throbber
Paper 10
`Trials@uspto.gov
`571-272-7822 Entered: September 12, 2018
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`UNIVERSAL SECURE REGISTRY LLC,
`Patent Owner.
`____________
`
`
`
`Case CBM2018-00022
`Patent 9,530,137 B2
`____________
`
`
`
`
`Before PATRICK R. SCANLON, GEORGIANNA W. BRADEN, and
`JASON W. MELVIN, Administrative Patent Judges.
`
`BRADEN, Administrative Patent Judge.
`
`
`DECISION
`Denying Institution of Covered Business Method Patent Review
`37 C.F.R. § 42.208
`
`
`
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`I. INTRODUCTION
`This is a preliminary proceeding to decide whether, under
`section 18 of the Leahy-Smith America Invents Act, Pub. L. No. 112–
`29, 125 Stat. 284, 331 (2011) (“AIA”), a covered business method
`patent review of U.S. Patent No. 9,530,137 B2 (Ex. 1001, “the
`’137 patent” or “the challenged patent”), should be instituted under
`35 U.S.C. § 324(a).1 A covered business method patent review may
`not be instituted “unless . . . the information presented in the
`petition . . . , if such information is not rebutted, would demonstrate
`that it is more likely than not that at least 1 of the claims challenged in
`the petition is unpatentable.” 35 U.S.C. § 324(a); see 37 C.F.R.
`§ 42.208. We have authority under 35 U.S.C. § 324(a).
`Apple Inc. filed a Petition requesting covered business method
`patent review of claims 1–12 of the challenged patent. Paper 3
`(“Pet.”). Patent Owner timely filed a Preliminary Response. Paper 8
`(“Prelim. Resp.”). With its Preliminary Response, Patent Owner
`provided evidence (Ex. 2001) that it filed with the Office a statutory
`disclaimer of claims 8, 10, and 11 of the ’137 patent pursuant to
`37 C.F.R. § 1.321(a). Prelim. Resp. 15 (citing Ex. 2001).
`
`
`
`1 GTNX, Inc. v. INTTRA, Inc., 789 F.3d 1309, 1310 (Fed. Cir. 2015)
`(describing transitional program for review of covered business
`method patents, pursuant to the AIA, as subject to “‘the standards and
`procedures of[] a post-grant review under’ . . . 35 U.S.C. §§ 321–329,”
`absent exceptions not applicable here (alteration in original) (quoting
`AIA § 18(a)(1))).
`
`2
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`Upon consideration of the record, as explained in detail below,
`we determine that the ’137 patent is not a covered business method
`patent and accordingly deny the Petition.
`A. Related Matters
`As required by 37 C.F.R. § 42.8(b)(2), each party identifies
`various judicial or administrative matters that would affect or be
`affected by a decision in this proceeding. Pet. 3–4; Paper 7, 2 (Patent
`Owner’s Mandatory Notices).
`B. The ’137 Patent
`The ’137 patent is titled “Method and Apparatus for Secure
`Access Payment and Identification” and describes ways to securely
`authenticate the identity of a plurality of users. Ex. 1001, [54], [57],
`1:43–55.
`
`1. Written Description
`The challenged patent describes a secure database called a
`“Universal Secure Registry,” which can be used as “a universal
`identification system” and/or “to selectively provide information about
`a person to authorized users.” Id. at 4:8–11. The ’137 patent states
`that the USR database is designed to “take the place of multiple
`conventional forms of identification.” Id. at 4:23–25. The ’137 patent
`further states that various forms of information can be stored in the
`database to verify a user’s identity and prevent fraud:
`(1) algorithmically generated codes, such as a time-varying multi-
`character code or an “uncounterfeitable token,” (2) “secret
`information” like a PIN or password, and/or (3) a user’s “biometric
`information,” such as fingerprints, voice prints, an iris or facial scan,
`
`3
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`DNA analysis, or even a photograph. See id. at 14:1–7, 14:21–40,
`44:54–61, Fig. 3. Accordingly, the ’137 patent discloses that the
`system can be used to selectively provide authorized users with access
`to perform transactions involving various types of confidential
`information stored in a secure database. See, e.g., id. at 4:8–15. “For
`example, a person may wish to participate in a transaction to give a
`potential employer one-time access to job application information 44.”
`Id. at 17:11–13.
`The ’137 patent specifically discloses that an event enabled or
`prevented by the system “may be a transaction (e.g., a financial
`transaction), access control (e.g., physical or electronic access), or
`other action that is either enabled or prevented.” Id. at 6:58–61, see
`also 28:49–50 (“[v]arious embodiments can be employed to control
`access to a physical facility.”). Certain embodiments in the ’137 patent
`illustrate that the transactions may provide “Address Information,”
`“Financial Information,” “Medical Information,” or “Tax
`Information.” Id. at 13:42–14:7, Figs. 3, 4; see also 15:6–57, 17:11–
`13, 23:18–21, 24:12–16, 24:46–49. Still other embodiments of the
`’137 patent disclose transactions involving “any of a wide variety of
`acts including: authorizing a withdrawal of money from a user’s
`account, permitting the user access to a secure area, permitting a user
`to view medical information concerning themselves or a third party, or
`permitting the user to access other confidential information.” Id. at
`42:64–43:3.
`
`4
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`2. Illustrative Claims
`Claims 1 and 12 are independent and illustrate the challenged
`
`subject matter.
`1. A system for authenticating a user for enabling a transaction,
`the system comprising:
`a first device including:
`a first processor, the first processor programmed to
`authenticate a user of the first device based on secret
`information and to retrieve or receive first biometric
`information of the user of the first device;
`a first wireless transceiver coupled to the first processor and
`programmed to transmit a first wireless signal including
`first authentication information of the user of the first
`device; and
`a biometric sensor configured to capture the first biometric
`information of the user;
`wherein the first processor is programmed to generate one
`or more signals
`including
`the
`first authentication
`information, an indicator of biometric authentication, and a
`time varying value in response to valid authentication of
`the first biometric information, and to provide the one or
`more signals including the first authentication information
`for transmitting to a second device; and
`wherein the first processor is further configured to receive
`an enablement signal from the second device; and
`the system further including the second device that is
`configured to provide the enablement signal indicating that the
`second device approved the transaction based on use of the one
`or more signals;
`wherein the second device includes a second processor that
`is configured to provide the enablement signal based on the
`indication of biometric authentication of the user of the first
`device, at least a portion of the first authentication
`information, and second authentication information of the
`user of the first device to enable and complete processing
`of the transaction.
`Id. at 45:27–61.
`
`5
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`12. A system for authenticating a user for enabling a transaction,
`the system comprising:
`a first device including:
`a biometric sensor configured to capture a first biometric
`information of the user;
`a first processor programmed to: 1) authenticate a user of the
`first device based on secret information, 2) retrieve or receive
`first biometric information of the user of the first device, 3)
`authenticate the user of the first device based on the first
`biometric, and 4) generate one or more signals including first
`authentication information, an indicator of biometric
`authentication of the user of the first device, and a time
`varying value; and
`a first wireless transceiver coupled to the first processor and
`programmed to wirelessly transmit the one or more signals to
`a second device for processing;
`wherein generating the one or more signals occurs responsive
`to valid authentication of the first biometric information; and
`wherein the first processor is further programmed to receive
`an enablement signal indicating an approved transaction from
`the second device, wherein the enablement signal is provided
`from the second device based on acceptance of the indicator
`of biometric authentication and use of the first authentication
`information and use of second authentication information to
`enable the transaction.
`Id. at 46:55–47:14.
`C. Asserted Grounds of Unpatentability
`Petitioner contends that claims 1–12 are unpatentable under 35
`
`U.S.C. § 101 as being directed to an abstract idea. Pet. 2, 25–26, 32.
`
`II. DISCUSSION
`
`A. Claim Construction
`In a covered business method patent review, we currently
`construe claim terms in an unexpired patent according to their broadest
`reasonable construction in light of the specification of the patent in
`
`6
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`which they appear. 37 C.F.R. § 42.200(b); Versata Dev. Grp., Inc. v.
`SAP Am., Inc., 793 F.3d 1306, 1328 (Fed. Cir. 2015) (affirming use of
`the broadest reasonable construction standard in a covered business
`method patent review); cf. Cuozzo Speed Techs. LLC v. Lee, 136 S. Ct.
`2131, 2144–46 (2016) (upholding the use of the broadest reasonable
`interpretation standard in an inter partes review). Claim terms
`generally are given their ordinary and customary meaning, as would be
`understood by one of ordinary skill in the art in the context of the
`entire disclosure. In re Translogic Tech., Inc., 504 F.3d 1249, 1257
`(Fed. Cir. 2007). To rebut this presumption by acting as a
`lexicographer, the patentee must give the term a particular meaning in
`the specification with “reasonable clarity, deliberateness, and
`precision.” In re Paulsen, 30 F.3d 1475, 1480 (Fed. Cir. 1994). In
`addition, the broadest reasonable construction of a claim term cannot
`be so broad that the construction is unreasonable under general claim
`construction principles. Cf. Microsoft Corp. v. Proxyconn, Inc., 789
`F.3d 1292, 1298 (Fed. Cir. 2015) (discussing broadest reasonable
`construction in the context of an inter partes review).
`Petitioner proposes constructions for several terms, including
`“biometric information,” “secret information,” and “authentication
`information.” Pet. 27–32. Patent Owner does not address directly
`Petitioner’s proposed constructions. Prelim. Resp. 11. Rather, Patent
`Owner contends construction of the claim terms is unnecessary. Id.
`We agree with Patent Owner. Specifically, we conclude that no
`term needs to be construed expressly in order for us to determine
`whether a covered business method patent review should be instituted.
`
`7
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`B. Covered Business Method Patent
`The AIA defines a “covered business method patent” as “a
`patent that claims a method or corresponding apparatus for performing
`data processing or other operations used in the practice, administration,
`or management of a financial product or service . . . .” AIA § 18(d)(1);
`see 37 C.F.R. § 42.301(a). “[Section] 18(d)(1) directs us to examine
`the claims when deciding whether a patent is a [covered business
`method] patent.” Blue Calypso, LLC v. Groupon, Inc., 815 F.3d 1331,
`1340 (Fed. Cir. 2016); Unwired Planet, LLC v. Google Inc., 841 F.3d
`1376, 1382 (Fed. Cir. 2016) (CBM patents “are limited to those with
`claims that are directed to methods and apparatuses of particular types
`and with particular uses ‘in the practice, administration, or
`management of a financial product or service’” (emphasis added); see
`also Secure Axcess, LLC v. PNC Bank Nat’l Assoc., 848 F.3d 1370,
`1378 (Fed. Cir. 2017) (“The statutory definition by its terms makes
`what a patent ‘claims’ determinative of the threshold requirement for
`coming within the defined class” of a covered business method patent.)
`(cert. granted, judgement vacated as moot by PNC Bank Nat. Ass’n. v.
`Secure Axcess, LLC, 138 S. Ct. 1982 (May 14, 2018)).
`A patent need have only one claim directed to a covered
`business method to be eligible for review. See Transitional Program
`for Covered Business Method Patents—Definitions of Covered
`Business Method Patent and Technological Invention; Final Rule,
`77 Fed. Reg. 48,734, 48,736 (Aug. 14, 2012); cf. Versata, 793 F.3d at
`1326–27 (accepting single claim analysis to determine whether to
`institute a covered business method patent review). “When properly
`
`8
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`construed in light of the written description, the claim need only
`require one of a ‘wide range of finance-related activities.’” Secure
`Axcess, 848 F.3d at 1381; see also Versata, 793 F.3d at 1312–13,
`1325–26 (identifying a qualifying claim); Blue Calypso, 815 F.3d at
`1339–40 (identifying a qualifying claim); SightSound Techs., LLC v.
`Apple Inc., 809 F.3d 1307, 1315–16 (Fed. Cir. 2015) (identifying a
`qualifying claim).
`C. Effect of Statutory Disclaimer
`Patent Owner provided, with its Preliminary Response, evidence
`that it filed with the Office a statutory disclaimer of claims 8, 10, and
`11 of the challenged patent pursuant to 35 U.S.C. § 253(a) and
`37 C.F.R. § 1.321(a). Ex. 2001, 1; see Prelim. Resp. 15. The
`disclaimer of a claim “shall . . . be considered as part of the original
`patent.” 35 U.S.C. § 253(a). The language “considered as part of the
`original patent” means that a patent subject to a disclaimer under
`§ 253(a) “is treated as though the disclaimed claims never existed.”
`Vectra Fitness, Inc. v. TNWK Corp., 162 F.3d 1379, 1383 (Fed. Cir.
`1998) (“This court has interpreted the term ‘considered as part of the
`original patent’ in section 253 to mean that the patent is treated as
`though the disclaimed claims never existed”) (citing Altoona Publix
`Theatres v. Am. Tri-Ergon Corp., 294 U.S. 477, 492 (1935)); Guinn v.
`Kopf, 96 F.3d 1419, 1422 (Fed. Cir. 1996) (holding that the Board’s
`interference jurisdiction under 35 U.S.C. § 291 required “the existence
`of an interference, and a claim that ‘never existed’ [due to a statutory
`disclaimer] cannot form the basis for an interference”); Great West
`Cas. Co. v. Intellectual Ventures II LLC, Case CBM2015-00171, slip
`
`9
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`op. at 7 (PTAB Feb. 9, 2016) (Paper 10) (the Board treats disclaimed
`claims “as never having existed”); Google Inc. v. SimpleAir, Inc., Case
`CBM2015-00019, slip op. at 14–15 (PTAB May 19, 2014) (Paper 11)
`(“[W]e treat the [challenged] patent as though [the disclaimed claim]
`never existed.”). Thus, even though claims of the challenged patent
`existed at the time the Petition here was filed, we must now treat the
`challenged patent as if it had never included those claims.
`
`1. Disclaimed Claims Challenged in the Petition
`Of the challenged claims, Patent Owner disclaimed claims 8, 10,
`and 11. Ex. 2001, 1. A covered business method patent review cannot
`be instituted based on disclaimed claims. 37 C.F.R. § 42.207(e) (“The
`patent owner may file a statutory disclaimer under 35 U.S.C. § 253(a)
`in compliance with 37 C.F.R. § 1.321(a), disclaiming one or more
`claims in the patent. No post-grant review will be instituted based on
`disclaimed claims.”).
`Specifically, the decision whether to institute a CBM patent
`review is based on whether a patent “is” a covered business method
`patent, which in turn is based on what the patent “claims” at the time
`of the institution decision, not as the claims may have existed at some
`previous time. See AIA §§ 18(a)(1)(E) (using the present tense “is”),
`18(d)(1) (using the present tense “claims”); 35 U.S.C. § 324(a);
`37 C.F.R. § 42.207(e) (when a patent owner files a statutory
`disclaimer, “[n]o post-grant review will be instituted based on
`disclaimed claims”); Facebook, Inc. v. Skky, LLC, 2017 WL 4349404,
`*5 (PTAB, Sept. 28, 2017) (§ II.B.2 designated precedential Dec. 21,
`2017) (“CBM patent review eligibility is determined based on the
`
`10
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`claims of the challenged patent as they exist at the time of the decision
`whether to institute, and statutorily disclaimed claims must be treated
`as if they never existed.”).
`Accordingly, no covered business method patent review will be
`instituted for disclaimed claims 8, 10, and 11. Nevertheless, our
`analysis continues because not all of the claims challenged in the
`Petition have been disclaimed by Patent Owner.
`2. Remaining Claims Challenged in the Petition
`Petitioner challenges some claims that have not been disclaimed
`by Patent Owner—claims 1–7, 9, and 12. Pet. 32. For the following
`reasons, we determine Petitioner has not established that these
`challenged patent claims qualify for a covered business method patent
`review.
`Petitioner identifies seven claims that it contends satisfy the
`threshold financial requirement on the basis of their claim language.
`Pet. 18–19 (identifying claims 1, 3, 4, 12, and disclaimed claims 8, 10,
`11). According to Petitioner, claims 1 and 12 disclose systems for
`“authenticating a user for enabling a transaction” and contemplate the
`transmission and receipt of an “enablement signal” that allows or
`denies the transaction, while claims 3 and 4 explicitly recite a
`“transaction.” Id. Petitioner notes that the specification makes clear
`that the “transactions” recited in the claims can be financial in nature.
`Id. at 19 (citing 6:57–61 (“In various embodiments, the event that is
`enabled or prevented may be a transaction (e.g., a financial
`transaction), access control (e.g., physical or electronic access) or other
`action that is either enabled or prevented.”); 8:25–28 (“In one
`
`11
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`embodiment the system further comprises a networked credit card
`validation-information entity configured to approve and deny financial
`transactions based on authentication of the user.”); Figs. 7–10
`(illustrating transmission of credit card and/or bank account
`information)).
`Patent Owner disputes Petitioner’s contentions, arguing that
`claims 1, 3, 4, and 12 fail to recite any limitation that is explicitly or
`inherently financial. Prelim. Resp. 14. According to Patent Owner,
`“Petitioner’s reliance on the term ‘transaction’ in the claims as the
`statutory basis for CBM review of the ’137 patent impermissibly
`expands the scope of CBM review, and ignores Federal Circuit
`precedent squarely contradicting Petitioner’s broad interpretation of
`the law.” Id. (citing Unwired Planet, 841 F.3d at 1382 (“reliance on
`whether [a] patent claims activities ‘incidental to’ or ‘complementary
`to’ a financial activity . . . was not in accordance with law”); Secure
`Axcess, 848 F.3d at 1381 (“such a definition of a CBM patent is
`beyond the scope of the statutory standard”)). Rather, Patent Owner
`notes, “a CBM patent must contain something ‘explicitly or inherently
`financial in the construed claim language.’” Id. (citing Blue Calypso,
`815 F.3d at 1340 (emphasis added by Patent Owner)).
`We agree with Patent Owner that not one of claims 1, 3, 4, and
`12 provides a basis for the challenged patent’s CBM eligibility.
`Specifically, these remaining challenged claims on their face do not
`evince claiming a financial product or service, and the written
`description describes the invention as being broader than a system for
`secure access payment and the authentication of a purchaser’s identify.
`
`12
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`See, e.g., Ex. 1001, 13:42–14:7, Figs. 3, 4 (encompassing transactions
`that may provide “Address Information,” “Financial Information,”
`“Medical Information,” or “Tax Information.”); 42:64–43:3
`(encompassing transactions involving “any of a wide variety of acts
`including: authorizing a withdrawal of money from a user’s account,
`permitting the user access to a secure area, permitting a user to view
`medical information concerning themselves or a third party, or
`permitting the user to access other confidential information.”). We do
`not consider the term “transaction” by itself to be explicitly or
`inherently financial, because the ’137 patent indicates that a particular
`transaction is financial in nature by using the term “financial
`transaction.” See Ex. 1001, 6:59, 7:9, claim 11. We further note
`Petitioner did not propose a construction of “transaction” as being
`inherently financial in nature. If there is “nothing explicitly or
`inherently financial in the construed claim language,” a patent does not
`meet the statutory definition under AIA Section 18(d)(1) and is
`ineligible for CBM review. See Blue Calypso, 815 F.3d at 1340; see
`also, e.g., Secure Axcess, 848 F.3d at 1381 (“Necessarily, the statutory
`definition of a CBM patent requires . . . a claim that contains . . . a
`financial activity element.”).
`Accordingly, we determine Petitioner has failed to meet its
`burden of showing that any one of challenged claims 1, 3, 4, and 12 is
`eligible for covered business method patent review. Therefore, we do
`not institute a covered business method patent review for the ’137
`patent.
`
`13
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`
`3. Conclusion
`In sum, we do not institute a covered business method patent
`review for challenged claims 8, 10, and 11 of the ’137 patent that were
`disclaimed by Patent Owner after the Petition was filed. Nor do we
`institute a covered business method patent review for challenged
`claims 1–7, 9, and 12 because Petitioner has failed to demonstrate that
`any one of these challenged claims render the patent eligible for
`covered business method patent review.
`
`III. ORDER
`After due consideration of the record before us and for the
`foregoing reasons, it is:
`ORDERED that the Petition is denied and no covered business
`method patent review is instituted.
`
`
`
`
`
`
`
`
`
`
`
`
`
`14
`
`

`

`CBM2018-00022
`Patent 9,530,137
`
`FOR PETITIONER:
`Monica Grewal
`Ben Fernandez
`WILMER CUTLER PICKERING HALE AND DORR LLP
`monica.grewal@wilmerhale.com
`ben.fernandez@wilmerhale.com
`
`FOR PATENT OWNER:
`
`James M. Glass
`Tigran Guledjian
`Christopher A. Mathews
`Nima Hefazi
`Richard Lowry
`QUINN EMANUEL URQUHART & SULLIVAN LLP
`jimglass@quinnemanuel.com
`tigranguledjian@quinnemanuel.com
`chrismathews@quinnemanuel.com
`nimahefazi@quinnemanuel.com
`richardlowry@quinnemanuel.com
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket