throbber
Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 1 of 7
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 9
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 2 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 2 of 7
`
`PATENT
`
`IN THE UNITED STATES PATENT AND TRADEMARKOFFICE
`
`In re Application of:
`
`Application No.:
`
`10/531,259
`
`Confirm. No.:
`
`4669
`
`Filing Date:
`
`April 24, 2006
`
`Examiner:
`
`Doan, Trang T
`
`First Inventor:
`
`Gisela Meister
`
`Art Unit:
`
`2431
`
`Attorney No.:
`
`MEIS3002/JJC/BEL
`
`Customer No.:
`
`23364
`
`For:
`
`METHOD FOR CARRYING OUT A SECURE ELECTRONIC
`TRANSACTION USING A PORTABLE DATA SUPPORT
`
`REPLY TO FINAL OFFICE ACTION
`OF FEBRUARY1, 2011
`
`Commissionerfor Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`Sir:
`
`INTRODUCTORY COMMENTS
`
`This is responsive to the final Office action dated February 1, 2011 in the above-
`
`identified application.
`
`In view of the following remarks, reconsideration of the application is respectfully
`
`requested.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 3 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 3 of 7
`
`Application No.: 10/531,259
`Art Unit: 2431
`
`REMARKS
`
`Reconsideration of the pending application is respectfully requested in view of the
`
`following observations.
`
`1.
`
`Rejection of claims 1-6 and 8-14 under 35 USC 102(e) as being anticipated by US
`
`publication 2002/0016913 (Wheeler)
`
`Reconsideration of the rejection is respectfully requested in view of the amendmentto the
`
`claims and the following observations.
`
`This rejection is respectfully traversed on the basis that Wheeler fails to disclose each and
`
`every elementof claims | and 10.
`
`By way of review, claim 1 recites a method for effecting a secure electronic transaction
`
`on a terminal using a portable data carrier arranged to perform different quality user
`
`authentication methods. The portable data carrier performs user authentication using one of the
`
`different user authentication methods, confirms the proof of authentication to the terminal, and
`
`performs a security-establishing operation within the electronic transaction. The method
`
`comprises creating authentication quality information by the portable data carrier about the user
`
`authentication method used and attaching the authentication quality information to the result of
`
`the security-establishing operation.
`
`It is asserted that critical technical differences exist between claim 1 and Wheeler.
`
`First, the Office Action on page 3 states that Wheeler discloses authentication quality
`
`information about the user authentication method used in paragraphs [0378]-[0379]. Paragraph
`
`[0378] discloses using a combination of values for Rs (PIN) and Rb(002) (thumbprint) in
`
`determining whether the suspect user (46) is an authorized user. An example is given that
`
`a correct PIN by itself, a correct PIN plus at
`
`least a 60% match of
`
`thumbprint, an incorrect PIN if the thumbprint exceeds 96%, and an incorrect PIN
`
`but two thumbprints exceeding 90% (but not identical) are all different types of
`
`verification statuses that may be sufficient for the banking authority 3320 to
`
`accept Factors B and C Entity Authentication of the suspect user 46 by card 95
`
`(see par. [0378]).
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 4 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 4 of 7
`
`Application No.: 10/531,259
`Art Unit: 2431
`
`The example describes different combinations of quantitative data between the PIN and
`
`thumbprint which a banking authority would find acceptable for authentication of a user. The
`
`quantitative data reflects on the closeness of the match for each actual application of an
`
`authentication method by representing the percentage matched. In other words, the quantitative
`
`data collected in Wheeler represents the quality of the match for different executions of a
`
`particular authentication method.
`
`In contrast, the authentication quality information of claim 1, however, relates to the
`
`quality of the user authentication method,
`
`itself. The portable carrier attaches the quality
`
`information to the result of the security-establishing operation, where “the quality of the user
`
`authentication methods varies between an inherently relatively lower quality and_an inherently
`
`relatively higher quality from a security perspective” (Claim 1, emphasis added). Thus, there is
`
`clear support in claim 1 that the quality of the user authentication method indicates the quality
`
`level of the authentication method used.
`
`Different authentication methods provide different levels of protection. For example, a
`
`PIN check as a knowledge-based methodis an inherently low-quality method while a fingerprint
`
`check as a biometric check method is an inherently higher-quality method (see page 5, lines 25-
`
`30 of the originally filed specification and the amended specification filed on May 18, 2009).
`
`The PIN check is a lower quality authentication method since a user merely needs to gain
`
`knowledge of the PIN to be successfully authenticated. A biometric check method is a higher-
`
`quality method since it would be more difficult for a user to duplicate a fingerprint in order to be
`
`authenticated and thus,
`
`the check “presupposes the personal presence of the user” (see
`
`specification, page 5, lines 3-5).
`
`Since the quality information of Wheeler is based on the concrete input data, namely the
`
`PIN entered or the thumbprint scanned, the quality information is necessarily dependent on the
`
`concrete input data. In the instant application, the quality information of claim 1 is independent
`
`of the concrete input data since the quality information exclusively depends on the authentication
`
`method used.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 5 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 5 of 7
`
`Application No.: 10/531,259
`Art Unit: 2431
`
`Thus, Wheeler does not disclose “the difference in quality of the user authentication
`
`methods varies between an inherently relatively lower quality and an inherently relatively higher
`
`quality from a security perspective.”
`
`Next, Wheeler does not disclose attaching authentication quality information to the result
`
`of the security-establishing operation. The Office Action interprets the authentication quality
`
`information being attached to the result of the security-establishing operation of claim 1 as the
`
`indicator (460), in paragraph [0145] of Wheeler, being attachedto a digital signature created by a
`
`device (see Office Action, page 3).
`
`The indicator (460) does not represent authentication quality information as required by
`
`claim 1. In Wheeler, the indicator (460) output from device (440) is based on the last comparison
`
`of the verification data (450) with the prestored data (470). When the verification data (450) and
`
`the prestored data (470) comprise a Secret, four verification statuses may be present: whether
`
`verification data (450) is present, a match between the verification data (450) and the prestored
`
`data (470), a failed match between verification data (450) and prestored data (470), and a match
`
`between the verification data (450) and the prestored data (470) (see par. [0150]). When
`
`the
`
`verification method used is biometric,
`
`the verification data (450) and prestored data (470)
`
`comprise biometric values and “the set of predefined verification statuses comprises the possible
`
`percentages of match — or degrees of difference — between the verification data (450) and
`
`prestored data (470)” (see par. [0151]).
`
`Asdiscussed above, the verification statuses in either method represent the quality of the
`
`match and not the authentication quality of the method. Therefore, Wheeler does not disclose
`
`attaching the quality information to the result of the security-establishing operation, wherein the
`
`difference in quality of the user authentication methods varies between an inherently relatively
`
`lower quality and an inherently relatively higher quality from a security perspective.
`
`Accordingly, Wheeler does not disclose each and every feature of claim 1. Moreover,
`
`claim 10 includes features similar to those of claim 1 and is likewise allowable for the reasons
`
`above.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 6 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 6 of 7
`
`Application No.: 10/531,259
`Art Unit: 2431
`
`Claims 2-6, 8, 9, and 11-14, which depend from one of claims 1 and 10, incorporate the
`
`features of claims 1 or 10 and are likewise allowable for the reasons above in view of their
`
`dependency from one of claims 1 and 10 and for their individually recited features.
`
`Withdrawalofthe rejection of the claims in view ofthe prior art is kindly requested.
`
`2.
`
`Rejection of claim 7 under 35 USC 103(a) over US publication 2002/0016913 (Wheeler)
`
`in view of USpatent 7.403.765 (Mivashita)
`
`Claim 7, which depends from claim 1, incorporates the features of claim 1 andis likewise
`
`allowable for the reasons above in view of its dependency from claim 1 and for its individually
`
`recited features. Moreover, Miyashita does not cure the deficiencies of Wheeler since Miyashita
`
`does not disclose attaching the authentication quality information to the result of the security-
`
`establishing operation, where the quality of the user authentication methods varies between an
`
`inherently relatively lower quality and an inherently relatively higher quality from a security
`
`perspective. Miyashita discloses using different security levels which consist of using fingerprint
`
`authentication alone or a combination of fingerprint and PIN authentication to determine whether
`
`a user is allowed to use a specific cellular phone functionality (see col. 3, line 51 — col. 4, line
`
`26).
`
`Withdrawalof the rejection of the claims in view ofthe prior art is kindly requested.
`
`

`

`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 7 of 7
`Case 6:21-cv-01101-ADA Document 34-9 Filed 06/09/22 Page 7 of 7
`
`Application No.: 10/531,259
`Art Unit: 2431
`
`3.
`
`Conclusion
`
`In view of the foregoing remarks, it is respectfully submitted that the application is in
`
`condition for allowance. Accordingly, it is respectfully requested that every pending claim in the
`
`present application be allowed andthe application be passedto issue.
`
`If any issues remain that may be resolved by a telephone or facsimile communication
`
`with the applicant’s attorney, the examiner is invited to contact the undersigned at the numbers
`
`shown below.
`
`BACON & THOMAS, PLLC
`625 Slaters Lane, Fourth Floor
`Alexandria, Virginia 22314-1176
`Phone: (703) 683-0500
`Facsimile: (703) 683-1080
`
`Date: March 30, 2011
`
`Respectfully submitted,
`
`/Justin J. Cassell/
`
`JUSTIN J. CASSELL
`Attomey for Applicant
`Registration No. 46,205
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket