throbber

`
`
`Paper No.__
`Filed: August 2, 2019
`
`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`___________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________________________
`
`UNIFIED PATENTS INC.,
`Petitioner
`
`v.
`
`VINDOLOR, LLC,
`Patent Owner
`
`
`IPR2019-00478
`Patent 6,213,391
`
`PETITIONER’S REQUEST FOR REHEARING
`PURSUANT TO 37 C.F.R. § 42.71(d)
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`Pursuant to 37 C.F.R. § 42.71(d), Petitioner Unified Patents Inc. (“Unified” or
`
`“Petitioner”) submits this Request for Rehearing in response to the Decision on
`
`Institution entered July 3, 2019 (Paper 9) (“Decision”) by the Patent Trial and Appeal
`
`Board (“Board”) regarding U.S. Patent 6,213,391 (“the ’391 patent”).
`
`I.
`
`STATEMENT OF RELIEF REQUESTED
`
`Petitioner respectfully requests rehearing regarding Grounds 1 and 2 of the
`
`Petition. Ground 1 asserts that Gullman (Ex. 1004) anticipates Claims 1-2 under 35
`
`U.S.C. § 102(a), (b), and (e). See Paper 1 (“Petition”) at 5, 26. Ground 2 asserts
`
`that Gullman in view of the knowledge of a person of ordinary skill in the art
`
`(“POSITA”) renders obvious Claims 1-2 under 35 U.S.C. § 103(a). See Petition at
`
`5, 45.
`
`Petitioner respectfully submits
`
`that
`
`the Decision overlooks and/or
`
`misapprehends Petitioner’s positions and supporting evidence that Gullman
`
`discloses the recited “access code” of the sole independent claim of the ’391 patent.
`
`Accordingly, Petitioner respectfully requests that the Board institute inter partes
`
`review of the ’391 patent.
`
`II. LEGAL STANDARD
`
`“A party dissatisfied with a decision may file a single request for rehearing”
`
`that “specifically
`
`identif[ies] all matters
`
`the party believes
`
`the Board
`
`1
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`misapprehended or overlooked, and the place where each matter was previously
`
`addressed in a motion, an opposition, or a reply.” 37 C.F.R. § 42.71(d).
`
`III. REASONS FOR THE REQUESTED RELIEF
`
`In the Decision, the Board found that Gullman’s security token is not the
`
`claimed “access code.” Decision at 6-7. Specifically, the Decision found:
`
`Gullman decodes the security token and uses what is encoded within
`to determine whether to grant access. … Thus, the security token in
`Gullman provides transmission security, whereas the data contained
`within (the correlation factor and the code) are used to authorize
`access.
`
`Decision at 6-7 (emphasis added). The Decision misapprehends or overlooks the
`
`evidence cited in the Petition for at least the following reasons.
`
`A. The Petition Demonstrates Gullman’s Security Token Provides
`Access.
`
`The Petition and the accompanying Declaration establish that Gullman
`
`discloses a security token that “both authenticates and identifies the user,” and thus
`
`is the claimed “access code.” Petition at 43; Declaration at ¶ 134; see also Decision
`
`at 6 (“Gullman decodes the security token and uses what is encoded within to
`
`determine whether to grant access.”).
`
`First, the Decision overlooks portions of the Petition that show Gullman’s
`
`security token is also an “access code,” as claimed, and can be used in a similar
`
`fashion as disclosed in the ’391 patent. For example, the Petition cites to Gullman’s
`
`disclosure that the “[security] token is communicated to a host system for
`
`2
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`determining whether access to such host is to be authorized.” See Petition at 26
`
`(citing Ex. 1004, 1:6-13) (emphasis added); Declaration at ¶ 84 (citing same).
`
`Further, Gullman discloses that “[t]he security token generated … may be input in
`
`the same manner as PINs or other security codes in common use.” Ex. 1004, 6:56-
`
`58; see also Petition at 29; Declaration at ¶ 89. Thus, to the extent the Decision
`
`acknowledges that a “PIN” is an “access code,”1 the Petition also shows that
`
`Gullman’s security token is an “access code” for the same reasons.
`
`Further, the Petition also demonstrates that Gullman’s security token is
`
`transmitted in the same manner as the claimed “access code.”2 In the claimed
`
`
`1 Patent Owner’s Preliminary Response also acknowledges the same. See Paper 6
`
`(“Response”) at 7 (providing a PIN as an example of a “prior art technique[] … for
`
`providing access codes for accessing secure objectives”).
`
`2 Patent Owner mischaracterizes Gullman’s security token as only providing end-to-
`
`end transmission security for transmitting individual data elements between a
`
`security apparatus and a host system. Response at 21, fn. 6; see also Response at
`
`41. However, as addressed in the Petition and supporting Declaration, Gullman’s
`
`security token is, in fact, used to also identify the user and determine whether access
`
`should be granted. Ex. 1004, 3:36-42, 4:3-8, 6:56-58; see also Decision at 6, Petition
`
`at 26, 29; Declaration at ¶¶ 84, 89.
`
`3
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`subject matter, a single data structure (i.e., the “access code”) is sent to a host system
`
`to determine user access. Ex. 1001, 9:1-5, 10:33-44, cl. 1; see also Petition at 18;
`
`Declaration at ¶ 54. Likewise, the Petition cites Gullman’s disclosure of transmitting
`
`a single security token to determine whether access should be granted or denied.
`
`Petition at 29 (citing Ex. 1004, 6:35-45); see also Decision at 6 (“[t]he security token
`
`is sent to a host computer to determine if access should be granted”); Declaration at
`
`¶ 89. Therefore, the Petition establishes that Gullman’s security token is used to
`
`identify a person and determine whether access should be granted, in the same
`
`manner as a conventional “access code” (e.g., a PIN or security code). See Petition
`
`at 29; Declaration at ¶ 89.
`
`Second, the Decision appears not to recognize that Gullman advances the
`
`prior art by disclosing a security token that provides both transmission security and
`
`user identification/access. Specifically, the Decision cites:
`
`‘[a] PIN is used to identify an individual and authorize access to a host
`system,’ which ‘provides user identification, while a token provides
`transmission security.’
`
`Decision at 6 (citing Ex. 1004, 1:30-45). This excerpt is from Gullman’s
`
`“BACKGROUND OF THE INVENTION,” discussing the conventional operation
`
`of a prior art transmission token in comparison to a prior art PIN. See Ex. 1004,
`
`1:28-34. By relying on this distinction between the prior art transmission token and
`
`the prior art PIN, however, the Decision overlooks that Gullman’s security token
`
`4
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`improves on the prior art by providing both identification/access and transmission
`
`security. See Petition at 26-27 (this “biometric security mechanism adds another
`
`level of security to the access process” while “serv[ing] as a convenient accessible
`
`security device”) (citing Ex. 1004, 3:34-36, 5:34-39); Declaration at ¶¶ 84-87; Ex.
`
`1004, 1:6-13, 1:53-56, 6:46-62. Thus, even though Gullman’s security token
`
`provides transmission security in addition to access, it still discloses the claimed
`
`“access code.” See Leggett & Platt, Inc. v. VUTEk, Inc., 537 F.3d 1349, 1355 (Fed.
`
`Cir. 2008) (a reference disclosing more functionality than what was called for by the
`
`patent claims is still anticipatory); see also Bristol-Myers Squibb Co. v. Ben Venue
`
`Laboratories, Inc., 246 F.3d 1368, 1378 (Fed. Cir. 2001) (citing Celeritas Techs.,
`
`Ltd. v. Rockwell Intern. Corp., 150 F.3d 1354, 1361 (Fed. Cir. 1998)) (a reference
`
`that discloses two or more separate functionalities is no less anticipatory).
`
`Third, the Decision found that Gullman “decodes the security token and uses
`
`what is encoded within to determine whether to grant access”(Decision at 6-7).
`
`However, the Decision overlooks and/or misapprehends Gullman in the context of
`
`claim 1 for two reasons.
`
`First, Claim 1, in context, only requires, “generating one or more access codes
`
`based upon said identification profile” Ex. 1001, cl. 1 (emphasis added). The
`
`Petition demonstrated, and, indeed, the Decision acknowledges that, “the data
`
`contained within [Gullman’s security token] (the correlation factor and the code) are
`
`5
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`used to authorize access.” Decision at 6-7. Simply put, Gullman’s security token,
`
`which is generated based on the user’s “identification profile” (i.e., the correlation
`
`factor and the code), provides all of the information necessary to authorize access.
`
`Nothing else is required by claim 1.
`
`Furthermore, the Board “was not persuaded that Gullman discloses an access
`
`code in the claimed manner” (Decision at 7), apparently in light of Patent Owner’s
`
`argument that Gullman’s “encoded/encrypted security token” cannot function as the
`
`claimed “access code” because it must be “decode[d]/decrypt[ed] … to recover the
`
`underlying data elements … [that are] used to evaluate whether access should be
`
`granted.” Response at 43; see also Decision at 7. However, the claims of the ’391
`
`patent do not require that the “access code” be received in a decoded or decrypted
`
`form. See Ex. 1001, cl. 1, 2. The “access code” is only required to be “an
`
`identification specific digital signature” “based upon [an] identification profile.” See
`
`Ex. 1001, cl. 1. Claim 1, however, does not specify any other required structure
`
`(e.g., content or form) or function/operation (e.g., how the code is used in operation)
`
`for the recited “access code.”
`
`Thus, Gullman discloses “access codes [Gullman’s security token] based
`
`upon said identification profile [Gullman’s correlation factor and code],” as required
`
`by claim 1 of the ‘391 patent. Ex. 1001, cl. 1 (emphasis added).
`
`6
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`For the aforementioned reasons, Petitioner respectfully requests the Board
`
`rehear Ground 1.
`
`B. Ground 2
`
`The Decision held that Ground 2 “[did] not establish a reasonable likelihood
`
`of success for the same reasons as the Gullman anticipation ground.” Therefore, for
`
`the same reasons stated above, Petitioner respectfully requests rehearing regarding
`
`Ground 2.
`
`IV. CONCLUSION
`
`In light of the foregoing, Petitioner respectfully requests that the Board rehear
`
`Grounds 1 and 2, and institute an inter partes review on the ’391 patent.
`
`
`
`
`
`Date: August 2, 2019
`
`Respectfully submitted,
`
`/ Cono A. Carrano/
`Cono A. Carrano (Reg. No. 39,623)
`Akin Gump Strauss Hauer & Feld LLP
`Robert S. Strauss Tower
`2001 K Street, N.W.
`Washington, DC 20006
`telephone: (202) 887-4000
`facsimile: (202) 887-4288
`email: ccarrano@akingump.com
`
`Ashraf Fawzy (Reg. No. 67,914)
`Jonathan Stroud (Reg. No. 72,518)
`Unified Patents Inc.
`1875 Connecticut Avenue, N.W., Floor 10
`Washington, DC 20009
`telephone: (214) 945-0200
`
`7
`
`

`

`
`
`
`
`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`email: roshan@unifiedpatents.com
`email: jonathan@unifiedpatents.com
`
`Clark Gordon (Reg. No. 74,706)
`Akin Gump Strauss Hauer & Feld LLP
`4 Park Place, Suite 1900
`Irvine, CA 92614-2585
`telephone: (949) 885-4100
`facsimile: (949) 885-4101
`email: cgordon@akingump.com
`
`Attorneys for Petitioner Unified Patents Inc.
`
`8
`
`

`

`
`
`
`
`
`
`Case IPR2019-00478
`Patent 6,213,391
`
`CERTIFICATE OF SERVICE
`
`The undersigned hereby certifies that a copy of the foregoing Petitioner’s
`
`Request for Rehearing Pursuant to 37 C.F.R. § 42.71(d) was served on counsel of
`
`record on August 2, 2019 by filing this document through the End-to-End System,
`
`as well as delivering a copy via electronic mail to the counsel of record for the
`
`Patent Owner at the following address:
`
`Raymond W. Mort, III – raymort@austinlaw.com
`Cabrach Connor – cab@connorkudlaclee.com
`
`Respectfully submitted,
`
`
`
`/ Cono A. Carrano/
`Cono A. Carrano (Reg. No. 39,623)
`Akin Gump Strauss Hauer & Feld LLP
`Robert S. Strauss Tower
`2001 K Street, N.W.
`Washington, DC 20006
`telephone: (202) 887-4000
`facsimile: (202) 887-4288
`email: ccarrano@akingump.com
`
`
`
`
` 9
`
`
`
`
`Date: August 2, 2019
`
`
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket