throbber
Tnals@uspte. gov
`
`
`571-272-7822
`
`Paper 11
`Entered: August 1, 2024
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`APPLEINC.,
`Petitioner,
`
`V.
`
`CARBYNE BIOMETRICS, LLC,
`Patent Owner.
`
`IPR2024-00333
`Patent 11,475,105 B2
`
`Before JAMESON LEE, ARTHUR M. PESLAK,and
`STEVEN M. AMUNDSON,Administrative Patent Judges.
`
`LEE, Administrative Patent Judge.
`
`DECISION
`DenyingInstitution of/nter Partes Review
`35 US.C. $314
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`I.
`
`INTRODUCTION
`
`Apple Inc. (“Petitioner”) filed a Petition requesting an interpartes
`
`review of claims 1, 9-11, 14, 18, 28-30, 33, and 35 (“challenged claims”) of
`
`U.S. Patent No. 11,475,105 B2 (Ex. 1001, “the ?105 patent”). Paper3.
`
`Carbyne Biometrics, LLC (“Patent Owner’’) filed a Preliminary Response.
`
`Paper 8. Petitioner filed an authorized Preliminary Reply. Paper 9 (“Prelim.
`
`Reply”). Patent Ownerfiled an authorized Preliminary Sur-reply. Paper 10
`
`(Prelim. Sur-reply”).
`
`Wehave authority to determine whetherto institute an interpartes
`
`review. See 35 U.S.C. §314 (2018); 37 C.F.R. § 42.4(a) (2024). An inter
`
`partes review maynotbe instituted unless the information presented in the
`
`Petition “showsthat there is a reasonable likelihood that the petitioner would
`
`prevail with respect to at least 1 of the claims challenged in the petition.”
`
`35 U.S.C. §314(a). Upon consideration ofthe contentions andthe evidence
`
`of record before us, we conclude Petitioner has not shown a reasonable
`
`likelihood that it would prevail in establishing the unpatentability of at least
`
`one challenged claim ofthe’ 105 patent.
`
`Accordingly, we declineto institute interpartes review.
`
`A.
`
`Real Parties in Interest
`
`I. BACKGROUND
`
`Petitioner identifies itselfas real party in interest. Pet. 1. Patent
`
`Owneridentifies itselfas real party in interest. Paper4, 2.
`
`B.
`
`RelatedMatters
`
`The parties each identify the followinglitigation as related to the ’105
`
`patent (Pet. 1; Paper 4, 2): Carbyne Biometrics, LLC v. Apple Inc., 1:23-cv-
`
`00324 (WDTX).
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`Petitioner further identifies Samsung Electronics Co., Ltd. v.
`
`RightQuestion, LLC, IPR2022-00244 (PTAB) (Terminated July 26, 2022),
`
`which involvedan ancestral patent ofthe ’105 patent, as a related matter.
`
`Pet. 1-2.
`
`IPR2024-00334 is a proceeding involving U.S. Patent No. 11,514,138
`
`B1, based on Application 17/027,481, from which the application that issued
`
`as the 105 patent 1s a continuation-in-part application.
`
`C.
`
`The ’105 Patent
`
`The ’105 patent is directed to authentication techniques to provide
`
`credentials to aservice. Ex. 1001, 1:43-52. The goalis to reduce practices
`
`such as passwordre-use and/or selection ofpoor quality passwords. /d.
`
`Specifically, the ’105 patent pertains to authentication translation andstates:
`
`Authentication translation is disclosed. A request to access a
`resource 1s received at an authentication translator, as is an
`authentication input. The authentication input correspondsto at
`least one stored record. The stored recordis associatedat least
`with the resource.
`In response to the receiving, a previously
`stored credential associated with the resource 1s accessed. The
`credential is provided to the resource.
`Id. at code (57). Figure 1 ofthe ’105 patent is reproduced below:
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`
`
`FHG. 4
`
`Figure | illustrates an embodiment of an environment in which
`
`authentication translation is provided. Ex. 1001, 2:62—63. Variousclient
`
`service devices 102—108 are connected through one or more networks
`
`(represented as single network cloud 110) to various services 120-124,
`
`whichare also referred to as sites.
`
`/d. at 2:63—67.
`
`Client device 102 is a notebook computer ownedbyuserAlice and
`
`includes a camera, a microphone, anda fingerprint sensor. /d. at 2:67—3:3.
`
`Client device 104 is a smartphone ownedbyuser Alice and includes a
`
`camera.
`
`/d. at 3:3—4. Client device 106 is a tablet owned by user Bob and
`
`includes a camera anda fingerprint sensor, and device 106 is sometimes
`
`used by Bob’s son Charlie. /d. at 3:5—7. Client device 108 is a kiosk located
`
`in the lobby ofa hotel, and it includes acameraanda microphone. /d.
`
`at 3:7-9.
`
`Service 120 is a social networkingsite; service 122 isa website ofa
`
`bank; service 124 is the online store of a boutique cameraretailer; each
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`service requires a username and password(and/or a cookie) from a user
`
`prior to giving that user access to protected content and/or other features.
`
`Ex. 1001, 3:15—20. A user need not type such user names and passwords
`
`into the devices whenever required by a service, but can authenticate to an
`
`“authentication translator’ which will provide the appropriate credentials to
`
`the service “on the user’s behalf.” /d. at 3:21—26.
`
`For example, notebook computer 102 includes authentication
`
`translator module 132 that provides authentication translation services. /d.
`
`at 3:29-31. Devices 104-108 can also include, but need not include, their
`
`own respective authentication translator modules. /d. at 3:31—33. The
`
`ownerofbank website 122 operates authentication translator 134 associated
`
`with the bank. /d. at 3:34—-35. Authentication translator 136 provides
`
`authentication servicesto a variety ofbusinesses, including online camera
`
`retailer 124.
`
`/d. at 3:35-38.
`
`Figure 2 of the ?105 patent is reproduced below:
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`
`
`
` x
`
`
`Sin, URERSHNIS, SRGANwAl
`
`|
`
`aerercereceereoeen
`
`
`
`
`FIG. 2
`
`Figure 2 shows an embodimentof credential information stored on a
`
`device 200.
`
`/d. at 3:38-39. Device 200 stores three user profiles 202—206,
`
`each ofwhich contains a username andone or more templates associated
`
`with the user.
`
`/d. at 3:39-42. A template 1s a collection ofbiometric
`
`features, where a fingerprint is an example ofa biometric feature. /d. at
`
`3:42-44. A representation ofa single fingerprint may be included in
`
`multipletemplates, such as in different resolutions in accordance with
`
`different protocols (e.g., warm or cold conditions and/orby itself or in
`
`combination with multiple fingerprints). /d. at 3:48—53. Whenother
`
`biometrics are employed, for example facial recognition, voice print, or
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`retina scan, correspondingfeatures are includedin the template. /d. at 3:53—
`
`56.
`
`Policies can be included in profiles that govern how matchesare to be
`
`performed. /d. at 4:3—5. Policies can specify threshold/tolerances for what
`
`constitutes a match, and can specify that different levels ofmatches can
`
`result in different levels of access to different resources. /d. at 4:5—8.
`
`A profile is associated with a vault, for example vault 220.
`
`/d. at 4:9.
`
`A vault, in turn, containstriples specifying a service provider/domain, a
`
`username, andacredential. /d. at 4:9-11.
`
`Regarding policies, the ’105 patent further describes:
`
`Policies can be associated with devices, or with all vaults on a
`device. Such a policy maystate that vaults can only be backed
`up to computational devices of the same brand, or
`to
`computational devices that satisfy software requirements
`associated with the policy, such as having anti-virus software or
`using an operating system that is the most recent version or the
`version before that, but not older.
`
`Ex. 1001, 19:28-34.
`
`The credential for a service provider or domain can be a password ora
`
`cryptographic key.
`
`/d. at 4:14-17. The ’105 patent describes that profiles,
`
`templates, and vaults are collectively referred to as “authentication
`
`information”and that in some embodimentssecure storage techniquesare
`
`used tostore at least a portion ofthe authentication information. /d. at 4:18—
`
`23. Profiles and vaults can be updated whilein secure storage, andifthat
`
`occurs, they are encrypted before being written back to insecure storage,
`
`which mayin turn propagate them to external backup storage. /d. at 4:44—
`
`48. Figure 3 is reproducedbelow:
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`
`
`
`
`
`
`
`
`
`
`Meaneenenennnnenennenenennnnenenennenenennenenennencnennencnennencnnnnenenennenccennnl!
`
`a0g-—*
`
`FIG. 3
`
`Figure 3 shows an embodimentusing secured storage to hold authentication
`
`information. /d. at 4:21—25.
`
`Mobile phone 300 includeslarge and insecure storage 302 attached to
`
`fast processor 304, and smaller but secure storage 306 is attached to
`
`dedicated processor 308 and sensor 310, which can be acamera ora
`
`fingerprint reader. /d. at 4:25—29. “Users (and applications) can read from
`
`and write to the insecure storage area. However, users cannotaccessthe
`
`secure storage area, and the fast processor can only communicate with the
`
`dedicated processor/sensor viaa restricted API.” Jd. at 4:29-33.
`
`D.
`
`Illustrative Claim
`
`Claims 1, 18, and 35 are independent. All other challengedclaims
`
`depend,directly or indirectly, from claim 1 or claim 18. Claim 1 is
`
`reproducedbelow:
`
`[1.0] A system, comprising:
`1.
`[1.1] one or moreprocessors configured to:
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`[1.2] receive,at a first device, a request to access a resource
`external to the first device, wherein the resource external to the
`first device is associated with a user;
`
`[1.3a] access at least one record stored on thefirst device,the at
`least one record including authentication information associated
`with the user and credential information associated with the
`external resource to which the user has requested access,
`
`[1.3b] wherein the credential information comprises a
`cryptographic key;
`
`[1.4] receive authentication input from the user;
`[1.5] determine that the authentication input from the user
`matches the authentication information associated with the user
`includedin the at least one record stored on thefirst device;
`
`[1.6] retrieve at least a portion ofthe credential information
`from the at least one record stored in thefirst device;
`
`[1.7] facilitate access ofthe userto the external resourceat least
`in part by transmitting, on behalfofthe user, from the first
`device, output basedat least in part on the at least portion ofthe
`credential information retrieved from the at least one record,
`wherein the userofthefirst device is granted access to the
`external resource basedat least in part on the output transmitted
`from thefirst device on behalfofthe user; and
`
`[1.8] based at least in part on the first device beinga same
`brand as a seconddevice,initiatea backup, to the second
`device, of at least a portion ofthe at least onerecord; and
`[1.9] a memory coupled to the one or more processors and
`configured to provide the one or more processors with
`instructions.
`
`Ex. 1001, 24:47-25:13.!
`
`' The bracketed heading labels correspond to those used by Petitioner to
`reference the claim elements. See Pet.23—42. Weuse the same labels here
`for ease of reference, understanding, and consistency.
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`E.
`
`Prior Art and Declaration Evidence
`
`Petitioner relies on the following evidence:”
`
`Challener
`
`1007
`US Patent No. 8,099,789 B2
`1006
`USPatent No. 8,799,666 B2
`
`Jakobsson ’351°|US Patent No. 10,360,351 B2 1011
`US Pub. App. 2004/0117636 Al|1008
`EP 2 079 023 A2
`
`1010
`
`> The ’105 patent issued from Application No. 17/123,018,filed Dec.15,
`2020, which 1s acontinuation-in-part ofApplication No. 17/027,481, filed
`Sept. 21, 2020, now Patent No. 11,514,138, which is a continuation of
`Application No. 16/773,767, filed Jan. 27, 2020, now Patent No. 10,929,512,
`which is acontinuation ofApplication No. 16/563,715, filed Sept. 6, 2019,
`now Patent No. 10,824,696, which is a continuation ofApplication No.
`16/273,797, filed Feb. 12, 2019, now Patent No. 10,521,568, whichisa
`continuation ofApplication No. 15/042,636, filed Feb. 12, 2016, now Patent
`No. 10,360,351, which is a continuation ofApplication No. 13/706,254,
`filed Dec. 5, 2012, now Patent No. 9,294,452. Ex. 1001, codes (21), (22),
`(63). The ’105 patent also claims priority to Provisional Application
`61/587,387, filed Jan. 17, 2012, and Provisional Application 61/569,112,
`filed Dec. 9, 2011. /d. code (60).
`> Issued Jan. 17, 2012 from Application No. 11/529,795, filed Sept. 29,
`2006. Ex. 1007, codes (21), (22), (45).
`4 Issued Aug. 5, 2014, from Application No. 12/731,050,filed Mar. 24,
`2010. Ex. 1006, codes (21), (22), (45).
`> Issued July 23, 2019, from Application No. 15/042,636,filed Feb. 12,
`2016, which is acontinuation ofApplication No. 13/706,254,filed Dec. 5,
`2012, now Patent No. 9,294,452. Ex. 1011, codes (21), (22),(45), (63).
`Jakobsson °351 also claims priority to Provisional Application 61/587,387,
`filed Jan. 17, 2012, and Provisional Application 61/569,112, filed Dec. 9,
`2011. /d. code (60). Jakobsson 7351 is an ancestral patent to which the ’105
`patent claimspriority through a chain of continuation applications including
`a continuation-in-part application. Ex. 1001, code (63).
`° Published June 17, 2004. Ex. 1008, code (43).
`7 Published July 15,2009. Ex. 1010, code (43).
`
`10
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`Petitioner also relies on the Declaration ofPatrick McDaniel, Ph.D.
`
`(Ex. 1003). Patent Owner has not submitted any declaration testimony.
`
`I
`
`The Asserted Grounds ofUnpatentability
`
`Petitioner asserts that the challenged claims ofthe ’105 patent are
`
`unpatentable based on the following grounds(Pet. 12):
`
`1, 14, 18, 33, 35
`
`103
`
`103
`
`Kesanupalli, Cheng, Kodama
`
`Kesanupalli, Cheng, Kodama,
`Challener
`
`35 9-11, 28-30
`
`
`
`1, 9-11, 14, 18, 28-30, 33,|103 Jakobsson °351, Kodama
`
`G.
`
`Effective Filing Date and Applicable Law
`
`The Leahy-Smith America Invents Act (“AIA”), Pub. L. No. 112-29,
`
`125 Stat. 284, 287-88 (2011), in § 3(n)(1), provides that the amendments
`
`made by this section “shall apply to any application for patent, and toany
`
`patent issuing thereon,that contains or contained at any time—(A) aclaim
`
`to a claimed invention that has aneffective filing date as defined in section
`
`100(1) of title 35, United States Code,that is on or after [expiration ofthe 18
`
`month period beginning on the date of enactment ofthe AIA (September16,
`
`2011)].°8 ATA § 3(n)(1).
`
`Petitioner asserts that dependent claim 16 ofApplication No.
`
`17/123,018 as initially filed on December 15, 2020, which issued as the ’105
`
`patent, recites “the backup is performed in response toa determination that
`
`’ The date ofenactment ofthe AIA is September16, 2011.
`
`11
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`the first device is ofthe same brandasthe second device.” Pet. 6 (citing
`
`Ex. 1002, 417). Petitioner also asserts:
`
`As confirmed by Dr. McDaniel, no disclosure exists in any
`application to which the ’018 App claimspriority—aincluding the
`pre-AIA ’254 App—that provides written description support for
`a backup being performedin response to a determination that
`the first device is of the same brand as the second device.
`APPL-1003, §§[36-41. Accordingly, AIA § 3(n)(1) dictates the
`°105 patent be evaluated under post-AIA §§102, 103.
`
`Id.
`
`Similarly, Petitioner asserts that the effective filing date of each
`
`challenged claim is no earlier than the actualfiling date ofApplication No.
`
`17/123,018, December 15, 2020, becauseall independentclaims ofthe
`
`challenged claims require initiating a backupbasedatleast in part ona first
`
`device being ofthe same brand as a second device. Pet. 6. Petitioner
`
`explains:
`
`As confirmed by Dr. McDaniel, no written description
`exists in any application to which the ’018 Appclaims priority
`for initiating backup to a second devicebasedat least in part on
`the first device being a same brand as a second device. APPL-
`1003, 936-41. To the extent passages of the ’018 App discuss
`the term “brand”(/.e., those portions corresponding to 13:28-33
`and/or 19:29-35 ofthe ’105 patent), these passagesare not found
`in any application to which the ’018 App claimspriority. APPL-
`1003, 39-41. These passages
`fall under
`a_ heading
`“ADDITIONAL EMBODIMENTS.” APPL-1001,
`11:30;
`APPL-1002, 18. This heading begins a portion ofthe 018 App’s
`specification that spans pages numbered18 to 36; in contrast, the
`originally filed specification ofthe U.S. Application 17/027,481
`of which the ’018 App is a CIP, does not include this heading
`and begins its claim recitation at its page 17. APPL-1002, 395-
`414; APPL-1005, 38.
`
`Pet. 7-8.
`
`12
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`Patent Ownerassertsthat “the Petition contains no actual analysis of
`
`the actual Provisional application.” Prelim. Resp. 44. Accordingto Patent
`
`Owner,it “properly disclosed support for the ‘same brand’ backupin the
`
`Provisional.” /d. at 45. Patent Owner explains:
`
`Here, the Provisional application (Ex. 1005 at 298) discusses
`“synchronization of data between device 110...
`. and cloud
`storage or other storage 101.” Ex. 1005 at 315 (Fig. 5). The
`Provisional further discusses that a “secure channel’ can be
`established between the twoentities to authenticate each other
`and that “[i]t is determined, based on policies and the identity
`and access history of device 1/0 what data to upload 502 to
`storage 101 from device 110...” Id. (emphasis added)
`(reproduced below).
`
`
`
`Ex. 1005 (Provisional) at 315 (Fig. 5). A determination “based
`on”policies and the identity ofthe device would have conveyed
`toa POSITAthat the backup could have been based on a policy
`including the device being of the same brand as the second
`
`13
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`device. See, e.g., Ex. 1001 (105 Patent) at 19:29-35 (“Such a
`policy may state that vaults can only be backed up to
`computational devices of the same brand.) (emphasis added).
`Petitioner and its expert completely disregard this statement and
`the backup discussionsin the Provisional.
`Prelim. Resp. 45—46 (emphasis in original).
`
`These assertions ofPatent Ownerare unavailing. First, in light of
`
`Petitioner’s application ofJakobsson 351 as prior art, Patent Ownerbears
`
`the burden ofproduction to present persuasive argumentthatits claims are
`
`entitled to the benefit ofa filing date prior to the date ofJakobsson ’351 as
`
`prior art. See Dynamic Drinkware, LLC v. National Graphics, Inc.,
`
`800 F.3d 1375, 1379-80 (Fed. Cir. 2015).
`
`Second, as to Patent Owner’s arguments regarding support being
`
`found in Provisional Application No. 61/587,387,filed Jan. 17,2012, we are
`
`not sufficiently unpersuaded. The disclosure Patent Ownerrefers to in the
`
`provisional application is this: “It 1s determined, based on policies and the
`
`identity and access history of device 110 what data to upload 502 to storage
`
`101 from device 110 and component 114, and similarly, what data to
`
`download from storage 101 to device 110 and component 114.” Ex. 1005,
`
`315 (cited at Prelim. Resp. 45—46).
`
`The test for written description support is whether the application
`
`reasonably would have conveyed to one with ordinary skill in the art “the
`
`inventor possessed the inventionat the time ofthat original disclosure.”
`
`Pandrol USA, LP v. Airboss Ry. Prods., Inc., 424 F.3d 1161, 1165 (Fed. Cir.
`
`2005); see also Vas-Cath Inc. v. Mahurkar, 935 F.2d 1555, 1563-64 (Fed.
`
`Cir. 1991) (“the applicant must also convey with reasonable clarity to those
`
`skilled in the art that, as of the filing date sought, he or she wasin possession
`
`ofthe invention’).
`
`14
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`The disclosure in the provisional application as cited by Patent Owner
`
`regardingpolicies is broad and does not convey with reasonable clarity what
`
`specifically are the policies, such as a policy for backup based on whether
`
`the first and second devices are ofthe same brand. The broaddisclosure
`
`does not indicate possession by the inventor the narrow andspecific
`
`limitation recited in independent claims1, 18, and 25, 1.e., “based at least in
`
`part on thefirst device being asame brandas a second device,initiating a
`
`backup,to the second device,of at least a portion ofthe at least onerecord.”
`
`Ex. 1001, 25:7—10, 26:30-32, 28:23—25.
`
`Patent Ownerstates: “A determination ‘based on’ policies and the
`
`identity ofthe device would have conveyed to a POSITAthat the backup
`
`could have been based on a policy including the device being ofthe same
`
`brand as the second device.” Prelim. Resp. 46 (emphasisin original). The
`
`assertion is misplaced becauseit refers to what “could have been”a policy,
`
`rather than whatpolicy the provisional application disclosure conveys the
`
`inventor actually possessed. Whatpotentially “could have been”is mere
`
`speculation, not written description indicating possession.
`
`Similarly, the disclosure ofthe provisional application does not
`
`provide adequate written description support for dependent claim 16
`
`contained in Patent Application 17/123,018 asinitially filed, which issued as
`
`the ’105 patent. Claim 16 as initially filed recites: “the backup 1s performed
`
`in response to a determination thatthe first device is of a same brand as the
`
`second device.” Ex. 1002, 417.
`
`For the foregoing reasons, we apply the AIAversions of 35 U.S.C.
`
`§§ 102 and 103. Also, we determine,on this record, that the effectivefiling
`
`15
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`date of all challenged claims ofthe 105 patentis the actualfiling date of
`
`Patent Application No. 17/123,018, December 15, 2020.
`
`II. ANALYSIS
`
`A.—Legal Standards
`
`A claim is unpatentable under 35 U.S.C. § 103 “if the differences
`
`between the claimed invention andthe priorart are such that the claimed
`
`invention as a whole would have been obviousbefore the effectivefiling
`
`date ofthe claimed invention to a person having ordinary skill in the art to
`
`whichthe claimed invention pertains.” 35 U.S.C. § 103; see KSR Int’l Co. v.
`
`Teleflex Inc. , 550 U.S. 398, 406 (2007). The question of obviousness is
`
`resolved on the basis ofunderlying factual determinations, including (1) the
`
`scope and content ofthe priorart; (2) any differences between the claimed
`
`subject matter andthepriorart; (3) the level of skill in the art; and (4) where
`
`in evidence, so-called secondary considerations ofnonobviousness.’ See
`
`Graham v. John Deere Co., 383 U.S. 1, 17-18 (1966).
`
`B.
`
`Level ofOrdinary Skill in the Art
`Citing testimony from Dr. McDaniel, Petitioner asserts a person of
`
`ordinary skill in the art “would have hada bachelor’s degree in [] electrical
`
`en gineering, computer engineering, computer science, ora related field, and
`
`at least two years of experiencein the research, design, development, and/or
`
`testing of authentication techniques, andrelated firmware and software,or
`
`the equivalent, with additional education substituting for experience and vice
`
`versa.” Pet. 8 (citing Ex. 1003 4 18-22).
`
`” The record does not include any evidence of secondary considerations of
`nonobviousness.
`
`16
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`On this record, we adoptPetitioner’s statement ofthe level of ordinary
`
`skill in the art, except for the qualifier “at least” which applies to experience
`
`and which would improperly extend the scope of experience to the realm of
`
`an expert. Itis supported by the testimony ofDr. McDanieland notdisputed
`
`by Patent Owner (Prelim. Resp. 12). Further, it appears consistent with what
`
`is reflected by the content ofthe applied prior art. Cf Okajimav. Bourdeau,
`
`261 F.3d 1350, 1354-55 (Fed. Cir. 2001) (the applied prior art may reflect
`
`an appropriate level of skill).
`
`C.
`
`Claim Interpretation
`Weuse the same claim construction standard that would be used to
`
`construea claim in acivil action under 35 U.S.C. § 282(b), including
`
`construing the claim in accordance with the ordinary and customary
`
`meaning of such claim as understood by one of ordinary skill in the art and
`
`the prosecution history pertaining to the patent. 37 C.F.R. § 42.100(b). The
`
`claim construction standard set forth in Phillips v. AWH Corp., 415 F.3d
`
`1303 (Fed. Cir. 2005) (en banc) is applicable.
`
`Claim termsare generally given their ordinary and customary
`
`meaning as would be understood by one with ordinary skill in the art in the
`
`context ofthe specification, the prosecution history, other claims, and
`
`extrinsic evidence including expert and inventor testimony,dictionaries, and
`
`learnedtreatises, although extrinsic evidenceis less significant than the
`
`intrinsicrecord. Phillips,415 F.3d at 1312-17. Usually, the specificationis
`
`dispositive, andit is the single best guide to the meaning of a disputed term.
`
`Td. at 1315.
`
`The specification may reveal a special definition given to a claim term
`
`by the patentee, or the specification or prosecution history may reveal an
`
`17
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`intentional disclaimer or disavowal of claim scope by the inventor. /d.
`
`at 1316. “There are only two exceptionsto this general rule: 1) whena
`
`patentee sets outa definition and acts as his own lexicographer, or 2) when
`
`the patentee disavowsthe full scope ofa claim term either in the
`
`specification or during prosecution.” Thorner v. Sony Comput. Entm’t Am.
`
`LLC, 669 F.3d 1362, 1365 (Fed. Cir. 2012).
`
`If an inventor acts as his or her own lexicographer, the definition must
`
`be set forth in the specification with reasonableclarity, deliberateness, and
`
`precision. Renishaw PLC v. Marposs Societa’per Azioni, 158 F.3d 1243,
`
`1249 (Fed. Cir. 1998). The disavowal,if any, can be effectuated by
`
`languagein the specification or the prosecution history. Poly-Am., L.P.v.
`
`API Indus., Inc., 839 F.3d 1131, 1136 (Fed. Cir. 2016).
`
`Only thoseclaim termsthat are in controversy need to be construed,
`
`and only to the extent necessary to resolve the controversy. Realtime Data,
`
`LLC v. lancu, 912 F.3d 1368, 1375 (Fed. Cir. 2019) (“The Boardis required
`
`to construe ‘only those terms. .
`
`. that are in controversy, and only to the
`299
`
`extent necessary to resolve the controversy.’”
`
`(quoting Vivid Techs., Inc. v.
`
`Am. Sci. & Eng’g, Inc., 200 F.3d 795, 803 (Fed. Cir. 1999))).
`
`D.
`
`Alleged Obviousness ofClaims 1, 14, 18, 33, and 35
`over Kesanupalli, Cheng, andKodama
`
`l.
`
`Overview ofKesanupalli (Exhibit 1006)
`
`Kesanupalli discloses systems and methods whichrelate to biometric
`
`authentication ofusers. Ex. 1006, 2:30—31. Biometric informationrefers to
`
`measurable biological characteristics of a user, such as fingerprint, facial
`
`characteristics, eye characteristics, and voice characteristics. /d. at 2:31—35.
`
`Figure 2 of Kesanupalli is reproduced below:
`
`18
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`204
`Le
`
`ENCRYPTION
`KEY
`
`5w
`
`e
`
`20Xe.
`
`SEQURE STORAGE
`
`FIG, 2
`
`Figure 2 illustrates sample system 200 for performing biometric user
`
`enrollment and authentication. Ex. 1006, 6:26—28. System 200 includes
`
`sensor 204, host PC 202, WinUSBdriver 210, biometric service 212,
`
`application 214, andsecurestorage206.
`
`/d. at 6:26—49.
`
`During an enrollment processthat uses a fingerprint sensor as the
`
`biometric sensor, a user swipesa finger across the fingerprint sensor several
`
`timesto create a fingerprinttemplate. Ex. 1006, 3:32—35. Aftercreating a
`
`fingerprint template, the user provides user credentials, such as a password,
`
`cryptographic key, or random seed.
`
`/d. at 3:41—44. The system then binds
`
`the user’s fingerprint template with the user’s credentials and stores the
`
`template and the credentials in a secure storage device. /d. at 3:44—47.
`
`During a subsequentuseridentification process, referred to as user
`
`verification process, a user Swipesa finger across a fingerprint sensor.
`
`Ex. 1006, 3:52—53. The processthen determines whetherthe user’s
`
`fin gerprint information matchesa fingerprint template associated with the
`
`fingerprint sensor. /d. at 3:54—56. Ifthe user’s fingerprint information
`
`matchesa fingerprint template, the user’s credentials are released to the user
`
`and/or a service or process requesting the user verification. /d. at 3:56—59.
`
`19
`
`wet
`f
`HOST PC
`
`SENSOR
`ko
`
`S8k
`
`1
`
`WinUSB
`oaveR
`\
`a0
`
`BIOMETRIC
`SERVICE
`‘
`BE
`
`.
`APPLICATION
`\
`214
`
`
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`The usercredentials are not released from the secure storage device until a
`
`matching fingerprint template is confirmed. /d. at 3:59-61.
`
`Figure 9 is reproduced below:
`
`
`
`WENTIE? 4 LSIQUE IDENTIF:
`FINGER?!
`
`
`
`Figure 9 illustrates a procedurefor authenticating a user in a biometric
`
`authentication system. Ex. 1006, 2:6—7.
`
`Kesanupalli describes that its system will send user credentialsto a
`
`predetermined address or location:
`
`The described systems and methods communicate user
`credentials to a specific address, location, or other recipient
`identifier. Thus, even if an imposter can gain accessto the user
`credentials, the system will send those user credentials to a
`predetermined address or location, thereby preventing the
`imposter from attempting to have theuser credentials sent to an
`alternate address or
`location.
`The address or
`location
`information is
`stored within the user credentials and is
`established as part ofthe enrollment process.
`
`Ex. 1006, 4:3—11. Kesanupalli describes that its systems and methodsare
`
`useful in performing Website authentication.
`
`/d. at 4:36-37. Kesanupalli
`
`explains:
`
`20
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`After a user has enrolled with a particular Website that
`supports biometric authentication, subsequentvisits to the same
`Website cause the Web browserplug-in to detect that the user
`has already enrolled withthe Website. In this situation, the Web
`site prompts the user to perform user authentication (e.g., using
`the biometric device). In the case of a fingerprint sensor, the user
`swipestheir finger across the fingerprint sensor or places their
`finger on the fingerprint sensor. If the fingerprint information
`matches a fingerprint template associated with the fingerprint
`sensor, the Web browserplug-in releases user secrets from the
`user credentials.
`In particular embodiments, the fingerprint
`sensor releases an OTP token or an RSA signature instead of
`plain-text credential. After the credentials are released, they are
`communicated to the Web site to complete the user
`authentication process.
`
`Ex. 1006, 5:9-24. Kesanupalli also describesthat “different user credentials
`
`are associated with each Website with which the user enrolls.” /d. at 5:35—
`
`37,
`
`2.
`
`Overview ofCheng (Ex. 1008)
`
`Chengdiscloses a method “to securely backup andrestore a user’s
`
`portable biometrics-based authentication device without compromising the
`
`security thereof.” Ex. 1008, code (57). The method has atwo-tier backup
`
`encryption structure which allowsdecryption of lower-tier data only when
`
`uppertier data has been decrypted and validated. /d. The lower-tier data
`
`contain encrypted electronic identity ofa user and authentication
`
`information associated therewith such as private keys and corresponding
`
`certificates. /d. The upper-tier data contain the encrypted lower-tier data
`
`and the user’s biometrics information. /d. Figure 2 of Cheng is reproduced
`
`below:
`
`21
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`Biometrics Enrollment, Processing and
`Feature Comparison 201
`
`User
`Interface
`203
`
`
`
`Encryption/Decryption Engine 202
`
`Memory 204
`
`FIG, 2
`
`Figure 2 shows a sample portable biometrics-based authentication device
`
`according to Cheng. Ex. 10089422. Portable device 200 includesuser-
`
`interface means 203, memory means 204, encryption/decryption engine 202,
`
`and biometrics processing means 201.
`
`/d. Onboard microprocessor and
`
`communication meansare not shown.
`
`/d.
`
`Chengdescribes that to backup a device, the lower-tier dataarefirst
`
`enciphered using a first encryption means, and the upper-tier data are then
`
`enciphered using a second encryption means. Ex. 100898. Cheng
`
`describes:
`
`In an embodiment, the encryption keys for both the upper and
`lower tiers are separately generated within the device.
`Ina
`preferred embodiment, the device obtainsa first encryption key
`from a first user service bureau. The lowertier data is encrypted
`with this encryption key. Then, the device obtains a second
`encryption key from a seconduser service bureau, which may or
`may not be the same asthefirst user service bureau, and the
`uppertier data are further encrypted using the second encryption
`key, generating a multiple-encrypted backupfile. The multiple-
`encrypted backupfile is then copied to a storage medium of
`user’s choice.
`
`Ex. 1008 4 8. Cheng further describes:
`
`The storage means could be, for instance, an online proprietary
`or Internet-based storage service, a remote server, a floppydisk,
`a hard drive, a data drive, a CD-ROM,anoptical storage means,
`
`22
`
`

`

`IPR2024-00333
`Patent 11,475,105 B2
`
`a removable disk, a smart card, amemory storage device or any
`other storage media capable of storing data. The user service
`bureau could be proprietary or Internet-based and could also
`provide the storage service.
`Id. § 29.
`
`To restore already backed-up data onto a new device, Chengstates as
`
`follows:
`
`To restore the multiple-encrypted backup data onto a new
`biometrics-based authentication device, the user first needs to
`enroll the relevant biometrics in

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket