throbber
Trials@uspto.gov
`571-272-7822
`
`
`
`
`Paper 32
`Entered: March 6, 2018
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________
`
`TWILIO INC.,
`Petitioner,
`
`v.
`
`TELESIGN CORPORATION,
`Patent Owner.
`____________
`
`Case IPR2016-01688
`Patent 9,300,792 B2
`____________
`
`
`
`Before SALLY C. MEDLEY, MICHAEL W. KIM, and JUSTIN T. ARBES,
`Administrative Patent Judges.
`
`ARBES, Administrative Patent Judge.
`
`FINAL WRITTEN DECISION
`35 U.S.C. § 318(a)
`
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`I. BACKGROUND
`Petitioner Twilio Inc. filed a Petition (Paper 1, “Pet.”) requesting inter
`partes review of claims 1–6, 8, 10–15, and 17 of U.S. Patent No. 9,300,792
`B2 (Ex. 1001, “the ’792 patent”) pursuant to 35 U.S.C. § 311(a). Patent
`Owner TeleSign Corporation filed, with its Preliminary Response, evidence
`that it filed with the Office a statutory disclaimer of claims 3, 5, 7, 12, 14,
`and 16 of the ’792 patent pursuant to 37 C.F.R. § 1.321(a). See Paper 8, 3;
`Ex. 2003, 380.
`On March 8, 2017, we instituted an inter partes review of the
`remaining challenged claims 1, 2, 4, 6, 8, 10, 11, 13, 15, and 17 on a single
`ground of unpatentability. Paper 10 (“Dec. on Inst.”); see 37 C.F.R.
`§ 42.107(e) (“No inter partes review will be instituted based on disclaimed
`claims.”). Patent Owner subsequently filed a Patent Owner Response
`(Paper 15, “PO Resp.”) and Petitioner filed a Reply (Paper 18, “Reply”).
`Patent Owner also filed a Motion to Exclude (Paper 20, “Mot.”) certain
`evidence submitted by Petitioner, to which Petitioner filed an Opposition
`(Paper 24) and Patent Owner filed a Reply (Paper 25, “PO Reply”). An
`oral hearing was held on October 25, 2017, and a transcript of the hearing is
`included in the record (Paper 31, “Tr.”).
`We have jurisdiction under 35 U.S.C. § 6. This Final Written
`Decision is issued pursuant to 35 U.S.C. § 318(a). For the reasons that
`follow, we determine that Petitioner has shown by a preponderance of the
`evidence that claims 1, 2, 4, 6, 8, 10, 11, 13, 15, and 17 are unpatentable.
`
`
`
`
`
`
`
`
`2
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`A. The ’792 Patent1
`The ’792 patent pertains to “on-line or web-site registration,” and
`describes processes for (1) “verifying an on-line registration by a telephone
`connection separate from the on-line connection between the web-site and
`potential registrant,” and (2) “notifying registrants of predetermined events
`using information obtained during the registration process.” Ex. 1001,
`col. 1, ll. 29–36. According to the ’792 patent, there was a need in the art
`for a way to accurately verify an individual’s identity during registration
`because “potential registrants often register with untraceable or false e-mail
`addresses and phone numbers.” Id. at col. 1, ll. 37–60. Similarly, there was
`a need to prevent fraud by subsequently notifying the registered individual
`when certain events occur and potentially seeking the individual’s
`authorization. Id. at col. 1, l. 61–col. 2, l. 25.
`The registration process begins with a user filling out “an on-line
`registration form accessed through a website” (i.e., a “first communication
`connection”). Id. at col. 4, ll. 15–17, 51–54. “For example, the registrant or
`consumer could be an individual attempting to access a web-site and set up
`an account with a financial institution.” Id. at col. 4, ll. 35–38. The user
`provides certain information requested in the form, such as his or her
`telephone number. Id. at col. 4, ll. 55–58. The website then sends a Short
`
`
`1 The ’792 patent also was challenged in Case CBM2016-00099, in which
`the petition seeking covered business method patent review was denied
`because Petitioner had not established that the ’792 patent is eligible for
`such review. The ’792 patent also is related to U.S. Patent No. 8,462,920
`B2, challenged in Case IPR2016-00450, and U.S. Patent No. 8,687,038 B2,
`challenged in Case IPR2016-00451, in which the petitions seeking inter
`partes review were denied.
`
`
`
`3
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`Message Service (SMS) message to the user’s telephone (i.e., a “second
`communication connection”) containing a verification code. Id. at col. 4,
`ll. 61–63, col. 6, ll. 29–36. The user enters the verification code in the
`website form and, if there is a match and the information provided shows
`that the user is who he or she purports to be, the user is verified and may
`login. Id. at col. 2, ll. 57–64, col. 4, ll. 63–67.
`“After registration, notification events are established” by the user or
`business utilizing the system or by a third party. Id. at col. 2, l. 65–col. 3,
`l. 1. A notification event may comprise, for example, “a news event, or a
`request to access or alter [the] registrant’s account.” Id. at col. 3, ll. 1–3.
`When a previously established notification event occurs, the user is notified
`via the telephone number provided during registration. Id. at col. 3, ll. 4–10.
`For example, the system may send an SMS message or voice message to the
`user’s telephone containing a verification code. Id. at col. 9, ll. 25–37. The
`user then enters the verification code into a website form, allowing the user
`to verify his or her identity, “provide[ ] confirmation of receipt of the
`information and, where necessary, authorization for the event to occur, such
`as access to the account, etc.” Id. at col. 9, ll. 37–43.
`
`
`B. Illustrative Claim
`Claim 1 of the ’792 patent recites:
`1. A verification and notification method implemented by
`a computing system, the method comprising:
`receiving, from a user, information via a computing
`interface presented to the user as a result of an attempt by the
`user to access a service, the received information including a
`telephone number associated with the user;
`
`
`4
`
`
`
`
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`verifying the telephone number by:
`establishing a short message service (SMS)
`connection with the user using the received telephone
`number;
`communicating a verification code to the user
`through the SMS connection;
`receiving, via the computing interface, a submitted
`verification code that is entered by the user; and
`verifying the telephone number if the submitted
`verification code is the same as the communicated
`verification code;
`completing a registration of the user based on the received
`information and verified telephone number, wherein the
`completed registration enables the user to access the service;
`maintaining a record of one or more notification events
`associated with actions that require acknowledgement by the
`user;
`
`upon receiving an indication of an occurrence of an
`established notification event, transmitting a message addressed
`to the verified telephone number indicating the occurrence of the
`notification event; and
`receiving, from the user, an acknowledgement of an action
`associated with the established notification event.
`
`C. Prior Art
`The pending ground of unpatentability in the instant inter partes
`review is based on the following prior art:
`U.S. Patent No. 8,781,975 B2, filed May 23, 2005, issued
`July 15, 2014 (Ex. 1003, “Bennett”); and
`U.S. Patent Application Publication No. 2006/0020816
`A1, filed July 5, 2005, published Jan. 26, 2006 (Ex. 1004,
`“Campbell”).
`
`
`
`
`5
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`D. Pending Ground of Unpatentability
`In the instant inter partes review, Petitioner challenges claims 1, 2, 4,
`6, 8, 10, 11, 13, 15, and 17 as unpatentable over Bennett and Campbell
`under 35 U.S.C. § 103(a).2
`
`
`II. ANALYSIS
`A. Claim Interpretation
`The Board interprets claims in an unexpired patent using the “broadest
`reasonable construction in light of the specification of the patent in which
`[they] appear[ ].” 37 C.F.R. § 42.100(b); see also Cuozzo Speed Techs.,
`LLC v. Lee, 136 S. Ct. 2131, 2144–46 (2016) (upholding the use of the
`broadest reasonable interpretation standard). In the Decision on Institution,
`we preliminarily interpreted the claim term “notification event” to mean an
`event that results in the user being notified that the event occurred. Dec. on
`Inst. 6–10. The parties apply this interpretation in their Response and Reply,
`and we do not perceive any reason or evidence that compels any deviation
`from our earlier interpretation. See Resp. 14–15; Reply 11. We adopt the
`previous analysis and conclude that no other terms require interpretation.
`
`
`B. Principles of Law
`To prevail in challenging claims 1, 2, 4, 6, 8, 10, 11, 13, 15, and 17 of
`the ’792 patent, Petitioner must demonstrate by a preponderance of the
`
`
`2 The Leahy-Smith America Invents Act, Pub. L. No. 112-29, 125 Stat. 284
`(2011) (“AIA”), amended 35 U.S.C. §§ 102 and 103. Because the
`challenged claims of the ’792 patent have an effective filing date before the
`effective date of the applicable AIA amendments, we refer to the pre-AIA
`versions of 35 U.S.C. §§ 102 and 103.
`6
`
`
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`evidence that the claims are unpatentable. 35 U.S.C. § 316(e); 37 C.F.R.
`§ 42.1(d). A claim is unpatentable for obviousness if, to one of ordinary
`skill in the pertinent art, “the differences between the subject matter sought
`to be patented and the prior art are such that the subject matter as a whole
`would have been obvious at the time the invention was made.” KSR Int’l
`Co. v. Teleflex Inc., 550 U.S. 398, 406 (2007) (quoting 35 U.S.C. § 103(a)).
`The question of obviousness is resolved on the basis of underlying factual
`determinations, including “the scope and content of the prior art are to be
`determined; differences between the prior art and the claims at issue are to
`be ascertained; and the level of ordinary skill in the pertinent art resolved.”3
`Graham v. John Deere Co., 383 U.S. 1, 17–18 (1966).
`A patent claim “is not proved obvious merely by demonstrating that
`each of its elements was, independently, known in the prior art.” KSR,
`550 U.S. at 418. An obviousness determination requires finding “both ‘that
`a skilled artisan would have been motivated to combine the teachings of the
`prior art references to achieve the claimed invention, and that the skilled
`artisan would have had a reasonable expectation of success in doing so.’”
`Intelligent Bio-Sys., Inc. v. Illumina Cambridge Ltd., 821 F.3d 1359,
`1367–68 (Fed. Cir. 2016) (citation omitted); see KSR, 550 U.S. at 418
`(for an obviousness analysis, “it can be important to identify a reason that
`would have prompted a person of ordinary skill in the relevant field to
`
`
`3 Additionally, secondary considerations, such as “commercial success, long
`felt but unsolved needs, failure of others, etc., might be utilized to give light
`to the circumstances surrounding the origin of the subject matter sought to
`be patented. As indicia of obviousness or nonobviousness, these inquiries
`may have relevancy.” Graham, 383 U.S. at 17–18. Patent Owner, however,
`has not presented any such evidence.
`
`
`
`7
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`combine the elements in the way the claimed new invention does”).
`A motivation to combine the teachings of two references can be “found
`explicitly or implicitly in market forces; design incentives; the ‘interrelated
`teachings of multiple patents’; ‘any need or problem known in the field of
`endeavor at the time of invention and addressed by the patent’; and the
`background knowledge, creativity, and common sense of the person of
`ordinary skill.” Plantronics, Inc. v. Aliph, Inc., 724 F.3d 1343, 1354 (Fed.
`Cir. 2013) (citation omitted). Further, an assertion of obviousness “cannot
`be sustained by mere conclusory statements; instead, there must be some
`articulated reasoning with some rational underpinning to support the legal
`conclusion of obviousness.” KSR, 550 U.S. at 418 (quoting In re Kahn, 441
`F.3d 977, 988 (Fed. Cir. 2006)); In re Nuvasive, Inc., 842 F.3d 1376, 1383
`(Fed. Cir. 2016) (a finding of a motivation to combine “must be supported
`by a ‘reasoned explanation’” (citation omitted)).
`
`
`C. Level of Ordinary Skill in the Art
`Petitioner argues that a person of ordinary skill in the art at the time of
`the ’792 patent would have had “at least an undergraduate degree in
`computer science, or equivalent experience, and in addition would be
`familiar with Internet and telephone communications.” Pet. 22 (citing
`Ex. 1002 ¶¶ 11–20). Patent Owner does not dispute Petitioner’s assessment
`in its Response. Based on the record developed during trial, including our
`review of the ’792 patent and the types of problems and solutions described
`in the ’792 patent and cited prior art, we agree with Petitioner’s assessment
`of the level of ordinary skill in the art and apply it for purposes of this
`Decision.
`
`
`
`8
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`D. Obviousness Ground Based on Bennett and Campbell
`(Claims 1, 2, 4, 6, 8, 10, 11, 13, 15, and 17)
`1. Bennett
`Bennett describes a system for “extending authentication to a two
`factor, out of band form, requiring an additional data element or code via a
`channel different from the channel used for the primary transaction.”
`Ex. 1003, Abstract. The user first provides information, such as his or her
`mobile telephone number, to the system via a website (i.e., a “first
`communication channel”). Id. at col. 2, ll. 61–63, col. 14, ll. 46–56. The
`system then establishes a telephone connection with the user (i.e., a “second
`communication channel”) and sends a completion code to the user (e.g., in
`an SMS message). Id. at col. 2, ll. 63–67, col. 5, ll. 32–35, col. 10, l. 62–col.
`11, l. 5, col. 15, ll. 8–13. The user enters the completion code into the
`website and the system determines, if there is a match, that the user is
`allowed to complete the transaction. Id. at col. 2, l. 67–col. 3, l. 4, col. 15,
`ll. 14–42. For example, the two-factor authentication process may be
`followed when a user initially registers with a service and when the user
`desires to perform various other types of transactions, such as an “online
`banking login,” “[o]nline purchasing,” “[m]oney transfers,” or “online
`banking transactions.” Id. at col. 12, l. 56–col. 13, l. 23.
`The user may be required to go through the authentication process
`only for certain transactions, such as when the user is accessing the system
`from a different device than what was used in the past, or for “each and
`every transaction.” Id. at col. 11, ll. 44–45, col. 18, ll. 4–16. In Bennett’s
`disclosed system, a decision making module determines whether a particular
`transaction requires the two-factor authentication process based on various
`
`
`
`9
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`factors, such as, for example, the current “alert level.” Id. at col. 11,
`l. 28–col. 13, l. 23, col. 16, ll. 3–13, Fig. 2 (decision making module 115
`with decision engine 108).
`Figure 3 of Bennett is reproduced below.
`
`
`As shown in Figure 3, the process begins when the user “wish[es] to access
`an institution in order to receive service. For example, a user makes a
`request to open an account, pay a bill, transfer funds, or purchase goods
`from an institution,” and performs a “regular” authentication (e.g., providing
`
`
`
`10
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`a user ID and password). Id. at col. 15, l. 64–col. 16, l. 3. Each
`“authentication transaction” is then “evaluated as to whether it requires
`further checks.” Id. at col. 16, ll. 3–6. If so, the user is “asked for additional
`authentication via an additional communication channel,” such as a mobile
`telephone number, and the system “send[s] a completion code or other
`information to the user via the additional channel supplied.” Id. at col. 16,
`ll. 22–43. The user then provides the completion code and, if it matches
`what the system provided, the transaction can be completed. Id. at col. 16,
`ll. 50–61.
`
`
`2. Campbell
`Campbell describes a system for managing “authentication attempts
`using . . . a real time communication channel with the end user that is
`separate from the channel being used for authentication.” Ex. 1004,
`Abstract. The system receives information about an authentication attempt
`(an “event”), such as a user attempting to access the Internet from a
`particular location, and determines whether the event meets certain criteria
`that would warrant additional procedures to prevent fraud. Id. ¶¶ 13–18.
`For example, an authentication attempt may be made where the same user
`ID was already used and Internet access is still active, or where multiple
`authentication attempts during a particular time period indicate “atypical
`use.” Id. ¶¶ 18–22.
`If additional processing is required, the system communicates with the
`requesting user via a “separate communications channel,” such as a cellular
`network. Id. ¶¶ 23–24. For example, the system may automatically change
`the user’s password and send an SMS message to the user’s telephone with
`
`
`
`11
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`the new password “along with a message explaining the reason a new
`password is being sent.” Id. ¶ 25. “An example message could read ‘Your
`password has been changed to XXXXXXX due to a risk that your old
`password has been compromised.’ Thus the valid user is automatically
`equipped with and informed of a change in password.” Id. ¶ 39. Or, if the
`number of authentication attempts in a particular time period exceeds a
`designated threshold,
`[t]he SMS message would indicate that the User account has
`been suspended and request
`the User
`to contact
`the
`authentication authority. The authentication authority could be a
`service provider or company that is granting access to, in this
`case, the internet. An example SMS message could read “Your
`account has been suspended due to a risk that your password has
`been compromised. Please contact 800-555-5555 for further
`information.” Thus the valid user is informed of the issue and
`can contact the authentication authority.
`Id. ¶ 41.
`
`
`3. Whether Bennett and Campbell are Prior Art
`to the Challenged Claims
`Bennett issued on July 15, 2014, from an application filed on May 23,
`2005. Campbell was published on January 26, 2006, from an application
`filed on July 5, 2005. Petitioner argues that both references are prior art
`because the earliest effective filing date of the challenged claims is October
`5, 2006. Pet. 9–21.
`
`
`
`
`
`
`12
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`Petitioner provides the following chart on page 10 of the Petition
`depicting the lineage of the ’792 patent.
`
`
`
`As shown in the chart above, the ’792 patent claims priority as a
`continuation or divisional application of a series of applications, and as a
`continuation-in-part (CIP) of U.S. Patent Application No. 11/034,421
`(Ex. 1027, “the ’421 application”), filed on January 11, 2005. See Ex. 1001,
`col. 1, ll. 7–25. Petitioner argues that there is no presumption that the
`challenged claims are entitled to the filing date of the ’421 application,
`because the Office did not consider priority during prosecution of the
`’792 patent, and the ’421 application does not provide written description
`support for certain limitations pertaining to the recited “notification event”
`in independent claims 1 and 10 of the ’792 patent. Pet. 9–15.
`In our Decision on Institution, we agreed with Petitioner, based on the
`record at the time, that the challenged claims are not entitled to the filing
`date of the ’421 application, and the earliest effective filing date of the
`challenged claims is October 5, 2006. Dec. on Inst. 10–12. Patent Owner
`does not dispute Petitioner’s assertions regarding the effective filing date of
`13
`
`
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`the challenged claims in its Response, and we do not perceive any reason or
`evidence that compels any deviation from our earlier conclusion. Thus, we
`adopt the previous analysis, and conclude that Bennett is prior art under
`35 U.S.C. § 102(e) and Campbell is prior art under 35 U.S.C. § 102(a).
`
`4. Claim 1
`a. Whether Bennett and Campbell Collectively Teach
`All of the Limitations of Claim 1
`Petitioner explains in detail how Bennett and Campbell4 collectively
`teach every limitation of claim 1, relying on the testimony of Michael
`Shamos, Ph.D., as support. See Pet. 26–59; Ex. 1002 ¶¶ 70–137. Petitioner
`relies on Bennett for the majority of the limitations of claim 1. Pet. 26–59.
`For example, Petitioner argues that Bennett teaches receiving a telephone
`number from a user via a “computing interface presented to the user as a
`result of an attempt by the user to access a service” (i.e., a web page
`provided to the user), establishing an SMS connection with the user using
`the telephone number, communicating a “verification code” (i.e., completion
`code) to the user through the SMS connection, receiving the completion
`code entered by the user via the “computing interface,” verifying the user’s
`telephone number if there is a match, and completing the registration of the
`user. Id. at 26–37.
`With respect to the last three steps of claim 1, which pertain to
`“notification events,” Petitioner again relies primarily on Bennett, but relies
`on the combined teachings of Bennett and Campbell for one aspect of the
`
`
`4 Campbell was not considered during prosecution of the ’792 patent. See
`Ex. 1001, (56).
`
`
`
`14
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`limitations. Id. at 44–59. Petitioner first argues that Bennett teaches
`“notification events associated with actions that require acknowledgement
`by the user,” as recited in the claims, based on Bennett’s use of “decision
`rules.” Id. at 38–41. For example, Bennett’s decision making module may
`apply the rules and determine that two-factor authentication is required
`“when a logon attempt is detected from a new device” or when there were
`“log-in attempts from suspicious [Internet Protocol (IP)] addresses and
`password recovery attempts.” Id. at 27, 40–41 (citing Ex. 1003, col. 18,
`ll. 4–50). According to Petitioner, the user acknowledges the action
`associated with the notification event by entering the completion code that
`he or she received. Id. at 38–39.
`As explained in the Decision on Institution, we do not agree with
`Petitioner that Bennett alone teaches “notification events,” because there is
`no indication in Bennett that the SMS message to the user containing the
`completion code notifies the user that the underlying event occurred.5 See
`Dec. on Inst. 16–17. In other words, Bennett teaches an “event” (e.g.,
`a login attempt from an unknown device or suspicious IP address, a request
`to perform a particular type of financial transaction) that triggers the SMS
`message with the completion code being sent to the user, but that event is
`not a “notification event” as we have interpreted the term (i.e., an event that
`results in the user being notified that the event occurred). See supra
`Section II.A.
`
`
`5 We do not perceive any reason or evidence that compels any deviation
`from that conclusion, and adopt our previous analysis for purposes of this
`Decision.
`
`
`
`15
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`
`Petitioner, therefore, relies on the combined teachings of Bennett and
`Campbell for the concept of a “notification event.” Pet. 44–47, 56–58.
`Specifically, Petitioner cites Campbell’s disclosure of determining, based on
`set criteria, that additional processing is required, and sending an SMS
`message to the user with an explanation. Id. at 44–45. One example, in
`Campbell, is “suspension of the user’s account as the result of multiple
`attempts to access the account using invalid user ID and password
`combinations within a certain time period,” where the corresponding SMS
`message reads “‘Your account has been suspended due to a risk that your
`password has been compromised. Please contact 800-555-5555 for further
`assistance.’” Id. (citing Ex. 1004 ¶¶ 40–41). Thus, according to Petitioner,
`suspension of the user’s account is an example of a “notification event,”
`because the user is notified of its occurrence via the text in the SMS
`message. Id.
`Petitioner asserts that it would have been obvious to combine this
`teaching from Campbell with Bennett, by “includ[ing] a sentence
`[in Bennett’s SMS message] along with the completion . . . code that
`describes the occurrence of the event that triggered the notification” (i.e., the
`reason why the user is being sent a completion code), and provides reasons
`as to why a person of ordinary skill in the art would have been motivated to
`do so. Id. at 45–47, 56–58. Thus, Petitioner makes clear in the Petition
`exactly how the references are being combined—Petitioner is relying on
`Bennett for all limitations of the claim other than a “notification event,” and
`by adding a sentence to Bennett’s SMS message describing what triggered
`the message, Bennett’s triggering “event” becomes a “notification event”
`(because it would result in the user being notified that the event occurred).
`
`
`
`16
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`See id.; Dec. on Inst. 18–19; Tr. 20:16–24 (Patent Owner acknowledging the
`particular combination asserted by Petitioner). Petitioner’s analysis,
`supported by the testimony of Dr. Shamos, which we credit, is persuasive.
`Patent Owner makes three arguments concerning Petitioner’s alleged
`shortcomings with respect to the aforementioned combination, relying on the
`testimony of Seth Nielson, Ph.D. (Ex. 2008), as support. First, Patent
`Owner argues that Bennett and Campbell fail to teach the “action”
`limitations of the claim. PO Resp. 17–25. Claim 1 recites “maintaining a
`record of one or more notification events associated with actions that require
`acknowledgement by the user” and “receiving, from the user, an
`acknowledgement of an action associated with the established notification
`event” (emphases added). According to Patent Owner, Petitioner improperly
`“collapses the recited ‘action’ with a notification-event itself” by
`“attempting to show acknowledgement of the notification events themselves
`rather than of the recited ‘actions’ associated with notification events.” Id.
`at 17. With respect to Bennett, Patent Owner argues that Bennett cannot
`disclose “actions” associated with “notification events,” because it does not
`disclose “notification events” in the first place. Id. at 18. Patent Owner then
`argues that Campbell also fails to teach “actions” associated with
`“notification events,” because the alleged “notification event” in
`Campbell—the suspension of the user’s account—happens automatically,
`and, thus, has no associated “action” that requires user acknowledgement to
`occur. Id. at 18–24.
`By focusing on each reference individually, however, Patent Owner
`fails to consider the references’ teachings in combination, which is the basis
`for Petitioner’s obviousness assertion. As explained above, Bennett teaches
`
`
`
`17
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`a decision making module that applies decision rules and evaluates whether
`the occurrence of a particular “event” (e.g., a login attempt from an
`unknown device or suspicious IP address, a request to perform a particular
`type of financial transaction) warrants two-factor authentication, in which
`case an SMS message is sent to the user with a completion code. See Pet.
`27, 38–41. The “event” in Bennett is what occurs that triggers the SMS
`message being sent to the user. Those “events,” however, are not
`“notification events,” as we have interpreted the term, because the SMS
`message does not tell the user anything (other than the completion code).
`Petitioner, therefore, relies on a combination with Campbell for the
`“notification event” concept. Id. at 44–47, 56–58. By adding a sentence to
`the SMS message notifying the user that the event occurred, Bennett’s
`“event” becomes a “notification event.”
`Importantly, Petitioner relies on Bennett—not Campbell—as teaching
`“actions” associated with an event. Specifically, Petitioner references what
`Bennett refers to as “transactions” that the user acknowledges by entering
`the completion code. Id. at 38–39 (“Bennett’s decision rules define which
`transactions (actions) require notifying the user and receiving user
`acknowledgement, in the form of two-factor authentication.” (emphasis
`added)); see also id. at 60, 62–63 (arguing for various dependent claims that
`Bennett teaches numerous types of financial and non-financial
`“transactions” that require two-factor authentication by “notifying the user
`and requiring an acknowledgement” of the transaction, including “online
`banking login, online purchasing, money transfers, online brokerage trading,
`[and] company extranet logon”); Tr. 20:25–21:1 (Patent Owner
`acknowledging that Petitioner does “rely on Bennett for everything
`
`
`
`18
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`associated with an action that requires acknowledgement”). Petitioner cites
`the following portion of Bennett, which broadly defines what Bennett means
`by “transactions”:
`As referred to in this description of the invention the term
`“Transaction” or “Transactions” may refer to any of the
`following non-limiting examples of online or other transactions,
`interactions, enrollment to a service, re-enrollment and password
`recovery using some sort of authentication/challenge or use of
`various services. It should be noted that the term Transaction is
`applicable not only to “financial” transactions but to any
`transaction involving authentication. For example, without
`limitation, Transaction refers not only to transactions such as an
`online banking login, but also to a company extranet login. It
`should be applicable to any transaction where the user is being
`authenticated by some means, regardless of the purpose of the
`authentication. Without limiting the foregoing, the following list
`illustrates certain types of transactions it may apply to: (1) Online
`enrolment, such as financial account opening: banking,
`brokerage, and insurance; subscriptions for example for ISP, data
`and
`informational content deliveries; customer
`service
`enrollment; enrollment to Programs (partnership, MLM, beta,
`etc.) and any other similar type of transaction; (2) Online
`transactions such as Online Purchasing, B2B, B2c and C2C
`transactions; Electronic Bill payment; Internet ACH providers;
`Money transfers between accounts; Online brokerage trading;
`Online insurance payments; Certain online banking transactions;
`Tax filing or Any other similar type of transaction; (3) Online
`Applications such as for credit cards; loans; memberships; patent
`applications or information; Governmental applications or other
`similar type of transactions; (4) Online password resetting, as
`well as online change or update
`to personal data by
`re-authentication/re-enrollment; by combining a mechanism
`involving secret questions; or by a combination of the above; (5)
`any login to a restricted service, or other operations that involve
`an element of risk. Other suitable transactions may be included
`as well.
`
`
`
`19
`
`

`

`IPR2016-01688
`Patent 9,300,792 B2
`
`Ex. 1003, col. 12, l. 56–col. 13, 23; see Pet. 38 (also citing Ex. 1003, col. 15,
`l. 61–col. 16, l. 13 (“For example, a user makes a request to open an account,
`pay a bill, transfer funds, or purchase goods from an institution.”)).
`In other words, the “action” in Bennett is the transaction that the user
`is attempting to complete, which will be completed once acknowledged.
`In Petitioner’s particular cited examples, a user is attempting to login, for
`instance. See Pet. 27, 38–41. The user acknowledges the transaction by
`entering the completion code he or she received, after which the transaction
`can be completed (e.g., the user can login, or the financial transaction can be
`completed). Id. at 58–59 (citing Ex. 1003, col. 15, ll. 12–41; Ex. 1002
`¶¶ 136–137 (explaining how when a user attempts to login from an unknown
`device or suspicious IP address, the two-factor authentication process
`requires the user to “acknowledg[e] that he or she is the one logging in by
`entering the completion [code]”)).
`Notably, Bennett’s descriptions of a user attempting to login and
`initiating a financial transaction are very similar to what is described

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket