Professional Documents
Culture Documents
Unified Patents Inc. v. Pen-One Acquisition Group, LLC and Equitable IP Corp., LLC, IPR2017-02167, (PTAB Sept. 24, 2017)
Unified Patents Inc. v. Pen-One Acquisition Group, LLC and Equitable IP Corp., LLC, IPR2017-02167, (PTAB Sept. 24, 2017)
v.
IPR2017-02167
U.S. Patent 7,281,135
____________
TABLE OF CONTENTS
I. INTRODUCTION .........................................................................................1
C. Related Matters......................................................................................2
1. 135 Patent......................................................................................10
A. identity verification data ..................................................................13
1. Ludtke.............................................................................................15
B. Ground 3: Ludtke and Hsu Render Claims 5-8, 13-16, and 29-
32 Obvious ..........................................................................................34
1. Hsu 34
1. Stinson ............................................................................................46
1. Beatson ...........................................................................................52
E. Ground 6: Hsu and Beatson Render Claims 5-8, 13-16, and 29-
32 Obvious ..........................................................................................63
X. CONCLUSION ............................................................................................79
EXHIBIT LIST
Exhibit Description
i
Sticha, P. and Ford, J. Introduction to Biometric Identification
1015 Technology: Capabilities and Applications to the Food Stamp
Program, R. Lewis and co., December 1999
ii
I. INTRODUCTION
Petitioner) petitions the PTAB to institute inter partes review of claims 1-32 of
information in this manner is not new, unobvious, nor the least bit innovative.
Biometric information has been used for centuries to verify and confirm identities.
information a more valuable and reliable tool to ensure only authorized individuals
perform electronic transactions and gain secure access. As the prior art discussed
in this Petition shows, the challenged claims recite nothing more than the well-
known use of biometric information to verify transactions and secure access using
mandatory disclosures:
A. Real Party-in-Interest
party-in-interest.
1
B. The Patent Owner
One).
C. Related Matters
The 135 Patent has been asserted in the following litigations, none of which
involve Unified:
designation of counsel: lead counsel is W. Todd Baker (Reg. No. 45,625), primary
back-up counsel is Roshan S. Mansinghani (Reg. No. 62,429), and other back-up
counsel are Marc K. Weinstein (Reg. No. 43,250) and Jonathan Stroud (Reg. No.
72,518).
E. Service Information
2
Address: W. Todd Baker
Oblon LLP
1940 Duke Street
Alexandria, VA 22314
Email: cpdocketbaker@oblon.com
Telephone: 703-413-3000
Fax: 703-413-2220
roshan@unifiedpatents.com.
The undersigned authorizes the Office to charge the required fees and any
As set forth below and pursuant to 37 C.F.R. 42.104, each requirement for
3
available for inter partes review and that Petitioner is not barred or estopped from
requesting inter partes review challenging the patent claims on the grounds
identified herein.
Petitioner requests inter partes review and cancellation of 135 Patent claims
1-32 as either anticipated under 35 U.S.C. 102 or obvious under 35 U.S.C. 103.
The application which issued as the 135 Patent is a divisional of application No.
09/865,638, now U.S. Patent 6,925,565 (EX1008), filed on May 25, 2001.
Petitioner relies upon the following patents, none of which were considered
EX1006 U.S. Patent 6,149,056 (Stinson), filed on May 12, 1997, is prior
4
2. The Specific Grounds on which the Challenge is Based
following grounds:
1-4,9-12,17-
1 102(e) Ludtke
24
1-4,9-12,17-
2 103(a) Ludtke
24
5-8,13-16,29-
3 103(a) Ludtke and Hsu
32
1,3-4,17,19-
5 102(e)/103(a) Beatson
21,23-24
5-8,13-16,29-
6 103(a) Hsu and Beatson
32
2,9-12,18,
7 103(a) Beatson and Stinson
22,25-28
V. DECLARATION EVIDENCE
systems. See EX1002. Dr. Jones performed a thorough analysis of the skill level
of a POSA, EX1002, 21, the prior art content and state, id., 32-41, claim
5
construction, id., 57-63, and the teachings and suggestions that a POSA would
have understood based on the prior art, id., 64-257, including a thorough
A. Summary
The 135 Patent is concerned with an already old concept as of 2001: using
46);
6
The 13
35 Patents purportedly inven
ntive systeem merelyy combinees these w
well-
1
known features. (Id., 12:6
62 13:2
21.) Thee Petitions prior arrt teaches this
The
T 135 patents
p Fig
g. 1A show
ws an idenntity verificcation systtem includdes a
host com
mputer, an
n interrogattor, a transp
ponder, annd a stylus.. (EX10011, 6:3-6.)
1
Althou
ugh the pattent title reefers to pen
n-based ideentity veriffication, noo 135 Pateent
needed.
7
The host computer accesses data linking the customer with a customer's payment
account, and the interrogator linked to the host computer is disposed at a point-of-
sale (POS) terminal. (Id., 6:12-17.) The customer carries a wireless transponder
that transmits data to the interrogator pertaining to the customers identity upon
request. (Id., 6:17-20.) The transponder has a unique serial number linked with a
6:20-23.) Access to the customer's payment account is only enabled when the
sensed and reference digital signatures match. (Id., 6:23-26.) The transponder can
be incorporated into the wireless stylus as shown in Fig. 1C. (Id., 6:43-46.) The
(Id., 6:46-49.)
8
As
A shown in
i Fig. 3, a customerr selects ggoods, procceeds to a POS term
minal,
and ind
dicates tran
nsaction payment
p th
hrough a transpondeer. (Id., 6:53-56.) An
interrog
gator dispo
osed collectts data from
m the trannsponder, aand the finggerprint seensor
9
B. Prosecution History
1. 135 Patent
The application issuing as the 135 Patent was filed on April 20, 2005 as
filed on May 25, 2001, now U.S. Patent 6,925,565 (EX1007). The 135 Patent
Amendment cancelling the original claims and adding 32 new claims. (Id., p.29-
30.)
two claims for examination that required radio frequency transmission and styluses
in each of the independent claims. (EX1009, p.96-100.) The single office action
found each claim obvious over U.S. Patent 6,164,528 to Hills et al. (EX1009,
p.43-47.)
transmission being used for data transfer between the first electronic device and
the second electronic device and characterized the present invention as follows
(Id., p.20-41.):
10
tollbooths, but it not used in commercial transactions because no
signature is required. Applicants stylus with one or more fingerprint
sensors provides a perfect signature, in that the fingerprint(s), written
text, and dynamic signature verification are captured therewith. The
preferred embodiment of the present invention is for use in
commercial transactions at a point-of-sale terminal. A customer
advises a merchant that a specific customer account is to be used for
payment. The customer also submits a fingerprint that is incidentally
captured when the name is signed.
(Id., p.30.)
The examiner provided no reasons for allowance, (id., p.16.), but it can be
inferred from claim amendments and remarks that the point of novelty was radio
frequency transmission for data transfer between first and second electronic
transmission but no stylus or pen. The Petitions prior art references, none
being applied by the examiner, show that using radio frequency transmission in a
11
C. Background of the Technology
transactions and accessing secure areas was well-known prior to 2001. Published
works document the use of biometric systems prior to 2001 in the areas of credit
of the DSS Digital Imaging Project Implementation and First Year Results),
Koehler, Biometrics and the Future of Money). Biometrics has therefore been
widely adopted for POS transactions earlier than 2001. (EX1002, 36.)
Access control biometric systems have also been available prior to 2001.
networked physical access control system that supports biometric readers at access
12
proximity, or Wiegand) or a biometric characteristic (such as a
fingerprint or a retina scan).
(EX1022, 2.4.2.) A central databased maintains authorized user. (Id., 3.1.)
The prior art evidences the level of ordinary skill in the art. See In re GPAC
Inc., 57 F.3d 1573, 1579 (Fed. Cir. 1995) (no error to adopt the approach that
references of record bets determine the level of skill in the art). The prior art
discussed herein, and in Dr. Jones declaration, demonstrates that a POSA, at the
time the application which issued as the 135 Patent was filed, would have had a
transaction systems and use of biometrics for regulating access and providing
The 135 Patent has not expired, and thus, its claims should be interpreted
specification. 37 C.F.R. 42.100(b). Petitioner adopts the plain meaning for all
Independent claims 1, 21, 25, and 29 each recite identity verification data
13
a first electronic device. The term identity verification data does not appear in
the specification outside of the claims, and the file history does not address the
terms meaning.
should maintain its plain meaning: data used for, or indicative of, identity
verification.
A POSA would have understood that identity verification data means data
on context (i) data used in a process for verifying someones identity or (ii) data
The 135 disclosure is consistent with this interpretation. (Id., 61) For
The 135 Patent also discloses that the fingerprint comparison can occur in
the transponder. (Id., 6:67 7:2.) Since the interrogator collects data from the
transponder and advises a customer about payment acceptance (Id., 6:50-60, Fig.
14
3), the transponder necessarily transmits the comparison result, which is data
(EX1002, 57-63).
element-by-element basis that claims 1-32 of the 135 Patent are unpatentable as
being anticipated by or obvious in view of Ludtke, Beatson, Hsu, and Stinson. For
ease of reference, this analysis numbers individual claim elements (e.g., 1[a]).
This analysis is based on and supported by Dr. Joness analysis of the 135 Patent
9-12, and 17-24 and thus anticipates them. Ground 2 demonstrates that claims 1-4,
1. Ludtke
15
5:1). Lu
udtkes Fig
g. 1 shows a system in
i which a transactioon privacy clearing hhouse
(TPCH)) 1102 interrfaces a usser 120 witth a vendorr 125. (Id., 6:36-44.))
Transaction
T 30 can be a card, diggital walleet, wirelesss telephone, or
n device 13
and com
mmunicatio
on protoco mmunicatinng with ouutside devvices such as a
ols for com
recognittion within
n the card
d. (Id., 5::53-64.) T
The transaaction devvice contaiins a
unique identifying
g value and
d other infformation aallowing thhe TPCH tto track itss use
2
Ludtkee also referrs to TPCH
H as transacction proceessing cleaaring housee.
16
As
A shown in
i Fig. 2, transaction
t n device 205 interfacces with a POS term
minal
210, wh
hich comm w TPCH 215. (Id.,, 8:25-28.)
municates with
The
T TPCH can provid
de the user with transsaction authhorization and be
The TPC
CH includes a custom
mer databaase 640 hollding custoomer inform
mation, thee
When
W the personal
p PO
OS terminaal receives a transactiion requestt, it asks thhe
transacttion devicee to validatte the user, confirms that the usser wants too make this
transacttion, and ob
btains userr account payment
p innformation. (Id., 28:557-62.) Thhe
17
transaction device asks the user to confirm the transaction and provide a fingerprint
transaction and provides the transaction record and the unique ID of the transaction
device, the TPCH using the transaction devices unique ID to process the
transaction. (Id., 29:10-14.) The TPCH validates the transaction devices good
standing and the account having sufficient funds. (Id., 29:15-17.) If so, the TPCH
issues a transaction confirmation back to the POS terminal, which reflects the
Ludtke also discloses a user of the commercial transaction system being registered
and digitally linked with an account for payment. (EX1002, 67.) In particular, a
18
user registers to use the system, the registration digitally linking the user with a
computer that has access to data that links the user with the user account.
(EX1002, 68.) In particular, the TPCH 110 accesses data linking the user and
user account (i.e., account information, user information, held in customer database
640). (Id., 9:26-34 (TCPH may be embodied as a secure server), 10:15-18 (The
customer database 640 holds information regarding each customer of the TPCH.),
Ludtke discloses a first electronic device (i.e., POS terminal) linked to the
host computer (i.e., TPCH). (EX1002, 69.) In particular, Ludtke discloses that a
POS terminal communicates with the TPCH. (EX1003, 8:25-37, 3:32-36, 3:48-
57.)
Ludtkes POS terminal performs the recited functions of the first electronic
device including being digitally linked to the host computer (Id., 8:25-37) and
radio frequency transmission being used for data transfer [with] the second
electronic device. (Id., 5:36-44; see also Section IX.A.1.(d) infra.) Accordingly,
19
a POSA would have understood that the structure within Ludtkes POS terminal for
the POS terminal. (EX1002, 70.) Moreover, nothing in the claim or specification
requires the first electronic device to be something other than the point-of-sale
To the extent the claims are interpreted such that a first electronic device
must be separate and independent from the POS terminal, it would have been
the POS terminal and disposed at it. (Id., 71) A POSA would have understood
that implementing the structure for performing the first electronic devices recited
functionality within the POS terminal or as a separate device at the POS terminal
implementation is well within the ability of a POSA and highly likely to succeed.
transaction through a POS terminal, a POSA would have been motivated to dispose
structure for implementing the first electronic devices functionality at or near the
20
d. Claim 1[c]: c. a second electronic device that is
wireless, the second electronic device being carried
by the user, the second electronic device
communicating identity verification data with the
first electronic device, radio frequency transmission
being used for data transfer between the first
electronic device and the second electronic device;
and
205) can be a card carried by a user. (EX1002, 73; EX1003, 5:36-44, 5:53-64,
10:64 11:7, 11:63-65 (As noted earlier, the privacy card 705 is configured to be
device unique ID) to the first electronic device (i.e., POS terminal). (EX1002,
74.) Ludtke discloses that the transaction device contains a unique identifying
value to assist in user transactions and provides that unique ID to the POS terminal
Ludtke also discloses that the transaction device is wireless and uses wireless
(transaction device may contain wireless data communication, data storage and
21
10:33-37, 10:64 11:18, 17:2-10.) Since the transaction device can be
the wireless communication with the POS terminal can be through radio frequency
disclose radio frequency (RF) transmission being used for data transfer between
the first and second electronic devices, using RF transmission would have been
and would have been the most common option, the implementation of which
would have provided predictable results and required merely simple substitution.
(See, e.g., EX1004, 10:1-5 (a wireless connection (e.g., using radio, infrared or
the particular wireless communication is simply a matter of design choice, and that
implementing it with RF transmission would have been well within the ability of a
POSA and was highly likely to succeed. (EX1002, 76.) Moreover, using RF
22
communication was well-known to a POSA, and its implementation would provide
images because claim 2 defines it as being a fingerprint image. (See also EX1001,
captures a digital signature (i.e., fingerprint) while using the member. (EX1002,
that limits access to the card 705 to authorized users. A fingerprint touch pad and
Moreover, the 135 Patent expressly discloses that the stylus, transponder, and
23
f. Claim 1[e]: whereby the sensed digital signature
image is compared to a reference digital signature
image upon a request to process the commercial
transaction, the reference digital signature image
being captured during a registration process; and
When the user has selected an account, the transaction device asks the
user to confirm the entire transaction and that the user is authorized,
for example, by entering a PIN or providing a fingerprint recognition
sample. The transaction device receives confirmation of the
transaction and validates that the user is authorized.
24
Ludtke also discloses capturing the reference digital signature image during
pad, and storing the fingerprint identity in the transaction device. (Id., 19:35
20:12.)
Ludtke discloses only accepting the commercial transaction if the sensed and
82.) In particular, unless the signature images match, the user is not authorized to
sample) in the second electronic device (i.e., transaction device). (EX1002, 84;
25
EX1003, 20:4-12 (the fingerprint identity sample that will be stored in the
discloses a user record (i.e., customer information) being accessible to the host
computer (i.e., TPCH) (EX1003, 10:15-18 (The customer database 640 holds
information regarding each customer of the TPCH. It is this database in which the
only link between actual user identity information and the digital aliases provided
by the transaction device exists.), Fig. 6 (showing TPCH includes database 640),
3:40-45, 6:49-51.) Ludtke also discloses that the user information includes the
reference digital signature image (i.e., sample fingerprint) (Id., 20:66-21:7 (user
all of the information [which includes fingerprint sample] and delivers it to the
26
l. Claim 9[a]: a. requesting identity verification
through cooperative engagement between a first and
a second electronic device, the first electronic device
being disposed at the point-of-sale terminal, the
second electronic device being wireless, the second
electronic device being carried by the user,
Ludtke discloses the first electronic device (i.e., POS terminal) being
disposed at the point-of-sale terminal and the second electronic device (i.e.,
transaction device) being wireless and carried by the user. (See supra Sections
and second electronic devices. (EX1002, 87, EX1003, 28:57-62 (When the
personal POS terminal receives the transaction request, it communicates with the
transaction device, asking the transaction device to validate the user (emphasis
added).)
Ludtke discloses the first electronic device (i.e., POS terminal) digitally
communicating with a host computer (i.e., TPCH) that has access to data digitally
second electronic device (i.e., transaction device) digitally communicating with the
27
host computer. (EX1002, 88, EX1003, Figs. 1-3 (each showing digital link (i.e.,
electronic distribution) between transaction device 130 and TPCH 110/215), 7:36-
56.)
digital signature image (i.e., captured fingerprint) when a users finger engages
with the member. (See supra Section IX(A)(1)(e).) Since Ludtke compares the
thus submits data (i.e., captured fingerprint) relative to identity verification (i.e.,
composed of a very thin silicon sensing pad along with the appropriate
electronics.)
28
p. Claim 9[e]: d. denying access to the user account
absent a match of the sensed digital signature image
and a reference digital signature image, the reference
digital signature image being captured during a
registration process.
29
u. Claim 17[a]: a. a host computer having access to
data that digitally links the user with the user
account;
transaction device) is wireless, carried by a user, has a sensor, and captures a users
with the electronic device (i.e., POS terminal) including by radio frequency. (See
30
x. Claim 17[d]: whereby the sensed digital signature
image is compared to a reference digital signature
image upon a request to process the commercial
transaction, the reference digital signature image
being captured during a registration process; and
31
cc. Claim 21[preamble]: 21. A system for conducting a
commercial transaction, a user of the commercial
transaction system being registered and digitally
linked with an account for payment, the system
comprising:
32
hh. Claim 21[e]: whereby identity verification is
determined by the comparison of the user digital
signature image and the reference digital signature
image, the reference digital signature image being
captured during a registration process; and
fingerprint and only provides the unique ID to the POS terminal if the comparison
33
B. Ground 3: Ludtke and Hsu Render Claims 5-8, 13-16, and 29-32
Obvious
Claims 5-8, 13-16, and 29-32 are obvious over Ludtke in view of Hsu.
1. Hsu
fingerprints, and a correlator comparing the stored reference biometric data with
the biometric data of the person seeking access and determining whether they
match. (Id., 2:5-12, 2:42-45.) The sensor, storage, and correlator can be integrated
2:18-24.)
34
As
A shown in Figs. 1A
1 and 1B
B, Hsus ssystem forr opening a door, i.e.,
providin
ng access to a secu
ure area, includes
i uuser-carriedd device 114', such as a
cellular telephon
ne, having metric sennsor fingeerprint seensor 16 that
g a biom
commun
nicates with
w receiv
ver 15 through
t work 17 and
ccommunicaation netw
commun
nication in
nterface 18 located near doorr 10 or computer 110' emboddying
another form of a "door. (IId., 4:55 5:12.) Pllacing a finnger over ssensor 16 sscans
the persson's fingeerprint and comparess it with a reference fingerprinnt image sttored
phone 14' using a fiingerprint correlator.. (Id., 5:117-21.) Iff a match,, the
in telep
5:21-27
7.)
35
a. Claim 5[preamble]: 5. A system for regulating
access to a secure area, the system comprising:
a user cannot have access to any of the data and functionality in a transaction
device. (Id., 14:33-46.) A POSA would have understood that using a fingerprint
verification is a system for regulating access, and that the data and functionality
that can only be accessed upon fingerprint verification for specified users is
access to a secure area, Hsu expressly teaches it. (Id.,117.) In particular, Hsu
secure area, whether property or data. (EX1005, 1:10-14, 2:42-53, 5:5-26, 1:59-
67.)
fingerprints for identity verification because both Ludtke and Hsu are directed to
36
commercial transactions and access to secure areas. (Id.) Such a substitution of
Ludtkes system is within the ability of a POSA and is highly likely to succeed.
(Id.)
reference digital signatures. (See supra Sections IX(A)(1)(b), (j); EX1002, 119.)
Ludtke discloses a first electronic device (i.e., POS terminal) and a second
EX1002, 120.)
To the extent Ludtke does not expressly teach a first electronic device being
disposed at a security checkpoint, Hsu discloses it. (EX1002, 121.) The 135
(EX1001, 3:34-36.) Hsu discloses a first electronic device (i.e., interface 18) that
is located at a door 10. (EX1002, 121; EX1005, 4:55 5:16.). Since door 10
provides access to the secure area, and interface 18 is located at door 10, interface
37
d. Claim 5[c]: the second electronic device being
wireless, the second electronic device being carried
by a user the first and second electronic devices being
in communication with the host computer, radio
frequency transmission being used for data transfer
between the first electronic device and the second
electronic device; and
device) having a sensor that captures a users digital signature image (i.e., captured
an access log (i.e., stores all transaction records). (EX1003, 10:19-22 (transaction
device can store transaction records).) A POSA would have understood that the
38
f. Claim 5[e]: whereby the sensed digital signature
image is compared to a reference digital signature
image upon a request to access the secure area, the
reference digital signature image being captured
during a registration process; and
Ludtke discloses comparing the sensed digital signature image (i.e., captured
comparing the sensed digital signature image (i.e., read fingerprint) to a reference
digital image (i.e., reference fingerprint) to regulate access to a secure area such as
access to the secure area if the sensed and digital signature images do not match by
not opening door 10 to allow access by user 12 and not permitting data access to
39
h. Claim 6: The system of claim 5, wherein the digital
signature image is a fingerprint image.
first electronic device (i.e., interface 18) being disposed at the security checkpoint
and the second electronic device (i.e., transaction device) being wireless and
carried by the user. (See supra Sections IX(B)(1)(c)-(d).) Ludtke also discloses
40
requesting identity verification through cooperative engagement (i.e., through
mutual communication (see, e.g., EX1001, 6:17-19)) between the first and second
digital during finger engagement. (See supra Sections IX(B)(1)(e), see also supra
would also have understood that using a signature as written data pertinent to
identity verification was well known and its use would provide predictable results.
41
o. Claim 13[d]: c. transmitting data between the first
electronic device and the second electronic device by
radio frequency transmission; and
IX(A)(1)(d).)
IX(B)(1)(h).)
IX(B)(1)(i).)
42
s. Claim 16: The method of claim 13, wherein the
reference digital signature image is disposed in a user
record, the user record being accessible by the host
computer.
IX(B)(1)(j).)
IX(B)(1)(b).)
IX(B)(1)(c).) Since door 10 provides access to the secure area, and interface 18 is
141.)
43
w. Claim 29[c]: c. a second electronic device that is
wireless, the second electronic device being carried
by the user, the second electronic device
communicating identity verification data with the
first electronic device, radio frequency transmission
being used for data transfer between the first
electronic device and the second electronic device,
the second electronic device enabling access to a
reference digital signature image; and
transaction device) being wireless, carried by the user, and communicating identity
verification data with the first electronic device using radio frequency
transmission. (See supra Section IX(A)(1)(d).) Ludtke also discloses the second
electronic device stores and thus enables access to a reference digital signature
digital signature image (i.e., captured fingerprint) during a request to access the
secure area. (See supra Section IX(B)(1)(e).) A POSA would have understood
that that, whenever a user seeks access to a secure area such as Hsus door 10, the
fingerprint pad incorporated on the transaction device carried by the user would
44
necessarily be proximate to accessing the secure area. (EX1002, 142; EX1005,
IX(B)(1)(f).)
IX(B)(1)(g).)
IX(B)(1)(h).)
IX(B)(1)(i).)
45
cc. Claim 32: The system of claim 29, wherein the
reference digital signature image is disposed in a user
record, the user record being accessible by the host
computer.
IX(B)(1)(j).)
1. Stinson
Stinson discloses a system and method for using biometric information such
cameras 125 produce customer images that are used for customer identity
verification. (Id., 5:14-22.) Check-cashing unit 100 includes check reader 130 and
is controlled by processor 300 that receives images from cameras 125 to identify
the customer. (Id., 5:50-62.) In some instances, the processor may receive
information about the customer's identity from card reader 145. (Id., 5:23-
60.) Unit 100 can communicate with server 500 at centralized services center 400.
(Id., 6:35-61.)
identify the customer. (Id., 7:46 8:14.) Identification can be based on biometric
46
information including fingerprints. (Id., 8:22-44.) If identification is confirmed
and applicable business rules are satisfied, the customer receives the appropriate
money amount. (Id., 8:50 9:18.) Otherwise, the customer receives a rejection
EX1003, 3:14-22, 18:55-56, 36:43, 57-37:4) A POSA would have understood that
check, Stinson expressly teaches it. (Id., 152.) In particular, Stinson discloses a
system for cashing a check at a check cashing apparatus or ATM using biometrics
67.)
because both Ludtke and Stinson are directed to user verification systems relying
47
on biometrics and specifically fingerprints to perform verification. (EX1002,
153.) Moreover, it has been well known to a POSA to use biometrics for user
identity verification for check cashing in Ludtkes system is within the ability of a
Ludtke discloses a first electronic device (i.e., POS terminal) being digitally
linked to the host computer (i.e., TPCH). (See supra Section IX(A)(1)(c);
EX1002, 155)
To the extent Ludtke does not expressly teach a first electronic device being
particular, Stinson discloses a first electronic device (i.e., check reader 130) that is
located at a check-cashing unit 100 and digitally linked to a host computer (i.e.,
server 500). (Id., 156; EX1006, 5:23-25, 6:35-61.) A POSA would have been
48
motivated to dispose the first electronic device at the check-cashing terminal to
Section IX(A)(1)(d).)
discloses a sensor captures a user digital signature image, the user digital signature
image being captured during a request to cash a check. (See supra Section
IX(A)(1)(n).) A POSA would have understood that that, whenever a user seeks to
cash a check such as Stinsons check-cashing unit 100, the fingerprint pad
cashing unit 100. (EX1002, 158.) In addition, Stinson discloses at least one
sensor (i.e., camera 125) disposed at the check-cashing unit 100 that captures a
49
digital signature image (i.e., a facial image). (Id.; EX1006, 8:22-39). In addition
EX1006, 8:40-44). A POSA also would have been motivated to have the sensor
proximate the check-cashing terminal because the customer would necessarily cash
discloses denying cashing the check absent matching signatures. (See supra
unless the fingerprint or other biometric images match. (EX1002, 160; EX1006,
8:22 9:27.) A POSA would understand that check cashing requires a written
POSA would have been motivated to deny cashing the check absent a match as
50
taught by Stinson to avoid fraud and ensure check cashing by authorized persons
only. (Id.)
Ludtke and Beatson address similar issues in the field of using biometric
transactions and other functions. However, while they may disclose similar
different ways. For example, while Beatson discloses a portable signature device
that captures digital signatures and receives an IC card storing information for
simpler and singular portable transaction device as a card having both wireless
51
communication and a pad for capturing a digital signature image for performing
In addition, whereas Beatson is prior art to the 135 Patent under 35 U.S.C.
102(b), Ludtke is only prior art under 35 U.S.C. 102(e) as having a prior art
U.S. filing date slightly more than six months before the earliest claimed priority
claims based upon purportedly unique claim features, which are clearly described
by each of Ludtke and Beatson, and may also attempt to swear behind Ludtke, both
1. Beatson
system.
52
As show
wn in Fig. 1, a transacction systeem 50 haviing real-tim
me signaturre processiing
capabiliities includ
des electron
nic transacction devices includinng personaal computerrs
52 and electronic
e cash registters 54 thatt are installled at the ttransactionn point. (Idd.,
8:16-21.) Electro
onic transaction devicces 52, 54 can autom
matically deebit a bankk
data pro
ocessing seerver 62. (IId., 8:22-4
40.)
Beatson
B furrther disclo
oses a signaature devicce 64 connnected to ellectronic
53
electronic IC card 66 into signature device 64, IC card 66 containing information
signature device 64 uses to verify and authenticate the customers signature. (Id.,
66 with the signature captured by signature device 64. (Id., 9:10-14.) Signature
housing to provide portability and thus enable a user to carry it. (Id., 10:9-11.)
a. Claim 1[preamble]
account for payment. (EX1002, 165.) In particular, a user registers to use the
54
system, the registration digitally linking the user with a payment account.
b. Claim 1[a]
Beatson discloses any of a POS server 62, financial institution 56, and credit
card company 60 as a host computer that has access to data that links the user with
the user account. (EX1002, 166.) In particular, Beatson discloses that financial
institution 56 maintains a user bank account via financial transaction network 58,
credit card company 60 maintains a user credit card account, and POS server 62
c. Claim 1[b]
Beatson discloses a first electronic device (i.e., transaction device 52, 54)
disposed at a point-of-sale terminal that is linked to the host computer (i.e., server
62, financial institution 56, credit card company 60). (EX1002, 167) In
server 62, financial institution 56, and credit card company 56. (EX1004, 8:15-40,
Fig. 1.)
55
HOST
T
COMPUT
TER
FIRS
ST
ELECTRRONIC
DEVIICE
registers 54 are in
nstalled at the
t point off transactioon (e.g., a rretail storee that sells
goods and/or
a services to mem he public)..).) Sincee transactioon devices 52,
mbers of th
54 are in
nstalled at the transaction pointt in a retaill store, a POSA woulld have
understo
ood that po
oint-of-salee terminalss are locateed at the trransaction ppoint, and
(EX100
02, 168.)
d. Claim
C 1[c]
Identity veerification data is defined ass data used for, orr indicativee of,
identity
y verificatio
on. (See supra
s Secttion VIII(A
A)).
Beatson
B disscloses a second
s elecctronic devvice (i.e., signature ddevice 64)) can
be portaable and th
hus carried EX1004, 88:41-52; 9:49
d by a userr. (EX10002, 170; E
56
10:11 (a rechargeable or replaceable battery can be included within housing 70
[of signature device 64] to provide power and provide unencumbered portability.
The second electronic device (i.e., signature device 64) can communicate
wirelessly by radio frequency (RF) transmission with the first electronic device
(i.e., transaction device 52, 54). (EX1002, 171; EX1004, 10:1-5 (a wireless
between signature device 64 and the electronic transaction device 52, 54.)
(emphases added).)
52, 54. (EX1002, 172; EX1004, 8:65 9:28 (based on a result of the comparison
e. Claim 1[d]
Beatson discloses a member (i.e., writing area 114) that captures a digital
signature while using the member. (EX1002, 173; EX1004, 8:41-52 (As the
57
customeer signs the receipt, the
t signatu
ure device 64 capturees an electtronic imagge of
contact between in
nternal pen
n 74 and siigning surfface 114 (ee.g., by cloosing of sw
witch
MEMBER R
CAPTURINNG
DIGITAL
L
SIGNATURRE
Beatsons
B signature device 64, i.e., the secoond electtronic devvice,
devices. Moreoveer, the 135 xpressly disscloses thaat the styluus, transponnder,
5 Patent ex
and fing
gerprint sen
nsors can be
b integrated. (EX10001, 6:43-449, Figs. 1B and 1C.)).
58
f. Claim 1[e]
Beatson discloses:
Beatson also discloses capturing the reference digital signature image during
59
customer and authentication information, and storing the signature image in the
g. Claim 1[f]
and digital signature images match; otherwise the transaction is denied. (EX1002,
h. Claim 3
stored in the second electronic device (i.e., signature device). (EX1002, 178.) In
commercial transaction. (EX1004, 9:1-10, (The store clerk (or the customer) may
couple the IC card 66 to the signature device 64 by, for example, inserting the card
into a slot provided within the signature device housing. IC card 66 in this example
contains information signature device 64 can use to verify and authenticate the
signature the customer makes on the paper receipt. (emphasis added)), 9:62-64,
60
number, device authentication keys and customer personal identification number)
i. Claim 4
template plus captured enrollment signature image and other customer identifying
and customer personal identification number) to host computer and/or to card 66.
(emphasis added)).)
j. Claim 17[preamble]
k. Claim 17[a]
l. Claim 17[b]
m. Claim 17[c]
device) is wireless, carried by a user, and captures a users digital signature image
61
(i.e., captured signature). (See supra Sections IX(A)(1)(d),(e).) The member
transmits data relative to an identity verification with the electronic device (i.e.,
array 216 as a sensor to sense and capture the digital signature. (EX1002, 183;
n. Claim 17[d]
o. Claim 17[e]
p. Claim 19
q. Claim 20
r. Claim 21[preamble]
s. Claim 21[a]
t. Claim 21[b]
v. Claim 21[d]
w. Claim 21[e]
x. Claim 21[f]
y. Claim 23
z. Claim 24
E. Ground 6: Hsu and Beatson Render Claims 5-8, 13-16, and 29-32
Obvious
Claims 5-8, 13-16, and 29-32 are obvious over Hsu in view of Beatson.
63
a. Claim 5[preamble]
b. Claim 5[a]
Hsu discloses a host computer (i.e., computer 10.1) having access to data.
(EX1002, 200; EX1005, 7:4-19 (For file access to the computer 10.1, the user
may simply need to access personal data relating to a user account in bank or
To the extent Hsu does not disclose the host computer having access to data
computer having access to a data for a plurality of reference digital signatures into
Hsus system of using biometrics for regulating access to a secure area because
both Hsu and Beatson are directed to user verification systems relying on
64
biometrics to perform verification and also to regulating access to secure areas.
A POSA would have been motivated to store the reference signatures in both the
second electronic device and the host computer as taught by Beatson (EX1004,
Such a substitution providing a host computer with access to a data for a plurality
of reference digital signatures in Hsus system is within the ability of a POSA and
c. Claim 5[b]
Hsu discloses a first electronic device (i.e., interface 18) and a second
electronic device (i.e., device 14). (EX1002, 203; EX1005, 4:55 - 5:26, Figs.
1A, 1B). Hsu also discloses that the first electronic device (i.e., interface 18) is
d. Claim 5[c]
Hsu discloses a second electronic device (i.e., device 14) can be a cellular
telephone carried by a user that communicates wirelessly with the first electronic
device (i.e., interface 18). (EX1002, 204; EX1005, 4:555:16, 5:38-52, Figs. 1A
65
device can be through radio frequency communication. (See supra Section
e. Claim 5[d]
Hsu discloses at least one sensor (i.e., sensor 16) that captures a digital
signature image (i.e., a fingerprint). (EX1002, 205; EX1005, 4:64 5:4, 5:17-26,
5:38-52.) To the extent Hsu and Beatson do not expressly disclose preserving an
access log, a POSA would understand that preserving access logs are well known
and obvious to a POSA. (EX1002, 205; see also EX1003, 10:19-22.) A POSA
would have understood that the transaction records in Ludtke, as modified by Hsu
to regulate access to secure areas, would include records of secure area accesses
when accessing secure areas, a POSA would have understood preserving an access
log is advantageous to ensuring only authorized personnel access the secure area as
the log provides evidence of who and when the area has been accessed. (Id.)
f. Claim 5[e]
addition, Hsu discloses the reference digital signature image is captured during
66
registration by storing it in storage during an enrollment process. (Ex1002, 206;
g. Claim 5[f]
Hsu discloses access to the secure area is only accepted if the sensed and
particular, unless the fingerprint images match, door 10 is not opened to allow
access by user 12, and computer 10 is not conditioned to permit data access by the
h. Claim 6
i. Claim 7
Hsu discloses the reference digital signature (i.e., fingerprint image) is stored
in the second electronic device (i.e., device 14). (EX1002, 209; EX1005, 2:43-53
(device that includes a memory for storing a reference fingerprint image of the
user).)
j. Claim 8
IX(D)(1)(i), IX(E)(b).)
67
k. Claim 13[preamble]
l. Claim 13[a]
interface 18) being disposed at the security checkpoint and the second electronic
device (i.e., device 14) being wireless and carried by the user. (See supra
m. Claim 13[b]
IX(E)(b)-(d),(j).)
n. Claim 13[c]
IX(E)(e).)
o. Claim 13[d]
IX(E)(d).)
68
p. Claim 13[e]
q. Claim 14
IX(E)(h).)
r. Claim 15
IX(E)(i).)
s. Claim 16
IX(E)(j).)
t. Claim 29[preamble]
u. Claim 29[a]
IX(E)(b).) A POSA would have understood that that, whenever a user seeks access
69
device 14 would necessarily be proximate to accessing the secure area. (EX1002,
221.)
v. Claim 29[b]
IX(E)(c),IX(B)(1)(v).)
w. Claim 29[c]
transaction device) being wireless, carried by the user, and communicating identity
verification data with the first electronic device using radio frequency
second electronic device (i.e., device 14) communicates identity verification data
(i.e., a confirmation message) to the first electronic device (i.e., interface 18).
(EX1005, 5:5-26 (If the comparison results in a match, the device 14/14' transmits
x. Claim 29[d]
user digital signature image (i.e., read fingerprint) during a request to access the
secure area. (See supra Section IX(E)(1)(e).) A POSA would have understood
that that, whenever a user seeks access to a secure area such as Hsus door 10,
70
fingerprint sensor 16 incorporated on device 14 would necessarily be proximate to
y. Claim 29[e]
IX(E)(f).)
z. Claim 29[f]
IX(E)(g).)
aa. Claim 30
IX(E)(h).)
bb. Claim 31
IX(E)(i).)
cc. Claim 32
IX(E)(j).)
F. Ground 7: Beatson and Stinson Render Claims 2, 9-12, 18, 22, and
25-28 Obvious
Claims 2, 9-12, 18, 22, and 25-28 are obvious over Beatson in view of
Stinson.
71
a. Claim 2
IX(D)(1)(a)-(g)). Although Beatson discloses the digital signature image being the
as a fingerprint) and as such there is a possibility that the customer will have an
"off day" (or the customer's signature has changed over time) so that an authentic
signature will fail the biometric test. It is highly desirable to minimize the
To the extent Beatson does not expressly disclose the digital signature image
72
information about the customer. Examples of suitable biometric information
biometrics for identity verification because both Beatson and Stinson are directed
POSA that a variety of biometrics can be used for user identity verification in
images, and signature images. (Id.) These biometrics are interchangeable, and the
system is within the ability of a POSA and is highly likely to succeed. (Id.)
b. Claim 9[preamble]
c. Claim 9[a]
Beatson discloses the first electronic device (i.e., transaction device) being
disposed at the point-of-sale terminal and the second electronic device (i.e.,
73
signature device) being wireless and carried by the user. (See supra Sections
signature device 64 and the electronic transaction device 52, 54.) (emphasis
added).)
d. Claim 9[b]
digitally communicating with a host computer (e.g., server 62) that has access to
data digitally linking a registered user to a reference digital signature image (i.e.,
communicating with the host computer. (EX1002, 237, EX1004, Fig. 1 (showing
digital link between signature device 64 and server 62 via transaction devices 52,
54.)
e. Claim 9[c]
Section IX(F)(a)), discloses a member (i.e., writing area) that enables capture of a
74
digital signature image (i.e., captured signature) of a user during engagement of a
finger of the user with the member. (See supra Sections IX(D)(1)(e),IX(F)(a);
user, the member thus submits data (i.e., captured signature) relative to identity
Beatson discloses that the signature device 64 includes a coil array 216 as a sensor
to sense and capture the digital signature. (EX1002, 238; EX1004, 11:19-39,
12:35-54.)
f. Claim 9[d]
g. Claim 9[e]
h. Claim 10
IX(F)(a).)
75
i. Claim 11
IX(D)(1)(h).)
j. Claim 12
IX(D)(1)(i).)
k. Claim 18
IX(F)(a).)
l. Claim 22
IX(F)(a).)
m. Claim 25[preamble]
246; EX1004, 8:14-52.) A POSA would have understood that cashing a check
(EX1002, 246.)
check, Stinson expressly teaches it. (Id., 247.) In particular, Stinson discloses a
76
system for cashing a check at a check cashing apparatus or ATM using biometrics
67.)
Beatson and Stinson are directed to user verification systems relying on biometrics
Such a substitution of using biometrics for identity verification for check cashing
in Beatsons system is within the ability of a POSA and is highly likely to succeed.
(Id.)
n. Claim 25[a]
o. Claim 25[b]
To the extent Beatson does not expressly teach a first electronic device being
particular, Stinson discloses a first electronic device (i.e., check reader 130) that is
77
(i.e., server 500). (Id., 250; EX1006, 5:23-25, 6:35-61.) A POSA would have
been motivated to dispose the first electronic device at the check-cashing terminal
p. Claim 25[c]
q. Claim 25[d]
discloses a sensor captures a user digital signature image, the user digital signature
image being captured during a request to cash a check. (See supra Sections
user seeks to cash a check such as Stinsons check-cashing unit 100, the fingerprint
one sensor (i.e., camera 125) disposed at check-cashing unit 100 that captures a
digital signature image (i.e., a facial image). (Id.; EX1006, 8:22-39). In addition
terminal 100 to detect the customers fingerprint. (EX1002, 252; EX1006, 8:40-
44). A POSA also would have been motivated to have the sensor proximate the
78
check-cashing terminal because the customer would necessarily cash the check at
r. Claim 25[e]
s. Claim 25[f]
Stinson discloses cashing the check only if the sensed and digital signature
particular, unless the fingerprint or other biometric images match, the customers
t. Claim 26
IX(F)(a).)
u. Claim 27
IX(D)(1)(h).)
v. Claim 28
IX(D)(1)(i).)
X. CONCLUSION
OBLON LLP
80
CERTIFICATE OF WORD COUNT
13,909 words, including the words added in annotating the figures, which is under
81
CERTIFICATE OF SERVICE
Petition for Inter Partes Review and supporting materials at the correspondence
address of record for the 135 Patent as well as counsel of record in the district
court litigations:
82