throbber

`
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`CANON U.S.A., INC.
`Petitioner,
`
`vs.
`
`CELLSPIN SOFT, INC.,
`Patent Owner
`
`CASE: PR2019-00127
`Patent No. 9,258,698
`
`PATENT OWNER’S SUR-REPLY TO PETITIONER’S REPLY
`
`

`

`
`
`TABLE OF CONTENTS
`TABLE OF AUTHORITIES .............................................................................................. ii
`EXHIBIT LIST ................................................................................................................... iii
` I.
`INTRODUCTION .................................................................................................. 1
`II.
`CELLSPIN’S CLAIM CONSTRUCTIONS ARE PROPER ................................. 3
`A. Cellspin’s Construction of “Paired Wireless Connection” is Correct .............. 3
`B. Canon’s New Construction of “Paired Wireless Connection” is Vague
`and Incorrect ..................................................................................................... 4
`C. Cellspin’s Construction of “Cryptographically Authenticating” is
`Correct............................................................................................................... 8
`D. Cellspin’s Construction of “Graphical User Interface” (i.e., “GUI”) is
`Correct............................................................................................................... 9
`E. Cellspin’s Construction of “Along With” is Correct. ....................................... 9
`NEITHER HIROISHI NOR HOLLSTROM DISCLOSES “PAIRED
`WIRELESS CONNECTION,” ESPECIALLY ANY PERFORMING
`THE REQUIRED ORDERED STEPS .................................................................. 9
`A. Canon’s mistaken assertion that Hiroishi and Hollstrom disclose a
`paired wireless connection erroneously relies upon their mere mention
`of “Bluetooth.” However, pairing (and cryptographic authentication as
`well) is optional in for Bluetooth. ..................................................................... 10
`NEITHER HIROISHI NOR HOLLSTROM MEET CANON’S NEW
`“ASSOCIATION” DEFINITION OF PAIRING ................................................... 10
`CANON’S NEW OBVIOUSNESS THEORY FOR PAIRED WIRELESS
`CONNECTION LACKS MERIT ........................................................................... 11
`A POSITA WOULD NOT HAVE BEEN MOTIVATED TO USE
`CRYPTOGRAPHIC AUTHENTICATION ........................................................... 15
`A. Canon’s obvious arguments are unpersuasively inconsistent .......................... 16
`VII. CELLSPIN’S ARGUMENTS CONCERNING TAKAHASHI’S FILE
`NAME NOT BEING SENT “ALONG WITH” THE IMAGE FILE ARE
`MERITORIOUS ..................................................................................................... 16
`VIII. HIROISHI TEACHES TEXTUAL, NON-GRAPHICAL USER
`INTERFACES ........................................................................................................ 17
`IX. CLAIMS 5 AND 8 AND THEIR DEPENDENT CLAIMS REQUIRE
`THE SAME APPLICATION TO PERFORM THE REQUIRED STEPS ............. 18
`
`III.
`
`IV.
`
`V.
`
`VI.
`
`
`
`i 
`
`

`

`
`
`X.
`
`A POSITA WOULD NOT HAVE BEEN MOTIVATED TO COMBINE
`HIROISHI WITH ANDO OR NOZAKI ................................................................ 21
`XI. THESE PROCEEDINGS ARE UNCONSTITUTIONAL ..................................... 21
`XII. CONCLUSION ....................................................................................................... 22
`CERTIFICATE OF COMPLIANCE WITH TYPE-VOLUME LIMITATION ................ 23
`CERTIFICATE OF SERVICE ........................................................................................... 24
`
`
`
`ii 
`
`

`

`
`
`
`
`
`
`TABLE OF AUTHORITIES
`O2 Micro Int’l v. Beyond Innovation Tech., 521 F.3d 1351 (Fed. Cir. 2008) ................... 1,9
`Baldwin Graphic Sys. v. Siebert, 512 F.3d 1338, 1342 (Fed. Cir.2008) ............................ 20
`01 Communique Lab. v. LogMeIn, 687 F.3d 1292, 1297 (Fed. Cir.2012) ......................... 20
`Dippin' Dots v. Mosey, 476 F.3d 1337 (Fed. Cir. 2007) ....................................................20
`Power Mosfet Tech. v. Siemens, 378 F.3D 1396 (Fed. Cir. 2004) .................................... 20
`McClurg v. Kingsland, 42 U.S. (1 How.) 202 (1843) ....................................................... 21
`James v. Campbell, 104 U.S. 356 (1881).......................................................................... 21
`Usery v. Turner Elkhorn Minin, 428 U.S. 1 (1976) ...........................................................21
`Edmond v. U.S, 520 U.S. 651 (1997) .................................................................................26
`Free Enterprise Fund v. Public Company Accounting Oversight
`Board, 561 U.S. 477 (2010) .............................................................................................. 21
`
`
`iii 
`
`

`

`
`
`
`
`Ex. No.
`2001
`2002
`2003
`2004
`
`2005
`2006
`2007
`2008
`
`2009
`2010
`2011
`
`2012
`
`2013
`
`2014
`
`2015
`
`2016
`
`2017
`2018
`2019
`
`2020
`
`2021
`2022
`
`EXHIBIT LIST
`
`
`Title of Document
`AIRcable User Manual
`U.S. Patent No. 9.398,891
`Silicon Labs UG103.10 RF4CA Fundamentals
`IEEE Part 15.4 Low-Rate Wireless Personal Area
`Networks (LR-WPANs)
`Glossary of Key Information Security Terms by NIST
`-- Skipped --
`-- Skipped --
`Wireless Communications & Networking, Stallings,
`2nd
`Declaration of Michael Foley, Ph.D.
`CV of Michael Foley, Ph.D.
`Definition of “encryption” from the Techopedia
`dictionary from
`https://www.techopedia.com/definition/5507/
`encryption
`Definition of “cryptographic” from Academic Press
`Dictionary of Science And Technology 556 (1992)
`(second edition)
`Excerpt from Bruce Schneier, Applied Cryptography:
`Protocols, Algorithms and Source Code in C, 2nd
`Edition, 1996, pp. 1-2.
`Excerpt from W. Stallings, "Cryptography And
`Network Security", 2nd, Edition, Chapter 13, IP
`Security, Jun. 8, 1998, pp. 399-440.
`Excerpt from CNSSI No. 4009, which is a Committee
`on National Security Systems Glossary
`Excerpt from NISTIR 7298, Revision 2, entitled
`“Glossary of Key Information Security Terms,” which
`was published by the National Institute of Standards
`and Technology
`Security Analysis of Zigbee
`Bluetooth v2.1 + EDR Core Specification
`Definition of “authentication” from the Techopedia
`dictionary from
`https://www.techopedia.com/definition/342/
`Authentication
`Definition of “graphical user interface” from the
`Techopedia dictionary from
`https://www.techopedia.com/
`definition/5435/graphical-user-interface-gui
`U.S. Patent Application No. No. 11/901,802
`Definition of “along with” from the Merriam-Webster
`dictionary: https://www.merriam-
`iv 
`
`

`

`
`
`
`
`
`
`
`
`Ex. No.
`
`2023
`
`2024
`2025
`2026
`2027
`
`2028
`
`2029
`2030
`2031
`2032
`2033
`
`Title of Document
`webster.com/dictionary/along%20with
`Bluetooth Basic Imaging Profile, Interoperability
`Specification, dated July 30, 2003
`Excerpts from Madisetti Deposition
`Supplemental Declaration of Michael Foley, Ph.D.
`Sur-Reply Declaration of Michael Foley, Ph.D.
`Print from Canon website at
`https://cpn.canoneurope.com/content/product/
`canon_software/ inside_eos_utility_3_0.do
`Print from Canon website at
`https://www.p4pictures.com/2014/08/wifi-pairing-eos-
`camera-utility-3/
`US20040059941 to Hardman
`Prosecution history for the ‘698 patent
`Bluetooth File Transfer Protocol, Rev. 1.3.1
`ZigBee RF4CE Specification, Version 1.01
`Wi-Fi Peer-to-Peer (P2P) Technical Specification,
`Version 1.7
`
`v 
`
`

`

`
`
`
`
`I.
`
`INTRODUCTION
`
`Canon’s Reply brazenly attempts to assert improper new theories, evidence and other
`
`matters, especially its new obviousness theory for “paired wireless connection.” This Sur-Reply is
`
`subject to, and without waiving, Cellspin’s objections at Doc 28.
`
`Cellspin’s definition of “paired wireless connection” covers all forms of wireless pairing.
`
`Canon vaguely contends that Cellspin has “narrowed” and “rewritten…terms” without stating
`
`what was narrowed or rewritten. Canon improperly seeks to rely upon a vague, unstated and
`
`unreasonably overbroad notion of “plain meaning.” Especially in view of the clear dispute over
`
`BRI claim scope, failing to properly construe this and the other disputed terms would be error. See
`
`O2 Micro Int’l v. Beyond Innovation Tech., 521 F.3d 1351 (Fed. Cir. 2008).
`
`Canon erroneously contends that Cellspin “cherry picked…optional” features from the
`
`Bluetooth specification. Although pairing is optional in the Bluetooth specification. Ex. 2026
`
`(Foley Declaration) ¶11, 15, 22-23, its BRI requirements are not optional for pairing to occur.
`
`Contrary to Canon’s misstatement, Cellspin’s construction applies to all wireless paired
`
`communications, including Bluetooth, ZigBee and Wi-Fi Direct. Ex. 2026, ¶¶12, 31-37, 50.
`
`Fundamentally, Canon fails to cite prior disclosure of a device in Hiroishi or Hollstrom
`
`that has performed any claimed method or a device that would be capable of the claimed
`
`functions. To the extent that Canon assumes that all “Bluetooth” devices are capable of
`
`performing every function described in the Bluetooth specification, that is incorrect. . Ex. 2026,
`
`¶15-18. There are, in fact, Bluetooth compliant devices that lack the capability to pair or
`
`cryptographically authenticate. Id.
`
`Canon’s new improper Reply theory for “paired” is obviousness. Aside from being
`
`untimely and improper, Canon’s new theory is meritless. Ex. 2026, ¶38-41. If a POSITA
`
`required pairing of a cellular phone and digital camera described in the ‘698 patent in late 2007,
`1
`
`
`
`

`

`
`
`
`
`she would surely look at v2.1+EDR Bluetooth Core Specification Secure Simple Pairing,
`
`Security Mode 4, the default mode (unpaired, encrypted, unauthenticated and unauthorized),
`
`and the Basic Image Profile for image pull (unpaired and unauthenticated) as the methods to
`
`implement. Ex. 2026, ¶21. The Nevro decision relied upon by Canon involved something being
`
`obvious because it was a universal practice and was necessary for implantation of the system in
`
`question. None of that is applicable here. Ex. 2026, ¶19-21.
`
`Canon relies on older Security Mode 3, which was excluded from the v2.1+EDR, and
`
`which had earned a bad reputation in the industry as being too difficult for end users to pair. Ex.
`
`2026, ¶21, 92, 103. Moreover, Canon has no evidence that Hiroishi or Hollstrom were capable
`
`of Security Mode 3 or anything beyond general references to “Bluetooth.”
`
`Version 2.1+EDR and prior versions of the Bluetooth Core Specification list many
`
`optional activities including pairing and authentication Ex. 2026, ¶¶11, 15, 22-23, 93. The mere
`
`mention of a Bluetooth connection in Hiroishi and Hollstrom does not establish that the
`
`connections described in those references are paired or authenticated, or that those devices were
`
`capable of performing those optional activities. Ex. 2026, ¶104.
`
`Canon’s Petition and Reply highlight that at least these key points which are not shown
`
`or rendered obvious any of the Canon asserted prior art combinations:
`
`• Paired wireless connection between a digital camera and a mobile device;
`
`• Cryptographic authentication of the mobile device by the camera;
`
`• Using HTTP to upload received media file along with user information;
`
`• GUI’s in general and specifically not for image deletion on the wirelessly connected
`
`digital camera; and
`
`• For claims 5 and 8, a single mobile application performing all the required functions
`
`(e.g., request, store, HTTP media upload, delete using GUI).
`
`2
`
`

`

`
`
`II.
`
`CELLSPIN’S CLAIM CONSTRUCTIONS ARE PROPER
`
`A.
`
`Cellspin’s Construction of “Paired Wireless Connection” is Correct
`
`Canon’s Reply takes issue with two aspects of Cellspin’s construction -- whether a “paired
`
`connection” must be capable of providing encrypted data exchange, and whether a paired
`
`connection must be capable of being disconnected and reconnected without having to repeat
`
`pairing. Contrary to Canon’s misstatement, Cellspin’s construction states that a paired connection
`
`provides for encrypted data exchange, not that it requires it. Ex. 2026, ¶30. Indeed, a paired
`
`connection may be encrypted or unencrypted and even change from encrypted to unencrypted
`
`during a connection. Id. Canon’s implication that providing for encrypted data equates to
`
`requiring it is incorrect. Id.
`
`The concept of a paired connection, as established by the Bluetooth SIG, became known
`
`and adopted by other industry organizations creating wireless technology for device connections,
`
`including WiFi Alliance and Zigbee Forum. Id., ¶31. For example, when WiFi Alliance created
`
`WiFi Direct, it adopted WiFi Protected Setup (WPS) and WiFi Protected Access (WPA) for
`
`pairing. Id. WPS provides an authentication key distribution method enabling devices to pair a
`
`WiFi Direct connection. Ex.2033, p.13; Ex. 2026, ¶31. WiFi Protected Access (WPA) provides for
`
`pairing using pre-shared encryption keys. Ex. 2026, ¶31
`
`On Canon’s own website, where Canon is describing connecting a digital camera using
`
`Canon’s own EOS Utility software, Canon states that paired Wi-Fi Devices can communicate "at
`
`any time in the future” and that Wi-Fi pairing information is “stored.” Ex.2027, p. 4; Ex.2028, p.
`
`1; Ex. 2026, ¶32. Pairing information is stored to be used again to avoid having to later re-pair,
`
`which creates a better user experience. Ex. 2026, ¶32. This is fundamental to pairing. Id.
`
`
`
`3
`
`

`

`
`
`Similarly, Zigbee also adopted the concept of pairing as defined by Bluetooth SIG, which
`
`involves a discovery and pairing process. Ex. 2026, ¶¶33-37; Ex.2003, p. 6 (“store information
`
`about the other node…in its pairing table.”)
`
`B. Canon’s New Construction of “Paired Wireless Connection” is Vague and
`Incorrect
`
`
`In response to Canon’s original unreasonably broad construction, Cellspin showed that
`
`wireless technologies, including Bluetooth and WiFi allow for “two-way communication” without
`
`pairing. Ex. 2026, ¶38. Canon’s Reply asserts that pairing is “something that…encompasses an
`
`association between two devices that allows for two-way communication over a wireless
`
`connection.” Canon provides no meaningful or substantial explanation for this shift, why its
`
`original construction was incorrect, or why its new one is BRI. Furthermore, the words
`
`“association” or “associated” do not appear in Hiroishi and Hollstrom. Ex. 1005; Ex. 1013.
`
`A POSITA would look to wireless specifications for guidance regarding as to what
`
`“association” refers. Ex. 2026, ¶40. Specifically, Bluetooth v2.1+EDR “Secure Simple Pairing
`
`uses four association models referred to as Numeric Comparison, Just Works, Out Of Band,
`
`and Passkey Entry,” Ex. 2006, p.133. Figure 5.1 shows how these four association models fit into
`
`the pairing process:
`
`
`
`4
`
`

`

`
`
`
`
`Ex. 2006, p. 35; Ex. 2026, ¶¶40.
`
`Although Canon is unclear what is meant by “association” besides somehow allowing two-
`
`way communications, it is clear that the association models are simply one component of creating
`
`a paired connection. Ex.2006, p.133; Ex. 2026, ¶41. Just using the association model doesn’t
`
`constitute pairing. Id. The entire pairing process must be completed. Id.
`
`Canon asserts that Dr. Foley agreed that pairing was “fluid.” To the contrary, he only agreed
`
`that pairing is performed, i.e., the pairing process, has changed over time. Neither the
`
`fundamental notion of what constitutes pairing or the BRI of pairing or paired connection
`
`have changed. Ex. 2026, ¶42.
`
`Cellspin has never imposed a permanency requirement. Id., ¶44. Paired devices can
`
`reconnect without having to repair. Id. If devices became unpaired, then they have to repair, and
`
`
`
`5
`
`

`

`
`
`then they can reconnect using saved information without repairing. Id. Dr. Foley’s testimony at
`
`Ex. 1041, 98:14-99:17 merely acknowledges the foregoing. Ex. 2026, ¶¶44-46.
`
`Canon contends that Cellspin somehow narrowed or redefined the “plain meaning” of
`
`“paired wireless connection.” However, Canon is incorrect, id., ¶49, and Canon never states any
`
`initial definition or plain meaning for a baseline.
`
`Canon contends that Cellspin’s construction lacks specification support. This is incorrect.
`
`Id., ¶50. A POSITA reading the specification would already understand that pairing provides for
`
`encrypted data exchange and that a touchstone of paired connections is that they are “disconnected
`
`and reconnected without having to repeat pairing or authentication.” Id.
`
`Canon contends that Cellspin’s construction somehow “contradicts” unspecified intrinsic
`
`evidence. To the contrary, nothing is being contradicted. Id. Cellspin’s expert evidence, especially
`
`here when consistent with the intrinsic evidence and founded on well-grounded documentation, is
`
`relevant to determining meaning of a term in the relevant art during the relevant time period. Teva
`
`Pharm. USA v. Sandoz, 135 S. Ct. 831, 841 (2015); Phillips v. AWH, 415 F.3d 1303, 1318 (Fed.
`
`Cir. 2005).
`
`Canon’s invalid criticisms should not distract from the fact that Cellspin’s BRI construction
`
`is correct and consistent with how paired connections were defined in the art in late 2007 while
`
`creating the Bluetooth specifications as well as other technologies, such as Zigbee and Wi-Fi
`
`Direct, which have implemented pairing. Ex. 2026, ¶12, 31-37, 50.
`
`Canon notes that Bluetooth describes three encryption modes, one of which does not
`
`encrypt data exchanged between devices. However, Cellspin’s construction states encryption is
`
`provided for, but not required. All the encryption modes defined in the Bluetooth specification fall
`
`within the Cellspin construction. Id., ¶¶54-56.
`
`
`
`6
`
`

`

`
`
`Canon notes that Bluetooth supports ad hoc arrangements that do not involve pairing. Here,
`
`Canon is noting that some Bluetooth connections are unpaired. Ex. 2026, ¶54. This acknowledges
`
`that pairing is optional. Id. (See II.A below). For these ad hoc arrangements, a temporary link key
`
`is used for “current session”. Ex. 1018, p.150; Ex. 2026, ¶54. This confirms that two devices can
`
`securely exchange information during session without pairing. Ex. 2026, ¶54. However, when
`
`pairing is desired, a “semi-permanent link key…is stored in non-volatile memory and may be used
`
`after the current session is terminated.” Ex.1018, p.150; Ex. 2026, ¶54. This corresponds with
`
`Cellspin’s construction of paired connection. Ex. 2026, ¶54.
`
`Canon also cites Ex. 1036 at 8-10 and Ex. 1040 at 43:4-23, but these have to do with the
`
`popularity of Bluetooth in general, which is not pertinent. Id., ¶55.
`
`Contrary to Canon’s suggestion, Cellspin’s construction for “paired wireless connection”
`
`covers not only all forms of Bluetooth pairing, but as shown above also encompasses other
`
`technologies such a WiFi and Zigbee. Ex. 2026, ¶12, 31-37, 50. Canon misleadingly cites the
`
`Foley deposition at “Ex. 1040 at 17:19-18:7.” Yet this discussion was not even about pairing. Id.;
`
`Ex. 2026, ¶56.
`
`Canon’s only support for its vague, shifting construction is the deeply flawed and highly
`
`conclusory assertions of Dr. Madisetti. Findings of fact must be supported by substantial evidence,
`
`and conclusory expert testimony such as Dr. Madisetti’s, without supporting evidence, is not
`
`substantial evidence. Cisco Systems v. TQ Delta, No. 18-1806 (Fed. Cir. 11/22/19).
`
`Canon cites testimony from Dr. Madisetti’s deposition, wherein, he declined to offer a
`
`construction for “paired,” and instead just repeated conclusory talking points. Ex. 1042,
`
`16:10–20:03 & 24:4-17; Ex. 2026, ¶59.
`
`.
`
`
`
`7
`
`

`

`
`
`Canon also cites Madisetti’s new declaration, which is also vague, conclusory and
`
`unsupported. Ex.1043, ¶¶6-7. As noted above, contrary to Canon’s suggestion, implementing a
`
`given “association model” does not equate with pairing. Id., ¶41.
`
`Canon quotes an unrelated application at Ex. 1045 which used the words pairing and
`
`association interchangeably. However, the fuller context of this quote (i.e., the following sentence)
`
`states that, “In this regard, ‘associated’ or ‘paired’ devices…form[] a trusted pair…. Ex.1045, p.10.
`
`Exhibit 1045 uses the word “association” to refer to key-based pairing that accords with Cellspin’s
`
`construction. Ex. 2026, ¶65-68. This is not evidence of any outside agreement with Canon’s
`
`position. Id.
`
`Canon points out that the ‘698 Patent describes a passkey-based mechanism that is optional
`
`in 2.1+EDR. However, Cellspin’s construction is broader than passkey-based mechanisms, and it
`
`incorporates and is consistent with all the association models defined in the Bluetooth specification
`
`as well as the association models in WiFi Direct, Zigbee, and Wireless USB. Id., ¶69.
`
`Canon’s asserts that Bluetooth supports “temporary connections and ad hoc file sharing,
`
`which may use pairing…without establishing a permanent connection.” Reply, p. 13. Although
`
`Bluetooth supports temporary connections and ad hoc file sharing, the rest of Canon’s assertion is
`
`misguided. Ex. 2026, ¶70. This use case is defined in the File Transfer Profile (FTP). Ex. 2031, pp.
`
`13-14; Ex. 2026, ¶70. FTP may be performed over a paired or unpaired link. Ex. 2031, pp. 13-14;
`
`Ex. 2026, ¶70. Further, as noted above, Cellspin’s construction does not require permanency in
`
`pairing.
`
`C. Cellspin’s Construction of “Cryptographically Authenticating” is Correct
`
`Canon notes that the ‘698 Patent does not limit the type of security used for cryptographic
`
`authentication. However, this does not support an overbroad definition of cryptographically to
`
`
`
`8
`
`

`

`
`
`include “security” that does not involve encryption. Rather, the ‘698 patent specification does not
`
`limit the types of encryption used for “cryptographically authenticating”.
`
`Canon complains that ““verified legitimate” is not specifically referenced in the ‘698
`
`specification. What the specification refers to is “cryptographic authentication.” As previously
`
`noted, to “authenticate” is to verify as legitimate. Ex. 2009, ¶¶61-62; Ex.2010; Ex. 1013.
`
`D. Cellspin’s Construction of “Graphical User Interface” (i.e., “GUI”) is Correct
`
`Contrary to Canon’s assertion, nothing in Cellspin’s GUI construction limits the use of
`
`other graphical elements such as input fields. Ex. 2026, ¶75. Such elements are “related user
`
`controls” which are part of the construction. Id. Cellspin’s construction is correct. Id.
`
`Canon erroneously equates entering characters into a box on a textual display as a
`
`graphical user interface (GUI). Ex. 2026, ¶76. Using a keyboard to enter text into such a GUI is
`
`within the purview of a GUI. Ex. 2026, ¶76, 118-119. However, the display needs to be graphical
`
`and not text based. Text-based input controls do not make a textual display graphics-based and as
`
`such, not a GUI. Ex. 2026, ¶119. Character-based entry had been available on textual user
`
`interfaces, for example Lotus 123 on DOS, for decades on personal computers before the ‘698
`
`patent priority date. Ex. 2026, ¶76.
`
`E. Cellspin’s Construction of “Along With” is Correct.
`
`The proper BRI construction for “along with” is: “in addition to.” Id., ¶77. This
`
`construction was taken directly from the definition of “along with” from the Merriam-Webster
`
`dictionary. Canon claims this is a “plain English term,” but declines to provide any explanation for
`
`the scope of such plain English. Cellspin’s BRI construction reflects plain English and properly
`
`resolves the parties dispute. Id. See O2 Micro, supra.
`
`
`
`
`
`
`
`9
`
`

`

`
`
`II.
`
`NEITHER HIROISHI NOR HOLLSTROM DISCLOSES “PAIRED WIRELESS
`CONNECTION,” ESPECIALLY ANY PERFORMING THE REQUIRED
`ORDERED STEPS
`
`Per below, Hiroishi and Hollstrom do not disclose paired connections under either
`
`Cellspin’s construction or Canon’s new construction. Ex. 2026, ¶78. Further, Canon has no support
`
`for Hiroishi and Hollstrom disclosing required steps in the required order, e.g., “acquiring new-
`
`media, wherein the new-media is acquired after establishing the short-range paired wireless
`
`connection between the digital camera device and the cellular phone.” Id. See ‘698, claim 1.
`
`A. Canon’s mistaken assertion that Hiroishi and Hollstrom disclose a paired wireless
`connection erroneously relies upon their mere mention of “Bluetooth.” However,
`pairing (and cryptographic authentication as well) is optional in for Bluetooth.
`
`None of Canon’s string-cited references disclose any fact beyond Hiroishi and Hollstrom
`
`
`
`mentioning Bluetooth in general. Ex. 2026, ¶79. Canon’s conclusions are premised upon an
`
`unreasonable and overly broad construction of “paired wireless connection.” Id.
`
`Canon appears to labor under a mistaken belief that every Bluetooth device is necessarily
`
`configured to establish a paired Bluetooth connection and/or to cryptographically authenticate the
`
`identity of other Bluetooth devices. To the contrary, even if the devices taught by Hiroishi and
`
`Hollstrom had been disclosed as being Bluetooth compliant, which they were not, there is no
`
`requirement that Bluetooth compliant devices be capable of pairing with other devices, that they be
`
`capable of cryptographic authentication, or that they be capable of many other features disclosed in
`
`the applicable Bluetooth specification. Ex. 2026, ¶81. For example, Bluetooth v2.1+EDR has error
`
`codes for when one device attempts to pair with another that does not allow pairing: (1) Pairing Not
`
`Allowed (0X18); AND (2) Simple Pairing Not Supported (0X37). Ex. 2026, ¶¶17, 81.
`
`There are Bluetooth compliant devices, for example ones that broadcast in stores, that lack
`
`the capability to pair or cryptographically authenticate their connections. Ex. 2026, ¶82.
`
`
`
`10
`
`

`

`
`
`Further, the discussion of the BIP illustrates that pairing was not recommended, much less
`
`required, for requesting images from a camera. Id.
`
`IV. NEITHER HIROISHI NOR HOLLSTROM MEET CANON’S NEW
`“ASSOCIATION” DEFINITION OF PAIRING
`
`
`
`Neither Hiroishi or Hollstrom, mention the words “association” or “associate” in their text.
`
`Although Canon is vague about what such an “association” is, Dr. Madisetti came close during his
`
`deposition at wherein he states that for pairing “there has to be a mechanism that enables two-way
`
`communications between two devices…that are used to establish a mutual agreement for these two
`
`devices to communicate.” Ex. 1042, 24:4-17; Ex. 2026, ¶83. To the extent this asserted
`
`“association” limitation means anything, it must mean Madisetti’s “mutual agreement.” Ex. 2026,
`
`¶83. Absent such a mutual agreement, Canon’s BRI construction for “paired wireless connection”
`
`simply reverts to its original erroneous position for all two-way communication being paired. Id.
`
`Assuming arguendo that only a “mutual agreement” is required for the BRI of pairing,
`
`neither Hiroishi nor Hollstrom discloses one. Id., ¶84. Hiroishi and Hollstrom reference Bluetooth,
`
`but Bluetooth does not require a “mutual agreement” to communicate. Id.
`
`V.
`
`
`
`CANON’S NEW OBVIOUSNESS THEORY FOR PAIRED WIRELESS
`CONNECTION LACKS MERIT
`
`Canon’s improper1 new obviousness theory is essentially that since Hiroishi and Hollstrom
`
`both disclose use of Bluetooth, pairing would be obvious. However, the fact that Hiroishi and
`
`Hollstrom mention Bluetooth does not address a reason or motivation for employing this optional
`
`Bluetooth functionality. Id., ¶85. It would not have been obvious to pair either Hiroishi’s or
`
`Hollstrom’s Bluetooth communications; rather, a POSITA would have been motivated to consult
`
`and design in accordance with the Bluetooth standard, at the time of invention would have been to
`
`
`1 Canon’s reliance upon Canon v. Intellectual Ventures II, IPR2014-00631 (8/19/2015) as allowing its new reply
`theories and evidence is misplaced.
`
`
`
`11
`
`

`

`
`
`use the Basic Image Profile (“BIP”) for image pull, which specified an unpaired and
`
`unauthenticated connection. Id., ¶¶87-92. Further, poor user experience for paring would have
`
`weighed against any alleged motivation to pair, especially when not needed. Id., ¶86.
`
`Bluetooth Profile specifications are used to describe how to implement a particular use case
`
`or family of related use cases. Ex. 2026, ¶29. The specification describing image transfer via
`
`Bluetooth, i.e., BIP, defines six features including Image Pull and Automatic Archive. Ex. 1020, p.
`
`15; Ex. 2026, ¶88. Of these features, Image Pull is most applicable to the ‘698 claims. Id.
`
`Automatic Archive, which Canon erroneously relies upon, typically downloads all the existing
`
`images from the digital camera to the cellular phone for backup purposes. Id. The two features are
`
`significantly different. Id.
`
`The decision on what to recommend for each feature was a conscious decision made by the
`
`BIP authors. Id., ¶89. After this consideration, BIP did not recommend pairing for the Image Pull
`
`feature. Id. It is important to recognize that a POSITA would look to BIP for guidance on this
`
`issue. Id.
`
`In BIP it is clear the images already exist on the digital camera for both Archiving and
`
`Image pull: “The Image Pull feature browses through the images stored on the Imaging Responder
`
`device” Ex.1020, p.16; Ex. 2026, ¶¶90-91. BIP doesn’t teach the temporal components of the
`
`methods of the ‘698 claims, including that the digital camera and cellular phone are paired before
`
`the image is captured by the digital camera. E.g., Ex 1003, 11:56-12:2; Ex. 2026, ¶¶90-91.
`
`Further, in late 2007, a POSITA not be inclined to create an image pull system which
`
`required pairing devices because the Bluetooth specifications didn’t require pairing. In Security
`
`Mode 4 introduced in the v2.1+EDR Bluetooth Core Specification the default security
`
`requirement was an unauthenticated link key, unpaired, which doesn’t require a PIN or passkey.
`
`Ex. 2026, ¶92. Canon relies on older Security Mode 3, which was excluded from the v2.1+EDR
`
`
`
`12
`
`

`

`
`
`Bluetooth Core Specification in 2007, and had earned a bad reputation in the industry as being too
`
`difficult for end users to perform. Id.
`
`Bluetooth v2.1+EDR lists many optional activities. Id., ¶¶11, 15, 22-23, 93. The mere
`
`mention of Bluetooth in Hiroishi and Hollstrom does not establish that the connections described in
`
`those references are paired. Id., ¶93. The words “pair,” “paired” or “pairing” do not appear in any
`
`of those references. There are 15 optional activities after a Bluetooth connection is established:
`
`
`
`Ex 2006, P. 19; Ex. 2026, ¶¶22-23. With 15 optional activities, there are 215–1=32,767 total
`
`combinations of optional activities after ACL connection establishment. Id., ¶¶22, 93. Even if all
`
`the options are not mutually exclusive, there would remain very large number of possible
`
`combinations. Id., ¶¶22, 93-94. The ‘698 patent specification teaches one particular combination
`
`from the large number of available options. Id. To conclude obviousness requires improper
`
`hindsight. Id., ¶¶23, 94.
`
`
`13
`
`

`

`
`
`To focus upon a dichotomy of paired vs. unpaired is an oversimplification of the Bluetooth
`
`connection model. Id., ¶24. Even viewing only the security modes described in v2.1+EDR, which
`
`is what a POSITA would have consulted for Bluetooth in the 2007 timeframe, there are
`
`significantly more options than just paired or unpaired. Id. A more complete list of options is:
`
`Unpaired, unencrypted, unauthenticated and unauthorized
`Unpaired, unencrypted, unauthenticated and authorized
`Unpaired, unencrypted, authenticated and unauthorized
`Unpaired, unencrypted, authenticated and authorized
`Unpaired, encrypted, unauthenticated and unauthorized (default mode)
`Unpaired, encrypted, unauthenticated and authorized
`Unpaired, encrypted, authenticated and unauthorized
`Unpaired, encrypted, authenticated and authorized
`Paired, unencrypted, unauthenticated and unauthorized
`Paired, unencrypted, unauthenticated and authorized
`Paired, unencrypted, authenticated and unauthorized
`Paired, unencrypted, authenticated and authorized
`Paired, encrypted, unauthenticated and unauthorized
`Paired, encrypted, unauthenticated and authorized
`Paired, encrypted, authenticated and unauthorized
`Paired, encrypted, authenticated and authorized
`
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`•
`
`Id. Any attempt to oversimplify these connection options results in an inaccurate analysis of
`
`Bluetooth. Id.
`
`The default connection mode described in the v2.1+EDR Bluetooth Core Specification is
`
`for the connection to b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket