throbber

`
`UNITED STATES PATENT AND TRADEMARKOFFICE
`
`UNITED STATES DEPARTMENT OF COMMERCE
`United States Patent and Trademark Office
`Address COMMISSIONER FOR PATENTS
`P.O, Box 1450
`Alexandria. Virginia 22313-1450
`WWW.USPLO.gOV
`
`CONFIRMATION NO.
`
`APPLICATION NO.
`
`15/054,020
`
`FILING DATE
`
`02/25/2016
`
`FIRST NAMED INVENTOR
`
`ATTORNEY DOCKET NO.
`
`An Liu
`
`MPS15-SP02
`
`6551
`
`Dock
`
`Docket Clerk - SAMS
`
`Al
`
`P.O. Drawer 800889
`Dallas, TX 75380
`
`“ees
`
`Dove
`
`ABEDIN, SHANTO
`
`ART UNIT
`
`2436
`
`PAPER NUMBER
`
`NOTIFICATION DATE
`
`DELIVERY MODE.
`
`O1/1 1/2018
`
`ELECTRONIC
`
`Please find below and/or attached an Office communication concerning this application or proceeding.
`
`The time period forreply, if any, is set in the attached communication.
`
`Notice of the Office communication was sent electronically on above-indicated "Notification Date" to the
`following e-mail address(es):
`patents @ munckwilson.com
`munckwilson @gmail.com
`patent.srad @samsung.com
`
`PTOL-90A (Rev. 04/07)
`
`CARDWAREEXHIBIT 2009
`
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 1 of 52
`
`

`

`
`
`
`
`Application No.
`Applicant(s)
`LIU ET AL.
`15/054 ,020
`
`
`
`
`
`
`
`
`
` Office Action Summary
`
`
`
`
`
`
`
`
`
`AIA (First Inventorto File)
`Art Unit
`Examiner
`
`
`SHANTO M. ABEDIN
`2436
`oa
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`-- The MAILING DATEof this communication appears on the cover sheet with the correspondence address --
`
`
`
`Period for Reply
`
`
`
`
`
`
`
`
`
`
`
`
`Disposition of Claims*
`5)B Claim(s) 1-20 is/are pending in the application.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5a) Of the above claim(s)
`is/are withdrawnfrom consideration.
`6)L] Claim(s)
`is/are allowed.
`
`
`
`
`
`7) Claim(s) 1-20 is/are rejected.
`
`
`
`
`8)L] Claim(s)
`is/are objected to.
`
`
`
`
`
`
`9)C] Claim(s)
`are subject to restriction and/or election requirement.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`* If any claims have been determined allowable, you may be eligible to benefit from the Patent Prosecution Highway program at a
`
`
`
`
`
`
`
`
`
`
`
`
`
`participating intellectual property office for the corresponding application. For more information, please see
`
`
`
`
`
`
`
`
`h/index.}sp or send an inquiry to PPHieedback@uspte.qov.
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A SHORTENED STATUTORY PERIOD FOR REPLYIS SET TO EXPIRE 03 MONTHS FROM THE MAILING DATE
`
`
`
`OF THIS COMMUNICATION.
`Extensions of time may be available under the provisions of 7 GFR 1.136{a).
`
`
`
`
`
`
`
`
`
`
`
`
`after SIX (6) MONTHS from the mailing date of this communication.
`
`
`
`
`
`
`
`
`
`
`
`-
`If NO period for reply is specified above, the maximum statutory period will apply and will expire SIX (6) MONTHS from the mailing date of this communication.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- Failure to reply within the set or extended period for reply will, by statute, cause the application to become ABANDONED (35 U.S.C. § 133).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Anyreply received by the Office later than three months after the mailing date of this communication, evenif timely filed, may reduce any
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`earned patent term adjustment. See 37 CFR 1.704(b).
`
`
`
`
`
`
`
`
`
`In no event, however, may a reply be timely filed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Status
`
`1) Responsive to communication(s) filed on 02/25/2016.
`
`
`
`
`
`
`
`
`(] A declaration(s)/affidavit(s) under 37 CFR 1.130(b) was/werefiled on
`
`
`
`
`
`
`
`
`
`2a)L] This action is FINAL.
`2b)X] This action is non-final.
`
`
`
`
`
`
`
`
`
`
`3)L] An election was madebythe applicant in response to a restriction requirementset forth during the interview on
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`___; the restriction requirement and election have been incorporated into this action.
`4)[] Since this application is in condition for allowance except for formal matters, prosecution as to the merits is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`closed in accordance with the practice under Ex parte Quayle, 1935 C.D. 11, 453 O.G. 213.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Application Papers
`10)Z The specification is objected to by the Examiner.
`
`
`
`
`
`
`
`
`
`
`11)EX] The drawing(s) filed on 02/25/2016 is/are: a) accepted or b)] objected to by the Examiner.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Applicant may not request that any objection to the drawing(s) be held in abeyance. See 37 CFR 1.85(a).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Replacement drawing sheet(s) including the correction is required if the drawing(s) is objected to. See 37 CFR 1.121(d).
`
`
`
`
`
`
`
`Priority under 35 U.S.C. § 119
`12)[_] Acknowledgmentis madeof a claim for foreign priority under 35 U.S.C. § 119(a)-(d) or(f).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Certified copies:
`a)L] All
`)[] Some** c)LJ Noneof the:
`
`
`
`
`
`
`
`1.1] Certified copies of the priority documents have been received.
`
`
`
`
`
`
`
`
`
`
`2.-] Certified copies of the priority documents have been received in Application No.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`3.1] Copiesof thecertified copies of the priority documents have been receivedin this National Stage
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`application from the International Bureau (PCT Rule 17.2(a)).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`** See the attached detailed Office action for a list of the certified copies not received.
`
`
`
`
`
`
`Attachment(s)
`
`
`1) | Notice of References Cited (PTO-892)
`3) C] Interview Summary (PTO-413)
`
`
`
`
`
`
`
`
`
`
`
`
`
`:
`:
`‘
`Paper No(s)/Mail Date.
`
`
`
`2) xX Information Disclosure Statement(s) (PTO/SB/08a and/or PTO/SB/08b)
`
`
`
`
`
`
`
`Paper No(s)/Mail Date 02/25/16: 03/01/16: 09/01/16 and 02/06/17.
`4) LJ other:_.- CARDWAREEXHIBIT 2009
`
`
`
`
`
`
`
`
`
`
`
`Teena
`oc Aston suman
`CARDWARE.V,.SAMSUNG
`
`
`
`PGR2023-00013
`Page 2 of 52
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 2 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The present application, filed on or after March 16, 2013, is being examined underthefirst
`
`
`
`
`
`
`
`inventorto file provisions of the AIA.
`
`
`
`
`DETAILED ACTION
`
`
`
`
`
`I,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`This office action is in response to the communication filed on 02/25/2016. Claims 1-20 are
`
`
`
`
`
`
`
`
`
`
`
`
`pending in the application. Claims 1-20 have been rejected.
`
`
`
`Information Disclosure Statement
`
`
`
`
`2:
`
`
`
`
`
`
`
`
`
`
`The information disclosure statements (IDS) submitted on 02/25/2016, 03/01/2016,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`09/01/2016 and 02/06/2017 are in compliance with the provisions of 37 CFR 1.97. Accordingly, the
`
`
`
`
`
`
`
`
`
`
`
`information disclosure statement are being considered by the examiner.
`
`
`
`
`
`
`
`Claim Rejections - 35 USC § 101
`
`
`
`
`
`
`
`
`
`35 U.S.C. 101 reads as follows:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Whoever invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`new and useful improvement thereof, may obtain a patent therefor, subject to the conditions and requirements of this
`title.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`There are two criteria for determining subject matter eligibility under 35 U.S.C. 101 and both
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`must be satisfied. The claimed invention (1) must be directed to one of the four statutory categories,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and (2) must not be wholly directed to subject matter encompassing a judicially recognized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`exception, as defined below. The following two step analysis is used to evaluate thesecriteria.
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page 3 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 3 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 3
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Step 1 analysis: Is the claim directed to one of the four patent-eligible subject matter
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`categories: process, machine, manufacture, or composition of matter? The subject matter of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`claim mustbe directed to one of the four subject matter categories.If it is not, the claim is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`eligible for patent protection and should be rejected under 35 U.S.C. 101, for at least this reason.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Step 2 analysis: Following the decision in Alice Corp. Pty. Ltd. v. CLS Bank Int'l, 134 S.Ct.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2347 (2014) (citing Mayo Collaborative Services v. Prometheus Labs., Inc., 132 S.Ct. 1289, 1300
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(2012)), the claims are analyzed where the abstract idea judicial exception to the categories of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`statutory subject matteris at issue using the following two-part analysis set forth in Mayo:1, e.g.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`step 2A) Determine whether the claim is directed to an abstract idea; and 2 e.g. step 2B) if an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`abstract idea is present in the claim, determine whether any element, or combination of elements, in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the claim is sufficient to ensure that the claim amountsto significantly more than the abstract idea
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`itself. See Alice Corp. Pty. Ltd. v. CLS Bank Int'l, 134 S.Ct. at 2350.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`For a detailed discussion of the analysis required to determine whether a claim is directed to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`patent-eligible subject matter, MPEP 2106 Patent Subject Matter Eligibility [R-07.2015] for detail
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`explanations; and also the 2014 Interim Guidance on Patent Subject Matter Eligibility, 79 Fed. Reg.
`
`
`
`
`
`
`
`
`
`74618 (December 16, 2014) and related materials available at www.uspto.gov /patent/laws-and-
`
`
`
`regulations/examination-policy/2014- interim-guidance-subject-matter-eligibility-0.
`
`
`
`3)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Claims 15-20 are rejected under 35 USC 101 as the claimed inventionis directed to non-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`statutory subject matter. The claim(s) does/do not fall within at least one of the four categories of
`
`
`
`
`
`
`
`
`
`
`
`
`
`patent eligible subject matter because of the reasons explained as bellows:
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 4 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 4 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 4
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claims 15-20, they are directed to a ‘system’ comprising a processor and a
`
`
`
`
`
`
`
`
`
`communication interface configured to perform the claimed functionalities.
`
`
`
`
`
`
`
`
`
`
`
`
`However,at the time of invention, software implementation of a processor (Note US
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2007/0204153 Al, Tomeet al, and US 2013/0007114 Al, WEEetal: virtual or software
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`processor) and a communication interface (Note US 2016/0080468, Lambert et al, Para 0331:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`virtual NIC; and US 2016/0036892, Twitchell, JR, Para 114: virtual network interface) were also
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`well knownin the art. Furthermore, according to the specification (please see applicant’s
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`specification Para 010: implementation using software and/ or firmwareetc.), the claimed
`
`
`
`
`
`
`
`
`
`
`
`
`
`processor/ controller and communication system could optionally be implemented in software/
`
`
`
`
`firmware only.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Therefore, the claimed system is interpreted as software only implemented system,or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`program perse product, and consequently fails “step 1” of the subject matter eligibility test. See
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`MPEP 2106 Patent Subject Matter Eligibility [R-07. 2015]: non-limiting examples of non-statutory
`
`
`
`
`
`
`
`
`
`
`categories to include computer program per se products.
`
`
`
`
`
`
`
`
`Claim Rejections - 35 USC§103
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The following is a quotation of 35 U.S.C. 103 which formsthe basis for all obviousness
`
`
`
`
`
`
`
`
`
`rejections set forth in this Office action:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`disclosed as set forth in section 102, if the differences between the claimed invention and thepriorart are suchthat
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the claimed invention as a whole would have been obvious before the effectivefiling date of the claimed invention to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by
`the mannerin which the invention was made.
`
`
`
`
`
`
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page 5 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 5 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The factual inquiries set forth in Graham v. John Deere Co., 383 U.S. 1, 148 USPQ 459
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(1966), that are applied for establishing a background for determining obviousness under35 U.S.C.
`
`
`
`
`
`
`
`
`103 are summarized as follows:
`
`
`
`
`
`
`
`
`
`
`1, Determining the scope and contents ofthe priorart.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2. Ascertaining the differences betweenthe prior art and the claimsat issue.
`
`
`
`
`
`
`
`
`
`
`
`
`
`3. Resolving the level of ordinary skill in the pertinentart.
`
`
`
`
`
`
`
`
`
`
`
`
`
`4, Considering objective evidence present in the application indicating obviousness or
`
`
`
`nonobviousness.
`
`
`
`4.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Claims 1-5, 7-12, 14-18 and 20 are rejected under 35 U.S.C. 103 as being unpatentable over
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 2014/0122873 Al (hereinafter DEUTSCHet al) in view of US 2011/0022835 Al (hereinafter
`
`
`
`Schibuk)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 1, DEUTSCHetal teaches a method for exchanging encrypted information
`
`
`
`
`
`
`
`
`
`by an electronic device, the method comprising:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`generating one or more device certificates and one or more device keys, the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device certificates signed using a device unique keythat is pre-stored on the electronic device (Note
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Para 034, 043, 073, 126: generated device certificates signed by attestation identity key, AIK);
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitting the one or more devicecertificates to a token service provider (TSP) server
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(Note Figure 2A.207 and Figure 3.315; and Para 021, 126-127: trust broker sending certificate to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`service provider; note, trust broker is interpreted as token service provider);
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page6 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 6 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 6
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving one or more TSPcertificates from the TSP server (Note Figure 2A.208; and Para
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`126-127: client receiving certificate from the trust broker; note, trust brokeris interpreted as token
`
`
`
`
`
`service provider, TSP);
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identifying one or more TSP public keys of the TSP server based on the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`received TSP certificates (Note Para 020, 073, 127-129: affirming mutual attestation between service
`
`
`
`
`
`
`providerand client); and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitting a message including(i) the information encrypted based on the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identified TSP keys and(ii) a signature of the electronic device (Note Para 034, 039, 061, 127, 130:
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitting signed certificate, and providing service/ information encrypted by AIK key)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCHet al fails to teach expressly the one or more device certificates signed using a
`
`
`
`
`
`
`
`
`
`
`
`
`
`device unique private key; and transmitting a message including the information encrypted based on
`
`
`
`
`
`
`
`
`
`
`the one or more identified TSP public keys.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`However, Schibuk teaches the one or more device certificates signed using a device unique
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`private key (Note Para 037, 057, 079: public key certificate associated with client/ device; may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`signed by the server); and transmitting a message including the information encrypted based on the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one or more identified TSP public keys (Note Para 066, 092-093, 099: encrypted communication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`between client and server using asymmetric keys) Examiner notes, Schibuk further teaches
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authenticating a certificate from a token facility or credit issuer (Note Para 025, 076, 086, 093) that
`
`
`
`
`
`
`
`
`can also be interpreted as TSP.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Schibuk and DEUTSCHetal are from the samefield of art of managing and authenticating
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`secure transactionsutilizing digital certificates. Therefore, at the time of invention, it would have
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`been obvious to a person of ordinary skill in the art to combine the teaching of Schibuk with
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 7 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 7 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 7
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCHet al to implement a method further comprising the features of the one or more device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates signed using a device unique private key, and transmitting a message including the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information encrypted based on the one or more identified TSP public keys in order to provide users
`
`
`
`
`
`
`
`
`
`
`
`
`
`with alternative and well-known authentication mechanism utilizing public key based device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates instead of AIK key based certificates (Note Schibuk, Para 003, 007)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 2, it is rejected applying as same motivation andrationale applied above
`
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 1, furthermore, Schibuk teaches the method, wherein:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a certificate of the device unique private key is signed using a rootcertificate authority (CA)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`private key of a manufacturer of the electronic device (Note Para 019, 057, 099: client device
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving public key certificate from certificate authority; determining rootcertificate), and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device unique private key is stored on the electronic device by the manufacturer for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`access by a trusted application of the electronic device (Note Para 057, 099: private key tied to the
`
`
`
`
`
`
`
`public key of the certificate)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 3, it is rejected applying as same motivation and rationale applied above
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 2, furthermore, Schibuk teaches the method wherein a public key for the root CA
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`private key of the manufacturer of the electronic device is provided to the TSP by the manufacturer
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of the electronic device priorto the generating of the one or more devicecertificates and the one or
`
`
`
`
`
`
`
`
`
`
`more device public private key pairs (Note Para 057, 099)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 4, DEUTSCHetal teaches the method of claim 1, wherein identifying the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one or more TSP public keys of the TSP server based on the one or more received TSP certificates
`
`
`
`comprises:
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page 8 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 8 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 8
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identifying a certificate of the TSP that is pre-stored on the electronic device for access by a
`
`
`
`
`
`
`
`
`
`
`
`trusted application of the electronic device (Note Para 020, 073, 127-129);
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`verifying authenticity of the one or more received TSPcertificates based on the certificate
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`using the trusted application (Note Para 020, 073, 127-129; affirming mutual attestation between
`
`
`
`
`
`
`
`service provider and client); and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identifying the one or more TSP keysin responseto verifying the authenticity of the one or
`
`
`
`
`
`
`
`
`
`
`
`
`more received TSPcertificates (Note Para 020, 039, 073, 128)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCH etal teaches authentication of the client device and the trust brokeror service
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`provider using AIK key certificate, but fails to teach expressly identifying a root certificate authority
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(CA)certificate that is pre-stored on the electronic device; verifying authenticity of the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`received certificates based on the root CA certificate; and identifying the one or more public keysin
`
`
`
`
`
`
`
`
`
`
`responseto verifying the authenticity of the certificates.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`However, Schibuk teaches identifying a root certificate authority (CA)certificate that is pre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`stored on the electronic device (Note Para 019, 057, 099); verifying authenticity of the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`received certificates based on the root CA certificate (Note Para 057, 099: client device receiving
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`public key certificate from certificate authority; determining root certificate); and identifying the one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`or more public keys in response to verifying the authenticity of the certificates (Note Para 019, 057,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`099: private key tied to the public key of the certificate) Schibuk further teaches authenticating a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificate from a token facility or credit issuer (Note Para 025, 076, 086, 093) that can also be
`
`
`
`
`
`interpreted as TSP.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 5, it is rejected applying as same motivation and rationale applied above
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 1, furthermore, Schibuk teaches the method, wherein:
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page 9 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 9 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`
`Page 9
`
`
`
`
`
`
`
`
`
`
`
`
`
`the one or more device certificates include an encryption certificate and a signing certificate,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the one or more device public private key pairs include a unique signing public private key pair
`
`
`
`
`
`
`
`
`(Note Para 037, 079, 099), and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the signature of the electronic device is based on a unique signing private key of the unique
`
`
`
`
`
`
`
`
`
`
`
`
`signing public private key pair (Note Para 019, 037, 079)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 7, it is rejected applying as same motivation and rationale applied above
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 1, furthermore, Schibuk teaches the method of claim 1, wherein the information
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`includes information for registering payment information with the TSP, the payment information
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`associated with the electronic device (Note Para 094-096: storing customer’s credit/ payment
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information) Examiner notes, Schibuk further teaches a token facility or credit issuer (Note Para
`
`
`
`
`
`
`
`
`
`
`
`
`
`025, 076, 086, 093) that can also be interpreted as TSP.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 8, DEUTSCHetalteaches an electronic device for exchanging encrypted
`
`
`
`
`
`
`
`information, the electronic device comprising:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`at least one processor (Note Figure 7B.710: processor) configured to generate one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device certificates and one or more device keys, the one or more devicecertificates signed using a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device unique key that is pre-stored on the electronic device (Note Para 034, 043, 073, 126:
`
`
`
`
`
`
`
`
`
`
`
`
`generated device certificates signed by attestation identity key, AIK); and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a transceiver (Note Figure 7B.770: connectivity component) configured to transmit the one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`or more device certificates to a token service provider (TSP) server and receive one or more TSP
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates from the TSP server (Note Figure 2A.207 and Figure 3.315; and Para 021, 126-127: trust
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`broker sending certificate to the service provider; note, trust broker is interpreted as token service
`
`
`
`provider),
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWAREV. SAMSUNG
`PGR2023-00013
`Page 10 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 10 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`Page 10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the at least one processoris further configured to identify one or more TSP keys of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the TSP server based on the one or more received TSPcertificates (Note Para 020, 073, 127-129:
`
`
`
`
`
`
`
`
`
`
`
`affirming mutual attestation between service provider and client), and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the at least one transceiver is configured to transmit a message including(i) the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information encrypted based on the one or more identified TSP keys and (ii) a signature of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`electronic device (Note Para 034, 039, 061, 127, 130: transmitting signed certificate, and providing
`
`
`
`
`
`
`
`
`service/ information encrypted by AIK key)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCHet alfails to teach expressly the one or more device certificates signed using a
`
`
`
`
`
`
`
`
`
`
`
`
`
`device unique private key; and transmitting a message including the information encrypted based on
`
`
`
`
`
`
`
`
`
`
`the one or more identified TSP public keys.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`However, Schibuk teaches the one or more device certificates signed using a device unique
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`private key (Note Para 037, 057, 079: public key certificate associated with client/ device; may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`signed by the server); and transmitting a message including the information encrypted based on the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one or more identified TSP public keys (Note Para 066, 092-093, 099: encrypted communication
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`betweenclient and server using asymmetric keys) Examiner notes, Schibuk further teaches
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authenticating a certificate from a token facility or credit issuer (Note Para 025, 076, 086, 093) that
`
`
`
`
`
`
`
`
`can also be interpreted as TSP.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Schibuk and DEUTSCHetal are from the samefield of art of managing and authenticating
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`secure transactionsutilizing digital certificates. Therefore, at the time of invention, it would have
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`been obvious to a person of ordinary skill in the art to combine the teaching of Schibuk with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCHet al to implement a device further comprising the features of the one or more device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates signed using a device unique private key, and transmitting a message including the
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 11 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 11 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`Page 11
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information encrypted based on the one or more identified TSP public keys in order to provide users
`
`
`
`
`
`
`
`
`
`
`
`
`
`with alternative and well-known authentication mechanism utilizing public key based device
`
`
`
`certificates instead of AIK key based certificates (Note Schibuk, Para 003, 007)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 9,it is rejected applying as same motivation andrationale applied above
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 8, furthermore, Schibuk teaches the electronic device wherein: a certificate of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device unique private key is signed using a rootcertificate authority (CA) private key of a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`manufacturer of the electronic device (Note Para 019, 057, 099: client device receiving public key
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificate from certificate authority; determining rootcertificate), and the device unique private key
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is stored on the electronic device by the manufacturer for access by a trusted application of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`electronic device (Note Para 057, 099: private key tied to the public key ofthe certificate)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 10, it is rejected applying as same motivation and rationale applied above
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rejecting claim 8, furthermore, Schibuk teaches the electronic device of claim 9, wherein a public
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`key for the root CA private key of the manufacturer ofthe electronic device is provided to the TSP
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`by the manufacturer of the electronic device prior to the generating of the one or more device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates and the one or more device public private key pairs (Note Para 057, 099)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Regarding claim 11, DEUTSCHetal teaches the electronic device of claim 8, wherein to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identify the one or more TSP public keys of the TSP server based on the one or more received TSP
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`certificates, the at least one processoris configured to: identify a certificate of the TSP that is pre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`stored on the electronic device for access by a trusted application of the electronic device ((Note
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Para 020, 073, 127-129); verify authenticity of the one or more received TSPcertificates based on
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the TSP certificate using the trusted application (Note Para 020, 073, 127-129: affirming mutual
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`attestation between service provider and client); and identify the one or more TSP public keys in
`
`
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 12 of 52
`
`CARDWARE EXHIBIT 2009
`CARDWARE V. SAMSUNG
`PGR2023-00013
`Page 12 of 52
`
`

`

`
`
`Application/Control Number: 15/054,020
`
`
`
`Art Unit: 2436
`
`
`
`
`Page 12
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`responseto verifying the authenticity of the one or more received TSPcertificates (Note Para 020,
`
`
`
`
`039, 073, 128)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DEUTSCHet al teaches authentication of the client device and the trust broker or service
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`providerusing AIK key certificate, but fails to teach expressly identifying a root certificate authority
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(CA) certificate that is pre-stored on the electronic device; verifying authenticity of the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`received certificates based on the root CA certificate; and identifying the one or more public keys in
`
`
`
`
`
`
`
`
`
`
`response to verifying the authenticity of the certificates.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`However, Schibuk teaches identifying a root certificate authority (CA)certificate that is pre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`stored on the electronic device (Note Para 01

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket