throbber
Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 1 of 10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 11
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 2 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 2 of 10
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In re of:
`
`Application No.:
`
`10/531,259
`
`Examiner:
`
`Trang T. Doan
`
`Filing Date:
`
`April 24, 2006
`
`Art Unit:
`
`2131
`
`First Inventor:
`
`Gisela MEISTER
`
`Customer No.:
`
`23364
`
`Attorney No.:
`
`MEIS3002/JEK
`
`Confirmation No.:
`
`4669
`
`For:
`
`METHOD FOR CARRYING OUT A SECURE ELECTRONIC
`TRANSACTION USING A PORTABLE DATA SUPPORT
`
`
`RESPONSE AND PROPOSED AMENDMENTSAFTER FINAL REJECTION
`(37 CFR §1,116)
`
`Commissioner for Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`INTRODUCTORY COMMENTS
`
`Reconsideration of the final rejection of the claims ofthis application as expressed in
`
`the Office Action mailed February 18, 2009 is respectfully requested. Applicant proposes to
`further amend claim 1
`to clearly place the application in condition for allowance without
`
`raising new issues or requiring further searching by the examiner.
`
`AMENDMENTS
`
`Amendments to the Specification
`
`The specification is amended as shown in the following pages under the heading
`
`“AMENDMENTSTO SPECIFICATION.”
`
`.
`Amendments to the Claims
`The claims are amended as shown in the following pages under the heading “LIST OF
`
`CURRENT CLAIMS”. This listing of claims supersedes all prior listings of the claims
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 3 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 3 of 10
`
`Application No.: 10/3531,259
`Art Unit: 2131
`
`presented in this application, shows the current status of all claims in the application and
`
`showscurrently proposed amendments to the claims.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 4 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 4 of 10
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`AMENDMENTS TO THE SPECIFICATION
`
`On page4, the last paragraph spanning pages 4 and 5 is amended toread:
`
`The portable data carrier 20 is further set up to perform at least one, but expediently a
`plurality of different quality user authentication methods.It preferably supports at least two
`authentication methods of different order with regard to the quality of authentication.It
`expediently supports at least one knowledge-based authentication method, e.g. a PIN check,
`and at least one biometric method, within which a biometric feature of the user 30 to be
`
`presented at the terminal 14 is checked. The biometric method inherently constitutes the
`higher-quality one here, since it presupposes the personal presence of the user 30; this is not
`ensured in the knowledge-based method since the knowledge can have been acquired by an
`unauthorized user. Accordingly the storage means 26 store at least one secret to be presented
`by the user 30,e.g. areference PIN assignedto a user 30, and at least one biometric reference
`data record assigned to a user 30. It can expediently be provided that the portable data carrier
`20 supports more than two authentication methods, in particular further biometric methods.
`Accordingly the storage means 26 in this case store further secrets and/or reference data
`records and the integrated circuit 24 is set up to perform the further authentication methods.
`
`On page 5, the last paragraph is amended to read:
`
`After the signature application has been started, the user 30 presents a suitable
`portable data carricr 20 to the terminal 40, step 104. The portable data carrier 20 will
`hereinafter be taken to have the form of a contact-type chip card. Further, it will hereinafter
`be assumed that the chip card 20 supports two authentication methods, namely a PIN check
`as a knowledge-based, inherently low-quality method, and a fingerprint check as a biometric,
`inherently higher-quality method.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 5 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 5 of 10
`
`Application No.: 10/531,259
`Agt Unit: 2131
`
`1. (Currently Amended) A methodfor effecting a secure electronic transaction on a
`terminal using a portable data carrier arranged to perform different quality user authentication
`methods, wherein the portable data carrier performs a user authentication using one ofsaid
`different user authentication methods, the portable data carrier confirms the proof of
`authentication to the terminal, and the portable data carrier then performs a security-
`establishing operation within the electronic transaction, comprising the steps of creating
`authentication quality information by the portable data carrier about said hew-the
`authenticationofthe-userwas-performedby-the-used-user authentication method used and
`attaching said authentication quality information is-attached-to the result of the security-
`establishing operation, wherein the difference in quality of user authentication varies between
`aninherently relatively lower quality and an inherently relatively higher quality from a
`
`security perspective.
`
`2. (Previously Presented) The method according to claim 1, wherein the security-
`establishing operation performed bythe portable data carrier comprises creating a digital
`
`signature.
`
`3. (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by presentation of a biometric feature.
`
`4, (Previously Presented) The method according to claim3, wherein the
`authentication of the user is performed by presentation of a physiological or behavior-based
`
`feature characteristic of a user.
`
`5. (Previously Presented) The method according to claim 1, wherein the
`authentication of the user is performed by proof of knowledge of a secret.
`
`6. (Previously Presented) The method according to claim 1, whereinat least two
`different authentication methods of different quality are offered for authentication ofthe user.
`
`7. (Previously Presented) The method according to claim 6, wherein the particular
`authentication methods not used are disabled.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 6 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 6 of 10
`
`Application No.; 10/531,259
`Art Unit: 2131
`
`8. (Previously Presented) The method according to claim 6, wherein no quality
`information is produced for an authentication method.
`
`9. (Previously Presented) The method according to claim 1, wherein a user is asked to
`select an authentication method.
`
`10. (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to perform different
`quality user authentication methods, wherein the difference in quality of user authentication
`varies between an inherently relatively lower quality and an inherently relatively higher
`quality from a security perspective, whereby the portable data carrier is arranged to perform a
`user authentication using one of said implemented user authentication methods and the
`portable data carrier is arranged to confirm the authentication to a terminal, and wherein the
`data carrier is arranged to create quality information about said
`stating-hewtheauthentication
`ofthe-userwas-performed-by-the-used user authentication method used and to attach such
`quality information to the result of the security establishing operation.
`
`11. (Previously Presented) The data carrier according to claim 10, wherein the
`portable data carrier is set up to create a digital signature.
`
`12. (Previously Presented) The data carrier according to claim 10, wherein the data
`catrier supports at least two qualitatively different authentication methods.
`
`13. (Currently Amended) A terminal for use in connection with [[a]] the portable data
`carrier according to claim 9, said terminal including a device arranged to cause a user to
`select one ofat least two possible different quality authentication methods.
`
`14. (Currently Amended) A system for effecting a secure electronic transaction within
`which the quality of authentication of a user of the system is ascertained, comprising [[a]] the
`portable data carrier according to claim 10 and [[a]] the terminal according to claim 13.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 7 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 7 of 10
`
`Application No.: 10/531,259
`Act Unit: 2131
`
`REMARKS
`
`Claim Objections
`Claims 13 and 14 have been amended in the manner suggested by the examiner,
`thereby removing the basis for objection to these claims. Withdrawal of the objections to
`claims 13 and 14, accordingly, is respectfully requested.
`
`Amendments to Claims
`
`‘Claim 1 has been amended to clarify the intended meaning of the claim without
`affecting the scope of the claim as previously presented. The difference in quality of the user
`authentication specifically is clarified by denoting that the quality may be inherently a
`relatively lower quality or inherently a relatively higher quality from a security perspective.
`Support for the amendment is found on page 5,
`last paragraph wherein the terms “low-
`quality” and “higher-quality” are used to describe two authentication methods. The word
`“inherently” has been added for clarification to indicate that the method itself inherently
`provides less security or more security depending on the nature of the method (e.g., biometric
`versus PIN). The objective of the amendmentis to better define the inherent nature of the
`user authentication method from a security perspective.
`
`Claim 10 has been amendedso thatit is consistent with claim 1.
`
`Claims 10 and 13 have been amended so they are consistent with amended claim 1.
`
`Amendmentto the Specification
`The specification has been amendedso that the language thereof is consistent with the
`language of the amended claims.
`
`Claim Rejections — 35 USC §103
`
`It is respectfully submitted that the examiner’s reasoning with regard to the rejection
`of claims 1, 3-8, 10, 12 and 14 as reciting subject matter considered to be obvious in view of
`Mimura as modified by Kao is legally flawed. Mimura pure and simple requires a two step
`authentication procedure involvingfirst a fingerprint verification of the user and thereafter an
`electronic authentication using a secret key that has been activated upon the fingerprint
`information submitted by the user matching fingerprint information stored in the system
`
`memory.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 8 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 8 of 10
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`The examiner equates the Mimura system with the system recited in claim 1 of this
`application with the exception of teaching that
`the user may use one of different
`authentication methods to authenticate the user.
`In the first place, Mimura fails to disclose or
`
`teach a method for securing an electronic transaction wherein the quality of the transaction
`
`used is determined and then information about the authentication quality is attached to the
`
`result of the security-establishing operation. Mimura simply is concerned with a two stage
`authentication procedure involving first a fingerprint matching process followed by the
`typical electronic signature authentication process, wherein the second procedure is
`authorized only upon the user passing the first authentication test. There simply is no
`disclosure, suggestion or teaching in any form that information about the quality of the
`method used for authentication in accordance with Mimura may be attached to the result of a
`
`security establishing operation. Accordingly, at the very outset the examiner has failed to
`establish a prima facie basis for rejecting the claims on grounds of obviousness due to a
`
`significant missing element in the basic reference Mimura.
`Recognizing that Mimura fails to specifically disclose that the user may use one of
`different user authentication methods for authentication, the examiner contends that a person
`
`skilled in the art would recognize from Kao that a user may use one of different user
`
`authentication methods to authenticate a user. The examiner concludes from this that the
`
`skilled person could readily modify the Mimura system by providing the user with the
`opportunity to use one of different user authentication methods to authenticate the user. The
`critical factor not explained by the examiner is that if Mimura is modified in the manner
`
`suggested by the examiner, the Mimura system would be defeated!
`Specifically, Mimura requires a two step authentication procedure involving first a
`fingerprint matching process followed by an electronic signature process, wherein the
`electronic signature process is not authorized unless and until the fingerprint procedure
`
`reveals that the user is authenticated based on a biometric measurement.
`
`Mimura is clear that both a biometric measurement procedure and an electronic
`
`signature or key procedure is required in accordance with the security system of Mimura.
`If Mimura is modified in accordance with Kao so that only one or another security
`
`identification system is used, then the two step process of Mimura is defeated and it will not
`function for its intended purpose, namely a two stage security authentication process.
`
`A careful
`reading of Kao reveals that
`it
`is intended to provide two or more
`independent authentication modes depending on the authentication procedure demanded by
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 9 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 9 of 10
`
`Application No.: 10/331,259
`Art Unit: 2131
`
`In accordance with the examples given in Kao, such parties would
`the party to be accessed.
`be a bank and a broker. The system of Kao recognizes which client is to be accessed and
`adapts the GUI of the user’s computer to reflect which program based on the client to be
`accessed is in use. The user then proceeds to obtain authentication and access to the client’s
`computer after satisfying the authentication requirements of the specific client being
`
`accessed,
`
`For example, if the client is a bank, a smart card authentication may be required and
`the GUIis adapted for such a procedure, prompting the user to enter the data required for the
`
`smart card authentication.
`For a different client, such as a brokerage house, a user/password authentication may
`
`be required, wherein different modes of operation, i-e., a biometric fingerprint authentication,
`
`may be required.
`The important consideration here is that in accordance with Kao, a user simply
`attempts to contact a client such as a bank or a brokerage house, and thereafter the system
`prompts the user to authenticate himself/herself using whichever authentication procedure is
`required by the client’s program. No weight whatsoever is given to the authentication
`procedure in accordance with Kao, and further in accordance with Kao, no information
`regarding the quality of the authentication is attached to the result of the security establishing
`operation. Simply put, there is nothing in Kao to suggest that any of the client programs(..¢.,
`bank, brokerage house, etc.) cares one whit about
`the quality of the authentication
`information apart from the fact that
`the user must satisfy the authentication procedure
`
`imposed by the client program.
`Accordingly, the examiner’s suggestion that Mimura in view of Kao results in a
`method corresponding to the rejected claims is legally defective and fails to establish a prima
`facie basis of obviousness due to fundamental missing elements in both Mimura and Kao.
`Both Mimura and Kao fail to suggest to a skilled person that the quality of authentication
`information may be attached to the result of a security-establishing operation, and
`furthermore modification of Mimura in accordance with the teachings of Kao would virtually
`
`defeat Mimura for its intended purpose,a result that entirely contradicts the proposition that a
`person skilled in the art would be motivated to modify Mimura in accordance with Kao to
`arrive at a process which the examiner equates with the rejected claims.
`It is important for the examiner to understand that the method recited in claim 1, as
`described in the written description of this application, provides many advantages over prior
`
`

`

`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 10 of 10
`Case 6:21-cv-01101-ADA Document 34-11 Filed 06/09/22 Page 10 of 10
`
`Application No.: 10/531,259
`Art Unit: 2131
`
`axt authentication methods due to the fact that the recipient of the security message following
`
`authentication receives through the quality information contained in the message a statement
`on the quality of the authentication performed by the user (page 8, last paragraph). For
`example, quality information is joined firmly with a created digital signature to form a
`security message expediently within the secure messaging mechanism using the previously
`negotiated session keys. (Page 8, third full paragraph.) This system enables the user to use
`both lower quality and higher quality authentication procedures and as an additional
`important feature, attaches information about the quality of the authentication procedure with
`the results of the security establishing operation.
`Noneof the prior art shows or teaches the methods recited in the rejected claims and
`withdrawal of the rejection of claims 1, 3-8, 10, 12 and 14 under 35 USC §103(a) as being
`unpatentable over Mimura in view of Kao is appropriate and the same is respectfully
`
`requested,
`It is respectfully submitted that entry of the proposed amendments is appropriate
`under 37 CFR 1.116, as the amendments do not raise any further issues or require further
`searching by the examiner, moreover, the amendments are responsive to the new grounds for
`rejection expressed in the Action. Finally, the legal deficiency of the final rejection of claims
`1, 3-8, 10, 12 and 14 as expressed above wartants withdrawalofthe rejection of these claims
`
`on the grounds contended by the examiner.
`With regard to claims 2, 9, 11 and 13, these claims are patentable at least on the basis
`
`of claims 1 and 10 from which they depend.
`
`In the event that the examiner maintains the final rejection of the claims of this
`
`application, entry of the amendments for purposes of appeal is respectfully requested.
`
`BACON & THOMAS, PLLC
`625 Slaters Lane, 4" Floor
`Alexandria, VA 22314-1176
`Phone: (703) 683-0500
`Facsimile: (703) 683-1080
`Date: May 18, 2009
`
`
`
`wwectfully submitted,
`
`
`
`
`Registration No, 19,179
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket