throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`APPLE INC.,
`Petitioner,
`
`v.
`PROXENSE, LLC,
`Patent Owner.
`____________________
`Case No. IPR2024-01333
`U.S. Patent No. 8,352,730
`____________________
`PETITION FOR INTER PARTES REVIEW
`
`

`

`IPR2024-01333
`U.S. Patent 8,352,730
`
`I. 
`II. 
`
`TABLE OF CONTENTS
`Relief Requested .............................................................................................. 1 
`The ’730 Patent ................................................................................................ 1 
`A.  Overview ............................................................................................... 1 
`III.  Claim Construction .......................................................................................... 4 
`IV.  Level of Ordinary Skill .................................................................................... 5 
`V.  Ground 1: Claims 1, 2, 4-6, 8, 9, 11, 12, and 14-17 Are Obvious Over
`Ludtke. ............................................................................................................. 5 
`A.  Overview of Prior Art Ludtke ............................................................... 5 
`B. 
`Claims .................................................................................................... 9 
`1. 
`Independent claim 1 .................................................................... 9 
`a. 
`[1preamble]: “A method for verifying a user during
`authentication of an integrated device, comprising
`the steps of:” ..................................................................... 9 
`[1ai]: “persistently storing biometric data of the user
`[in a tamper proof format written to a storage
`element on the integrated device that is unable to be
`subsequently altered]” .................................................... 11 
`[1aii]: “[persistently storing] a plurality of codes and
`other data values comprising a device ID code
`uniquely identifying the integrated device [in a
`tamper proof format written to a storage element on
`the integrated device that is unable to be
`subsequently altered]” .................................................... 14 
`[1aiii]: “[persistently storing] a secret decryption
`value in a tamper proof format written to a storage
`element on the integrated device that is unable to be
`subsequently altered;” ..................................................... 16 
`
`b. 
`
`c. 
`
`d. 
`
`i
`
`

`

`e. 
`
`f. 
`
`g. 
`
`h. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`[1b]: “wherein the biometric data is selected from a
`group consisting of a palm print, a retinal scan, an
`iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition;” ............. 23 
`[1c]: “responsive to receiving a request for a
`biometric verification of the user, receiving scan
`data from a biometric scan;” ........................................... 23 
`[1d]: “comparing the scan data to the biometric data
`to determine whether the scan data matches the
`biometric data;” .............................................................. 25 
`[1e]: “responsive to a determination that the scan
`data matches the biometric data, wirelessly sending
`one or more codes from the plurality of codes and
`the other data values for authentication by an agent
`that is a third-party trusted authority possessing a
`list of device ID codes uniquely identifying
`legitimate integrated devices, wherein the one or
`more codes and other data values includes the
`device ID code; and” ...................................................... 25 
`[1f]: “responsive to authentication of the one or
`more codes and the other data values by the agent,
`receiving an access message from the agent
`allowing the user access to an application, wherein
`the application is selected from a group consisting
`of a casino machine, a keyless lock, a garage door
`opener, an ATM machine, a hard drive, computer
`software, a web site and a file.” ...................................... 32 
`Claim 2: “The method of claim 1, wherein the one or more
`codes and the other data values are transmitted to the agent
`over a network.” ........................................................................ 36 
`Claim 4: “The method of claim 1, wherein the one or more
`codes and the other data values indicate that the biometric
`verification was successful.” ..................................................... 36 
`
`i. 
`
`2. 
`
`3. 
`
`ii
`
`

`

`4. 
`
`5. 
`
`6. 
`
`b. 
`
`c. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`Claim 5: “The method of claim 1, wherein the biometric
`data and the scan data are both based on a fingerprint scan
`by the user.” .............................................................................. 38 
`Claim 6: “The method of claim 1, further comprising:
`establishing a secure communication channel prior to
`sending the one or more codes and the other data values for
`authentication” .......................................................................... 38 
`Independent Claim 8 ................................................................. 39 
`a. 
`[8preamble]: “An integrated device for verifying a
`user during authentication of the integrated device,
`comprising:” ................................................................... 39 
`[8ai]: “a memory stores biometric data of a user,
`and” ................................................................................. 39 
`[8aii]: “a plurality of codes and other data values
`comprising a device ID code uniquely identifying
`the integrated device, and” ............................................. 39 
`[8aiii]: “a secret decryption value in a tamper proof
`format written to the memory that is unable to be
`subsequently altered;” ..................................................... 39 
`[8b]: “wherein the biometric data is selected from a
`group consisting of a palm print, a retinal scan, an
`iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition;” ............. 39 
`[8c]: “a verification unit, in communication with the
`memory, receives scan data from a biometric scan
`for comparison against the biometric data, and if the
`scan data matches the biometric data, wirelessly
`sends one or more codes from the plurality of codes
`and the other data values for authentication by an
`agent that is a third-party trusted authority
`possessing a list of device ID codes uniquely
`identifying legitimate integrated devices, wherein
`
`d. 
`
`e. 
`
`f. 
`
`iii
`
`

`

`7. 
`
`8. 
`
`9. 
`
`g. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`the one or more codes and the other data values
`includes the device ID code; and” .................................. 40 
`[8d]: “responsive to the agent authenticating the one
`or more codes and the other data values, a radio
`frequency communicator, receives an access
`message from the agent allowing the user access to
`an application, wherein the application is selected
`from a group consisting of a casino machine, a
`keyless lock, a garage door opener, an ATM
`machine, a hard drive, computer software, a web
`site and a file.” ................................................................ 41 
`Claim 9: “The integrated device of claim 8, wherein the one
`or more codes and the other data values are transmitted to
`the agent over a network.” ........................................................ 42 
`Claim 11: “The integrated device of claim 8, wherein the
`verifier comprises: an LED to be activated for requesting
`the biometric scan.”................................................................... 42 
`Independent Claim 12 ............................................................... 45 
`a. 
`[12preamble]: “A method for authenticating a
`verified user using a computer processor configured
`to execute method steps, comprising:” ........................... 45 
`[12a]: “receiving one or more codes from a plurality
`of codes and other data values including a device ID
`code, wherein the plurality of codes and the other
`data values comprises the device ID code uniquely
`identifying the integrated device and a secret
`decryption value associated with a biometrically
`verified user, the device ID code being registered
`with an agent that is a third-party trusted authority
`possessing a list of device ID codes uniquely
`identifying legitimate integrated devices” ...................... 47 
`[12b]: “requesting authentication of the one or more
`codes and the other data values by the agent,
`wherein the authentication determines whether the
`
`b. 
`
`c. 
`
`iv
`
`

`

`d. 
`
`e. 
`
`c. 
`
`d. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`one or more codes and the other data values are
`legitimate;” ..................................................................... 50 
`[12c]: “receiving an access message from the agent;
`and;” ................................................................................ 50 
`[12d]: “in response to a positive access message,
`allowing the biometrically verified user access to an
`application, wherein the application is selected from
`a group consisting of a casino machine, a keyless
`lock, a garage door opener, an ATM machine, a
`hard drive, computer software, a web site and a
`file.” ................................................................................ 51 
`10.  Claim 14: “The method of claim 12, further comprising:
`establishing a secure communications channel with a
`biometric key, wherein the one or more codes and the other
`data values associated with the biometrically verified user is
`received from the biometric key. .............................................. 51 
`Independent claim 15 ................................................................ 51 
`a. 
`[15preamble]: “A system, comprising:” ......................... 51 
`b. 
`[15ai]: “a biometric key stores biometric data of a
`user” ................................................................................ 52 
`[15aii]: “and a plurality of codes and other data
`values comprising a device ID code uniquely
`identifying the biometric key” ........................................ 53 
`[15aiii]: “and a secret decryption value in a tamper
`proof format written to a storage element on the
`biometric key that is unable to be subsequently
`altered,” ........................................................................... 53 
`[15aiv]: “and if scan data can be verified as being
`from the user by comparing the scan data to the
`biometric data, wirelessly sending, one or more
`codes from the plurality of codes and other data
`
`11. 
`
`e. 
`
`v
`
`

`

`f. 
`
`g. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`values wherein the one or more codes and the other
`data values include the device ID code,” ........................ 53 
`[15av]: “and the biometric data is selected from a
`group consisting of a palm print, a retinal scan, an
`iris scan, a hand geometry, a facial recognition, a
`signature recognition and a voice recognition; and” ...... 53 
`[15b]: “an authentication unit receives the plurality
`of codes and the other data values and send the
`plurality of codes and the other data values to agent
`for authentication to determine whether the one or
`more codes and the other data values are legitimate,
`wherein the agent is a third-party trusted authority
`possessing a list of device ID codes uniquely
`identifying legitimate integrated devices,” ..................... 54 
`[15c]: “and responsive to the device ID code being
`authenticated, the authentication unit receiving an
`access message from the agent allowing the user to
`access an application, wherein the application is
`selected from a group consisting of a casino
`machine, a keyless lock, a garage door opener, an
`ATM machine, a hard drive, computer software, a
`web site and a file.” ........................................................ 56 
`12.  Claim 16: “The system of claim 15, wherein the biometric
`key receives an authentication request from the
`authentication unit, and in response, requests a biometric
`scan from the user to generate the scan data.” .......................... 56 
`13.  Claim 17: “The system of claim 15, wherein if the
`biometric key cannot verify the scan data as being from the
`user, it does not send the one or more codes and the other
`data values.” .............................................................................. 58 
`VI.  Ground 2: Claims 3, 10, and 13 are Obvious Over Ludtke and Kon. ........... 60 
`A.  Kon ...................................................................................................... 60 
`B. 
`Claims .................................................................................................. 64 
`
`h. 
`
`vi
`
`

`

`2. 
`
`3. 
`
`1. 
`
`IPR2024-01333
`U.S. Patent 8,352,730
`Claim 3: “The method of claim 1, further comprising:
`registering an age verification for the user in association
`with the device ID code.” .......................................................... 64 
`Claim 10: “The integrated device of claim 9, wherein an
`age verification is registered in association with the device
`ID code.” ................................................................................... 69 
`Claim 13: “The method of claim 12, further comprising:
`registering a date of birth or age with the agent.” ..................... 69 
`VII.  Discretionary Denial Is Not Warranted ......................................................... 69 
`A.  Discretionary Denial Is Not Warranted Under Fintiv ......................... 69 
`B. 
`Discretionary Denial Is Not Warranted Under General Plastics ........ 70 
`C. 
`Discretionary Denial is Not Warranted under § 325(d). ..................... 72 
`VIII.  Mandatory Notices ......................................................................................... 75 
`A. 
`Real Parties-in-Interest Under 37 C.F.R. § 42.8(b)(1) ........................ 75 
`B. 
`Related Matters Under 37 C.F.R. § 42.8(b)(2) ................................... 75 
`C. 
`Lead and Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3) ................ 76 
`D. 
`Service Information Under 37 C.F.R. § 42.8(b)(4) ............................. 77 
`IX.  Standing ......................................................................................................... 77 
`X. 
`Conclusion ..................................................................................................... 77 
`
`
`
`
`
`
`vii
`
`

`

`IPR2024-01333
`U.S. Patent 8,352,730
`
`TABLE OF AUTHORITIES
`
`Cases
`Alcon Inc. v. AMO Dev., LLC, IPR2021-00843, Paper 15 (PTAB Nov.
`12, 2021) ............................................................................................................. 10
`Code200, UAB v. Bright Data, Ltd., IPR2022-00861, Paper 18 (PTAB
`Aug. 23, 2022) .................................................................................................... 72
`Gen. Plastic Indus. Co. v. Canon Kabushiki Kaisha, IPR2016-01357,
`Paper 19 (PTAB Sept. 6, 2017) .......................................................................... 70
`Intel Corp. v. Qualcomm Inc., 21 F.4th 801 (Fed. Cir. 2021) ................................. 10
`Realtime Data, LLC v. Iancu, 912 F.3d 1368 (Fed. Cir. 2019) ................................. 5
`Target Corp. v. Proxicom Wireless, LLC, IPR2020-00931, Paper 10
`(PTAB Nov. 10, 2020) ........................................................................................ 10
`Zillow Grp., Inc. v. Int’l Bus. Machs. Corp., IPR2020-01656, Paper 8
`(PTAB Mar. 15, 2021) ........................................................................................ 10
`Federal Statutes
`35 U.S.C. § 102(b) ............................................................................................. 57-58
`35 U.S.C. § 102(e) ................................................................................................. 5-7
`35 U.S.C. § 103 .......................................................................................................... 1
`35 U.S.C. § 325(d) ............................................................................................. 70-72
`Regulations
`37 C.F.R. § 42.8(b)(1) .............................................................................................. 73
`37 C.F.R. § 42.8(b)(2) .............................................................................................. 73
`37 C.F.R. § 42.8(b)(3) .............................................................................................. 74
`37 C.F.R. § 42.8(b)(4) .............................................................................................. 75
`
`
`
`viii
`
`

`

`IPR2024-01333
`U.S. Patent 8,352,730
`
`
`LIST OF EXHIBITS
`
`Ex. 1007
`
`Description
`Exhibit
`Ex. 1001 U.S. Patent No. 8,352,730 (“the ’730 patent”)
`Ex. 1002 File History of U.S. Patent No. 8,352,730
`Ex. 1003 Declaration of Stephen Gray (Decl.)
`Ex. 1004 Curriculum Vitae of Stephen Gray
`Ex. 1005 U.S. Patent No. 7,188,110 to Ludtke et al. (“Ludtke”)
`Ex. 1006 U.S. Patent Application Publication No. 2002/0046336 to Kon et al.
`(“Kon”)
`Samsung Electronics America, Inc. v. Proxense, LLC, IPR2021-
`01444, Paper 11 (PTAB Feb. 28, 2022).
`Ex. 1008 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No.
`31, Scheduling Order (W.D. Tex Aug. 18, 2023)
`Ex. 1009 Proxense, LLC v. Samsung Electronics Co., Ltd., Case No. 6:21-cv-
`00210, Dkt. No. 43, Claim Construction Order (W.D. Tex. Jan. 18,
`2022).
`Ex. 1010 Proxense, LLC v. Samsung Electronics Co., Ltd., Case No. 6:21-cv-
`00210, Dkt. No. 149, Memorandum in Support of Claim
`Construction Order (W.D. Tex. Dec. 28, 2022).
`Ex. 1011 Request for Reexamination, No. 90/015,052 (June 8, 2022).
`Ex. 1012 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No. 1,
`Complaint (W.D. Tex. May 2, 2023)
`Ex. 1013 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Preliminary
`Infringement Contentions (W.D. Tex. July 24, 2023).
`
`Ex. 1014 CERTIFICATION REPORT No. P165: Sony FeliCa Contactless
`Smart Card RC-S860, UK IT Security Evaluation and Certification
`Scheme (Mar. 2002).
`
`ix
`
`

`

`IPR2024-01333
`U.S. Patent 8,352,730
`
`Description
`Exhibit
`Ex. 1015 U.S. Patent Application Publication No. 2002/0049806 to Gatz et al.
`(“Gatz”)
`Ex. 1016 U.S. Patent Application Publication No. 2006/0034492 to Siegel et
`al. (“Siegel”)
`Ex. 1017 U.S. Patent Application Publication No. 2001/0036297 to Ikegami et
`al. (“Ikegami”)
`Ex. 1018 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No.
`45, Proxense’s Responsive Claim Construction Brief (W.D. Tex.
`Dec. 1, 2023).
`Ex. 1019 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No.
`45, Proxense’s Expert Transcript (W.D. Tex. Dec. 18, 2023).
`Ex. 1020 Decision on Petition, Ex Parte Reexamination No. 90/015,052 (Jan.
`3, 2024).
`Ex. 1021 Order Granting Request for Ex Parte Reexamination, Ex Parte
`Reexamination No. 90/015,052 (Aug. 2, 2022).
`Ex. 1022 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No.
`50, Proxense’s Sur-Reply Claim Construction Brief (W.D. Tex. Jan.
`5, 2024).
`Ex. 1023 U.S. District Courts—National Judicial Caseload Profile, available
`at
`https://www.uscourts.gov/sites/default/files/data_tables/fcms_na_dis
`tcomparison0930.2023.pdf (retrieved Jan. 15, 2024).
`Ex. 1024 Final Rejection, Ex Parte Reexamination No. 90/015,053 (Mar. 4,
`2024).
`Ex. 1025 Correspondence to Proxense, dated May 20, 2024
`Ex. 1026 Applications and Ex Parte Reexamination related to the ’730 Patent
`
`EX. 1027
`
`Proxense, LLC v. Apple, Inc., Case No. 6-24-cv-00143, Dkt. 29,
`Scheduling Order (W.D. Tex)
`
`EX. 1028 U.S. District Courts—National Judicial Caseload Profile, available
`
`x
`
`

`

`IPR2024-01333
`U.S. Patent 8,352,730
`
`Exhibit
`
`Description
`
`at:
`https://www.uscourts.gov/sites/default/files/data_tables/fcms_na_d
`istprofile0630.2024.pdf (retrieved Aug. 20, 2024).
`
`EX. 1029 Docket Sheet for Proxense, LLC v. Apple, Inc., Case No. 6-24-cv-
`00143 (W.D. Tex) (pulled Aug. 20, 2024)
`
`EX. 1030 Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt. No.
`59, Claim Construction Order (W.D. Tex. Jan. 23, 2024)
`
`EX. 1031
`
`Proxense, LLC v. Microsoft Corp., Case No. 6:23-cv-00319, Dkt.
`No. 66, Claim Construction Order (W.D. Tex. May 24, 2024)
`
`
`
`xi
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`I.
`
`Relief Requested
`Apple Inc. (Petitioner) requests inter partes review of claims 1-6 and 8-17 of
`
`U.S. Patent No. 8,352,730 (“the ’730 patent”) based on the following grounds
`
`(Decl., 70-71):
`
`Ground
`1
`
`Claim(s) Challenged
`1, 2, 4-6, 8, 9, 11, 12, and
`14-17
`
`35 U.S.C. §
`103
`
`Reference(s)
`Ludtke
`
`2
`
`3, 10, 13
`
`103
`
`Ludtke and Kon
`
`II. The ’730 Patent
`A. Overview
`The ’730 patent was filed on December 20, 2005 and claims priority to
`
`provisional applications filed on December 20, 2004 and February 14, 2005. Ex.
`
`1001, cover page. The ’730 patent generally relates to “authentication responsive
`
`to biometric verification.” Ex. 1001, 1:16-19.
`
`Figure 6 illustrates a process for “verifying a subject” using a biometric key.
`
`Ex. 1001, 6:65-67, FIG. 6. As shown in Figure 6, the device receives biometric
`
`scan data, such as a fingerprint scan, from the user (step 620). Ex. 1001, FIG. 6. If
`
`the scan data matches “previously-stored biometric data,” (step 630), the user is
`
`“verified” (step 640), at which point a “code” is sent to a trusted key authority
`
`(step 650). Ex. 1001, 7:3-14, FIG. 6.
`
`
`
`1
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`
`
`Ex. 1001, FIG. 6.
`
`Once the code is received, as illustrated in Figure 7, the trusted key authority
`
`determines whether the code is “authentic” (step 730). Ex. 1001, 7:15-18, FIG. 7.
`
`“If authentication is successful, the trusted key authority sends an access message
`
`to [an] application to allow user access and/or provide additional information from
`
`the profile” (step 740). Ex. 1001, 7:18-21, FIG. 7. If authentication is not
`
`
`
`2
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`successful, authentication fails (step 750) and “the message to the application
`
`indicates that the user should be denied access.” Ex. 1001, 7:21-23, FIG. 7; Decl.,
`
`46-48.
`
`Ex. 1001, FIG. 7.
`
`
`
`
`
`3
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`III. Claim Construction
`In a previous institution decision, the Board “interpreted” the term “third-
`
`party trusted authority” as recited in the ’730 patent to mean “a trusted authority
`
`that is an entity separate from the parties to a transaction.” Ex. 1007 at 15.
`
`In the previous district court litigation, Proxense, LLC v. Samsung
`
`Electronics Co., Ltd., Case No. 6-21-cv-00210, two terms from the ’730 patent
`
`were construed by the court (Exs. 1009-1010):
`
` Device ID Code – “[a] unique code identifying a device”
`
` Access Message – “[a] signal or notification enabling or announcing
`
`access.”
`
`Ex. 1009, 3; Ex. 1010, 15, 20; Decl., 49-53.
`
`Because the prior art in this Petition discloses each of these prior
`
`constructions, and the plain and ordinary meaning of all terms, Petitioner submits
`
`that no claim terms need to be construed to resolve unpatentability in this Petition1
`
`
`
`1 Additional claim terms were construed in other proceedings relating the ’730
`
`patent, but the Board need not resolve those terms because the Grounds relied on
`
`in this petition render the challenged claims obvious under either the plain and
`
`
`
`4
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`(Realtime Data, LLC v. Iancu, 912 F.3d 1368, 1375 (Fed. Cir. 2019)).
`
`IV. Level of Ordinary Skill
`A person of ordinary skill in the art (“POSITA”) at the time of the purported
`
`invention would have had at least a bachelor’s degree in Computer or Electrical
`
`Engineering or an equivalent engineering discipline, and at least three years of
`
`experience in the field of encryption and security, or the equivalent. Decl., 31-32,
`
`54-56. Additional education could substitute for professional experience, and
`
`significant work experience could substitute for formal education. Decl., 55.
`
`V. Ground 1: Claims 1, 2, 4-6, 8, 9, 11, 12, and 14-17 Are Obvious Over
`Ludtke.
`A. Overview of Prior Art Ludtke
`Ludtke, filed December 11, 2000, is prior art under at least 35 U.S.C.
`
`§ 102(e). Ludtke, cover page. Ludtke discloses systems and methods of authorizing
`
`a user to conduct a transaction using a “biometric device” (also called a
`
`“transaction device”) such as a privacy card and/or digital wallet. Ludtke, Abstract,
`
`3:32-36, 6:36-44. The transaction device includes a processor, memory, and
`
`fingerprint recognition technology. Ludtke, 5:60-64, FIG. 7A. Ludtke stores
`
`
`
`ordinary meaning or the alternate constructions adopted in the other proceedings.
`
`See EX. 1030, EX. 1031.
`
`
`
`5
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`“authorized fingerprint recognition samples,” a device ID corresponding to the
`
`privacy card, and a public key infrastructure (“PKI”) on the transaction device.
`
`Ludtke, 11:66-12:7, 14:19-21, 38:26-29. Ludtke also indicates that the biometric
`
`device can use other techniques, such as a “retinal scan, voice, DNA, hand profile,
`
`face recognition, etc.,” instead of or in addition to fingerprints. Ludtke, 35:61-64.
`
`When an authorized user attempts to use the transaction device, e.g., at a
`
`point of sale (“POS”) terminal, or other “service,” the user is “prompted to supply
`
`a fingerprint recognition sample,” as an initial security measure. Ludtke, 1:22-31,
`
`1:37-38, 14:33-42, 18:45-50, 18:52-55. The sample is compared to stored
`
`fingerprints and if the sample is recognized, the user is authorized. Ludtke, 14:40-
`
`46.
`
`In one embodiment, “the transaction device is used to trigger shopping
`
`activity” such as a “web-based transaction using a transaction device such as a
`
`privacy card and/or digital wallet and a personal POS terminal” by “clicking on a
`
`‘Buy!’ or similar button in the web browser.” Ludtke, 28:15-18, 28:26-40, 28:34-
`
`35. The POS asks the transaction device to “validate the user” and the user is
`
`“prompted to supply a fingerprint recognition sample,” as an initial security
`
`measure. Ludtke, 1:22-31, 1:37-38, 14:33-42, 18:45-50, 18:52-55, 28:57-62. The
`
`sample is compared to stored fingerprints and if the sample is recognized, the user
`
`is authorized. Ludtke, 14:41-46. Once the transaction device authorizes the user
`6
`
`
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`based on the matching biometric information, the personal POS terminal “opens a
`
`secure communications session to the TPCH, requesting a transaction,” and
`
`“provides the transaction record that it received from the web browser and the
`
`unique ID of the transaction device.” Ludtke, 29:5-12 (emphasis added); see also
`
`Ludtke, 27:12-13 (“Privacy card information is provided to TPCH, step 1510.”),
`
`34:25-27 (explaining that “necessary secure transaction communication with the
`
`TPCH” includes “providing the transaction data and its device ID” (emphasis
`
`added)). The TPCH is a trusted third-party agent, separate from the transaction
`
`device, personal POS terminal and the back-end transacting entity (e.g., vendor).
`
`Ludtke, 7:42-48, 9:26-34, FIG. 6.
`
`Ludtke also discloses an alternate embodiment in which the POS
`
`“functionality of providing secure communication and transactions with the
`
`Transaction Privacy Clearing House (TPCH)” described above “can be integrated
`
`into the digital wallet directly.” Ludtke, 28:41-45. Thus, Ludtke also discloses
`
`communicating the device ID directly from the transaction device to the TPCH
`
`responsive to a “match” between the scanned biometric data (e.g., fingerprint or
`
`other biometric data) and stored data.
`
`Next, “[t]he TPCH uses the unique ID of the transaction device to process
`
`the transaction. After validating that the transaction device is in good standing and
`
`that the selected account has sufficient funds for the transaction, the TPCH issues a
`7
`
`
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`transaction confirmation back to the personal POS terminal” that “reflects the
`
`transaction confirmation back to . . . the transaction device. The transaction device
`
`may display a transaction confirmation to the user and may additionally record the
`
`transaction in its local storage.” Ludtke, 29: 12-23, FIG. 15.
`
`Ludtke, FIG. 15.
`
`
`
`
`
`8
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`Ludtke is analogous art to the ’730 patent because it is directed to the same
`
`technical field: user authentication methods and systems. Compare Ex. 1001, 1:16-
`
`19, with Ludtke, 1:59-61; Decl., 33, 57-64.
`
`B. Claims
`1.
`Independent claim 1
`a.
`[1preamble]: “A method for verifying a user during
`authentication of an integrated device, comprising the
`steps of:”
`To the extent limiting, Ludtke discloses [1preamble] because Ludtke
`
`discloses “identifying an authorized user” (verifying a user) “with a biometric
`
`device and enabling the authorized user to access private information” using a
`
`“transaction device” such as a privacy card and/or digital wallet (integrated
`
`device). Ludtke, Abstract, 3:32-36; Decl., 72-74. Ludtke explains that “[t]he user
`
`connects to and performs transactions with [an] eCommerce system through a
`
`transaction device which has a unique identifier (ID)” such as “a privacy card is
`
`used” or “a digital wallet” (integrated devices). Ludtke, 3:32-36.
`
`The ’730 patent describes a “biometric key” including the elements recited
`
`in [1ai]-[1aii]. Ex. 1001, 1:57-67. Patent Owner indicated in its Responsive Claim
`
`Construction Brief (Ex. 1018) that “an ‘integrated device’ is a ‘device’ that is
`
`integrated with a biometric key.” Ex. 1018, 4. Patent Owner’s Sur-Reply Claim
`
`Construction Brief also states that “‘integrated device’ integrates or includes a
`
`
`
`9
`
`

`

`IPR2024-01333
`U.S. Patent No. 8,352,730
`
`biometric key component … .” Ex. 1022, 2. Ludtke’s transaction devices (such as
`
`a digital wallet and/or privacy card) likewise include a biometric key and constitute
`
`an integrated device under Patent Owner’s construction, as explained below. Decl.,
`
`73-74.
`
`Petitioner’s indefiniteness challenge in the district court proceeding does not
`
`preclude institution of an IPR. Intel Corp. v. Qualcomm Inc., 21 F.4th 801, 813
`
`(Fed. Cir. 2021) (“The indefiniteness of a limitation … precludes a patentability
`
`determination only when the indefiniteness renders it logically impossible for the
`
`Board to reach such a decision.”); Zillow Grp., Inc. v. Int’l Bus. Machs. Corp.,
`
`IPR2020-01656, Paper 8 at 11 (PTAB Mar. 15, 2021) (“Patent Owner cites no
`
`authority nor are we aware of any authority for the proposition that we may not
`
`assess the patentability of claims in an inter partes review because the Petitioner
`
`also challenges those claims as indefinite in District Court.”); Target Corp. v.
`
`Proxicom Wireless, LLC, IPR2020-00931, Paper 10 at 9 (PTAB Nov. 10, 2020)
`
`(noting that “[a]lternative pleading before a court is common practice”); Alcon Inc.
`
`v. AMO Dev., LLC, IPR2021-00843, Paper 15 at 16 (PTAB Nov. 12, 2021)
`
`(instituting review despite petitioner’s allegation before the district court that the
`
`claim is indefinite when the Board was “able to construe the disputed claim term
`
`with sufficient precision to address the obviousness arguments”).
`
`
`
`10
`
`

`

`b.
`
`IPR2024-01333
`U.S. Patent No. 8,352,730
`[1ai]: “persistently storing biometric data of the user
`[in a tamper proof format written to a storage
`element on the integrated device that is unable to be
`subsequently altered]”
`Ludtke discloses [1ai] because its transaction device, like a privacy card
`
`and/or digital wallet, (integrated device) stores “authorized fingerprint recognition
`
`samples” or other “biometric identification” e.g., “retinal scan, voice, DNA, hand
`
`profile, face recognition, etc.” (biometric data of the user) in a “user
`
`identity/account information block 760” or “write-once memory” (persistent
`
`storage). Ludtke, 13:27-29, 14:19-21, 19:9-14, 19:29-40, 35:61-64, FIGS. 7B-7C,
`
`Decl., 75-78.
`
`Ludtke’s privacy card (integrated device) has a “user identity/account
`
`information block 760 [that] stores data about the user and accounts that are
`
`accessed by the card” including “the authorized fingerprint recognition samples.”
`
`Ludtke, 13:27-29, 14:19-21, 14:13-18 (emphasis added) (explaining that the
`
`privacy card embodied in Figure 7C “may include those functions set forth in FIG.
`
`7b, referred to herein as first generation privacy card technology block 775 and
`
`FeliCa2 Technology block 774”); Decl., 76.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket