throbber

`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`_________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`_________________________
`
`InAuth, Inc.
`
`Petitioner
`
`v.
`
`mSIGNIA, Inc.
`
`Patent Owner
`_________________________
`
`Case No. Unassigned
`
`_________________________
`
`
`
`DECLARATION OF DR. PATRICK TRAYNOR
`
`
`
`IA1003
`
`IA1003
`
`

`

`
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`OVERVIEW AND SUMMARY OF OPINIONS.................................................... 1
`A. My Background And Qualifications ............................................................. 4
`LIST OF DOCUMENTS I CONSIDERED IN FORMULATING MY
`OPINIONS ............................................................................................................... 7
`PERSON OF ORDINARY SKILL IN THE ART ................................................... 9
`III.
`STATE OF THE ART ............................................................................................ 10
`IV.
`OVERVIEW OF THE ‘852 PATENT ................................................................... 13
`V.
`THE ‘852 FILE HISTORY .................................................................................... 24
`VI.
`VII. CLAIM CONSTRUCTION ................................................................................... 26
`VIII. BASIS OF MY ANALYSIS WITH RESPECT TO ANTICIPATION ................. 27
`IX. BASIS OF MY ANALYSIS WITH RESPECT TO OBVIOUSNESS AND
`OBJECTIVE INDICIA OF NONOBVIOUSNESS ............................................... 28
`SUMMARY OF GROUNDS ................................................................................. 30
`X.
`XI. GROUND 1: CLAIMS 1-5, 7, 14-21, AND 24-25 ARE ANTICIPATED
`BY ETCHEGOYEN ................................................................................................ 31
`A.
`The Etchegoyen System .............................................................................. 35
`B. Methods of Authenticating in Etchegoyen .................................................. 38
`C.
`Independent Claim 1 ................................................................................... 41
`D.
`Independent Claim 24 ................................................................................. 54
`E.
`Independent Claim 25 ................................................................................. 64
`F.
`Dependent Claim 2 ...................................................................................... 74
`G.
`Dependent Claim 3 ...................................................................................... 74
`H.
`Dependent Claims 4 and 5........................................................................... 75
`I.
`Dependent Claim 7 ...................................................................................... 78
`J.
`Dependent Claims 14, 15, and 16 ............................................................... 79
`K.
`Dependent Claims 17, 18, and 19 ............................................................... 81
`L.
`Dependent Claim 20 .................................................................................... 84
`M.
`Dependent Claim 21 .................................................................................... 84
`XII. GROUND 2: CLAIMS 1-5, 7, 14-21, AND 24-25 WOULD HAVE BEEN
`OBVIOUS IN VIEW OF ETCHEGOYEN ............................................................. 85
`
`
`
`IA1003
`
`IA1003
`
`

`

`
`
`XIII. GROUND 3: DEPENDENT CLAIMS 6 AND 8-12 WOULD HAVE
`BEEN OBVIOUS IN VIEW OF ETCHEGOYEN AND JAKOBSSON ................. 88
`A.
`Dependent Claim 6 ...................................................................................... 92
`B.
`Dependent Claims 8-12 ............................................................................... 95
`XIV. GROUND 4: DEPENDENT CLAIMS 13, 22, AND 23 WOULD HAVE
`BEEN OBVIOUS IN VIEW OF ETCHEGOYEN AND VARGHESE ................ 100
`A.
`Dependent Claims 13, 22, and 23 ............................................................. 101
`XV. GROUND 5: CLAIMS 1-23, 25 ARE ANTICIPATED BY VARGHESE ......... 103
`A.
`Independent Claim 1 ................................................................................. 104
`B.
`Independent Claim 25 ............................................................................... 118
`C.
`Dependent Claim 2 .................................................................................... 125
`D.
`Dependent Claim 3 .................................................................................... 125
`E.
`Dependent Claims 4, 5, and 6 ................................................................... 126
`F.
`Dependent Claim 7 .................................................................................... 131
`G.
`Dependent Claims 8-12 ............................................................................. 132
`H.
`Dependent Claims 13, 22, and 23 ............................................................. 134
`I.
`Dependent Claims 14, 15, and 16 ............................................................. 136
`J.
`Dependent Claims 17, 18, and 19 ............................................................. 138
`K.
`Dependent Claim 20 .................................................................................. 140
`L.
`Dependent Claim 21 .................................................................................. 141
`XVI. GROUND 6: CLAIM 24 WOULD HAVE BEEN OBVIOUS IN VIEW
`OF VARGHESE AND BACKGROUND KNOWLEDGE OF A POSA ............. 142
`A.
`Independent Claim 24 ............................................................................... 142
`XVII. OBJECTIVE INDICIA DO NOT SUPPORT PATENTABILITY ..................... 149
`XVIII. CONCLUSION .................................................................................................... 150
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`I, Patrick Traynor, Ph.D., hereby declare as follows.
`
`1.
`
`I am over the age of eighteen (18) and otherwise competent to make
`
`this declaration.
`
`2.
`
`I have been retained as an expert witness on behalf of InAuth, Inc.
`
`(“InAuth”) in connection with the above-captioned requested inter partes review
`
`(“IPR”). I am being compensated for my time in connection with this IPR at my
`
`standard consulting rate, which is $500 per hour. My compensation does not
`
`depend on the outcome of this proceeding. I have no personal interest in the
`
`outcome of this proceeding.
`
`I.
`
`OVERVIEW AND SUMMARY OF OPINIONS
`
`3.
`
`I understand that a petition for inter partes review has been filed
`
`regarding U.S. Patent No. 9,559,852 (“the ‘852 patent”) (IA1001), which resulted
`
`from U.S. Application No. 15/075,066 (“the ‘066 Application”), filed on March
`
`18, 2016, naming Paul Timothy Miller and George Allend Tuvell as inventors. I
`
`understand that the petition for inter partes review challenges claims 1-25 of the
`
`‘852 patent (the “Challenged Claims”) as anticipated and/or obvious.
`
`4.
`
` The ‘852 Patent issued on January 31, 2017, from the ‘066
`
`application.
`
`5.
`
`I understand that the ‘852 patent lists mSIGNIA, Inc. (“Patent
`
`Owner”) as assignee.
`
`
`
`1
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`I understand that the earliest possible filing date for the ‘852 patent is
`
`6.
`
`February 3, 2011, which is the filing date of Provisional Patent Application No.
`
`61/462,474 (“the ‘474 provisional”). IA1009. I have not been asked to opine
`
`regarding whether the ‘474 provisional provides adequate written description for
`
`and/or enables the Challenged Claims, and I offer no opinion on this matter in this
`
`declaration. I have assumed, only for purposes of this Declaration, that the priority
`
`date for all Challenged Claims is February 3, 2011. My opinions as to invalidity
`
`discussed herein would not change if February 3, 2011 or a later date is used as the
`
`priority date. I am not aware of any evidence to suggest that any claim of the ‘852
`
`patent should get the benefit of any earlier priority date. I am also not aware of
`
`any claim by Patent Owner to an earlier priority date that would change any of my
`
`opinions set forth in this declaration or otherwise. I reserve the right to respond
`
`with specificity if Patent Owner alleges an earlier priority date.
`
`7.
`
`In preparing this Declaration, I have reviewed the ‘852 patent, its file
`
`history (IA1002), the parent U.S. Patent No. 9,294,448 (“the ‘448 patent”)
`
`(IA1010), the file history of the ‘448 patent (IA1011), the grand-parent U.S. Patent
`
`No. 8,817,984 (“the ‘984 patent”) (IA1012), the file history of the ‘984 patent
`
`(IA1013), and the ‘474 Provisional and considered each of the documents cited
`
`herein, in light of general knowledge in the art (i.e., field) on or before February 3,
`
`2011. In formulating my opinions, I have relied upon my nearly 20 years of
`
`
`
`2
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`experience, education, and knowledge in the relevant art. In formulating my
`
`opinions, I have also considered the viewpoint of one of ordinary skill in the art as
`
`of February 3, 2011. A brief summary of my opinions follows:
`
`a. Etchegoyen discloses all limitations of Claims 1-5, 7, 14-21, and
`
`24-25 of the ‘852 patent and therefore anticipates these claims.
`
`(Ground 1 of Petition)
`
`b. To the extent it is found that Etchegoyen does not disclose any of
`
`the limitations of Claims 1-5, 7, 14-21, and 24-25 of the ‘852
`
`patent, Etchegoyen, when viewed against
`
`the background
`
`knowledge and understanding of a POSA, would render obvious as
`
`a whole the claimed subject matter of these claims. (Ground 2 of
`
`Petition)
`
`c. Etchegoyen in view of Jakobsson renders obvious Claims 6 and 8-
`
`12 of the ‘852 patent. (Ground 3 of Petition)
`
`d. Etchegoyen in view of Varghese renders obvious Claims 13, 22,
`
`and 23 of the ‘852 patent. (Ground 4 of Petition)
`
`e. Varghese discloses all limitations of Claims 1-23 and 25 of the
`
`‘852 patent and therefore anticipates these claims. (Ground 5 of
`
`Petition)
`
`
`
`3
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`f. Varghese, when viewed against the background knowledge and
`
`understanding of a POSA, renders obvious the claimed subject
`
`matter for Claim 24. (Ground 6 of Petition)
`
`8.
`
`I understand that the Petition advances the following grounds, which
`
`accord with my opinions expressed above:
`
`Claims
`
`References
`
`Ground
`
`1
`
`2
`
`3
`
`4
`
`5
`
`35 U.S.C. §
`(pre-AIA)
`§ 102
`
`§ 103
`
`§ 103
`
`§ 103
`
`§ 102
`
`Claims 1-5, 7, 14-21,
`and 24-25
`
`Claims 1-5, 7, 14-21,
`and 24-25
`
`Claims 6 and 8-12
`
`Claims 13, 22, and 23
`
`Claims 1-23, 25
`
`Etchegoyen
`
`Etchegoyen
`
`Etchegoyen and
`Jakobsson
`
`Etchegoyen and
`Varghese
`
`Varghese
`
`Varghese
`
`§ 103
`
`6
`
`A. My Background And Qualifications
`
`Claim 24
`
`9.
`
`I received a B.S. in Computer Science from the University of
`
`Richmond in 2002 and an M.S. and a Ph.D. in Computer Science and Engineering
`
`from the Pennsylvania State University in 2004 and 2008, respectively. My
`
`dissertation, entitled “Characterizing the Impact of Rigidity on the Security of
`
`
`
`4
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`Cellular Telecommunications Networks,” focused on security problems that arise
`
`in cellular infrastructure when gateways to the Internet are created.
`
`10.
`
`I am currently an Associate Professor in the Department of Computer
`
`and Information Science and Engineering (CISE) at the University of Florida. I
`
`was hired under the “Rise to Preeminence” hiring campaign and serve as the co-
`
`founder and co-director of the Florida Institute for Cybersecurity (FICS). I have
`
`since been named the John and Mary Lou Dasburg Preeminent Chair in
`
`Engineering. Prior to joining the University of Florida, I was an Associate
`
`Professor from March to August 2014 and an Assistant Professor of Computer
`
`Science from 2008 at the Georgia Institute of Technology. I have supervised many
`
`Ph.D., M.S. and undergraduate students during the course of my career.
`
`11.
`
`I am a Senior Member of the Association for Computing Machinery
`
`(ACM) and the Institute of Electrical and Electronics Engineers (IEEE). I am also
`
`a member of the USENIX Advanced Computing Systems Association.
`
`12. My area of expertise is security, especially as it applies to mobile
`
`systems and networks, including cellular networks. As such, I regularly teach
`
`students taking my courses and participating in my research group to program and
`
`evaluate software and architectures for mobile and cellular systems.
`
`13.
`
`I have published over 70 articles in the top journals and conferences in
`
`the areas of information security, mobility and networking. Many of my results are
`
`
`
`5
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`highly cited, and I have received a number of “Best Paper” Awards. I have also
`
`written a book entitled Security for Telecommunications Networks, which is used
`
`in wireless and cellular security courses at a number of top universities.
`
`14.
`
`I serve as an Associate Editor for the ACM Transactions on Privacy
`
`and Security (TOPS), have been the Program Chair for seven conferences and
`
`workshops, and have served as a member of the Program Committee for over 50
`
`different conferences and workshops.
`
`15.
`
`I have received numerous awards for research and teaching, including
`
`being named a Kavli Fellow (2017), a Fellow of the Center for Financial Inclusion
`
`(2016) and a Research Fellow of the Alfred P. Sloan Foundation (2014), won the
`
`Lockheed Inspirational Young Faculty Award (2012), was awarded a National
`
`Science Foundation (NSF) CAREER Award (2010), and received the Center for
`
`the Enhancement of Teaching and Learning at Georgia Tech’s “Thanks for Being a
`
`Great Teacher” Award (2009, 2012, 2013).
`
`16.
`
`I was a Co-Founder and Research Fellow for the private start-up,
`
`Pindrop Security, from spring 2012 to spring 2014. Pindrop provides anti-fraud
`
`and authentication solutions for Caller-ID spoofing attacks in enterprise call
`
`centers by creating and matching acoustic fingerprints.
`
`
`
`6
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`I am the Co-Founder and Chief Executive of a private start-up,
`
`17.
`
`CryptoDrop. CryptoDrop developed a ransomware detection and recovery tool to
`
`provide state of the art protection to home, small business, and enterprise users.
`
`18.
`
`I have taught courses on the topics of network and systems security,
`
`cellular networks, and mobile systems at both Georgia Tech and the University of
`
`Florida. I also advised and instructed the Information Assurance Officer Training
`
`Program for the United States Army Signal Corps in the spring of 2010.
`
`19.
`
`I am a named inventor on two United States patents, which are listed
`
`in my CV. These patents detail methods for determining the origin and path taken
`
`by phone calls as they traverse networks and for providing a secure means of
`
`indoor localization.
`
`20. Further detail on my education, work, and teaching experience, and
`
`the cases in which I have previously given testimony in at least the past four years
`
`are contained in my curriculum vitae (CV) included as Appendix A. IA1028.
`
`II. LIST OF DOCUMENTS I CONSIDERED IN FORMULATING MY
`OPINIONS
`
`21.
`
`In formulating my opinions, I considered all of the references cited in
`
`this Declaration, including the documents listed below.
`
`Exhibit Number
`
`Description
`
`IA1001
`IA1002
`
`
`
`U.S. Patent No. 9,559,852 to Miller et al.
`Prosecution File History of U.S. Patent No. 9,559,852
`
`7
`
`
`
`IA1003
`
`IA1003
`
`

`

`Exhibit Number
`
`Description
`
`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`
`IA1003
`IA1004
`IA1005
`IA1006
`IA1007
`IA1008
`IA1009
`IA1010
`IA1011
`IA1012
`IA1013
`IA1014
`
`IA1015
`IA1016
`IA1017
`
`IA1018
`IA1019
`
`IA1020
`
`IA1021
`IA1022
`IA1023
`
`
`
`Declaration of Professor Patrick Traynor
`U.S. Patent No. 8,316,421 to Etchegoyen
`U.S. Patent Pub. No. 2006/0282660 to Varghese et al.
`U.S. Patent No. 8,312,157 to Jakobsson et al.
`U.S. Patent No. 6,185,316 to Buffam et al.
`U.S. Patent Pub. No. 2011/0007177 to Kang et al.
`Provisional Patent Application No. 61/462,474
`U.S. Patent No. 9,294,448 to Miller et al.
`Prosecution File History of U.S. Patent No. 9,294,448
`U.S. Patent No. 8,817,984 to Miller et al.
`Prosecution File History of U.S. Patent No. 8,817,984
`Provisional Patent Application No. 61/252,960 to
`Etchegoyen
`Patent Application No. 12/903,948 to Etchegoyen
`Patent Application No. 12/504,159 to Jakobsson et al.
`Kohno et al., “Remote Physical Device Fingerprinting”
`(Apr. 2005)
`Pang et al., “802.11 User Fingerprinting” (2007)
`“Race Is On To ‘Fingerprint’ Phones, PCs”, WALL STREET
`JOURNAL (Nov. 30, 2010)
`Denning & MacDoran, “Location-Based Authentication:
`Grounding Cyberspace for Better Security” (Feb. 1996)
`Cortes et al., “Communities of Interest” (2001)
`Johansen et al., “Email Communities of Interest” (2007)
`Aiello et al., “Analysis of Communities of Interest in Data
`Networks” (2005)
`
`8
`
`
`
`IA1003
`
`IA1003
`
`

`

`Exhibit Number
`
`Description
`
`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`
`IA1024
`
`IA1025
`
`IA1026
`
`IA1027
`
`Smart et al., “Defeating TCP/IP Stack Fingerprinting”
`(1999)
`“The Man Who Invented The Cash Machine”, BBC NEWS
`(June 25, 2007)
`Redline Comparison of Provisional Patent Application No.
`61/462,474 to Specification of Application No. 12/903,948
`mSIGNIA, Inc. v. InAuth, Inc., No. 8:17-cv-1289, Dkt. No. 1,
`Complaint (C.D. Cal. July 26, 2017)
`Curriculum Vitae of Professor Patrick Traynor (Appendix A)
`
`IA1028
`
`III. PERSON OF ORDINARY SKILL IN THE ART
`
`22. A person of ordinary skill in the art (“POSA” or “one of ordinary skill
`
`in the art”) is a hypothetical person who is presumed to be aware of all pertinent
`
`art, thinks along the lines of the conventional wisdom in the art, and is a person of
`
`ordinary creativity. As of February 3, 2011, a POSA in the technical field of the
`
`‘852 Patent – authentication technologies – would have had knowledge of the
`
`scientific literature concerning methods of securely authenticating devices and
`
`users by way of digital fingerprinting and data minutiae associated with those
`
`devices and users.
`
`23. A POSA at the time the application leading to the ‘852 patent was
`
`filed would have had an undergraduate degree in Computer Science, Electrical
`
`Engineering or related fields and two years experience with networking
`
`technologies, or a masters degree in Computer Science, Electrical Engineering or
`
`
`
`9
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`related fields with one year experience with networking technologies. Additional
`
`education could substitute for hands-on experience.
`
`IV. STATE OF THE ART
`
`24.
`
`I understand that the ‘852 patent claims priority to the ‘474
`
`Provisional, which was filed on February 3, 2011. For purposes of my invalidity
`
`analyses below, I have considered the relevant priority date to be February 3, 2011.
`
`25. Capturing the identity of a user or machine has long been a goal in
`
`computer security. Some of the earliest and most intuitive means of doing so came
`
`in the form of usernames and passwords on early timesharing systems (e.g., MIT’s
`
`Compatible Time Sharing System (CTSS)) in the 1960s.
`
`26. Advancements in the field of cryptography provided increasingly
`
`stronger protocols by which such information could be conveyed. For instance, the
`
`public release of the Data Encryption Standard (DES) algorithm (1977) provided
`
`public and private entities with a relatively strong means of encrypting usernames
`
`and passwords over networked connections. Similarly, the Needham-Schroeder
`
`Public-Key Protocol (1978) allowed authentication to be enabled via newly
`
`discovered asymmetric cryptosystems. Such advances allowed for strong, explicit
`
`means of authentication.
`
`27. The advent of the World Wide Web led to new challenges in
`
`capturing identity. For instance, the addition of “cookies” to web requests allowed
`
`
`
`10
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`for websites to customize a user’s experience across multiple pages. Specifically,
`
`by keeping a record of the pages that were being accessed with a specific cookie, a
`
`website could develop profiles of users (i.e., fingerprints) and provide them with
`
`additional resources that were likely to be of interest. Cookies, which began
`
`appearing in 1994, allowed for that customization to be based not necessarily on
`
`the specific identity of a user, but on the machine from which requests were being
`
`made.
`
`28. However, because cookies could easily be deleted, many others
`
`sought techniques to develop more long-lived fingerprints. Researchers developed
`
`the nmap tool (1999) and demonstrated that the software and operating system
`
`running on remote machines could be accurately identified by looking at the
`
`distinctive ports and message parameters returned from those machines when they
`
`received a message.
`
`29. Researchers also developed methods for the remote identification of
`
`specific users and machines based on clock skew1, semi-persistent network
`
`configuration data2, and many other features3.
`
`
`1 IA1017 (T. Kohno, A. Broido, and K. C. Claffy, “Remote Physical Device
`Fingerprinting,” IEEE Trans. Dependable Secur. Comput., vol. 2, pp. 93–108,
`April 2005).
`2 IA1018 (J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall,
`“802.11 User Fingerprinting,” in MobiCom ‘07: Proceedings of the 13th Annual
`ACM International Conference on Mobile Computing and Networking. ACM
`11
`
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`30. Geo-location, both through GPS coordinates and highly dynamic
`
`location signatures (updating on the millisecond timescale based on observability
`
`of satellites), was also commonly discussed.4
`
`31. Fingerprinting users and devices based on their community of interest,
`
`or the entities with which they regularly communicated was also widely discussed
`
`and applied to spaces including telephony5, email spam6 and intrusion detection7.
`
`32.
`
`In response, the research community also built mechanisms to help
`
`scrub such data from communications to ensure that devices could not be
`
`fingerprinted unless the user/administrator allowed it.8
`
`
`Press, 2007, pp. 99–110).
`3 IA1019 ( J. Angvin and J. Valentino-Devries, “Race Is On to ‘Fingerprint’
`Phones, PCs,” WALL STREET JOURNAL, November 30 2010).
`4 IA1020 (D. Denning and P. MacDoran, Location-Based Authentication:
`Grounding Cyberspace for Better Security, Computer Fraud & Security, 1996:2,
`12-16, 1996).
`5 IA1021 (C. Cortes, D. Pregibon, and C. Volinsky. Communities of interest.
`Lecture Notes in Computer Science, 2189:105–114, 2001).
`6 IA1022 (L. Johansen, M. Rowell, K. Butler, and P. McDaniel, Email
`Communities of Interest, Proceedings of the Conference on Email and Anti-Spam,
`2007).
`7 IA1023 (W. Aiello, C. Kalmanek, P. McDaniel, S. Sen, O. Spatscheck, and J.
`V. der Merwe. Analysis of communities of interest in data networks. Lecture Notes
`in Computer Science, 3431:83–96, 2005).
`8 IA1024 (M. Smart, G.R. Malan, and F. Jahanian, Defeating TCP/IP Stack
`Fingerprinting, Proceedings of the USENIX Security Symopsium, 1999).
`12
`
`
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`33. Using multiple factors for authentication has also long been known in
`
`the field of information security. The Personal Identification Number (PIN) was
`
`created in parallel with the first Automated Teller Machine (ATM) in 19679. While
`
`static, PINs create a second factor (e.g., beyond the possession of an account
`
`number) by which the authenticity of a transaction can be validated.
`
`V. OVERVIEW OF THE ‘852 PATENT
`
`34.
`
`I understand that this Declaration is being submitted together with a
`
`petition for inter partes review of Claims 1-25 of the ‘852 patent. I have reviewed
`
`the ‘852 patent, the parent ‘448 patent, the file history of the ‘448 patent, the
`
`grand-parent ‘984 patent, the file history of the ‘984 patent, and the ‘474
`
`Provisional to which the ‘852 patent claims priority. In assessing the ‘852 patent, I
`
`have considered the state of the scientific literature before February 3, 2011, in
`
`light of general knowledge in the art before that date.
`
`35. The ‘852 patent specification identifies a number of purported
`
`problems with prior art computer authentication methods such as use of a
`
`“computer fingerprint.” Prior art computer fingerprints according to the ‘852
`
`specification were formed by “calculating a hash of the minutia found on a
`
`computer to uniquely identify the computer.” IA1001, 2:44-45. A drawback of
`
`such fingerprints was that “current fingerprints use a relatively small set of static
`
`9 IA1025 (BBC NEWS, The Man Who invented the Cash Machine (June 25,
`2007)).
`
`
`
`13
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`minutia which may be prone to spoofing.” Id., 2:51-54. While some prior art
`
`approaches increased the number of minutia to be included in the fingerprint, “as
`
`more minutia are included in the computation, the probability [rises] that changes
`
`occurr[ing] naturally to the minutia can result in a new computer fingerprint,”
`
`resulting in false negatives. Id., 2:63-65.
`
`36. The ‘852 patent purports to solve this problem by “anticipating
`
`changes to the user device or computer” and thus “deliver[ing] a tolerant, yet
`
`secure authentication with fewer false negatives.” Id., 5:40-44. The ‘852 patent
`
`describes methods of formulating cryptographic keys using minutia found on the
`
`computer such that “the computer itself is uniquely identified” by the key. Id.,
`
`5:59-64. Examples of minutia that may be used include hardware, firmware,
`
`software, user secrets, user biometrics, or location information from the device.
`
`37. The ‘852 patent discloses methods by which the alleged invention can
`
`be used to determine that a valid user is using an authenticated computer. All three
`
`independent claims recite an “identity recognition system” using at least two
`
`components (memory and processor(s)) to perform a four-step method to
`
`determine whether or not a device and/or user are authentic. Claim 1 is exemplary
`
`and reads as follows:
`
`[Preamble] An identity recognition system comprising:
`
`[1.a] a non-transitory memory storing information associated with
`
`
`
`14
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`
`one or more identities,
`[1.b] wherein the information stored for an identity includes (a) data
`values associated with that identity;
`[1.c] and (b) information regarding anticipated changes to one
`or more of the stored data values associated with that identity;
`[1.d] one or more hardware processors in communication with
`the memory and configured to execute instructions to cause the
`identity recognition system to recognize that the presentation of
`identity information by a computer is authentic, by performing
`operations comprising:
`[1.e] generating a challenge to the computer, wherein the
`challenge prompts the computer to provide a response
`based on one or more data values from the computer that
`correspond to one or more of the stored data values
`associated with the identity;
`[1.f] receiving, from the computer, the response to the
`challenge;
`[1.g] determining whether the response is allowable,
`wherein such determining comprises using the stored
`information regarding anticipated changes to the stored
`data values associated with the identity to determine
`whether a data value used to form the response is based
`on an acceptable change to a corresponding stored data
`value;
`[1.h] and recognizing that the presentation of identity
`information by the computer is authentic, according to
`whether the computer has provided an allowable
`15
`
`
`
`
`
`IA1003
`
`IA1003
`
`

`

`response to the challenge.
`
`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`
`38. As recited above, the claimed identity recognition system includes a
`
`memory storing “data values associated with that identity.” Examples of such data
`
`values are described in the specification as computer minutia and encompass
`
`hardware, firmware, software, user secrets, user biometrics, or location information
`
`from the device. Also stored in the memory is “information regarding anticipated
`
`changes to one or more of the stored data values.” Such changes include “changes
`
`to the minutia caused by updates and natural usage of the computer.” The
`
`specification notes that “behavioral algorithms” can be applied to the minutia.
`
`39. Claim 1 recites a four-step method of using this system. First, the
`
`identity recognition system generates a “challenge” to the computer. The
`
`challenge prompts the computer to provide a response based on one or more data
`
`values (minutia). Second, the identity recognition system receives from the
`
`computer a response to the challenge. Third, the system determines whether the
`
`response is allowable by using the stored information regarding anticipated
`
`changes to the minutia. Lastly, the system “recogniz[es] that the presentation of
`
`identity information by the computer is authentic.”
`
`40.
`
`I understand that Claims 2-23 “depend” from from Claim 1 of the
`
`‘852 Patent because they refer directly to Claim 1 or claims that themselves depend
`
`from Claim 1. The dependent claims are reproduced below:
`
`
`
`16
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
` Claim 2 requires the further limitation that “the identity is associated
`
`with the computer and is a user identity or a device identity.”
`
` Claim 3 requires the further limitation that “the challenge prompts a
`
`response based on one or more user minutia data values.”
`
` Claim 4, which further depends from claim 3, requires the further
`
`limitation that “the operation of determining whether the response is
`
`allowable includes evaluating whether at least a portion of the
`
`response is based on one or more acceptable changes to a user minutia
`
`data value.”
`
` Claim 5, which further depends from claim 4, requires the further
`
`limitation that “the user minutia data values used to determine
`
`whether the response is allowable comprise user secrets, user
`
`customization, entertainment data, bio-metric data, or contacts.”
`
` Claim 6, which further depends from claim 4, requires the further
`
`limitation that “the user minutia data values used to determine
`
`whether the response is allowable comprise calling app data, geo-
`
`location data, frequently called phone numbers, email, or network
`
`connection data.”
`
` Claim 7 requires the further limitation that “a stored data value is used
`
`to generate at least a portion of the challenge, and wherein the
`
`
`
`17
`
`
`
`IA1003
`
`IA1003
`
`

`

`IPR of USPN 9,559,852
`Declaration of Dr. Patrick Traynor
`determining operation comprises evaluating whether the data value
`
`used to form the response is the same as the stored data value.”
`
` Claim 8 requires the further limitation that “a change to the stored
`
`data value is acceptable when the data value used to form the response
`
`is within a set of acceptable values for the stored data value that are
`
`determined independently from receiving the response from the
`
`computer.”
`
` Claim 9, which futher depends from claim 8, requires the further
`
`limitation that “the set of acceptable values includes one or more
`
`values based on anticipated changes to the data value.”
`
` Claim 10, which further depends from claim 8, requires the further
`
`limitation that “the set of acceptable values includes one or more
`
`values based on anticipated changes to the data value, based on
`
`industry updates to hardware, firmware, or software elements.”
`
` Claim 11, which further depends from claim 8, requires the further
`
`limitation that “the set of acceptable values includes one or more
`
`values based on an anticipated user customization of the computer.”
`
` Claim 12, which further dep

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket