throbber
Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 1 of 25
`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 1 of 25
`
`EXHIBIT 8
`EXHIBIT 8
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 2 of 25
`
`AIRE-SAMS-00000674
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re of:
`Application No.:
`
`10/531,259
`
`Filing Date:
`
`April 24, 2006
`
`Examiner:
`
`Art Unit:
`
`Trang T. Doan
`
`2131
`
`First Inventor:
`
`Gisela MEISTER
`
`Customer No.:
`
`23364
`
`Attorney No.:
`
`MEIS3002/JEK
`
`Confirmation No.:
`
`4669
`
`For:
`
`METHOD FOR CARRYING OUT A SECURE ELECTRONIC
`TRANSACTION USING A PORTABLE DATA SUPPORT
`
`RESPONSE AND PROPOSED AMENDMENTS AFTER FINAL REJECTION
`(37 CFR
`
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`INTRODUCTORY COMMENTS
`Reconsideration of the final rejection of the claims of this application as expressed in
`the Office Action mailed February 18, 2009 is respectfully requested. Applicant proposes to
`to clearly place the application in condition for allowance without
`further amend claim 1
`raising new issues or requiring further searching by the examiner.
`
`AMENDMENTS
`
`Amendments to the Specification
`The specification is amended as shown in the following pages under the heading
`“AMENDMENTS TO SPECIFICATION.”
`
`Amendments to the Claims
`The claims are amended as shown in the following pages under the heading “LIST OF
`CURRENT CLAIMS”. This listing of claims supersedes all prior listings of the claims
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 3 of 25
`
`AIRE-SAMS-00000675
`
`presented in this application, shows the current status of all claims in the application and
`shows currently proposed amendments to the claims.
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 4 of 25
`
`AIRE-SAMS-00000676
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`AMENDMENTS TO THE SPECIFICATION
`On page 4, the last paragraph spanning pages 4 and 5 is amended to read:
`The portable data carrier 20 is further set up to perform at least one, but expediently a
`plurality of different quality user authentication methods. It preferably supports at least two
`authentication methods of different order with regard to the quality of authentication. It
`expediently supports at least one knowledge-based authentication method, e.g. a PIN check,
`and at least one biometric method, within which a biometric feature of the user 30 to be
`presented at the terminal 14 is checked. The biometric method inherently constitutes the
`higher-quality one here, since it presupposes the personal presence of the user 30; this is not
`ensured in the knowledge-based method since the knowledge can have been acquired by an
`unauthorized user. Accordingly the storage means 26 store at least one secret to be presented
`by the user 30, e.g. areference PIN assigned to a user 30, and at least one biometric reference
`data record assigned to a user 30. It can expediently be provided that the portable data carrier
`20 supports more than two authentication methods, in particular further biometric methods.
`Accordingly the storage means 26 in this case store further secrets and/or reference data
`records and the integrated circuit 24 is set up to perform the further authentication methods.
`
`On page 5, the last paragraph is amended to read:
`After the signature application has been started, the user 30 presents a suitable
`portable data carrier 20 to the terminal 40, step 104. The portable data carrier 20 will
`hereinafter be taken to have the form of a contact-type chip card. Further, it will hereinafter
`be assumed that the chip card 20 supports two authentication methods, namely a PIN check
`as a knowledge-based, inherently low-quality method, and a fingerprint check as a biometric,
`inherently higher-quality method.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 5 of 25
`
`AIRE-SAMS-00000677
`
`Application No.: 10/531,259
`Axt Unit: 2131
`
`LIST OF CURRENT CLAIMS
`1. (Currently Amended) A method for effecting a secure electronic transaction on a
`terminal using a portable data carrier arranged to perform different quality user authentication
`methods, wherein the portable data carrier performs a user authentication using one of said
`different user authentication methods, the portable data carrier confirms the proof of
`authentication to the terminal, and the portable data carrier then performs a security-
`establishing operation within the electronic transaction, comprising the steps of creating
`authentication quality information by the portable data carrier about said hew-+the
`user authentication method used and
`attaching said authentication quality information is-attaehed-to the result of the security-
`establishing operation, wherein the difference in quality of user authentication varies between
`an inherently relatively lower quality and an inherently relatively higher quality from a
`security perspective.
`
`2. (Previously Presented) The method according to claim 1, wherein the security-
`establishing operation performed by the portable data carrier comprises creating a digital
`signature.
`
`3. (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by presentation of a biometric feature.
`
`4, (Previously Presented) The method according to claim 3, wherein the
`authentication of the user is performed by presentation of a physiological or behavior-based
`feature characteristic of a user.
`
`5. (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by proof of knowledge ofa secret.
`
`6. (Previously Presented) The method according to claim 1, wherein at least two
`different authentication methods of different quality are offered for authentication of the user.
`
`7. (Previously Presented) The method according to claim 6, wherein the particular
`authentication methods not used are disabled.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 6 of 25
`
`AIRE-SAMS-00000678
`
`Application No.; 10/531,259
`Art Unit: 2131
`
`8. (Previously Presented) The method according to claim 6, wherein no quality
`information is produced for an authentication method.
`
`9, (Previously Presented) The method according to claim 1, wherein a user is asked to
`select an authentication method.
`
`10. (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to perform different
`quality user authentication methods, wherein the difference in quality of user authentication
`varies between an inherently relatively lower quality and an inherently relatively higher
`quality from a security perspective, whereby the portable data carrier is arranged to perform a
`user authentication using one of said implemented user authentication methods and the
`portable data carrier is arranged to confirm the authentication to a terminal, and wherein the
`data carrier is arranged to create quality information about saidstatinghowtheauthentication
`theused user authentication method used and to attach such
`ofthe
`-userwas-performed-by-
`quality information to the result of the security establishing operation.
`
`11. (Previously Presented) The data carrier according to claim 10, wherein the
`portable data carrier is set up to create a digital signature.
`
`12. (Previously Presented) The data carrier according to claim 10, wherein the data
`catrier supports at least two qualitatively different authentication methods.
`
`13. (Currently Amended) A terminal for use in connection with [[a]] the portable data
`carrier according to claim 9, said terminal including a device arranged to cause a user to
`select one of at least two possible different quality authentication methods.
`
`14. (Currently Amended) A system for effecting a secure electronic transaction within
`which the quality of authentication of a user of the system is ascertained, comprising [[a]] the
`portable data carrier according to claim 10 and [[a]] the terminal according to claim 13.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 7 of 25
`
`AIRE-SAMS-00000679
`
`Application No.: 10/531,259
`Agt Unit: 2131
`
`REMARKS
`
`Claim Objections
`Claims 13 and 14 have been amended in the manner suggested by the examiner,
`thereby removing the basis for objection to these claims. Withdrawal of the objections to
`claims 13 and 14, accordingly, is respectfully requested.
`
`Amendments to Claims
`‘Claim 1 has been amended to clarify the intended meaning of the claim without
`affecting the scope of the claim as previously presented. The difference in quality of the user
`authentication specifically is clarified by denoting that the quality may be inherently a
`relatively lower quality or inherently a relatively higher quality from a security perspective.
`last paragraph wherein the terms “low-
`Support for the amendment is found on page 5,
`quality” and “higher-quality” are used to describe two authentication methods. The word
`“inherently” has been added for clarification to indicate that the method itself inherently
`provides less security or more security depending on the nature of the method (e.g., biometric
`versus PIN). The objective of the amendment is to better define the inherent nature of the
`user authentication method from a security perspective.
`Claim 10 has been amended so that it is consistent with claim 1.
`Claims 10 and 13 have been amended so they are consistent with amended claim 1.
`
`Amendment to the Specification
`The specification has been amended so that the language thereof is consistent with the
`language of the amended claims.
`
`Claim Rejections — 35 USC §103
`It is respectfully submitted that the examiner’s reasoning with regard to the rejection
`of claims 1, 3-8, 10, 12 and 14 as reciting subject matter considered to be obvious in view of
`Mimura as modified by Kao is legally flawed. Mimura pure and simple requires a two step
`authentication procedure involving first a fingerprint verification of the user and thereafter an
`electronic authentication using a secret key that has been activated upon the fingerprint
`information submitted by the user matching fingerprint information stored in the system
`memory.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 8 of 25
`
`AIRE-SAMS-00000680
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`The examiner equates the Mimura system with the system recited i claim 1 of this
`application with the exception of teaching that
`the user may use one of different
`In the first place, Mimura fails to disclose or
`authentication methods to authenticate the user.
`teach a method for securing an electronic transaction wherein the quality of the transaction
`used is determined and then information about the authentication quality is attached to the
`result of the security-establishing operation. Mimura simply is concerned with a two stage
`authentication procedure involving first a fingerprint matching process followed by the
`typical electronic signature authentication process, wherein the second procedure is
`There simply is no
`authorized only upon the user passing the first authentication test.
`disclosure, suggestion or teaching in any form that information about the quality of the
`method used for authentication in accordance with Mimura may be attached to the result of a
`security establishing operation. Accordingly, at the very outset the examiner has failed to
`establish a prima facie basis for rejecting the claims on grounds of obviousness due to a
`significant missing element in the basic reference Mimura.
`Recognizing that Mimura fails to specifically disclose that the user may use one of
`different user authentication methods for authentication, the examiner contends that a person
`skilled in the art would recognize from Kao that a user may use one of different user
`authentication methods to authenticate a user. The examiner concludes from this that the
`skilled person could readily modify the Mimura system by providing the user with the
`opportunity to use one of different user authentication methods to authenticate the user. The
`critical factor not explained by the examiner is that if Mimura is modified in the manner
`suggested by the examiner, the Mimura system would be defeated!
`Specifically, Mimura requires a two step authentication procedure involving first a
`fingerprint matching process followed by an electronic signature process, wherein the
`the fingerprint procedure
`electronic signature process is not authorized unless and until
`reveals that the user is authenticated based on a biometric measurement.
`Mimura is clear that both a biometric measurement procedure and an electronic
`signature or key procedure is required in accordance with the security system of Mimura.
`If Mimura is modified in accordance with Kao so that only one or another security
`identification system is used, then the two step process of Mimura is defeated and it will not
`function for its intended purpose, namely a two stage security authentication process.
`is intended to provide two or more
`reading of Kao reveals that
`it
`A careful
`independent authentication modes depending on the authentication procedure demanded by
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 9 of 25
`
`AIRE-SAMS-00000681
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`In accordance with the examples given in Kao, such parties would
`the party to be accessed.
`be a bank and a broker. The system of Kao recognizes which client is to be accessed and
`adapts the GUI of the user’s computer to reflect which program based on the client to be
`accessed is in use. The user then proceeds to obtain authentication and access to the client’s
`computer after satisfying the authentication requirements of the specific client being
`accessed,
`For example, if the client is a bank, a smart card authentication may be required and
`the GUI is adapted for such a procedure, prompting the user to enter the data required for the
`smart card authentication.
`For a different client, such as a brokerage house, a uset/password authentication may
`be required, wherein different modes of operation, i-e., a biometric fingerprint authentication,
`may be required.
`The important consideration here is that in accordance with Kao, a user simply
`attempts to contact a client such as a bank or a brokerage house, and thereafter the system
`prompts the user to authenticate himself/herself using whichever authentication procedure is
`required by the client’s program. No weight whatsoever is given to the authentication
`procedure in accordance with Kao, and further in accordance with Kao, no information
`regarding the quality of the authentication is attached to the result of the security establishing
`operation. Simply put, there is nothing in Kao to suggest that any of the client programs
`the quality of the authentication
`bank, brokerage house, etc.) cares one whit about
`information apart from the fact that the user must satisfy the authentication procedure
`imposed by the client program.
`Accordingly, the examiner’s suggestion that Mimura in view of Kao results in a
`method corresponding to the rejected claims is legally defective and fails to establish a prima
`facie basis of obviousness due to fundamental missing elements in both Mimura and Kao.
`Both Mimura and Kao fail to suggest to a skilled person that the quality of authentication
`information may be attached to the result of a security-establishing operation, and
`furthermore modification of Mimura in accordance with the teachings of Kao would virtually
`defeat Mimura for its intended purpose,a result that entirely contradicts the proposition that a
`person skilled in the art would be motivated to modify Mimura in accordance with Kao to
`arrive at a process which the examiner equates with the rejected claims.
`It is important for the examiner to understand that the method recited in claim 1, as
`described in the written description of this application, provides many advantages over prior
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 10 of 25
`
`AIRE-SAMS-00000682
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`art authentication methods due to the fact that the recipient of the security message following
`authentication receives through the quality information contained in the message a statement
`last paragraph). For
`on the quality of the authentication performed by the user (page 8,
`example, quality information is joined firmly with a created digital signature to form a
`security message expediently within the secure messaging mechanism using the previously
`negotiated session keys. (Page 8, third full paragraph.) This system enables the user to use
`both lower quality and higher quality authentication procedures and as an additional
`important feature, attaches information about the quality of the authentication procedure with
`the results of the security establishing operation.
`None of the prior art shows or teaches the methods recited in the rejected claims and
`withdrawal of the rejection of claims 1, 3-8, 10, 12 and 14 under 35 USC §103(a) as being
`unpatentable over Mimura in view of Kao is appropriate and the same is respectfully
`requested,
`It is respectfully submitted that entry of the proposed amendments is appropriate
`under 37 CFR 1.116, as the amendments do not raise any further issues or require further
`searching by the examiner, moreover, the amendments are responsive to the new grounds for
`rejection expressed in the Action. Finally, the legal deficiency of the final rejection of claims
`1, 3-8, 10, 12 and 14 as expressed above warrants withdrawal of the rejection of these claims
`on the grounds contended by the examiner.
`With regard to claims 2, 9, 11 and 13, these claims are patentable at least on the basis
`of claims 1 and 10 from which they depend.
`In the event that the examiner maintains the final rejection of the claims of this
`application, entry of the amendments for purposes of appeal is respectfully requested.
`
`BACON & THOMAS, PLLC
`625 Slaters Lane, 4" Floor
`Alexandria, VA 22314-1176
`Phone: (703) 683-0500
`Facsimile: (703) 683-1080
`Date: May 18, 2009
`
`an
`
`submitted,
`
`eons
`
`Ky
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 11 of 25
`
`AIRE-SAMS-00000730
`
`Application/Control Number: 10/531 ,259
`Art Unit: 2431
`
`Page 2
`
`DETAILED ACTION
`
`1.
`
`2.
`
`This action is in response to the amendment filed on 12/1/2009.
`Claims 1-14 are pending for consideration.
`
`Response to Arguments
`Applicant's arguments with respect to claims 1-14 have been considered but are
`3.
`moot in view of the new ground(s) of rejection.
`
`4.
`
`Claim Rejections - 35 USC § 102
`The following is a quotation of the appropriate paragraphs of 35 U.S.C. 102 that
`form the basis for the rejections under this section made in this Office action:
`A person shall be entitled to a patent unless —
`(e) the invention was described in (1) an application for patent, published under section 122(b), by
`another filed in the United States before the invention by the applicant for patent or (2) a patent
`granted on an application for patent by another filed in the United States before the invention by the
`applicant for patent, except that an international application filed under the treaty defined in section
`351(a) shall have the effects for purposes of this subsection of an application filed in the United States
`only if the international application designated the United States and was published under Article 21(2)
`of such treaty in the English language.
`Claims 1-6 and 8-14 are rejected under 35 U.S.C. 102(e) as being anticipated by
`5.
`Russo et al. (Pub. No. 20030101348) (hereinafter Russo).
`Regarding claims 1 and 10, Russo discloses a method for effecting a secure
`6.
`electronic transaction on a terminal using a portable data carrier arranged to perform
`different quality user authentication methods, wherein the portable data carrier performs
`a user authentication method, the portable data carrier confirms the proof of
`authentication to the terminal, and the portable data carrier then performs a security-
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 12 of 25
`
`AIRE-SAMS-00000731
`
`Page 3
`
`Application/Control Number: 10/531 ,259
`Art Unit: 2431
`establishing operation within the electronic transaction, comprising the step of creating
`quality information by the portable data carrier about said user authentication method
`used and attaching said authentication quality information to the result of the security-
`establishing operation, wherein the difference in quality of user authentication varies
`between an inherently relatively lower quality and an inherently relatively higher quality
`from a security perspective (Russo: paragraph 0046: Token includes trust metric. The
`trust metric has three possible values (i.e., low, medium, and high confidence);
`paragraph 0053: token also includes a digital signature; and paragraphs 0058-0060: if
`the signature verification succeeds, then the server determines its confidence in the
`transaction).
`Regarding claim 2 and 11, Russo discloses wherein the security-establishing
`7.
`operation performed by the portable data carrier comprises creating a digital signature
`(Russo: paragraph 0024: token...comprising an envelope and a seal. The envelope
`comprises...a trust metric. The seal contains a digital signature).
`Regarding claim 3, Russo discloses wherein the authentication of the user is
`8.
`performed by presentation of a biometric feature (Russo: paragraph 0051: biometric
`such as fingerprint, voiceprint, or face recognition).
`Regarding claim 4, Russo discloses wherein the authentication of the user is
`9.
`performed by presentation of a physiological or behavior-based feature characteristic of
`a user (Russo: paragraph 0051: biometric such as fingerprint, voiceprint, or face
`recognition).
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 13 of 25
`
`AIRE-SAMS-00000732
`
`Page 4
`
`Application/Control Number: 10/531 ,259
`Art Unit: 2431
`Regarding claim 5, Russo discloses wherein the authentication of the user is
`10.
`performed by proof of knowledge of a secret (Russo: paragraph 0039: a secret...such
`as a private key or password).
`11. |Regarding claims 6 and 12, Russo discloses wherein at least two different
`authentication methods of different quality are offered for authentication of the user
`(Russo: paragraph 0051: low confidence level is assigned to authentication using a PIN
`or password...an authentication trust metric indicating a high confidence level is
`assigned authentication requiring use of a biometric).
`Regarding claim 8, discloses wherein no quality information is produced for an
`12.
`authentication method (Russo: paragraph 0059: no confidence in the authenticity of the
`associated transaction).
`Regarding claims 9 and 13, discloses wherein a user is asked to select an
`13.
`authentication method (Russo: paragraph 0044).
`Regarding claim 14, discloses a system for effecting a secure electronic
`14.
`transaction within which the quality of authentication of a user of the system is
`ascertained, comprising a portable data carrier according to claim 10 and a terminal
`according to claim 13 (Russo: paragraph 0051: a physical token such as...smart card).
`
`15.
`
`Claim Rejections - 35 USC § 103
`The following is a quotation of 35 U.S.C. 103(a) which forms the basis for all
`obviousness rejections set forth in this Office action:
`(a) A patent may not be obtained though the invention is not identically disclosed or described as set
`forth in section 102 of this title, if the differences between the subject matter sought to be patented and
`the prior art are such that the subject matter as a whole would have been obvious at the time the
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 14 of 25
`
`AIRE-SAMS-00000733
`
`Application/Control Number: 10/531 ,259
`Art Unit: 2431
`
`Page 5
`
`invention was made to a person having ordinary skill in the art to which said subject matter pertains.
`Patentability shall not be negatived by the manner in which the invention was made.
`Claim 7 is rejected under 35 U.S.C. 103(a) as being unpatentable over Russo in
`16.
`view of Miyashita (US 7403765) (hereinafter Miyashita).
`
`17.
`
`Regarding claim 7, Russo does not disclose wherein the particular authentication
`methods not used are disabled. However, Miyashita discloses wherein the particular
`authentication methods not used are disabled (Miyashita: see figure 1, item S301; and
`column 5 lines 40-67). Therefore, it would have been obvious to a person skilled art at
`the time the invention was made to have included in Russo the feature of Miyashita as
`discussed above because the plural authenticating means of the PIN input
`authentication and the fingerprint authentication can be used in combination, so that
`plural security levels can be implemented by combining the plural authenticating means
`(Miyashita: column 6, lines 40-45).
`
`Conclusion
`Any inquiry concerning this communication or earlier communications from the
`examiner should be directed to TRANG DOAN whose telephone number is (571)272-
`0740. The examiner can normally be reached on Monday-Friday.
`If attempts to reach the examiner by telephone are unsuccessful, the examiner's
`supervisor, William R. Korzuch can be reached on (571) 272-7589. The fax phone
`number for the organization where this application or proceeding is assigned is 571-
`273-8300.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 15 of 25
`
`AIRE-SAMS-00000734
`
`Page 6
`
`Application/Control Number: 10/531 ,259
`Art Unit: 2431
`Information regarding the status of an application may be obtained from the
`Patent Application Information Retrieval (PAIR) system. Status information for
`published applications may be obtained from either Private PAIR or Public PAIR.
`Status information for unpublished applications is available through Private PAIR only.
`For more information about the PAIR system, see http://pair-direct.uspto.gov. Should
`you have questions on access to the Private PAIR system, contact the Electronic
`Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a
`USPTO Customer Service Representative or access to the automated information
`system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000.
`
`[Trang Doan/
`Examiner, Art Unit 2431
`[Syed Zia/
`Primary Examiner, Art Unit 2431
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 16 of 25
`
`AIRE-SAMS-00000751
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re of:
`Application No.:
`
`10/531,259
`
`Filing Date:
`
`April 24, 2006
`
`Examiner:
`
`Art Unit:
`
`First Inventor:
`
`Gisela MEISTER
`
`Customer No.:
`
`Trang T. Doan
`
`2131
`
`23364
`
`Attorney No.:
`
`MEIS3002/JEK
`
`Confirmation No.:
`
`4669
`
`For:
`
`METHOD FOR CARRYING OUT A SECURE ELECTRONIC
`TRANSACTION USING A PORTABLE DATA SUPPORT
`
`RESPONSE TO OFFICE ACTION MAILED MARCH 2, 2010
`
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`INTRODUCTORY COMMENTS
`This is responsive to the Office Action mailed March 2, 2010 with regard to the above
`identified application. Reconsideration of this application is requested in view of the
`amendments and comments presented below.
`
`AMENDMENTS
`
`Amendments to the Claims
`The claims are amended as shown in the following pages under the heading “LIST OF
`CURRENT CLAIMS”. This listing of ‘claims supersedes all prior listings of the claims
`presented in this application, shows currently proposed amendments to the claims and shows
`the status of all claims in the application.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 17 of 25
`
`AIRE-SAMS-00000752
`
`Application No.: 10/531,259 |
`Art Unit: 2131
`
`LIST OF CURRENT CLAIMS
`1. (Previously Presented) A method for effecting a secure electronic transaction on a
`terminal using a portable data carrier arranged to perform different quality user authentication
`methods, wherein the portable data carrier performs a user authentication using one of said
`different user authentication methods, the portable data carrier confirms the proof of
`authentication to the terminal, and the portable data carrier then performs a security-
`establishing operation within the electronic transaction, comprising the steps of creating
`authentication quality information by the portable data carrier about said user authentication
`method used and attaching said authentication quality formation to the result of the
`security-establishing operation, wherein the difference in quality of user authentication varies
`between an inherently relatively lower quality and an inherently relatively higher quality
`from a security perspective.
`
`2. (Previously Presented) The method according to claim 1, wherein the security-
`establishing operation performed by the portable data carrier comprises creatinga digital
`signature.
`
`3. (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by presentation of a biometric feature.
`
`4, (Previously Presented).The method according to claim 3, wherein the
`authentication of the user is performed by presentation of a physiological or behavior-based
`feature characteristic of a user.
`
`5, (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by proof of knowledge of a secret.
`
`6. (Previously Presented) The method according to claim 1, wherein at least two
`different authentication methods of different quality are offered for authentication of the user,
`
`7. (Previously Presented) The method according to claim 6, wherein the particular
`authentication methods not used are disabled.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 18 of 25
`
`AIRE-SAMS-00000753
`
`Application No.: 10/531,259
`Ast Unit: 2131
`
`8. (Previously Presented) The method according to claim 6, wherein no quality
`information is produced for an authentication method.
`
`9. (Previously Presented) The method according to claim 1, wherein a user is asked to
`select an authentication method.
`
`10, (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to perform different
`quality user authentication methods, wherein the difference in quality of user authentication
`varies between an inherently relatively lower quality and an inherently relatively higher
`quality from a security perspective, comprising: whereby the portable data carrier is arranged
`to perform a user authentication using one of said implemented user authentication methods
`and the portable data carrier is arranged to confirm the authentication to a terminal, and
`wherein the data carrier is arranged to create quality information about said user
`authentication method used and to attach such quality information to the result of the security
`establishing operation.
`
`11. (Previously Presented) The data carrier according to claim 10, wherein the
`portable data carrier is set up to create a digital signature.
`
`12. (Previously Presented) The data carrier according to claim 10, wherein the data
`carrier supports at least two qualitatively different authentication methods.
`
`13. (Currently Amended) A terminal for use in connection with the portable data
`carrier according to claim [[9]] 10, said terminal including a device arranged to cause a user
`to select one of at least two possible different quality authentication methods.
`
`14. (Previously Presented) A system for effecting a secure electronic transaction
`within which the quality of authentication of a user of the system is ascertained, comprising
`the portable data carrier according to claim 10 and the terminal according to claim 13.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-8 Filed 05/19/22 Page 19 of 25
`
`AIRE-SAMS-00000754
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`REMARKS
`
`Amendments to the Claims
`Claim 10 is amended to change “whereby” to “comprising:” in line 5 to more properly
`recite the inventive subject matter in terms reflecting appropriate U.S. practice. The scope
`and meaning of the claim is unchanged by the amendment.
`Claim 13 is amended to correct an obvious mistake resulting from the original claim
`referring back to claim 9 instead of claim 10. The claim has been amended to properly refer
`back to claim 10.
`
`35 USC §102
`Claim Rejections
`The rejection of claims 1-6 and 8-14 under 35 USC §102(e) as being anticipated by
`Russo (U.S. 2003/0101348 A1) is respectfully traversed. As a starting point, the scope and
`meaning of the claims are reviewed from the perspective of a person skilled in the art based
`on the written description and drawings of the application.
`Claim 1 recites a method for effecting a secure electronic transaction on a terminal
`using a portable data carrier that is capable of performin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket