throbber

`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`____________________
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`____________________
`APPLE INC.,
`Petitioner,
`
`v.
`PROXENSE, LLC,
`Patent Owner.
`____________________
`Case No. IPR2024-01486
`U.S. Patent No. 8,352,730
`____________________
`PETITION FOR INTER PARTES REVIEW
`
`
`
`
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`TABLE OF CONTENTS
`
`I. 
`
`II. 
`
`REQUIREMENTS FOR IPR ......................................................................... 1 
`A.  Grounds for Standing ............................................................................ 1 
`B. 
`Challenge and Relief Requested ........................................................... 1 
`C. 
`Claim Construction ............................................................................... 2 
`D. 
`Level of Ordinary Skill in the Art ......................................................... 4 
`THE ‘730 PATENT ........................................................................................ 4 
`A. 
`Brief Description ................................................................................... 4 
`B. 
`Prosecution History ............................................................................... 5 
`III.  THE CHALLENGED CLAIMS ARE UNPATENTABLE ........................... 6 
`A. 
`[GROUND 1] – Claims 1, 2, 4-9, 11, 12, and 14-17 are obvious over
`Burger .................................................................................................... 6 
`1. 
`Burger ......................................................................................... 6 
`2. 
`Application of Burger to the ’730 Claims ............................... 28 
`[GROUND 2] – Claim 3, 10, and 13 are Obvious in view of Burger and
`Robinson .............................................................................................. 86 
`1. 
`Robinson .................................................................................. 86 
`Combination of Burger and Robinson ..................................... 90 
`2. 
`3. 
`Application of Burger and Robinson to the ’730 Claims ........ 93 
`PTAB DISCRETION SHOULD NOT PRECLUDE INSTITUTION ......... 95 
`A. 
`35 U.S.C. §314(a) - Fintiv ................................................................... 95 
`B. 
`35 U.S.C. §325(d) – Advanced Bionics ............................................... 98 
`CONCLUSION ........................................................................................... 100 
`V. 
`VI.  MANDATORY NOTICES UNDER 37 C.F.R § 42.8(a)(1) ...................... 100 
`A. 
`Real Party-In-Interest Under 37 C.F.R. § 42.8(b)(1) ........................ 100 
`B. 
`Related Matters Under 37 C.F.R. § 42.8(b)(2) ................................. 100 
`C. 
`Lead And Back-Up Counsel Under 37 C.F.R. § 42.8(b)(3) ............. 102 
`D. 
`Service Information ........................................................................... 103 
`
`B. 
`
`IV. 
`
`
`
`
`
`
`
`i
`
`

`

`MSC-1001
`
`MSC-1002
`
`MSC-1003
`MSC-1004
`
`MSC-1005
`
`MSC-1006
`
`MSC-1007
`
`MSC-1008
`
`MSC-1009
`
`MSC-1010
`MSC-1011
`MSC-1012
`MSC-1013
`
`MSC-1014
`MSC-1015
`
`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`EXHIBITS
`U.S. Patent No. 8,352,730 to John J. Giobbi (“the ’730
`Patent”)
`Excerpts from the Prosecution History of the ‘730 Patent (“the
`’730 Prosecution History”)
`Declaration and Curriculum Vitae of Dr. Patrick Traynor
`Complaint, Proxense, LLC v Microsoft Corporation, 6:23-cv-
`00319, W.D. Tex., filed April 28, 2023
`US Patent Application Publication No. 2005/0050367
`(“Burger”)
`US Patent Application Publication No. 2003/0177102
`(“Robinson”)
`Institution Decision, Samsung Electronics America, Inc. v.
`Proxense, LLC, IPR2021-01444, Paper 11 (PTAB Feb. 28,
`2022)
`Definition of “transaction,” Merriam-Websters Collegiate
`Dictionary, 10th Ed., 1999
`Google Pixel Serial Number Guide, HomeServe webpage,
`https://www.homeserve.com/en-us/customers/find-serial-
`number-device-type/google/ (last visited April 19, 2024)
`US Patent No. 8,977,860 (“Barrus”)
`US Patent No. 7,681,050 (“Blom”)
`US Patent No. 10,755,300 (“Goodhart”)
`US Patent Application Publication No. 2009/0070219
`(“D’Angelo”)
`US Patent No. 10,929,869 (“Rosenberg”)
`US Patent No. 8,200,980 (“Robinson 980”)
`
`ii
`
`

`

`MSC-1016
`
`MSC-1017
`
`MSC-1018
`
`MSC-1019
`
`MSC-1020
`
`MSC-1021
`MSC-1022
`
`MSC-1023
`
`MSC-1024
`
`MSC-1025
`
`MSC-1026
`
`IPR2024-01486
`U.S. Patent No. 8,352,730
`Memorandum, Interim Procedure for Discretionary Denials in
`AIA Post-Grant Proceedings with Parallel District Court
`Litigation (USPTO June 21, 2022) (“Director’s Guidance”)
`Microsoft’s Opening Brief in support of its Motion to Dismiss
`for Failure to State a Claim, Proxense, LLC v Microsoft
`Corporation, 6:23-cv-00319, W.D. Tex., filed July 10, 2023
`Microsoft’s Reply in support of its Motion to Dismiss for
`Failure to State a Claim, Proxense, LLC v Microsoft
`Corporation, 6:23-cv-00319, W.D. Tex., filed August 10,
`2023
`Order Canceling Markman Hearing, Proxense, LLC v
`Microsoft Corporation, 6:23-cv-00319, W.D. Tex., Jan. 9,
`2024
`Product Identification Codes, https://www.uc.edu/con-
`tent/dam/uc/ce/docs/OLLI/Page%20Content/PRODUCT%20I
`DENTIFICATION%20CODES%20BAR%20QR.pdf, last
`visited April 19, 2024
`RESERVED
`Ex-Parte Re-examination Request of 730 Patent; Re-
`examination application number 90/015,052
`Motion to Transfer, Proxense, LLC v Microsoft Corporation,
`6:23-cv-00319, W.D. Tex., Aug. 21, 2023
`Motion to Stay pending resolution of the Motion to Transfer,
`Proxense, LLC v Microsoft Corporation, 6:23-cv-00319, W.D.
`Tex., Mar. 8, 2024
`Order Granting Motion to Stay pending resolution of the
`Motion to Transfer, Proxense, LLC v Microsoft Corporation,
`6:23-cv-00319, W.D. Tex., Mar. 26, 2024
`How to Find the Serial Number on TP-Link Devices,
`https://www.tp-link.com/us/support/faq/503/, last visited April
`19, 2024
`
`iii
`
`

`

`MSC-1027
`
`EX-1028-1029
`EX-1030
`
`EX-1031
`
`EX-1032
`
`EX-1033
`
`EX-1034
`
`EX-1035
`EX-1036
`
`EX-1037
`
`
`
`
`IPR2024-01486
`U.S. Patent No. 8,352,730
`Order Denying Motion to Transfer, Proxense, LLC v
`Microsoft Corporation, 6:23-cv-00319, W.D. Tex., April 18,
`2024
`
`Reserved
`Proxense, LLC v. Microsoft Corp., Case No. 6:23-cv-00319,
`Dkt. No. 66, Claim Construction Order (W.D. Tex. May 24,
`2024)
`Docket Sheet for Proxense, LLC v. Apple Inc., Case No. 6-24-
`cv-00143 (W.D. Tex) (pulled Oct. 14, 2024)
`Proxense, LLC v. Apple Inc., Case No. 6-24-cv-00143, Dkt. No.
`38, Agreed Joint Motion to Amend Scheduling Order (W.D.
`Tex)
`Proxense, LLC v. Samsung Electronics Co., Ltd., Case No. 6-
`21-cv-00210, Dkt. No. 43, Claim Construction Order (W.D.
`Tex. Jan. 18, 2022)
`Proxense, LLC v. Samsung Electronics Co., Ltd., Case No. 6-
`21-cv-00210, Dkt. No. 149, Memorandum in Support of Claim
`Construction Order (W.D. Tex. Dec. 28, 2022)
`Applications Related to the 730 Patent
`Complaint, Proxense, LLC v Apple Inc., 6:24-cv-00143, W.D.
`Tex., filed March 18, 2024
`Proxense, LLC v. Google LLC, Case No. 6:23-cv-00320, Dkt.
`No. 59, Claim Construction Order (W.D. Tex. Jan. 13, 2024)
`
`
`
`iv
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`LISTING OF CHALLENGED CLAIMS
`
`Claim 1
`
`
`
`[1pre]
`
`A method for verifying a user during authentication of an
`
`integrated device, comprising the steps of:
`
`[1.1]
`
`persistently storing biometric data of the user and a
`
`plurality of codes and other data values comprising a
`
`device ID code uniquely identifying the integrated device
`
`and a secret decryption value in a tamper proof format
`
`written to a storage element on the integrated device that
`
`is unable to be subsequently altered;
`
`[1.2]
`
`wherein the biometric data is selected from a group
`
`consisting of a palm print, a retinal scan, an iris scan, a
`
`hand geometry, a facial recognition, a signature
`
`recognition and a voice recognition;
`
`[1.3]
`
`responsive to receiving a request for a biometric
`
`verification of the user, receiving scan data from a
`
`biometric scan,
`
`v
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`[1.4]
`
`comparing the scan data to the biometric data to
`
`determine whether the scan data matches the biometric
`
`data;
`
`[1.5]
`
`responsive to a determination that the scan data matches
`
`the biometric data, wirelessly sending one or more codes
`
`from the plurality of codes and the other data values for
`
`authentication by an agent that is a third-party trusted
`
`authority possessing a list of device ID codes uniquely
`
`identifying legitimate integrated devices, wherein the one
`
`or more codes and other data values includes the device
`
`ID code; and
`
`[1.6]
`
`responsive to authentication of the one or more codes
`
`and the other data values by the agent, receiving an
`
`access message from the agent allowing the user access
`
`to an application,
`
`[1.7]
`
`wherein the application is selected from a group
`
`consisting of a casino machine, a keyless lock, a garage
`
`vi
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`door opener, an ATM machine, a hard drive, computer
`
`software, a web site and a file.
`
`Claim 2
`
`
`
`[2]
`
`The method of claim 1, wherein the one or more codes
`
`and the other data values are transmitted to the agent
`
`over a network.
`
`Claim 3
`
`
`
`[3]
`
`The method of claim 1, further comprising: registering
`
`an age verification for the user in association with the
`
`device ID code.
`
`Claim 4
`
`
`
`[4]
`
`The method of claim 1, wherein the one or more codes
`
`and the other data values indicate that the biometric
`
`verification was successful.
`
`vii
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`Claim 5
`
`
`
`[5]
`
`The method of claim 1, wherein the biometric data and
`
`the scan data are both based on a fingerprint scan by the
`
`user.
`
`Claim 6
`
`
`
`[6]
`
`The method of claim 1, further comprising: establishing
`
`a secure communication channel prior to sending the one
`
`or more codes and the other data values for
`
`authentication.
`
`Claim 7
`
`
`
`[7.1]
`
`The method of claim 1, further comprising: receiving a
`
`request for the one or more codes and the other data
`
`values without a request for biometric verification; and
`
`[7.2]
`
`responsive to receiving the request for the one or more
`
`codes and the other data values without a request for
`
`biometric verification, sending the one or more codes
`
`viii
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`and the other data values without requesting the scan
`
`data.
`
`Claim 8
`
`
`
`[8.pre]
`
`An integrated device for verifying a user during
`
`authentication of the integrated device, comprising:
`
`[8.1]
`
`a memory stores biometric data of a user and a plurality
`
`of codes and other data values comprising a device ID
`
`code uniquely identifying the integrated device and a
`
`secret decryption value in a tamper proof format written
`
`to the memory that is unable to be subsequently altered;
`
`[8.2]
`
`wherein the biometric data is selected from a group
`
`consisting of a palm print, a retinal scan, an iris scan, a
`
`hand geometry, a facial recognition, a signature
`
`recognition and a voice recognition;
`
`[8.3]
`
`a verification unit, in communication with the memory,
`
`receives scan data from a biometric scan for comparison
`
`against the biometric data, and if the scan data matches
`
`the biometric data, wirelessly sends one or more codes
`
`ix
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`from the plurality of codes and the other data values for
`
`authentication by an agent that is a third-party trusted
`
`authority possessing a list of device ID codes uniquely
`
`identifying legitimate integrated devices, wherein the one
`
`or more codes and the other data values includes the
`
`device ID code; and
`
`[8.4]
`
`responsive to the agent authenticating the one or more
`
`codes and the other data values, a radio frequency
`
`communicator, receives an access message from the
`
`agent allowing the user access to an application,
`
`[8.5]
`
`wherein the application is selected from a group
`
`consisting of a casino machine, a keyless lock, a garage
`
`door opener, an ATM machine, a hard drive, computer
`
`software, a web site and a file.
`
`Claim 9
`
`
`
`[9]
`
`The integrated device of claim 8, wherein the one or
`
`more codes and the other data values are transmitted to
`
`the agent over a network.
`
`x
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`Claim 10
`
`
`
`[10]
`
`The integrated device of claim 9, wherein an age
`
`verification is registered in association with the device
`
`ID code.
`
`Claim 11
`
`
`
`[11]
`
`The integrated device of claim 8, wherein the verifier
`
`comprises: an LED to be activated for requesting the
`
`biometric scan.
`
`Claim 12
`
`
`
`[12.pre]
`
`A method for authenticating a verified user using a
`
`computer processor configured to execute method steps,
`
`comprising:
`
`[12.1]
`
`receiving one or more codes from a plurality of codes
`
`and other data values including a device ID code,
`
`[12.2]
`
`wherein the plurality of codes and the other data values
`
`comprises the device ID code uniquely identifying the
`
`integrated device and a secret decryption value
`
`xi
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`associated with a biometrically verified user, the device
`
`ID code being registered with an agent that is a third-
`
`party trusted authority possessing a list of device ID
`
`codes uniquely identifying legitimate integrated devices;
`
`[12.3]
`
`requesting authentication of the one or more codes and
`
`the other data values by the agent, wherein the
`
`authentication determines whether the one or more codes
`
`and the other data values are legitimate;
`
`receiving an access message from the agent; and
`
`in response to a positive access message, allowing the
`
`biometrically verified user access to an application,
`
`wherein the application is selected from a group
`
`consisting of a casino machine, a keyless lock, a garage
`
`door opener, an ATM machine, a hard drive, computer
`
`software, a web site and a file.
`
`[12.4]
`
`[12.5]
`
`Claim 13
`
`[13]
`
`The method of claim 12, further comprising: registering
`
`a date of birth or age with the agent.
`
`xii
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`Claim 14
`
`
`
`[14]
`
`The method of claim 12, further comprising:
`
`establishing a secure communications channel with a
`
`biometric key, wherein the one or more codes and the
`
`other data values associated with the biometrically
`
`verified user is received from the biometric key.
`
`Claim 15
`
`
`
`[15.pre]
`
`A system, comprising:
`
`[15.1]
`
`a biometric key stores biometric data of a user and a
`
`plurality of codes and other data values comprising a
`
`device ID code uniquely identifying the biometric key
`
`and a secret decryption value in a tamper proof format
`
`written to a storage element on the biometric key that is
`
`unable to be subsequently altered, and if scan data can be
`
`verified as being from the user by comparing the scan
`
`data to the biometric data, wirelessly sending, one or
`
`more codes from the plurality of codes and other data
`
`xiii
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`values wherein the one or more codes and the other data
`
`values include the device ID code,
`
`[15.2]
`
`and the biometric data is selected from a group
`
`consisting of a palm print, a retinal scan, an iris scan, a
`
`hand geometry, a facial recognition, a signature
`
`recognition and a voice recognition; and
`
`[15.3]
`
`an authentication unit receives the plurality of codes and
`
`the other data values and send the plurality of codes and
`
`the other data values to agent for authentication to
`
`determine whether the one or more codes and the other
`
`data values are legitimate, wherein the agent is a third-
`
`party trusted authority possessing a list of device ID
`
`codes uniquely identifying legitimate integrated devices,
`
`and
`
`[15.4]
`
`responsive to the device ID code being authenticated, the
`
`authentication unit receiving an access message from the
`
`agent allowing the user to access an application,
`
`[15.5]
`
`wherein the application is selected from a group
`
`consisting of a casino machine, a keyless lock, a garage
`
`xiv
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`door opener, an ATM machine, a hard drive, computer
`
`software, a web site and a file.
`
`Claim 16
`
`
`
`[16]
`
`The system of claim 15, wherein the biometric key
`
`receives an authentication request from the
`
`authentication unit, and in response, requests a biometric
`
`scan from the user to generate the scan data.
`
`Claim 17
`
`
`
`[17]
`
`The system of claim 15, wherein if the biometric key
`
`cannot verify the scan data as being from the user, it does
`
`not send the one or more codes and the other data values.
`
`
`
`xv
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`Apple Inc. (“Petitioner” or “Apple”) petitions for Inter Partes Review
`
`(“IPR”) of claims 1-17 (“the Challenged Claims”) of U.S. Patent No. 8,352,730
`
`(“the ‘730 Patent”). Compelling evidence presented in this Petition demonstrates
`
`at least a reasonable likelihood that Apple will prevail with respect to at least one
`
`of the Challenged Claims.
`
`I.
`
`REQUIREMENTS FOR IPR
`A. Grounds for Standing
`Petitioner certifies that the ‘730 Patent is available for IPR. This petition is
`
`being filed within one year of service of a complaint against Apple. EX-1036.
`
`Apple is not barred or estopped from requesting review of the Challenged Claims
`
`on the below-identified grounds.
`
`B. Challenge and Relief Requested
`Apple requests an IPR of the Challenged Claims on the grounds noted
`
`below. Dr. Patrick Traynor provides supporting testimony in his Declaration
`
`(MSC-1003, ¶¶[1]-[166]).
`
`Ground
`
`Claim(s)
`
`35 U.S.C. § 103
`
`1
`
`2
`
`
`
`
`
`1, 2, 4-9, 11, 12, and
`
`Burger
`
`14-17
`
`3, 10, and 13
`
`Burger in view of Robinson
`
`1
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`The ’730 Patent was filed on December 20, 2005, and claims priority from
`
`earlier applications. MSC-1001, cover. The earliest application that the ’730
`
`Patent claims priority from is US provisional application No. 60/637,538, filed on
`
`December 20, 2004. MSC-1001, cover. While Petitioner does not concede that
`
`December 20, 2004 is the priority date that should be accorded to the ’730 Patent,
`
`for the purposes of this proceeding, each of the references asserted in this Petition
`
`qualifies as prior art under 35 USC §§102(a), (b), or (e) (as shown in the table
`
`below) even if the December 20, 2004 date of the provisional application is used as
`
`the priority date of the ’730 Patent.
`
`Reference
`
`Filing Date
`
`Publication
`
`Date
`
`US 2005/0050367 (Burger or MSC-1005)
`
`Sept. 30,
`
`Mar. 3, 2005
`
`2004
`
`US Pat Pub. No. 2003/0177102 (Robinson or
`
`Feb. 19,
`
`Sept. 18, 2003
`
`MSC-1006)
`
`2003
`
`
`
`C. Claim Construction
`No formal claim constructions are necessary in these proceedings because
`
`“claim terms need only be construed to the extent necessary to resolve the
`
`controversy.” Wellman, Inc. v. Eastman Chem. Co., 642 F.3d 1355, 1361 (Fed.
`
`
`
`2
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`Cir. 2011). Nonetheless, for the sake of completeness, Petitioner notes the three
`
`phrases addressed by the Board during a prior IPR proceeding (IPR2021-01444).
`
`In IPR2021-01444, the Board noted that:
`
`1)
`
`“interpretation of ‘tamper proof format’ is not necessary to determine
`
`whether to institute an inter partes review”;
`
`2)
`
`“[t]he plain meaning of ‘third-party trusted authority’ suggests an
`
`entity or party separate from the principal parties to a transaction”;
`
`and
`
`3)
`
`“no further interpretation of the ‘access message’ limitations is
`
`necessary.”
`
`MSC-1007, 11-15. The references asserted in this petition render the claims
`
`obvious even if these earlier positions adopted by the Board are used in these
`
`proceedings.1 MSC-1003, ¶¶[43]-[44].
`
`
`1 Additional claim terms were construed in other proceedings relating to the ’730
`
`patent, but the Board need not resolve those terms because the Grounds relied on
`
`in this petition render the challenged claims obvious under either the plain and
`
`ordinary or alternate constructions adopted in the other proceedings. See EX-
`
`1037, EX-1030, EX-1033-1034, IPR2024-00232, Paper 10.
`
`
`
`3
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`Petitioner reserves the right to respond to any constructions offered by
`
`Patent Owner or adopted by the Board. Petitioner is not conceding that each
`
`challenged claim satisfies all statutory requirements. Petitioner is not waiving any
`
`arguments concerning other grounds that cannot be raised in IPR proceedings.
`
`D. Level of Ordinary Skill in the Art
`A person of ordinary skill in the art (“POSITA”) relating to the subject
`
`matter of the ‘730 Patent as of December 20, 2004 would have had (1) at least a
`
`bachelor’s degree in computer science, computer engineering, electrical
`
`engineering, or a related field, and (2) at least two years of industry experience in
`
`wireless communications security. Additional graduate education could substitute
`
`for professional experience, and vice versa. MSC-1003, ¶¶[22]-[23].
`
`II. THE ‘730 PATENT
`A. Brief Description
`The ‘730 patent is directed to systems and methods for performing “an
`
`authentication responsive to biometric verification of a user being authenticated.”
`
`MSC-1001, 1:15-18, Abstract, 2:60-67. In particular, the ‘730 patent discloses a
`
`biometric key 100, as shown in FIG. 2 below, that can be used to perform the
`
`biometric verification using a trusted key authority. MSC-1001, 3:47-5:2, 5:60-67;
`
`MSC-1003, ¶¶[45]-[48].
`
`
`
`4
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`
`
`MSC-1001, FIG. 2.
`B.
`Prosecution History
`The ’730 patent was filed as US Patent Application No. 11/314,199 (the
`
`“’199 application”) on Dec. 20, 2005. MSC-1001, cover. After three RCEs, the
`
`Examiner allowed the claims by amending the claims to add features [1.2] and
`
`[1.7] (and some other minor amendments) by virtue of an Examiner amendment
`
`attached to the notice of allowance dated August 31, 2012. MSC-1002, 31-43.
`
`However, as noted in this petition below, features [1.2] and [1.7] were well-known
`
`and would have been obvious to a POSITA. MSC-1003, ¶¶[49]-[50].
`
`
`
`5
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`III. THE CHALLENGED CLAIMS ARE UNPATENTABLE
`A.
`[GROUND 1] – Claims 1, 2, 4-9, 11, 12, and 14-17 are
`obvious over Burger
`1.
`Burger
`Burger is related to a portable electronic authorization device it calls a
`
`“Pocket Vault.” MSC-1005, ¶[51]. The Pocket Vault is “used for producing,
`
`distributing, storing, and using the typical contents of a person’s wallet, as well as
`
`the multiple, separate transaction authorization devices.” MSC-1005, ¶[93].
`
`Burger’s system, shown below in FIG. 1, enables “individuals to replace nearly all
`
`of the paper and plastic contents of their wallets and all of their other transaction
`
`authorization implements with a single, hand-held portable electronic authorization
`
`device”—the Pocket Vault. MSC-1005, ¶¶[51], [93]; MSC-1003, ¶[51].
`
`
`
`6
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`
`
`MSC-1005, FIG. 12.
`Burger’s system 100 includes the Pocket Vault 102, an associated token
`
`102a, network server(s) 114, interface stations 104a-c coupled to the network
`
`server(s) 114, commercial card reader(s) 106, commercial bar code reader(s) 107,
`
`and computers 108, 110, and 112 operated by one or more advertisers, non-
`
`financial media issuers, and financial media issuers, respectively. MSC-1005,
`
`¶¶[96][97]. Components of system 100 can be connected in a wired or wireless
`
`manner. MSC-1005, ¶¶[99]-[102]. The Pocket Vault 102 may communicate with
`
`
`2 Annotations to figures in the petition are marked up in color.
`7
`
`
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`the network server 114 directly in a wireless network or may communicate through
`
`the interface stations 104a-c. MSC-1005, ¶[101]; MSC-1003, ¶[52].
`
`An example of the Pocket Vault 102 is shown below in Burger’s FIG. 2.
`
`Burger’s Pocket Vault 102 includes “a controller 202, … a transceiver 204, a user
`
`input device 206, a docking interface 208, a read/write memory 210, a write-once
`
`memory 212, a power manager 214, an indicator 215, a display 216, a token port
`
`218, and a fingerprint scanner 220, all coupled to the controller 202.” MSC-1005,
`
`¶[118]. Burger “is not limited to any particular type of memory. The memory 210
`
`may, for example, comprise a suitable non-volatile SRAM. Similarly, any suitable
`
`memory device that permits a only [sic] single write operation to take place may
`
`be employed as the write-once memory 212.” MSC-1005, ¶[127]. The Pocket
`
`Vault 102 may also include a hard-wired memory (not shown) to store device
`
`serial numbers and key operating system and encryption software components.”
`
`MSC-1005, ¶[118]. A POSITA would have understood that device serial numbers
`
`are generally used to identify a device, and, for a device such as the Pocket Vault,
`
`would have included a Pocket Vault ID (chip ID). MSC-1003, ¶[53].
`
`Memory 210 can include a high-security section used to “store value-based
`
`or value-linked media such as debit and credit cards and certain ID information
`
`such as driver’s licenses, passports, building security passes, etc.” MSC-1005,
`
`¶[129]; MSC-1003, ¶[54].
`
`
`
`8
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`
`
`MSC-1005, FIG. 2.
`The controller 202 includes “a low-power multiprocessor or microcomputer
`
`having an on-board SRAM and/or flash memory.” MSC-1005, ¶[122]. “The
`
`controller 202 may include a software-programmable and encryption-protected or
`
`hard-wired unique chip ID. In one embodiment, this chip ID [(Pocket Vault ID)]
`
`is released from the Pocket Vault 102 only after the fingerprint scanner 220 … has
`
`successfully authenticated the identity of the holder.” MSC-1005, ¶[122]; MSC-
`
`1003, ¶[55].
`
`
`
`9
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`The Pocket Vault 102 includes a display 216 that can be used, e.g., to
`
`dynamically display branding and advertising messages. MSC-1005, ¶[110]. In
`
`addition, the display 216 can include a “touch screen or a separate user input
`
`device” to “effectively flip through the contents of the Pocket Vault 102 to locate
`
`and select a desired media (e.g., a credit card, driver’s license, library card,
`
`frequent flier card, a particular RFID personality, etc.) much like a person can flip
`
`through the contents of his or her wallet to do the same.” MSC-1005, ¶¶[109],
`
`[132], [133]; MSC-1003, ¶[56].
`
`The Pocket Vault 102 can also include or be coupled to a token 102a, which
`
`“may be used by the Pocket Vault holder to engage in a transaction.” MSC-1005,
`
`¶[103]. Token 102a can be released from the Pocket Vault 102 and can include a
`
`display device to display information such as credit card information and used in
`
`transactions with retailers. MSC-1005, ¶¶[103]-[104], [155]-[158]. For example,
`
`“[w]hen used by a consumer, retailers may verify authenticity by matching the
`
`information displayed on the token 102a with that revealed in the swipe or other
`
`token reading process. Without a match, the token 102a may be rejected.” MSC-
`
`1005, ¶[158]; MSC-1003, ¶[57].
`
`Burger’s Pocket Vault 102 also includes a fingerprint scanner 220. MSC-
`
`1005, FIG. 2; ¶[135]. “[O]ther bio-metric scanning devices may also be employed
`
`to verify the identity of the holder. For example, some embodiments may employ a
`10
`
`
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`charge coupled device (CCD) to serve as an iris or retina scanner, an optical
`
`sensor, and/or a voiceprint.” MSC-1005, ¶[135]; MSC-1003, ¶[58].
`
`When a user is interested in using the device, the user’s biometric feature
`
`(e.g., fingerprint scan, retina scan, etc.) is used to authenticate the user. MSC-
`
`1005, ¶[112]. “In one illustrative embodiment, authentication information used to
`
`validate the holder’s identity (e.g., the stored fingerprint and/or PIN code) is stored
`
`within the to-be-accessed device,” the Pocket Vault, “and the validation is
`
`performed in its entirety on-board the same device, such that the user-specific
`
`authentication information never leaves the device in which it is stored. Thus,
`
`using this technique, the likelihood that such information will be intercepted by
`
`unauthorized third parties may be reduced significantly.” MSC-1005, ¶[112].
`
`Burger explains that “great care may be taken to ensure that only authorized
`
`individuals are permitted to validate Pocket Vaults 102 by having their
`
`authentication information (e.g., their fingerprint data or PIN codes) stored therein.
`
`Therefore, after it has been confirmed that the holder’s authentication information
`
`has been properly stored in the Pocket Vault 102, a “trust relationship” may be
`
`established between the network server 114 and the Pocket Vault 102. This
`
`relationship may involve, for example, the registration of a unique encrypted chip
`
`ID of the Pocket Vault 102 with the network server 114 through a secure Internet
`
`connection, the distribution of a digital certificate (e.g., a PKI certificate) to the
`11
`
`
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`Pocket Vault 102, and the grant of authority to the Pocket Vault 102 to
`
`permanently store the Pocket Vault holder’s authentication information.” MSC-
`
`1005, ¶[114]. “Because of the creation of the above-described trust relationships,
`
`each Pocket Vault 102 and each interface station 104 may communicate securely
`
`with the network server 114.” MSC-1005, ¶[116]; MSC-1003, ¶[59].
`
`Burger’s network server(s) 114 can “serve as: (1) a repository of
`
`information for the network, (2) the entity that controls access to the stored
`
`information by the other network devices, and (3) a service provider for financial
`
`and non-financial media issuers, advertisers, as well as Pocket Vault holders.”
`
`MSC-1005, ¶¶[98], [117], FIG. 1. In one example shown in FIG. 4 (reproduced
`
`below), the network server 114 may include a database 406 that stores “a real-time
`
`record of critical reference data along with transaction histories, back-up files, and
`
`security audit trail information for key events. Examples of specific items that
`
`may be stored in the database 406 include: a list of current Pocket Vault holders
`
`…; … a list of currently authorized or registered Pocket Vaults 102, identified by
`
`chip ID and linked to the holder list; a list of currently authorized or registered
`
`tokens 102a, identified by chip ID and linked to the holder list; … authorized
`
`media data received from media issuers that has not yet been downloaded to
`
`individual Pocket Vaults 102.” MSC-1005, ¶[146], FIG. 4; MSC-1003, ¶[60].
`
`
`
`12
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`MSC-1005, FIG. 4.
`FIG. 27 (shown below) depicts another example implementation of a
`
`
`
`network server 114 that includes “one or more controllers 402 and a database 406,
`
`as described above in connection with FIG. 4. In addition, the network server 114
`
`may include a communication protocol layer 2716, which provides low-level
`
`communication functions to server communications software.” MSC-1005,
`
`¶¶[0540], [0077], [0531], [0542]; MSC-1003, ¶[61].
`
`
`
`13
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`
`
`
`MSC-1005, FIG. 27.
`An example method of using Burger’s Pocket Vault 102 to perform user and
`
`device authentication is shown in FIG. 7A below. When a user’s fingerprint is
`
`applied to the fingerprint scanner 220, the power manager 214 powers on the
`
`Pocket Vault 102. MSC-1005, ¶¶[178]-[181]. “[T]he fingerprint scanner 220
`
`[then] scans the applied fingerprint of the Pocket Vault holder” and determines
`
`whether the Pocket Vault 102 has been validated (step 708). MSC-1005, ¶¶[181]-
`
`[182]. “In one embodiment, the Pocket Vault 102 is not validated until: (1) a
`
`user’s fingerprints have been stored in the fingerprint memory (e.g., the write-once
`
`
`
`14
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`memory 212 of FIG. 2), and (2) the Pocket Vault 102 has received and stored
`
`encrypted validation information (e.g., a PKI certificate) from the network server
`
`114.” MSC-1005, ¶¶[182]; MSC-1003, ¶[62].
`
`MSC-1005, FIG. 7A.
`“When, at the step 708, it is determined that the Pocket Vault 102 has
`
`already been validated,” at step 712 “it is determined whether Pocket Vault 102
`
`has been authenticated, e.g., whether the fingerprint scanned at the step 706
`
`
`
`
`
`15
`
`

`

`IPR2024-01486
`U.S. Patent No. 8,352,730
`matches one of the fingerprints stored in the fingerprint memory 212.” MSC-
`
`1005, ¶¶[183]-[184], [209]-[210]. After “it is determined that the Pocket Vault
`
`102 has been properly authenticated,” “an encryp

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket