throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`PANASONIC CORPORATION OF NORTH AMERICA et al.,
`Petitioner
`
`vs.
`
`CELLSPIN SOFT, INC.,
`Patent Owner
`
`
`Case IPR2019-00131
`Patent No. 9,258,698
`
`
`PATENT OWNER’S RESPONSE
`UNDER 37 C.F.R. § 42.120
`
`
`
`
`
`

`

`The undersigned, acting on behalf of the patent owner, Cellspin Soft, Inc. (“Cellspin”),
`
`and, pursuant to 37 U.S.C. § 42.120 and 35 U.S.C. § 316, respectfully responds in opposition to
`
`the petition of Panasonic Corporation of North America et al. (“Petitioner” or “Panasonic”) for
`
`Inter Partes Review (“IPR”) be denied, including because Petitioner fails to establish a reasonable
`
`likelihood that it would prevail on any claim.
`
`
`Dated: January 30, 2019
`
`
`
`
`
`
`
`
`
`Respectfully submitted,
`
`/s/ John J. Edmonds
`John J. Edmonds, Reg. No. 56,184
`EDMONDS & SCHLATHER, PLLC
`355 South Grand Avenue, Suite 2450
`Los Angeles, CA 90071
`Telephone: 213-973-7846
`Facsimile: 213-835-6996
`Email: pto-edmonds@ip-lit.com
`
`
`Stephen F. Schlather, Reg. No. 45,081
`EDMONDS & SCHLATHER, PLLC
`1616 S. Voss Road, Suite 125
`Houston, TX 77057
`P: 832-715-1092
`F: 832-415-2535
`E: sschlather@ip-lit.com
`
`
`
`
`
`P a g e 2 | 58
`
`

`

`TABLE OF CONTENTS
`
`
`EXHIBIT LIST ................................................................................................................................4
`I. INTRODUCTION .......................................................................................................................5
`II. SUMMARY OF ARGUMENTS ...............................................................................................5
`III. SUPPORTING EVIDENCE .....................................................................................................6
`IV. LEGAL PRINCIPLES ..............................................................................................................6
`IV. THE ’698 PATENT ..................................................................................................................7
`V. THE LEVEL OF ORDINARY SKILL IN THE ART .............................................................11
`VI. ANALYSIS .............................................................................................................................10
`A. Claim Construction ...........................................................................................................10
`B. Claim Construction Summary ..........................................................................................23
`C. Prior Art Relied Upon by Petitioner ..................................................................................24
`1. Mashita ..........................................................................................................................24
`a. Mashita’s local wireless link termination issue ........................................................27
`b. Mashita teaches away from a cellular phone using HTTP .......................................32
`2. Onishi ............................................................................................................................33
`3. Hiraishi ..........................................................................................................................34
`D. Non-obviousness of Claims 1, 3–5, 7, 8, 10–13, and 15–20 over Mashita, Onishi,
`and Hiraishi ............................................................................................................................35
`1. “Limitation C” – No paired Connection .......................................................................40
`2. “Limitation C” – No Cryptographic Authentication .....................................................40
`3. “Limitation D” – No Established Paired Connection ...................................................42
`4. “Limitation G” – No Data Transfer Request .................................................................42
`5. “Limitation H – No Established Paired Connection ......................................................43
`6. “Limitation J” – No HTTP Upload of New-Media ......................................................44
`7. “Limitation K” – No GUI Deletion of New-Media File ...............................................46
`7. N73 ................................................................................................................................49
`8. Z520A ...........................................................................................................................49
`E. Response to Dr. Strawn’s Overview of the State of the Art and the Knowledge
` of a Person of Ordinary Skill in the Art ..........................................................................50
`F. Lack of Motivation to Combine Mashita, Onishi and Hiraishi .........................................51
`G. Claim 5 and Claim 8 – No Single Application Performing Steps ....................................52
`H. Claim 6 – Mobile Application Performing All Steps Lacking .........................................54
`I. Conclusions regarding independent claims 1, 5, 8, and 13 ................................................54
`J. Dependent Claims 3, 4, 7, 10, 11, 12, 15, 16, 17, 18, 19, and 20 ......................................55
`VII. THIS PROCEEDING AND ANY INVALIDITY RULINGS BASED THEREON
`ARE UNCONSTITUTIONAL, INCLUDING UNDER THE FIFTH AND
`FOURTEENTH AMENDMENTS .........................................................................................56
`VIII. CONCLUSION ....................................................................................................................57
`
`P a g e 3 | 58
`
`

`

`EXHIBIT LIST
`
`Exhibit
`Declaration of Michael Foley, Ph.D.
`
`CV of Michael Foley, Ph.D.
`Definition of “encryption” from the Techopedia dictionary from
`https://www.techopedia.com/definition/5507/encryption
`
`Definition of “cryptographic” from Academic Press Dictionary of
`Science And Technology 556 (1992) (second edition)
`
`
`
`2015 CNSSI Excerpt
`
`Short Name
`No.
`2009 Foley
`Declaration
`2010 Foley CV
`2011 Techopedia
`definition for
`encryption
`2012 Science
`Dictionary
`definition of
`cryptographic
`Excerpt from Bruce Schneier, Applied Cryptography: Protocols,
`2013 Schneier
`Algorithms and Source Code in C, 2nd Edition, 1996, pp. 1-2.
`Excerpt
`2014 Stallings Excerpt Excerpt from W. Stallings, "Cryptography And Network
`Security", 2nd, Edition, Chapter 13, IP Security, Jun. 8, 1998, pp.
`399-440.
`Excerpt from CNSSI No. 4009, which is a Committee on
`National Security Systems Glossary
`2016 NISTIR Excerpt Excerpt from NISTIR 7298, Revision 2, entitled “Glossary of
`Key Information Security Terms,” which was published by the
`National Institute of Standards and Technology
`2017 ZigBee Analysis Security Analysis of Zigbee
`2018 Bluetooth v2.1
`Bluetooth v2.1 + EDR Core Specification
`2019 Techopedia
`Definition of “authentication” from the Techopedia dictionary
`definition for
`from
`authentication
`https://www.techopedia.com/definition/342/Authentication
`2020 Techopedia
`Definition of “graphical user interface” from the Techopedia
`definition for
`dictionary from https://www.techopedia.com/
`GUI
`definition/5435/graphical-user-interface-gui
`‘802 Application U.S. Patent Application No. No. 11/901,802
`2021
`2022 Webster
`Definition of “along with” from the Merriam-Webster
`Definition of
`dictionary: https://www.merriam-
`“along with”
`webster.com/dictionary/along%20with
`2023 Bluetooth BIP
`Bluetooth Basic Imaging Profile, Interoperability Specification,
`Profile
`dated July 30, 2003
`
`
`
`
`
`
`P a g e 4 | 58
`
`

`

`I.
`
`INTRODUCTION
`
`The lead inventor of USP 9,258,698 (“‘698 patent”), Gurvinder Singh, is also the founder
`
`and president of Cellspin Soft, Inc. (“Cellspin” or “Owner”), an innovative company that, for many
`
`years, designed and provided innovative products and services, primarily its own line of social
`
`media, blogging, and advertising services.
`
`Petitioner fails to prove by a preponderance of the evidence that claims 1, 3, 4, 5, 7, 8, 10,
`
`11, 12, 13, 15, 16, 17, 18, 19, and 20 are unpatentable. Petitioner’s argument fails to render any
`
`claim obvious due to, inter alia, at least six essential claimed requirements noted in the Summary
`
`of Arguments below. Moreover, Petitioner’s declaration of Dr. Strawn impermissibly uses
`
`hindsight to arrive at alleged obviousness, it fails to provide a logical nexus between alleged
`
`motivations to combine and the specific features being combined, and it fails to support rendering
`
`any of the challenged claims obvious.
`
`I.
`
`SUMMARY OF ARGUMENTS.
`
`The references and combination of refences do not disclose many of the teachings of the
`
`‘698 patent. Without limitation, these key points are not shown or rendered obvious any of the
`
`prior art asserted by Petitioner:
`
` Paired wireless connection between a camera and a mobile device;
`
` Cyrtographic authentication of the mobile device by the camera;
`
` Mashita teaches away from a cellular phone using HTTP;
`
` Combining Mashita with Hirashi would not work;
`
` GUI’s in general and specifically not for image deletion on the wirelessly connected digital
`
`camera; and
`
` For claims 5 and 8, a single mobile application performing all the required functions (e.g.,
`
`request, store, HTTP media upload, delete using GUI).
`
`P a g e 5 | 58
`
`

`

`
`
`III.
`
`SUPPORTING EVIDENCE
`
`The exhibit numbers of the supporting evidence relied upon and the relevance of the
`
`evidence to the challenges raised are provided herein. An Exhibit List identifying the exhibits is
`
`included supra. In support of the proposed grounds, this Petition is accompanied by the declaration
`
`of Michael Foley, Ph.D., an expert in the fields of electrical and computer engineering, with
`
`extensive experience with wireless communications including Buetooth. Ex. 2009.
`
`III.
`
`LEGAL PRINCIPLES
`
`A patent claim is unpatentable as obvious if the differences between the claimed subject
`
`matter and the prior art are such that the subject matter as a whole would have been obvious at the
`
`time the invention was made to a person having ordinary skill in the art to which said subject
`
`matter pertains.
`
`In satisfying its burden of proving obviousness, Petitioner cannot employ mere conclusory
`
`statements. Petitioner must instead articulate specific reasoning, based on evidence of record, to
`
`support the conclusion of obviousness.
`
`In assessing the prior art, one must consider whether a POSITA would have been motivated
`
`to combine the prior art to achieve the claimed invention. It can be important to identify a reason
`
`that would have prompted a POSITA in the relevant field to combine the elements in the way of
`
`the claimed invention at the relevant time of the priority date.
`
`A POSITA may consider whether the prior art teaches a combination. Proving obviousness
`
`cannot involve hindsight reconstruction. Modifications that render the prior art unsatisfactory for
`
`its intended purpose may not be obvious.
`
`IV.
`
`THE ’698 PATENT
`
`The application for ‘698 patent is a continuation of application no. 12/333,303, filed on
`
`P a g e 6 | 58
`
`

`

`December 11, 2008, and it claims priority to provisional application No. 61/017,202, filed on
`
`December 28,2007. For purposes of this declaration and analysis, Cellspin assumes (as did
`
`Petitioner) that the claims of the ‘698 patent are entitled to a priority date of December 28, 2007.
`
`Ex. 2009,¶21.
`
`The ‘698 patent states that, prior to the ‘698 invention, capture methods were crude. Ex.
`
`1003,1:46–55. As for the invention, the ‘698 specification describes embodiments comprising
`
`digital data capture device 201, e.g., a digital camera, paired with a physically separate mobile
`
`device 202, e.g., a Bluetooth enabled cellular phone with client application 203. See Ex. 1001,3:39-
`
`46. Figure 2 “illustrates a system for utilizing a digital data capture device in conjunction with a
`
`Bluetooth enabled mobile device.”Id.,3:14–18. As stated in the specification, Bluetooth “pairing
`
`occurs when the BT communication device 201a agrees to communicate with the mobile device
`
`202 in order to establish a connection.”Id.,4:1-3. As noted hereinbelow, a POSITA understands
`
`that Bluetooth pairing involves other aspects as well.
`
`In one embodiment, “In order to initiate the pairing process between the BT
`
`communication device 201a and the mobile device 202, a common password known as a passkey
`
`is exchanged between the BT communication device 201a and the mobile device 202.Id.,4:5-7.
`
`As stated in the specification, “[a] passkey is a code shared by the Bluetooth
`
`communication device 201a and the mobile device 202.”Id.,4:7-8.
`
`In request/response mode, client application 203 on the cellular phone (i.e., mobile device
`
`202) detects the captured image on the digital camera (i.e., digital data capture device 201), and,
`
`over the established, paired Bluetooth connection, initiates transfer of the captured image and
`
`associated files.Id., Abstract, 2:35-37,6:36-40,8:37-40. Digital data capture device 201 responds
`
`by transferring the captured image and associated files to client application 203 on mobile device
`
`202.Id.,8:40-42.
`
`P a g e 7 | 58
`
`

`

`User information and translation to HTTP are applied in transit and on mobile device 202.
`
`SeeId.,‘794/8:52-55,9:61-10:9. The captured data is then transferred via HTTP from client
`
`application 203 of mobile device 202 to publishing service 401 via network 402, including as
`
`illustrated in FIG. 4.Id.,5:9-11,8:43-50.
`
`A Bluetooth device that wants to communicate only with a trusted device can
`
`cryptographically authenticate the identity of another Bluetooth device.Id.,3:59-61. In a preferred
`
`embodiment communication is authenticated cryptographically using the passkey noted
`
`above.Id.,4:3-7.
`
`2.
`
`‘698 Claims
`
`30.
`
`The claims of the ’698 patent are broken down in the Foley Declaration. Ex.
`
`2009,¶30. A diagram showing the inventive way of claim 5 is as follows:
`
`P a g e 8 | 58
`
`

`

`Digital Camera
`
`short-range
`'Q1 Device
`wireless
`capability lJblJ
`
`'698 Claim 5
`Device Claim
`
`Cellular Phone
`short-range
`wireles5
`capability
`
`User Media
`Publishing
`Website
`
`....... (cid:141)
`
`A Camera with
`Non-Volatile
`Memory
`+
`Processor
`+
`Short-range
`Commum'catlon
`device
`+
`Data capture
`circuitry
`
`cryptographlcally
`authen tlcating
`Identity a/ the
`cellular phone
`
`Acquiring
`New-Media
`
`Create &
`Store
`New-Media
`File
`
`Receive
`requestto
`Transfer the
`New-Media
`File
`
`Send
`Created
`New-Media
`File
`
`Establish a short-range paired wireless connection
`
`'----____ _____,,Ir•
`
`r,:iptograp/lirnllJ•_t1111/lt llllrnti11g
`
`nitiate transfer of the
`Request to I Media file
`NeW·
`
`Mobile
`Software
`Application
`
`Receive & Store
`New-Media File
`
`User Information
`New-Media File
`
`.QQoor--r---.
`·····~
`
`•••·•••• ...
`Use HTT
`P to send N
`....... .
`Information t
`ew-Med/a F'/
`....... • ..
`, e + User
`o a user media
`Website on a
`NON Paired w· PUbl,shfng
`Connection lreless Internet
`
`GUI forNew(cid:173)
`Media File
`
`GUI to Delete
`Created
`New-Media
`File
`
`P a g e 9 | 58
`
`
`
`

`

`
`
`V.
`
`THE LEVEL OF ORDINARY SKILL IN THE ART
`
`The Petitioner states that a person of ordinary skill in the art at the relevant time would
`
`have at least a bachelor’s degree in electrical engineering or computer science, or an equivalent
`
`degree, and at least two years of industry experience with software development and/or electronic
`
`system design. More education can supplement relevant experience and vice versa. Pet. 9; Ex.
`
`1001,¶24. For purposes of institution, the Board determined that a POSITA would have had a
`
`person of ordinary skill in the art would have had a bachelor’s degree in electrical engineering or
`
`computer science, or an equivalent degree, and two years of industry experience with software
`
`development, electronic system design, digital camera
`
`technology, and/or wireless
`
`communications. Institution Decision, 15. Cellspin agrees that either the Board’s determination
`
`of a POSITA’s qualifications is correct, and that Panasonic’s formulation of a POSITA’s
`
`qualifications is also correct. Cellspin agrees that either the Board’s determination of a POSITA’s
`
`qualifications is correct, and that Panasonic’s formulation of a POSITA’s qualifications is also
`
`correct. Ex. 2009,¶32. In this Response, Cellspin applies the Board’s determination of a POSITA’s
`
`qualifications.Id.
`
`VI. ANALYSIS
`
`A.
`
`Claim Construction
`
`Petitioner proposes that the above-noted “wherein” clause be construed under BRI as:
`
`“wherein as part of establishing the short-range paired wireless connection between the digital
`
`camera device and the cellular phone, the digital camera authenticates the identity of the cellular
`
`phone using some form of secrecy, security, or encryption, including by use of a shared passkey
`
`on the digital camera device and the cellular phone.” Id. 11. However, the construction proposed
`
`by Petitioner’s expert Dr. Strawn is not the same. The difference is that Dr. Strawn does not agree
`
`P a g e 10 | 58
`
`

`

`with Panasonic that “some form of secrecy” is sufficient. Ex. 1001, 38, 39.
`
`Petitioner argues its proposed construction “is consistent with the ordinary meaning of the
`
`words ‘cryptographically authenticating’ to those skilled in the art.” Pet. 11–12 (citing Ex. 1012
`
`(McGraw-Hill Dictionary of Computing & Communications, 2003) (defining “cryptography” as
`
`“[t]he science of preparing messages in a form which cannot be read by those not privy to the
`
`secrets of the form”); Ex. 1013 (Wiley Electrical and Electronics Engineering Dictionary, 2004),
`
`(defining “authentication” as “In computers and communications, the processes of verifying the
`
`legitimacy of a transmission, user, or system. Measures such as passwords and digital signatures
`
`are employed.”)
`
`Cellspin
`
`is primarily addressing
`
`the proper BRI constructions
`
`for “paired,”
`
`“cryptographically authenticating” and “graphical user interface,” including subsidiary and related
`
`terms where applicable, from the perspective of a POSITA and in view of the specification, prior
`
`art and relevant knowledge of a POSITA. Ex. 2009,¶40.
`
`Figure 1 of the ‘698 patent illustrates a method of utilizing a digital data capture device
`
`201 in conjunction with a physically separate Bluetooth enabled mobile device 202. Ex. 1003,
`
`3:34-41. “The digital data capture device 201 may, for example, be a digital camera, a video
`
`camera, digital modular camera systems, or other digital data capturing systems.”Id.,3:41-44. As
`
`noted in the patent:
`
`BT pairing involves establishing a connection between two BT devices that
`mutually agree to communicate with each other. A BT device that wants to
`communicate only with a trusted device can cryptographically authenticate the
`identity of another BT device. BT pairing occurs when the BT communication
`device 201a agrees to communicate with the mobile device 202 in order to establish
`a connection. In order to initiate the pairing process between the BT communication
`device 201a and the mobile device 202, a common password known as a passkey
`is exchanged between the BT communication device 201a and the mobile device
`202. A passkey is a code shared by the BT communication device 201a and the
`mobile device 202. A user sets a discoverable mode for the mobile device 202…
`the entered passkey is matched with the passkey of the BT communication device
`201a. If a match is found, a trusted pair is automatically established.
`P a g e 11 | 58
`
`

`

`
`Ex. 1003, 3:60-4:25.
`
`Thus, Bluetooth pairing involves (among other things) establishing a connection between
`
`two Bluetooth devices that mutually agree to communicate with each other.Id. 4:1-3. Further, the
`
`specification states that:
`
`The BT communication device 201a comprises a BT association protocol module
`201b and a data transfer protocol module 201c. The client application 203 on the
`mobile device 202 comprises a BT association protocol module 203a, a data and
`file monitoring and detection module 203b, a data transfer protocol module 203c,
`a data storage module 203d, a graphical user interface (GUI) 203e, and a media
`publishing module 203f. The BT association protocol module 201b of the digital
`data capture device 201and the BT association protocol module 203a of the client
`application 203 enable the pairing between the BT communication device 201a and
`the mobile device 202. The pairing of the BT communication device 201a and the
`mobile device 202is explained in the detailed description of FIG. 1. The data
`capture module 201d captures the data and the multimedia content on the digital
`data capture device 201.
`
`Id. 6:23-39 (emphasis added).
`
`
`Thus, the ‘698 specification states that Bluetooth pairing involves association and
`
`establishing a connection between two Bluetooth devices that mutually agree to communicate with
`
`each other.Id. 4:1-3. To a POSITA, this points out that pairing involves association and an
`
`exchange of credentials to fulfilling the agreement in addition to merely communicating back and
`
`forth. Ex. 2009,¶45.
`
`On this issue the Bluetooth specification includes the following:
`
`
`
`
`
`P a g e 12 | 58
`
`

`

`BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 1]
`
`page 6 of 96
`
`0 Bluetooth·
`
`4
`
`5
`
`3.5.6 Extended synchronous connection-oriented (eSCO) ... .44
`3.5.7 Active slave broadcast (ASB) ........................................ 45
`3.5.8 Parked slave broadcast (PSB) ..................................... 46
`3.5.9 Logical links .................................................................. 47
`3.5.10 User Asynchronous/Isochronous Logical Link (ACL-U) 48
`3.5.11 User Synchronous/Extended Synchronous Logical Links
`(SCO-S/eSCO-S) .......................................................... 48
`L2CAP Channels ....................................................................... 49
`3.6
`Communication Topology ................................................................. 50
`4 .1
`Pico net Topology ....................................................................... 50
`4 2 Operational Procedures and Modes ....................................... 52
`4.2.1
`Inquiry (Discovering) Procedure .................................... 52
`4.2.2 Paging (Connecting) Procedure .................................... 53
`4.2.3 Connected mode ........................................................... 53
`4.2.4 Hold mode ............................................................... 54
`4.2.5 Sniff mode ..................................................................... 54
`4.2.6 Parked state .................................................................. 55
`4.2.7 Role switch procedure ................................................... 55
`4.2.8 Enhanced Data Rate ..................................................... 56
`Secure Simple Pairing Overview ...................................................... 57
`5 1 Security Goals ........................................................................ 57
`Passive Eavesdropping Protection ............................................ 57
`5 .2
`5.3 Man-In-The-Middle Protection ................................................... 58
`5 .4
`ssoc1ation ode ls ................................................................... 59
`5.4.1 Numeric Comparison .................................................... 59
`5.4.2
`Just Works .................................................................... 59
`5.4.3 Out of Band ................................................................... 60
`5.4.4 Passkey Entry ............................................................... 60
`5.4.5 Association Model Overview ......................................... 61
`
`
`
`and
`
`P a g e 13 | 58
`
`

`

`5.4.5 Association Model Overview
`
`The following diagram shows Secure Simple Pairing from the point of view of
`the technology used for discovery and then the different association possibili(cid:173)
`ties.
`
`Paring Procedure
`S1age
`
`Blue1001h In Bar<!
`
`008
`OiSCOYl!Wy only
`
`008
`Discovery er<!
`Authen11ca110n
`
`Bauetooth lrlormallon dscOYered
`by Bluetoolh lrquory
`
`Bk.letooth lnformat10n exchanged
`voe00B
`
`Bluetoolh CcnnecbOn crealed using
`Page
`
`BluelOOlh Connection creeled using
`Page
`
`8'uelooth Comecbon
`crellled using Page
`
`BD_ADDR lrom00B
`
`BD_ADDR lromOOB
`
`SecLnly
`Eslabllstvnenl
`
`Exchange Public Keys , 10 Cepablllloes , Comp1.ce DHKey
`
`Secure , Aulhenllc:eted , Simple PaiTig
`
`Figure 5.1: Secure Simple Pairing Association Models
`
`
`
`Ex. 2018, 80, 135. As noted above, the Bluetooth specification refers to a passkey as being one of
`
`the association models. Ex. 2009,¶46.
`
`To a POSITA, in the context of the ‘698 patent and in other contexts as well, the BRI of a
`
`“paired connection” is a “bidirectional communications link between devices which provides
`
`encrypted data exchange between the devices, and the communication link can be
`
`disconnected and reconnected without having to repeat pairing or authentication.” Ex. 2009,
`
`46. This is consistent with how paired connections were defined while creating the Bluetooth
`
`specifications as well as other technologies, such as Zigbee, which have implemented the paired
`
`connection concept.Id. To a POSITA under BRI, pairing is the steps taken which result in a
`
`paired connection.Id.
`
`P a g e 14 | 58
`
`

`

`
`To a POSITA, in the context of the ‘698 patent but in other contexts as well, the BRI of a
`
`paired connection must be distinguished from mere authentication and from other methods
`
`of communications that involve exchanges of credentials but not pairing.Id.,¶47.
`
`For purposes of determining whether to institute this proceeding, the Board determined
`
`that “cryptographically authenticating identity of the cellular phone” encompasses “authenticating
`
`the identity of the cellular phone using some form of security or encryption, including by use of a
`
`shared passkey on the digital camera device and the cellular phone.” Here the Board essentially
`
`agreed with Panasonic’s proposed construction from the ‘131 IPR, except that the Board, like
`
`Panasonic’s expert Dr. Strawn, did not include the word “secrecy.”
`
`To a POSITA, in the context of the ‘698 patent but in other contexts as well, “encryption
`
`is the process of using an algorithm to transform information to make it unreadable for
`
`unauthorized users.” Ex. 2009,¶50. See https://www.techopedia.com/definition/5507/encryption,
`
`Ex. 2011. “This cryptographic method protects sensitive data such as credit card numbers by
`
`encoding and transforming information into unreadable cipher text. This encoded data may only
`
`be decrypted or made readable with a key.”Id. In the ’131 IPR, Panasonic cited its Ex. 1012, the
`
`McGraw-Hill Dictionary of Computing & Communications, 2003 at 3, as defining “cryptography”
`
`as “The science of preparing messages in a form which cannot be read by those not privy to the
`
`secrets of the form”. To a POSITA, the way in which messages cannot be read by those not privy
`
`to the secrets of the form is by the use of an algorithm to encode the data. See Academic Press
`
`Dictionary of Science And Technology 556 (1992) (second edition) (Ex. 2012). See also Bruce
`
`Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition, 1996,
`
`pp. 1-2 (“The process of disguising a message in such a way as to hide its substance is encryption.
`
`An encrypted message is ciphertext. The process of turning ciphertext back into plaintext is
`
`P a g e 15 | 58
`
`

`

`decryption.”) (Ex. 2013) ; W. Stallings, "Cryptography And Network Security", 2nd, Edition,
`
`Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440 (“A cryptographic algorithm, also called a
`
`cipher, is the mathematical function used for encryption and decryption.”) (Ex. 2014); CNSSI
`
`4009-2015 (NSA/CSS Manual Number 3-16 (COMSEC)) (cryptography is the “Art or science
`
`concerning the principles, means, and methods for rendering plain information unintelligible and
`
`for restoring encrypted information to intelligible form.) (Ex. 2015) . Further, the National
`
`Institute of Standards and Technology defines “cryptographic algorithm” as “[a] well-defined
`
`computational procedure that takes variable inputs, including a cryptographic key, and produces
`
`an output.” Ex. 2016. Further, the cryptographic mechanism in ZigBee, another well-known
`
`means of short-range wireless communication, is “based on symmetric-key cryptography.” Ex.
`
`2017, p.3. See also cases cited in para. 51 of the Foley Declaration, which have claim constructions
`
`consistent with the BRI of cryptographic in the context of the ‘698 patent. Ex. 2009,¶51.
`
`To a POSITA, cryptography converts data into a format that is unreadable for an
`
`unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into
`
`a readable format, thus compromising the data. Ex. 2009,¶52.
`
`Thus, To a POSITA, in the context of the ‘698 patent but also in other contexts, the BRI
`
`of “cryptographically authenticated” is authenticated using a process that involves
`
`encryption and decryption using an algorithm. Ex. 2009,¶53. The BRI of “authenticated” is
`
`addressed below.
`
`As apparently acknowledged by the Board and Dr. Strawn, to a POSITA, the BRI of
`
`“cryptographically” should not include secrecy. To a POSITA, secrecy does not equate with the
`
`BRI of cryptographically. For example, a PIN may be kept secret, but PINs, by themselves, are
`
`not cryptographic. Ex. 2009,¶54.
`
`As noted above, for purposes of determining whether or not to institute, the Board
`
`P a g e 16 | 58
`
`

`

`determined that “cryptographically authenticating identity of the cellular phone” encompasses
`
`“authenticating the identity of the cellular phone using some form of security or encryption,
`
`including by use of a shared passkey on the digital camera device and the cellular phone.” To a
`
`POSITA, this is problematic and incorrect in multiple respects. Ex. 2009,¶55.
`
`First, this construction allows a “form of security” to suffice for encryption, even though
`
`the claim limitation is “cryptographically authenticating…” If the Board is using security as a
`
`synonym for encryption, i.e., that a secure connection would require cryptographic techniques, this
`
`would not be problematic. Ex. 2009,¶55. However, the use of “security or encryption” suggests
`
`that “security” is something different than encryption.Id.
`
`Further, defining “cryptographic authenticating” as “authenticating… using some form of
`
`… encryption…” appears circular because it merely defines “cryptographic” as using
`
`“encryption.”Id.,¶57. As noted above, the BRI of “encryption” is “the process of using an
`
`algorithm to transform information to make it unreadable for unauthorized users and the
`
`BRI of “cryptography” is the “science of preparing messages in a form which cannot be read
`
`by those not privy to the secrets of the form.”Id.
`
`Further, a POSITA understands that the mere use of a shared passkey is not sufficient to
`
`achieve encryption or to cryptographically authenticate. Ex. 2009,¶58.The devices must still use a
`
`cryptographic algorithm typically taking the passkey as an input along with other inputs,
`
`potentially using a hash function on those inputs and keys to encrypt a challenge/response
`
`algorithm amongst the two devices.Id. Only after the algorithm is executed on each device and the
`
`proper responses are received after the challenges are issued can the devices be considered
`
`authenticated.Id. After authentication, encryption keys can be generated or exchanged and used
`
`for encryption.Id. The encryption keys can then be stored on each device and used in future
`
`communication sessions without the need to repeat the authentication process.Id. This complete
`
`P a g e 17 | 58
`
`

`

`process, along with the storing of encryption keys for further communication sessions results in
`
`the two devices being paired.Id. If one of the devices deletes the encryption key, the devices
`
`become unpaired and the entire process described here needs to be repeated in order to pair the
`
`devices again.Id. (citing Bluetooth v2.1 + EDR Core Specification, Section 7.2.3 and Section 5.2.2,
`
`p 1273-1287, Ex. 2018).
`
`Petitioner asserts that the ’698 patent “makes clear that ‘various security, encryption and
`
`compression techniques’ can be used ‘to enhance the overall user experience.’” Petition, 1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket