throbber

`
`
`IPR2019-00478 Petition
`
`U.S. 6,213,391
`
` DOCKET NO.: 698162.0005
`Filed on behalf of Unified Patents Inc.
`By: Cono A. Carrano (Reg. No. 39,623)
`(ccarrano@akingump.com)
`
`
`(cgordon@akingump.com)
`
`Clark Gordon (Reg. No. 74,706)
`
`Akin Gump Strauss Hauer & Feld LLP
`1333 New Hampshire Avenue, NW
`Washington, DC 20036
`telephone: (202) 887-4000
` Ashraf Fawzy (Reg. No. 67,914)
`(afawzy@unifiedpatents.com)
`
`
`(jonathan@unifiedpatents.com)
`
`Jonathan Stroud (Reg. No. 72,518)
`
`Unified Patents Inc.
`1875 Connecticut Avenue, NW, Floor 10
`Washington, DC 20009
`telephone: (202) 871-0110
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`___________________________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`___________________________________
`UNIFIED PATENTS INC.,
`Petitioner
` v.
`VINDOLOR, LLC,
`Patent Owner
`
`IPR2019-00478
`Patent 6,213,391
`
`PETITION FOR INTER PARTES REVIEW OF
`U.S. PATENT NO. 6,213,391
`CHALLENGING CLAIMS 1-2
`UNDER 35 U.S.C. § 312 AND 37 C.F.R. § 42.104
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`CONTENTS
`Introduction .................................................................................................... 1
`I.
`II. Mandatory Notices, Standing, and Fees ...................................................... 1
`Real Party-In-Interest....................................................................................... 1
`Related Matters ................................................................................................ 1
`Lead and Backup Counsel ............................................................................... 3
`Service Information ......................................................................................... 3
`Certification of Grounds for Standing ............................................................. 3
`Fees 4
`III.
`Invalidity Grounds ......................................................................................... 4
`IV. The Board Should Not Deny This Petition Under 35 U.S.C. §
`325(d) ............................................................................................................... 5
`Technology Background ................................................................................ 6
`V.
`VI. U.S. 6,213,391 ................................................................................................. 7
`A.
`Summary ............................................................................................... 7
`B.
`Level of Ordinary Skill in the Art ....................................................... 20
`C.
`Claim Construction ............................................................................. 21
`VII. The Challenged Claims are Unpatentable ................................................ 26
`A. GROUND 1: Gullman anticipates Claims 1 and 2 ............................. 26
`1.
`Overview of Gullman ............................................................... 26
`2.
`Independent Claim 1 ................................................................. 30
`3.
`Dependent Claim 2 ................................................................... 44
`B.
`GROUND 2: Gullman in view of the knowledge of a POSITA
`renders obvious Claims 1 and 2 .......................................................... 45
`1.
`Independent Claim 1 ................................................................. 45
`2.
`Dependent Claim 2 ................................................................... 48
`C.
`GROUND 3: Lane in view of Drexler renders obvious Claims 1
`and 2 .................................................................................................... 49
`1.
`Overview of Lane ...................................................................... 49
`2.
`Overview of Drexler ................................................................. 54
`3.
`Drexler and Lane are Analogous Art ........................................ 60
`4.
`Rationales to Combine Lane and Drexler ................................. 61
`Independent Claim 1 ................................................................. 65
`5.
`Dependent Claim 2 ................................................................... 80
`6.
`VIII. Conclusion .................................................................................................... 82
`
`i
`
`

`

`
`
`
`
`Exhibit No.
`1001
`1002
`1003
`1004
`1005
`1006
`1007
`
`IPR2019-00478 Petition
`
`U.S. 6,213,391
`
`EXHIBITS
`Description
`U.S. Patent No. 6,213,391 (the “’391 Patent”)
`Declaration of Dr. Creed Jones
`Petitioner’s Voluntary Interrogatory Responses
`U.S. Patent No. 5,280,527 (“Gullman”)
`U.S. Patent No. 5,623,552 (“Lane”)
`U.S. Patent No. 5,457,747 (“Drexler”)
`File History for the ’391 Patent
`
`ii
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`INTRODUCTION
`I.
`Petitioner Unified Patents Inc. (“Unified” or “Petitioner”) requests inter
`partes review (“IPR”) of claims 1-2 of U.S. Patent No. 6,213,391 (the “’391
`Patent”). (Ex-1001).
`The challenged claims are unpatentable based on the disclosures in at least the
`references presented in this Petition and as supported by the declaration of Dr. Creed
`Jones.
`II. MANDATORY NOTICES, STANDING, AND FEES
`Real Party-In-Interest
`Pursuant to 37 C.F.R. § 42.8(b)(1), Petitioner certifies that Unified is the real
`party-in-interest, and further certifies that no other party exercised control or could
`have exercised control over Unified’s participation in this proceeding, the filing of
`this petition, or the conduct of any ensuing trial. In view of Worlds Inc. v. Bungie,
`Inc., 903 F.3d 1237, 1242-44 (Fed. Cir. 2018), Unified has submitted voluntary
`discovery in support of its certification. (See Ex-1003).
`Related Matters
`Petitioner is aware of the following cases involving the ’391 Patent:
` Vindolor, LLC v. Petco Animal Supplies, 2:18-cv-00481 (E.D. Tex.);
` Vindolor, LLC v. Discount Tire Company of Texas, Inc., 2:18-cv-00480
`(E.D. Tex.);
`1
`
`

`

`
`
`
`
`IPR2019-00478 Petition
`
`U.S. 6,213,391
`
` Vindolor, LLC v. Spec's Family Partners, Ltd., 6:18-cv-00107 (W.D.
`Tex.);
` Vindolor, LLC v. Retail Services & Systems, Inc., 6:18-cv-00108 (W.D.
`Tex.);
` Vindolor, LLC v. Euromarket Designs Inc., 6:18-cv-00105 (W.D. Tex.);
` Vindolor, LLC v. Trader Joe's East, Inc., 2:18-cv-00482 (E.D. Tex.);
` Vindolor, LLC v. Restoration Hardware, Inc., 2:18-cv-00373 (E.D.
`Tex.);
` Vindolor, LLC v. NTW, LLC d/b/a National Tire and Battery, 2:18-cv-
`00374 (E.D. Tex.);
` Vindolor, LLC v. Disney Store USA, LLC, 2:18-cv-00375 (E.D. Tex.);
` Vindolor, LLC v. Hat World, Inc., 2:18-cv-00187 (E.D. Tex.); and
` Vindolor, LLC v. Buc-ee’s, Ltd., 6:18-cv-00104 (W.D. Tex.).
`
`2
`
`

`

`
`
`
`
`IPR2019-00478 Petition
`
`U.S. 6,213,391
`
`Lead and Backup Counsel
`Petitioner provides the following designations of counsel:
`Backup Counsel
`Lead Counsel
`Cono A. Carrano (Reg. No. 39,623)
`Ashraf Fawzy (Reg. No. 67,914)
`Akin Gump Strauss Hauer & Feld LLP
`Jonathan Stroud (Reg. No. 72,518)
`1333 New Hampshire Avenue, NW
`Unified Patents Inc.
`Washington, DC 20036-1564
`1875 Connecticut Avenue, NW, Floor 10
`telephone: (202) 887-4000
`Washington, DC 20009
`facsimile: (202) 887-4288
`telephone: (202) 871-0110
`email: ccarrano@akingump.com
`email: afawzy@unifiedpatents.com
`email: jonathan@unifiedpatents.com
`
` Clark Gordon (Reg. No. 74,706)
`Akin Gump Strauss Hauer & Feld LLP
`4 Park Plaza, Suite 1900
`Irvine, CA 92614
`telephone: (949) 885-4200
`facsimile: (949) 885-4101
`email: cgordon@akingump.com
`
` Service Information
`Please address all correspondence and service to the addresses listed above.
`Unified consents to electronic service by email at: ag-upi-vindolor@akingump.com,
`ccarrano@akingump.com, cgordon@akingump.com, afawzy@unifiedpatents.com,
`and jonathan@unifiedpatents.com.
`Certification of Grounds for Standing
`Petitioner certifies under 37 C.F.R. § 42.104(a) that the ’391 Patent is
`available for IPR and that Petitioner is not barred or estopped from requesting this
`review.
`3
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`Fees Under 37 C.F.R. § 42.103(a), Petitioner authorizes the Office to charge the fee
`set forth in 37 C.F.R. § 42.15(a) to Deposit Account No. 50-6990, as well as any
`additional fees that might be due in connection with this Petition.
`III.
`INVALIDITY GROUNDS
`The ’391 Patent was filed on September 10, 1997 and issued on April 10,
`2001. For the purposes of this Petition only, and without waiver, Petitioner has
`assumed September 10, 1997 as the earliest effective filing date.1
`Pursuant to 37 C.F.R. § 42.22(a)(1) and §§ 42.104(b)(1)-(2), Petitioner
`requests review of the challenged claims in view of the following prior art
`references:
` U.S. Patent No. 5,280,527 (“Gullman”) (Ex-1004) was filed on April 14,
`1992 and issued on January 18, 1994. Gullman qualifies as prior art at
`least under 35 U.S.C. § 102(a), (b), and (e).
` U.S. Patent No. 5,623,552 (“Lane”) (Ex-1005) was filed on August 15,
`1995 and issued on April 22, 1997. Lane qualifies as prior art at least under
`35 U.S.C. § 102(a) and (e).
`
`1 The ’391 Patent was filed before March 16, 2013. Accordingly, the pre-AIA
`provisions of Title 35 apply.
`4
`
`

`

`
`
`
`
`
`
`
`IPR2019-00478 Petition
`U.S. 6,213,391
`
` U.S. Patent No. 5,457,747 (“Drexler”) (Ex-1006) was filed on January 14,
`
`1994 and issued on October 10, 1995. Drexler qualifies as prior art at least
`
`under 35 U.S.C. § 102(a), (b), and (e).
`
`Petitioner requests review on the following grounds:
`
`Ground
`1
`
`Proposed Statutory Rejections for the ’391 Patent
`Gullman anticipates Claims 1 and 2 under 35 U.S.C. § 102(a), (b), and
`(e).
`
`2
`
`3
`
`Gullman in view of the knowledge of a person of ordinary skill in the
`art (“POSITA”) renders obvious Claims 1 and 2 under 35 U.S.C. §
`103(a).
`
`Lane in view of Drexler renders obvious Claims 1 and 2 under 35
`U.S.C. § 103(a).
`
`IV. THE BOARD SHOULD NOT DENY THIS PETITION UNDER 35
`U.S.C. § 325(d)
`
`The ’391 Patent is not currently involved in a parallel IPR proceeding.
`
`Furthermore, the prior art and arguments presented in this Petition are not the same
`
`or substantially the same as those previously presented to the Office. (See 35 U.S.C.
`
`§ 325(d)). None of the grounds of unpatentability in the current Petition rely upon
`
`exactly the same combination of prior art as the grounds stated in the prosecution
`
`history. (See Ex-1007, pgs. 97-109, 135-149, 170-177). While the examiner cited
`
`Lane as a supplementary reference in the Notice of Allowance, Lane was not the
`
`basis of any substantive rejection during prosecution. (See Id.). In the Notice of
`
`Allowance, the examiner stated that Lane disclosed various elements, discussed
`
`5
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`infra, but did “not teach[] the authenticated signal is an identification specific digital
`signature profile.” (Ex-1007, pg. 174). Petitioner notes that the relevant portion of
`claim 1 of the ’391 Patent, as issued, recites an “identification specific digital
`signature” as opposed to an “identification specific digital signature profile” as
`recited in the Notice of Allowance. (See Ex-1001, cl. 1; Ex-1007, pg. 174 (emphasis
`added)). Thus, the examiner made no express statement regarding whether Lane
`discloses an “identification specific digital signature” of the issued claims. Further,
`Petitioner is not relying on Lane for this particular claim limitation.
`Therefore, the Petitioner respectfully submits that the Board should not
`exercise its authority to preclude this Petition under § 325(d).
`V. TECHNOLOGY BACKGROUND
`The advent of computers and the Internet brought “a vast increase in [systems
`that conduct] … private electronic transactions.” (Ex-1001, 1:15-18; Ex-1002, ¶21).
`Such transactions include financial services, such as “home banking,” “the use of
`automatic teller machines” (ATMs), and “computerized stock transactions;” “home
`shopping;” “telephone access and
`transactions;” “security entrances;” and
`“identification cards” for services like healthcare or insurance. (Ex-1001, 1:22-33;
`Ex-1002, ¶21). Correspondingly, these systems provided security measures to
`identification/authentication and safeguard access
`ensure user
`to private
`information, resources, and secured objectives such as “an ATM machine, security
`6
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`gate or door,” “bank account, restricted room, database” or anything which could
`require restricted access. (Ex-1001, 3:51-53; 8:36-41; Ex-1002, ¶21).
`While improvements in technology and the use of the Internet increased the
`number of private transactions, it was recognized that information transmitted
`electronically could be intercepted and used by unauthorized parties. (Ex-1001,
`1:34-44). Accordingly the industry saw a need for additional security. (Id.; Ex-1002,
`¶22). For instance, industry articles published well before the ’391 Patent’s effective
`filing date, discussed the conventional use of a Personal Identification Number
`(“PIN”) to authenticate ATM and credit card-holders. (Ex-1002, ¶22). These articles
`also discussed card security measures based on the identification of biometric
`characteristics, such as retina or fingerprint recognition, or other user-distinct
`characteristics like personal signatures. (Ex-1002, ¶¶22-32).
`VI. U.S. 6,213,391
`A. Summary
`The ’391 Patent generally relates to a portable system for electronic personal
`identification and authentication using a uniquely identifying trait of the user, such
`as biometric information, and purports to combine code and identification
`technologies to further increase security of electronic devices. (Ex-1001, 1:6-12,
`3:37-45; Ex-1002, ¶¶33-56).
`7
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`Prior Art Deficiencies
`The ’391 Patent addresses purported problems of security and portability that
`existed in prior art systems (or devices). (Ex-1001, 3:37-45; Ex-1002, ¶¶36-40). For
`example, the ’391 Patent acknowledges prior art systems that used “a password or
`… PIN that identifie[d] a person as one authorized to conduct [the] specific
`transaction.” (Ex-1001, 1:44-47; Ex-1002, ¶¶37-40). For example, a user would
`enter a generic PIN code at an ATM to access a bank account associated with an
`ATM card. (Ex-1001, 1:47-54; Ex-1002, ¶37).
`According to the ’391 Patent, a generic PIN code at the time, while helpful in
`providing security, was “not sufficiently unique to provide adequately reliable [user]
`identification.” (Ex-1001, 1:63-65). In particular, a generic PIN code system could
`not “distinguish between users actually authorized [for access], and unauthorized
`users that have discovered the correct PIN code.” (Ex-1001, 2:19-22). This is
`because a generic PIN did “not truly identify the [user], but allow[ed] access to
`anyone … who also enter[ed] the correct [PIN].” (Ex-1001, 2:10-14). In other
`words, generic PIN code systems, or other systems implementing a “specific, pre-
`determined access code,” “fail[ed] to provide a means for positively identifying the
`user as an authorized user as a condition precedent to granting access to [a] secure
`objective.” (Ex-1001, 2:23-33; Ex-1002, ¶38). Therefore, an unauthorized person
`8
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`may still gain access to a secure objective2 by simply discovering the correct PIN or
`access code. (Ex-1001, 1:65-2:2; Ex-1002, ¶38). Thus, PIN systems were well-
`known, as were their benefits and drawbacks. (Ex-1002, ¶¶37-40).
`The ’391 Patent also acknowledges that known prior art systems provided
`“means for identification based on a biometric trait unique to specific users.” (Ex-
`1001, 2:34-36). These means included “voice identification, fingerprint analysis,
`retina scan, or DNA analysis” (i.e., “biometric identification” or “biometric
`analysis”). (Ex-1001, 2:36-38; 3:41, 5:31; Ex-1002, ¶39). Systems implementing
`biometric analysis could “more accurately identify specific persons” through their
`biometric characteristics and could be overcome the security flaws of generic PIN
`code systems. (Ex-1001, 2:40-41; 2:34-36; Ex-1002, ¶39).
`According to the ’391 Patent, biometric prior art systems also had several
`drawbacks, including that at the time, they required “expensive, onsite identification
`devices or systems,” such as independent terminals for authorization. (Ex-1001,
`5:35-38; see also id., 1:55-2:33, 2:52-67, 3:11-16, 3:27-34, 4:18-25, 5:35-44, 5:64-
`6:14 (discussing other prior art limitations); Ex-1007, pg. 117). The patent suggests
`
`2 As disclosed, a secure objective may be “an ATM machine, security gate or
`door,” “bank account, restricted room, database” or anything which would require
`restricted access. See Section V (Technology Background).
`9
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`these systems were not integrated into a single device and were generally not
`portable. (Ex-1007, pg. 153). Here too, the benefits and drawbacks of such prior art
`systems were well-known. (Ex-1002, ¶¶36-40).
`The ’391 Patent Disclosed Subject Matter
`The ’391 Patent is directed to portable security systems for electronic
`transactions involving both PIN codes and biometric data sensors. (Ex-1001, 3:37-
`46; Ex-1002, ¶¶41-56). It discloses a “card or other small portable device that
`contains a device which positively identifies the cardholder as an authorized or
`unauthorized user,” as illustrated in Figure 3, reproduced below. (Ex-1001, 3:47-53,
`Fig. 3). All of the admittedly known components necessary to perform authorization
`are enclosed in the same device, which is “of sufficient dimensions to be portable.”
`(Ex-1001, 7:35-36; Ex-1007, pg. 154; Ex-1002 ¶41). “[T]he card itself receives
`biometric data through the inputs, and compares it with information stored in the
`card’s memory to determine if the user utilizing the card is an authorized user, and
`the card will output … an access code.” (Ex-1007, pg. 154).
`
`10
`
`

`

`
`
`
`
`
`
`
`IPR2019-00478 Petition
`U.S. 6,213,391
`
`
`
` As illustrated in Figure 1, reproduced below, the card or portable device
`includes a verifying means 2,3 a code generator 5, a storage medium 6, a memory
`chip 7, and various inputs and output (e.g., inputs 12, 14 and outputs 10, 11). (Ex-
`1001, 7:40, 8:16, 8:38, 8:49, Fig. 1).
`
`3 The ’391 Patent specification refers to “verifying means 2” as “analyzing
`means 2” interchangeably. See, e.g., Ex-1001, 7:46-49, 7:50-52, 7:54-59.
`11
`
`

`

`
`
`
`
`
`
`
`IPR2019-00478 Petition
`U.S. 6,213,391
`
`
`During prosecution the examiner noted that the prior art of record did not
`disclose “inputs, outputs, verifying means, and code generator … all on the same
`device” (or card) such that the device is “a portable self-authenticating system.”
`(Ex-1007, pg. 154 (emphasis in original)). In other words, the components of the
`card were well-known in the prior art and utilized in security systems. (Ex-1002,
`¶56). The alleged invention, however, combine those components onto a card such
`that “[t]he card itself performs the authorization” which “allow[ed] the user to verify
`his identity” in a flexible manner and “eliminat[ed] the need for expensive, onsite
`identification devices or systems.” (Ex-1001, 5:29-40; Ex-1007, pg. 155). However,
`the examiner did not have all the references discussed herein before them.
`12
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`
`In operation, verifying means 2 “create[s] an initial representation of the
`potential user’s identification profile.” (Ex-1001, 7:60-64). The ’391 Patent
`discloses taking raw data representing a unique characteristic of a user and
`generating an “identification profile” based on that data. (Ex-1001, 7:42-46; Ex-
`1002, ¶44). As disclosed, the “identification profile” can be a “digital representation
`of some uniquely identifying trait of the user,” such as the user’s voice, DNA, iris,
`retina, palm print, or fingerprint. (Ex-1001, 3:55-58, 4:44-45, 7:48-59). For
`example, an “identification profile created (or received) … may be a numeric,
`alphanumeric, or other digital representation of the user’s unique biometric or digital
`signature.” (Ex-1001, 3:65-4:2).
`The ’391 Patent discloses how the card (device) may obtain an “identification
`profile” by at least three different methods. (Ex-1002, ¶¶45-50). For example, in
`one embodiment, input 12 receives raw data from a user. (Ex-1001, 7:45-52, Fig.
`1). Verifying means 2 then converts the raw data received by input 12 into a “digital
`representation of the potential user’s identification profile.” (Ex-1001, 7:43-52).
`For example, the card (device) may contain a scanner (e.g., a fingerprint scanner)
`which scans a corresponding user characteristic (e.g., a fingerprint) through input
`12. Verifying means 2 then converts the scanned raw data into an identification
`profile. (Ex-1001, 7:45-52).
`13
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`In another embodiment, input 36 of a card (device) receives raw data from an
`outside source. (Ex-1001, 10:8-14, Fig. 2). Verifying means 21 then converts the
`received raw data into an “identification profile.” (Ex-1001, 10:8-14). For example,
`raw data is received from some external source (e.g., an outside fingerprint scanner).
`(Ex-1002, ¶47). The card receives the raw data through input 36 where verifying
`means 21 contained in the device converts the raw data into an “identification
`profile. (Ex-1002, ¶47).
`In another embodiment, input 12 receives a “predigitized identification
`profile” from a source outside the card (device). (Ex-1001, 7:60-65, Fig. 1). For
`example, some means outside the device creates an identification profile externally.
`(Ex-1002, ¶48). Input 12 then receives this external identification profile to be used
`by verifying means 2. (Ex-1002, ¶48).
`Accordingly, a POSITA would have understood the disclosed input to consist
`of an interface to receive data related to user characteristics. (Ex-1002, ¶49). In the
`first embodiment, an interface (e.g., input 12) to a card (device) receives biometric
`data or other characteristics unique to the user (e.g,, a microphone, or a DNA, iris,
`retina, palm, or fingerprint scanner). (Ex-1001, 3:55-61, 7:48-59; Ex-1002, ¶49). In
`the second embodiment, an interface (e.g., input 36) is capable of receiving data
`representing a scanned user characteristic. (Ex-1001, 10:8-14; Ex-1002, ¶49). In
`14
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`the third embodiment, an interface (e.g., input 12) is capable of receiving an
`identification profile generated externally. (Ex-1001, 7:64-65; Ex-1002, ¶49).
`A user’s identification profile is used to “determine[] whether the person using
`the card is an authorized user of the card,” shown in annotated Figure 1 below. (Ex-
`1001, 7:40-42). “After determining the potential user’s [identification] profile,
`verifying means 2 … obtains any authorized profiles … from the built in storage
`medium 6, and then compares the stored profile to the potential user’s
`[identification] profile.” (Ex-1001, 8:8-13).
`The ’391 Patent therefore discloses two types of “identification profiles”:
`“spontaneous profiles” and “stored profiles.” (Ex-1001, 8:13-17; Ex-1002, ¶¶50-
`51). “Spontaneous profiles” are profiles that are created when a potential user
`attempts authorization. (Ex-1001, 8:8-13). “Stored profiles” are profiles that have
`been authorized and are used in comparison with “spontaneous profiles.” (Ex-1001,
`8:8-13). The ’391 Patent discloses generating both “spontaneous” and “stored” user
`identification profiles. (Ex-1001, 9:20, 10:52-55; Ex-1002, ¶51).
`The ’391 Patent also discloses various methods to use the results of the profile
`comparisons. (Ex-1002, ¶¶52-53). For example, in one embodiment, based on the
`comparison, the verifying means 2 “generates a ‘Positive ID’ signal” or a “‘Negative
`ID’ signal on signal line 3,” which is “output at output port 10” to inform “whether
`the potential user is authorized to use the card.” (Ex-1001, 8:13-28). In particular,
`15
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`“[o]utput port 10 transmits the ‘Positive ID’ signal or ‘Negative ID’ signal to the
`program, circuitry or other device associated with the secure objective that
`ultimately grants or denies access to the secure objective.” (Ex-1001, 8:25-28).
`
`
`
`In another embodiment, “[c]ode generator 5 transforms the user’s unique
`identification profile into a specific code which may be assigned to a user’s specific
`secure objective,” shown in annotated Figure 1 below. (Ex-1001, 8:36-41). In other
`words, the ’391 Patent discloses “the creation of unique, secure PIN codes for use
`as preliminary or secondary verification of identification.” (Ex-1001, 5:41-43). To
`do so, “[s]ignal line 4 transmits the [potential user’s] identification profile …
`determined by verifying means 2 to code generator 5.” (Ex-1001, 8:36-38). “[C]ode
`16
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`generator 5 uses an algorithm obtained from memory chip 7 to convert user’s unique
`identification profile into an access code associated with the secure objective.” (Ex-
`1001, 8:42-45). For example, in ATM applications, the code generator 5 “would
`convert the user’s unique identification profile into a four digit numeric personal
`identification number (PIN) code, which could then provide access to the account.”
`(Ex-1001, 8:45-49).
`
`
`During prosecution, the patent owner highlighted that the “code generated by
`code generator 5 … is based on the user’s actual [biometric characteristic] profile”
`so that the user’s profile and the access code are “functionally connected.” (Ex-
`1001, 9:12-13; Ex-1007, pgs. 123-124). Specifically, in the verification process, the
`17
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`user’s profile may be algorithmically “transformed … into a [distinctive and user-]
`specific code.” (Ex-1001, 5:45-53; Ex-1002, ¶54). “Once the user’s unique
`identification profile has been transformed into an appropriate access code by code
`generator 5, the access code is output to output port 11 where it may be received by
`a secure objective to determine whether access is granted.” (Ex-1001, 8:66-9:3).
`Therefore, even if “during use by an unauthorized user, the verifying means 2
`improperly sends a ‘positive ID’ signal, … the code generated by code generator 5
`… would not match the code assigned to the authorized user’s account” because the
`generated code is based on the unauthorized user’s identification profile. (Ex-1001,
`9:10-15).
`
`In another embodiment, the disclosed system includes an encrypting means
`24, shown in annotated Figure 2 below. (Ex-1001, 10:33). The encrypting means
`24, which may include well-known algorithms and methods, can be used “to
`securely encrypt … the access codes generated by code generator 23.” (Ex-1001,
`10:34-37; Ex-1002, ¶55). “Secure encryption by encrypting means 24 ensures that
`… access codes may not be intercepted upon transmission between the [card] and
`[the secured objective].” (Ex-1001, 10:37-40; Ex-1002, ¶55).
`
`18
`
`

`

`
`
`
`
`
`
`
`IPR2019-00478 Petition
`U.S. 6,213,391
`
`
`
`
`
`Independent claim 1 recites:
`
`A portable identification system comprising
`1.P
`
`a storage medium for storing electronic data;
`1.1
`
`one or more inputs;
`1.2
`
`one or more outputs;
`1.3
`
`a verifying means for determining user authorization or
`1.4
`non-authorization,
`19
`
`

`

`
`
`
`
`IPR2019-00478 Petition
`
`U.S. 6,213,391
`
`
`said verifying means receiving data from at least one of
`1.5
`said one or more inputs, which data is derived from biometric or
`other distinctive characteristics of the user,
`said verifying means generating an identification profile
`
`1.6
`for each user, wherein said identification profile is determined
`from said data,
`
`and a code generator employing at least one code
`1.7
`generating algorithm for generating one or more access codes
`based upon said identification profile wherein at least one of the
`said one or more access codes is an identification specific digital
`signature.
` B. Level of Ordinary Skill in the Art
`A person of ordinary skill in the art at the time of the filing of the earliest
`priority application for the ’391 Patent, i.e., September 10, 1997, (a “POSITA”)
`would have had at least a Bachelor’s degree in Computer Science, Computer
`Engineering, or Electrical Engineering, and two to three years of experience with
`user identification/authentication systems or cards (devices), including the use of
`biometric information. (Ex-1002, ¶¶67-70). More work experience could substitute
`for education, and vice versa. (Ex-1002, ¶¶67-70).
`20
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`C. Claim Construction4
`For purposes of this Petition, other than as provided below, Petitioner submits
`that no explicit construction (beyond plain and ordinary meaning under the Phillips
`standard) is required.5 (Ex-1002, ¶¶71-80).
`Claim 1 recites a portable identification system comprising … a verifying
`means. Use of the term “means for” or “means” in a claim gives rise to the rebuttable
`presumption that the patent owner intended to claim functional limitations under 35
`U.S.C. § 112, ¶6.6 Williamson v. Citrix Online, LLC, 792 F.3d 1339, 1348 (Fed. Cir.
`2015). Here, claim 1 recites a verifying means, giving rise to the presumption that
`
`4 ’391 Patent claim language is in bold and italic text.
`5 Should the Patent Owner, to avoid the prior art, contend that a claim term
`has a construction different from its plain and ordinary meaning, the appropriate
`course is for the Patent Owner to seek to amend the claim to expressly correspond
`to its contentions in this proceeding. See 77 Fed. Reg. 48764 (Aug. 14, 2012).
`6 Because the ’391 Patent was filed before the effective date of revisions to 35
`U.S.C. § 112 made by the AIA, the prior version of § 112 controls. See MobileMedia
`Ideas LLC v. Apple Inc., 780 F.3d 1159, 1168 n.3 (Fed. Cir. 2015) (applying the pre-
`AIA version of 35 U.S.C. § 112 ¶ 6).
`21
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`§ 112, ¶6 applies. Accordingly, Petitioner provides a claim construction under the §
`112, ¶6 framework.7
`When construing a means-plus-function limitation, the claimed function must
`be identified, and the corresponding disclosure of structures capable of performing
`the claimed function and their equivalents must be identified. Med. Instrumentation
`& Diagnostics Corp. v. Elektra AB, 344 F.3d 1205, 1210 (Fed. Cir. 2003). Where
`the disclosed structure is programmed or designed to carry out specialized functions,
`the disclosed structure “cannot be implemented in a general purpose computer, but
`instead must be implemented in a special purpose computer.” Williamson, 792 F.3d
`at 1352. In cases “involving a claim limitation that is subject to § 112, para. 6 that
`must be implemented in a special purpose computer, [the Federal Circuit] has
`consistently required that the structure disclosed in the specification be more than
`simply a general purpose computer or microprocessor.” Id. at 1348. This logic has
`extended to other words such as controllers, modules, mechanism, and elements.
`See id.; Toyota Motor Corp. v. Cellport Sys., Inc., IPR2015-00633. In particular, the
`specification must “disclose an algorithm for performing the claimed function,”
`where an algorithm is “a series of instructions for [a] computer to follow” and a
`
`7 The Board is required by statute to construe means-plus-function claims. See
`IPCom GmbH & Co. v. HTC Corp., 861 F.3d 1362, 1369 (Fed. Cir. 2017).
`22
`
`

`

`IPR2019-00478 Petition
`
`
`U.S. 6,213,391
`
`
`
`“sequence of computational steps.” Typhoon Touch Techs., Inc. v. Dell, Inc., 659
`F.3d 1376, 1384 (Fed. Cir. 2011) (citations omitted); Ibormeith IP, LLC v. Mercedes-
`Benz USA, LLC, 732 F.3d 1376, 1379 (Fed. Cir. 2013) (citations omitted).
`Algorithms “may be expressed as a mathematical formula, in prose, or as a flow
`chart, or in any other manner that provides sufficient structure.” Williamson, 792
`F.3d at 1348.
`Petitioner submits that the recited functions, corresponding structure, and, to
`the extent necessary

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket