Patent 8152059

Obviousness

Combinations of prior art that suggest the claimed invention would have been obvious under 35 U.S.C. § 103.

Active provider: Google · gemini-2.5-pro

Obviousness

Combinations of prior art that suggest the claimed invention would have been obvious under 35 U.S.C. § 103.

✓ Generated

Based on the provided prior art analysis, the following is an analysis of the obviousness of the independent claims of US Patent 8,152,059 ("the '059 patent") under 35 U.S.C. § 103.

This analysis is from the perspective of a Person Having Ordinary Skill in the Art (PHOSITA) prior to the patent's priority date of October 26, 2004. Under § 103, a patent claim is obvious if the differences between the claimed invention and the prior art are such that the subject matter as a whole would have been obvious at the time the invention was made to a PHOSITA.

Obviousness of Independent Claim 1

Claim 1: A secure commercial transaction system comprising a transactional device with a microprocessor, memory, and a transmitter. The device has two operational modes: a first "normal" mode and a second "panic" mode, activated by distinct first and second user signals, respectively. The second mode initiates an automated transmission from the device's transmitter.

Conclusion: Claim 1 would have been obvious over the combination of U.S. Patent 5,731,575 (Zingher '575) and U.S. Patent 4,908,608 (Reinke '608).

Analysis:

  1. Base Reference (Zingher '575): The Zingher '575 patent teaches the core concept of the claim: a system with two distinct user inputs for activating different operational modes at a transaction terminal.

    • The "normal PIN" in Zingher '575 corresponds to the "first operational signal" of claim 1, which activates a normal transaction (the "first operational mode").
    • The "duress code" in Zingher '575 corresponds to the "second operational signal," which activates a duress mode (the "second operation mode") that initiates a transmission (a silent alarm to police).

    The primary element missing from Zingher '575 is the limitation that the transactional device itself contains the transmitter and sends the transmission. In Zingher '575, the transmission is initiated by the transaction terminal (e.g., the ATM).

  2. Secondary Reference (Reinke '608): The Reinke '608 patent, titled "Alarmcard," explicitly discloses a credit-card-sized device containing its own power source and a transmitter for the purpose of sending an alarm signal to a receiver.

  3. Motivation to Combine: A PHOSITA starting with the duress PIN system taught by Zingher '575 would have recognized a significant limitation: the security alert is tied to the physical location of the ATM. A common and foreseeable risk in such criminal encounters is the abduction of the victim after the transaction is complete. In this scenario, an alarm triggered only at the ATM would be of limited use in ensuring the victim's ongoing safety.

    A PHOSITA would have been motivated to find a way to make the alarm mobile and to track the victim's location after they leave the terminal. The "Alarmcard" taught by Reinke '608 provides a direct and obvious solution: incorporate a transmitter directly into the transactional device. Combining the duress trigger mechanism from Zingher '575 with the card-based transmitter from Reinke '608 would be a predictable and logical step to overcome the limitations of a stationary alarm system. This combination directly results in a transactional device with a duress signal that activates an on-board transmitter, as claimed in claim 1.

Obviousness of Independent Claim 11

Claim 11: The system of claim 1, wherein the transactional device is a card with "no visible data."

Conclusion: Claim 11 would have been obvious over the combination of Zingher '575, Reinke '608, and U.S. Patent 6,068,184 (Barnett '184).

Analysis:

  1. Base Combination (Zingher '575 and Reinke '608): As established above, this combination renders the system of claim 1 obvious. This provides the starting point: a duress-enabled card that contains its own transmitter.

  2. Secondary Reference (Barnett '184): The Barnett '184 patent addresses a different, but related, security problem: the theft of account information from the physical surface of a lost or stolen card. Barnett '184 explicitly teaches a security card where the account number is not printed on the exterior but is stored electronically. This is the core concept of a card with "no visible data."

  3. Motivation to Combine: A PHOSITA tasked with developing a "secure commercial transaction system" would consider a wide range of threats beyond physical duress. A primary threat in 2004 was identity and account theft from information physically present on the card. Barnett '184 provides an established solution to this problem. A PHOSITA would have been motivated to create a single, comprehensively secure card that protects against both physical duress (via the Zingher '575 mechanism) and data theft (via the Barnett '184 mechanism). Applying the "no visible data" security feature from Barnett '184 to the duress-enabled card of the base combination is a simple aggregation of known security techniques to solve known problems, and would have been an obvious design choice to enhance overall security.

Obviousness of Independent Claim 22

Claim 22: The system of claim 11, wherein in the normal mode, transaction data is (a) stored in the device's memory, (b) is retrievable, (c) is also transmitted via email, and (d) a comparative assessment of the two data sets may occur.

Conclusion: Claim 22 would have been obvious over the combination of Zingher '575, Reinke '608, Barnett '184, U.S. Patent 5,590,038 (Pitroda '038), and knowledge of the conventional use of email for transaction confirmations.

Analysis:

  1. Base Combination (Zingher '575, Reinke '608, Barnett '184): As established for claim 11, this combination provides a duress-enabled, transmitting security card with no visible data.

  2. Secondary Reference (Pitroda '038): The Pitroda '038 patent teaches a transaction card that stores electronic receipts in on-board memory, which can later be downloaded to a personal computer. This directly teaches elements (a) and (b) of claim 22—that transaction data is stored on the device and is retrievable.

  3. Final Element and Motivation to Combine: The final element of claim 22 is the parallel transmission of transaction data via email from the point of sale, allowing for a later comparison with the data stored on the card. By 2004, the use of email to send immediate transaction confirmations and receipts was a widespread and conventional practice, particularly in e-commerce, but also available at sophisticated point-of-sale terminals.

    A PHOSITA, starting with the on-card receipt storage system from Pitroda '038, would have recognized the benefit of adding a real-time notification layer for enhanced security and record-keeping. While on-card storage is useful for later accounting, it does not provide immediate notice of a transaction. Combining Pitroda's on-card storage with the conventional practice of emailing a receipt from the terminal would be an obvious way to create a more robust, dual-record system. The motivation for the "comparative assessment" is inherent and implicit in the creation of two separate records of the same event; the purpose of a duplicate record is to allow for cross-checking to detect fraud or error. Therefore, adding the well-known feature of an email receipt to the on-card storage system of Pitroda '038, and applying this combined record-keeping system to the secure card of the base combination, would have been obvious to a PHOSITA seeking to build a feature-rich and secure transaction system.

Generated 5/6/2026, 1:32:08 PM