Cheng is entitled “System, Method and Apparatus for Secure Two-Tier
`
`Backup and Retrieval of Authentication Information” and provides ways to
`
`“securely backup and restore” a user’s authentication-based device without
`
`compromising the security thereof. APPL-1008, (54), Abstract.
`
`Cheng
`
`recognizes “[b]iometrics-based authentication”
`
`is commonly
`
`
`
`- 13 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`implemented, which leads to portable devices that include “user’s authentication
`
`information, electronic identity and any data associated therewith.” APPL-1008,
`
`[0004], [0006]. Cheng securely backs-up this data to avoid costs of creating the
`
`data on new device from scratch should a first device containing the data be lost or
`
`stolen. See APPL-1008, Abstract, [0006]. Cheng’s FIGS. 3A-3B illustrate a
`
`backup of data of a user’s device is performed through secure communication
`
`between a user service bureau (a storage service) and the device. APPL-1008,
`
`[0029]-[0030]. Cheng’s backup process includes a two-tier encryption procedure
`
`for backing up data. APPL-1008, [0031]-[0039].
`
`
`
`- 14 -
`
`

`

`
`
`
`
`
`
`IPR2024-00507 Petition
`U.S. Patent No. 11,475,105
`
`APPL-1008, FIG. 3A–3B (portion), annotated
`
`
`
`See APPL-1003, ¶¶74-77. Cheng describes a use case of a user’s device, having
`- 15 -
`
`
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`been backed up, becoming unavailable. A second device connects to the user
`
`service to download the data. APPL-1008, [0044]–[0050], FIGS. 4A-4C.
`
`3. Kodama
`Kodama is directed to backing up data in an electronic device. APPL-1010,
`
`(57), [0040], [0041], APPL-1003, ¶¶78-80. Kodama explains its backup
`
`procedures “can be applied to any electronic appliance such as a mobile phone, a
`
`PDA or a PC[,]” and “there is no particular limitation in the backup target data
`
`upon applying the present invention.” APPL-1010, [0040]-[0041].
`
`Kodama teaches registering a first device with a backup service (storage)
`
`including “device information including the manufacturer name” and after
`
`registration, sending data to its storage. APPL-1010, [0101], [0106]–[0107].
`
`Kodama restores data onto another device (e.g., a “new” device) and to start
`
`restoration “device information including the manufacturer name” of the second
`
`device is sent to the backup service system. APPL-1010, [0135]–[0136]. The
`
`backup service system verifies the information–including the manufacturer name–
`
`of the second device coincides with the first device before permitting the backup of
`
`data to the second device. See APPL-1010, [0137]-[0144].
`
`4. Combination of Kesanupalli, Cheng and Kodama
`POSITA would have been motivated to apply Cheng’s data backup
`
`teachings to Kesanupalli’s device including biometric information and credentials
`
`
`
`- 16 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`for user authentication. APPL-1003, ¶¶81-90. Kesanupalli’s device and its stored
`
`biometric information and credentials, which are a user’s personal data, combined
`
`with Cheng’s data backup teachings would produce obvious, beneficial, and
`
`predictable results of reducing the need to recreate the user’s personal data when
`
`using a new device (e.g., a device replacing one having been lost or stolen). Id.
`
`POSITA would have been further motivated to apply Kodama’s teachings of
`
`ensuring devices implementing the backup are the same brand, which provides the
`
`obvious, beneficial, and predictable result of mitigating compatibility arising
`
`between manufacturers. Id.
`
`Kesanupalli, Cheng, Kodama and the ’105 patent are all in the same field of
`
`endeavor−security arrangements and procedures for protecting data in computer
`
`systems. APPL-1003, ¶83; see, e.g., APPL-1006, 2:30-38, 2:48-50; APPL-1008,
`
`[0003]-[0004]; APPL-1001, 1:43-50 , FIG. 1; APPL-1010, (57), [0040]-[0041].
`
`Moreover, as evidenced on the front pages of Kesanupalli, the ’105 patent,
`
`and Kodama, each includes the same search subclass. See APPL-1001, (51), (52);
`
`APPL-1006, (51) (58); APPL-1010, (51).3 POSITA would recognize it is directed
`
`
`
`3 see also www.uspto.gov/web/patents/classification/cpc/html/cpc-
`
`G06F.html#G06F (subclass definitions);
`
`
`
`- 17 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`to the same technology. APPL-1003, ¶84; APPL-1008, [0007].
`
`Second, POSITA would have been motivated to employ Cheng’s backup
`
`technique in connection with Kesanupalli’s secure user authentication methods
`
`because Kesanupalli’s stored biometric information and credentials are personal
`
`data. APPL-1003, ¶¶85-89. POSITA would have understood stored personal data
`
`(biometric information and credentials) would need to be created and registered
`
`from scratch should the device be lost or stolen. Id.; APPL-1008, [0006]. Such a
`
`problem of inconvenience would have also been reasonably pertinent to the
`
`inventor of the challenged patent. See APPL-1001, 8:55-58. Thus, not only were
`
`Kesanupalli, Cheng/Kodama and the ’105 patent in the same field of endeavor, but
`
`Cheng would have been reasonably pertinent to a problem faced by the inventor of
`
`the ’105 patent as well as pertinent to known risks of theft and loss of devices and
`
`recovery of data that would have motivated POSITA to address by combining
`
`Cheng with Kesanupalli.
`
`POSITA would readily recognize a personal electronic device can be lost,
`
`damaged, or otherwise require replacement. APPL-1003, ¶¶85-89; see APPL-
`
`1006, 10:13-18; APPL-1008, [0006]. And when introducing replacement devices,
`
`www.uspto.gov/web/patents/classification/cpc/html/cpc-G06F.html#G06F (CPC to
`
`
`
`IPC concordance).
`
`
`
`- 18 -
`
`

`

`IPR2024-00507 Petition
`
`
`U.S. Patent No. 11,475,105
`
`
`it is desirable to have access to the personal data without having to create the data
`
`from scratch. APPL-1008, [0006]-[0007]. Moreover, POSITA would have
`
`recognized a desire in the market of electronic devices to be capable of being
`
`backed up long before the ’105 patent. APPL-1003, ¶87. Cheng provides a benefit
`
`of implementing its techniques to perform the desired backup of personal data
`
`giving access to data in other user devices in a “reliable and secure way.” Id. In
`
`particular, Cheng teaches backing up personal data related to biometric information
`
`and secret keys. APPL-1008, [0007]–[0009]. This is data the same data as store

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket