throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`Panasonic Corporation of North America et al.
`Petitioners
`
`v.
`
`Cellspin Soft, Inc.
`Patent Owner
`
`CASE: IPR2019-00131
`Patent No. 9,258,698
`
`PETITIONERS’ REPLY TO PATENT OWNER’S RESPONSE
`
`

`

`TABLE OF CONTENTS
`
`Page
`
`C.
`
`D.
`
`INTRODUCTION .......................................................................................... 1
`I.
`THE FOLEY DECLARATION SHOULD BE GIVEN NO WEIGHT ........ 2
`II.
`III. CLAIM CONSTRUCTION ........................................................................... 3
`A.
`Cellspin’s Construction of “Paired Connection” is Incorrect. ............. 3
`B.
`Cellspin’s Construction of “Cryptographically Authenticating”
`is Incorrect. ........................................................................................... 4
`Cellspin’s Construction of “Graphical User Interface” is
`Incorrect. ............................................................................................... 5
`Cellspin’s Construction of “A” as “A Single” rather than “One
`or More” is Incorrect. ........................................................................... 6
`IV. LIMITATION C IS DISCLOSED IN MASHITA, OR AT LEAST
`RENDERED OBVIOUS BY THE PRIOR ART ........................................... 7
`A. Mashita Discloses Establishing a Paired Connection Between a
`Cellular Phone and Digital Camera. ..................................................... 7
`B. Mashita Also Discloses The “Cryptographically Authenticating
`Identity” Portion Of Limitation C. ..................................................... 18
`C. At Minimum, it Would Have Been Obvious to a POSITA to
`Implement the Bluetooth Connections described in Mashita,
`Onishi, and Hiraishi as a Paired Connection. ..................................... 19
`Cellspin’s Arguments Do Not Apply to the Non-Method
`Challenged Claims. ............................................................................ 22
`LIMITATION G IS OBVIOUS IN VIEW OF THE COMBINATION ...... 23
`V.
`VI. LIMITATION J IS OBVIOUS IN VIEW OF THE COMBINATION. ...... 23
`A.
`Cellspin’s “Teaching Away” Theory is Demonstrably Factually
`Incorrect. ............................................................................................. 24
`The Two Disadvantages Identified by Mashita are Not Part of
`the Combination and Not Relevant to the Challenged Claims. ......... 26
`VII. LIMITATION K IS OBVIOUS IN VIEW OF THE COMBINATION. ..... 27
`VIII. CELLSPIN’S “SINGLE APPLICATION” ARGUMENT FOR
`CLAIMS 5 AND 8 FAILS BOTH LEGALLY AND FACTUALLY ......... 29
`i
`
`D.
`
`B.
`
`

`

`TABLE OF CONTENTS
`(continued)
`
`Page
`
`IX. THESE PROCEEDINGS ARE CONSTITUTIONAL ................................ 30
`X.
`CONCLUSION ............................................................................................. 30
`
`ii
`
`

`

`TABLE OF AUTHORITIES
`
` Page(s)
`
`Cases
`B.E. Tech., LLC v. Sony Mobile Comm’ns (USA) Inc.,
`657 Fed.Appx. 982 (Fed. Cir. 2016) ..................................................................... 2
`Baldwin Graphic Sys. v. Siebert, Inc.,
`512 F.3d 1338 (Fed. Cir. 2008) ........................................................................ 6, 7
`Celegene Corp. v. Peter,
`931 F.3d 1342 (Fed. Cir. 2019) .......................................................................... 30
`E.I. du Pont De Nemours & Co. v. MacDermid Printing Sols.,
`657 Fed. Appx. 1004 (Fed. Cir. 2016) ................................................................ 21
`InfoBionic, Inc. v. Braemar Manufacturing, LLC,
`IPR2015-01704, Paper 11 ..................................................................................... 2
`KRS Int’l Co. v. Teleflex, Inc.,
`550 U.S. 398 (2007) ............................................................................................ 21
`Other Authorities
`37 C.F.R. § 42.65(a) ....................................................................................... 3, 14, 15
`
`iii
`
`

`

`I.
`
`INTRODUCTION
`
`The three prior art references here (Mashita, Onishi, Hiraishi) each expressly
`
`disclose a Bluetooth connection between a phone and camera. Cellspin argues that
`
`these references nonetheless do not disclose implementing these connections as
`
`paired Bluetooth connections. But Mashita does disclose a paired Bluetooth
`
`connection. It describes the same pairing process as the ’698 patent itself. And the
`
`Bluetooth specification documents describe the process of pairing the same way as
`
`Mashita does—entering the same PIN on both devices.
`
`Beyond that, Cellspin never explains how pairing could possibly be a non-
`
`obvious implementation of Bluetooth. The facts are these: Bluetooth was in
`
`hundreds of millions of devices at the time of the alleged inventions—“pervasive”
`
`to use the ’698 patent’s word (see Ex. 1003 (“’698 patent”), 9:42-45). All
`
`Bluetooth devices could implement a paired connection. The only two options for
`
`implementing Bluetooth connections were paired or not. Cellspin’s expert witness,
`
`Dr. Foley, agreed that a POSITA would have known how to implement paired
`
`connections and would have understood the many benefits of doing so. Indeed, the
`
`very Bluetooth specification document that Cellspin identifies as describing “the
`
`scenarios most in line with the ’698 patent” (Paper 19 (“Response”), 37-38)
`
`explicitly teaches that whether to use a paired connection or not is merely “left to
`
`1
`
`

`

`the implementer’s discretion.” Ex. 1020, 16. This is textbook obviousness, not a
`
`patentable invention.
`
`Cellspin’s remaining arguments fare no better. Its “teaching away”
`
`argument, and its argument that Mashita terminates the Bluetooth connection after
`
`every transaction, are both based on plain misreadings of the prior art. Cellspin
`
`premises another argument on a very narrow, and unjustified, construction of the
`
`common term “graphical user interface (GUI)”; even accepting its construction,
`
`Cellspin fails to dispute that Mashita discloses a GUI. Finally, Cellspin commits
`
`another claim construction error, interpreting “a” as “a single” despite the claim
`
`construction rule that “a” means “one or more.”
`
`II.
`
`THE FOLEY DECLARATION SHOULD BE GIVEN NO WEIGHT
`
`At the outset, Dr. Foley’s declaration (Ex. 2009) is not persuasive or credible
`
`across-the-board. Entire sections of the Foley declaration and Cellspin’s response
`
`are word-for-word identical or nearly so. Compare, e.g., Ex. 2009, ¶¶99-113 with
`
`Response, Section VI.D.1; compare Ex. 2009, ¶¶127-132 with Response, Section
`
`VI.D.6. The Federal Circuit and the Board have not credited expert witnesses who
`
`merely parrot attorney argument. See B.E. Tech., LLC v. Sony Mobile Comm’ns
`
`(USA) Inc., 657 Fed.Appx. 982, 988 (Fed. Cir. 2016); InfoBionic, Inc. v. Braemar
`
`Manufacturing, LLC, IPR2015-01704, Paper 11 (denying institution) at 6, 12, 14-
`
`15. Furthermore, most of Dr. Foley’s statements cite no evidentiary support.
`
`2
`
`

`

`Examples are highlighted in this Reply. Such testimony “is entitled to little or no
`
`weight.” 37 C.F.R. § 42.65(a). Finally, Dr. Foley’s assertions often are factually
`
`wrong, and in many cases he admitted as much in his deposition. See, e.g., infra
`
`Section IV.A (Foley’s deposition testimony regarding Mashita’s supposed
`
`“termination issue” directly contradicted his declaration).
`
`III. CLAIM CONSTRUCTION
`
`A.
`
`Cellspin’s Construction of “Paired Connection” is Incorrect.
`
`Cellspin’s proposed construction of “paired connection” erroneously
`
`requires that the connection “provides encrypted data exchange” and that the
`
`connection “can be disconnected and reconnected without having to repeat pairing
`
`and authentication.” Response, 14. Cellspin conflates the connection between
`
`devices—which is claimed—with encrypted communications—which are not.
`
`Cellspin/Foley cite no support from the ’698 patent or elsewhere for reading these
`
`two additional requirements into the term. The Bluetooth specifications, for
`
`example, make clear that paired connections do not necessarily require encrypted
`
`data exchange. Ex. 2018, 414, 416; Ex. 1024 (Second Declaration of Dr. Strawn),
`
`¶22. See also infra Section III.B regarding encryption.
`
`Ultimately, this claim construction dispute is irrelevant because the prior art
`
`still satisfies Cellspin’s (incorrect) construction. Cellspin’s construction is
`
`intended to encompass at least a paired Bluetooth connection. Response, 14; Ex.
`
`3
`
`

`

`1023 (“Foley Depo.”), 53:10-16. The prior art discloses (or at least would have
`
`rendered obvious) a paired Bluetooth connection (see infra Section IV).
`
`B.
`
`Cellspin’s Construction of “Cryptographically Authenticating” is
`Incorrect.
`
`The ’698 patent’s specification mentions “cryptographically
`
`authenticat[ing]” only once, and then describes the Bluetooth pairing process. ’698
`
`patent, 3:65-4:8. Neither the specification nor the claims state that this process
`
`requires an “algorithm” or “encryption”—rather, the specification teaches that
`
`“various security [or] encryption” techniques may be used to implement the
`
`disclosed programs. Id., 10:60-62. Cellspin’s citations to dictionary definitions of
`
`“encryption” or “cryptographic algorithm” are thus beside the point: the broadest
`
`reasonable interpretation of “cryptographically authenticating identity” cannot be
`
`limited to these unclaimed concepts. The Board’s construction in the Institution
`
`Decision (at 12-13) is appropriate.1
`
`1 Panasonic’s proposed construction includes “secrecy” along with “security” and
`
`“encryption.” The two constructions do not meaningfully differ; the prior art
`
`clearly satisfies the Board’s construction as explained herein. Contrary to
`
`Cellspin’s claim, Dr. Strawn does not “disagree” with Panasonic’s construction.
`
`Ex. 1024, ¶¶6-9.
`
`4
`
`

`

`Here too, Cellspin’s incorrect construction ultimately does not matter. The
`
`prior art discloses (or at least would have rendered obvious) a paired Bluetooth
`
`connection, which would meet Cellspin’s construction. Bluetooth pairing uses a
`
`cryptographic algorithm for authentication (see infra Section IV).
`
`C.
`
`Cellspin’s Construction of “Graphical User Interface” is
`Incorrect.
`
`Cellspin’s highly specific construction of “graphical user interface (GUI)” is
`
`far from the broadest reasonable interpretation of this common term. Cellspin’s
`
`construction errs in (a) distinguishing GUIs from “text-based interfaces” and (b)
`
`implying that GUIs must be “manipulated by a pointing device.” Response, 19-21.
`
`The intrinsic record does not support these limitations. The ’698 patent
`
`depicts the GUI in Figure 2 literally as an empty box, and the specification says
`
`nothing about the GUI’s appearance or how the user inputs commands to the GUI.
`
`’698 patent, Fig. 2, 6:25-30, 6:58-66, 9:62-64. Dr. Foley acknowledged these facts
`
`(Foley Depo., 59:16-64:1), and confirmed that the patent uses “GUI” consistent
`
`with its understood meaning in the art at the time (Id., 68:8-22).
`
`Cellspin’s narrow construction is derived from a single online dictionary
`
`(circa 2019), but other dictionaries (from the relevant time) define GUI more
`
`broadly. E.g., Ex. 1013, 3 (Wiley dictionary). Cellspin’s construction thus is not
`
`the broadest reasonable interpretation.
`
`5
`
`

`

`Moreover, even the non-limiting exemplary GUI from a different Cellspin
`
`patent application contradicts Cellspin’s construction. See Response, 19-20
`
`(referencing Ex. 2021); Foley Depo., 66:23-67:11. This GUI displayed text and
`
`users pressed a physical button to input commands. Ex. 2021, Fig. 3, 7:17-20
`
`(describing various user inputs to the GUI including a button “click or touch”);
`
`Foley Depo., 64:15-65:17, 66:3-22. This example accords with a POSITA’s
`
`understanding that existing mobile phones had a wide variety of GUIs, with
`
`various user inputs (including push buttons). Ex. 1001, ¶¶130-133.
`
`Regardless, the prior art discloses a GUI even under Cellspin’s erroneous
`
`construction. See infra Section VII.
`
`D.
`
`Cellspin’s Construction of “A” as “A Single” rather than “One or
`More” is Incorrect.
`
`Cellspin also argues that “a software application” in claims 5 and 8 means “a
`
`single software application.” Response, 50-52. This is a claim construction issue,
`
`although not identified as one by Cellspin.
`
`“That ‘a’ or ‘an’ can mean ‘one or more’ [in patent claims] is best described
`
`as a rule, rather than merely as a presumption or even a convention.” Baldwin
`
`Graphic Sys. v. Siebert, Inc., 512 F.3d 1338, 1342 (Fed. Cir. 2008) (emphasis
`
`added). “The exceptions to this rule are extremely limited.” Id. This long-
`
`established rule applies even under the Phillips standard; under the broadest
`
`6
`
`

`

`reasonable interpretation standard, it would be even less appropriate to construe
`
`“a” narrowly as “a single.”
`
`Cellspin relies upon Dr. Foley’s testimony, but Dr. Foley did not
`
`acknowledge or apply the governing claim construction rule: “It’s not applications,
`
`plural. It’s ‘a’, singular. … It would say the software applications, plural, if it was
`
`more than one.” Foley Depo., 79:20-82:7. Cellspin identifies no evidence of the
`
`patentee’s “clear intent to limit ‘a’ or ‘an’ to ‘one,’” as would be required to depart
`
`from the rule, and the intrinsic record lacks any such evidence. See Baldwin, 512
`
`F.3d at 1342.
`
`Again, even Cellspin’s incorrect claim construction would not distinguish
`
`the Challenged Claims from the prior art. See infra Section VIII.
`
`IV. LIMITATION C2 IS DISCLOSED IN MASHITA, OR AT LEAST
`RENDERED OBVIOUS BY THE PRIOR ART
`
`A. Mashita Discloses Establishing a Paired Connection Between a
`Cellular Phone and Digital Camera.
`
`As Petitioners have explained, Mashita and the ’698 patent both describe
`
`essentially the same pairing and cryptographically authenticating process. See
`
`Petition 41-42; Ex. 1001, ¶85. A side-by-side comparison helps to illustrate:
`
`2 This Reply uses the same “common limitations” approach as the Petition. See
`
`Petition, Appendix A; Institution Decision, 19-20. Cellspin contests Limitations D
`
`7
`
`

`

`Mashita
`
`’698 Patent
`
`“First, an identical Personal
`Identification Number (PIN) code is
`input to both the cellular phone 102
`and the digital camera 101 … The
`cellular phone 102 thus establishes a
`link through local wireless
`[Bluetooth] connection with the
`digital camera 101.”
`Ex. 1006 (“Mashita”), [0051].
`
`“[T]o initiate the pairing process
`between the BT communication device
`201a and the mobile device 202, a
`common password known as a
`passkey is exchanged … A passkey is a
`code shared by the BT communication
`device 201 a and the mobile device
`202.”
`…
`“On entering the passkey by the user
`of the mobile device 202, the entered
`passkey is matched with the passkey of
`the BT communication device 201a. If
`a match is found, a trusted pair is
`automatically established.”
`’698 patent, 4:3-25
`
`In both descriptions, a PIN/passkey code is input by a user into a mobile
`
`phone, matching the same PIN/passkey code for the digital camera. As the ’698
`
`patent makes clear, this match results “automatically” in a Bluetooth paired
`
`connection—from the user interface perspective, nothing more is required. Both
`
`Mashita and the ’698 patent also describe using the devices’ Bluetooth addresses in
`
`and H only on the same basis as Limitation C (Response, 40, 41-42), so these
`
`arguments apply to those Limitations also.
`
`8
`
`

`

`the process. ’698 patent, 4:13-17; Mashita, [0030], [0051]. Mashita thus discloses
`
`Limitation C.
`
`The difference in wording between “PIN” and “passkey” is immaterial,
`
`because the terms are interchangeable. “When the Bluetooth PIN is referred to on
`
`the UI level, the term ‘Bluetooth Passkey’ should be used.” Ex. 2018 (Bluetooth
`
`Version 2.1+EDR Core Specification), 1258; Ex. 1024, ¶48. The ’698 patent’s
`
`specification describes the user interface (UI) level, as Dr. Foley acknowledged
`
`(Foley Depo., 89:9-24), so unsurprisingly it uses “passkey.”
`
`In arguing that PINs and passkeys differ, Cellspin cites an excerpt from the
`
`Bluetooth specification documents, but ignores the context. This excerpt describes
`
`“Secure Simple Pairing,” a feature added in Bluetooth Version 2.1+EDR, which
`
`was released in 2007. Foley Depo., 52:17-53:3, 97:22-98:10; Ex. 2018, 154.
`
`Secure Simple Pairing is only one type of Bluetooth pairing. Foley Depo., 53:4-
`
`12. And as the Secure Simple Pairing Overview explains, “It is a goal of Secure
`
`Simple Pairing to exceed the maximum security level provided by the use of a 16
`
`alphanumeric PIN with the pairing algorithm used in Bluetooth Core
`
`Specification version 2.0 + EDR and earlier versions. Note that many Bluetooth
`
`devices compliant with Bluetooth Core Specification 2.0 + EDR and earlier
`
`versions use a 4-digit PIN ….” Ex. 2018, 131 (emphasis added).
`
`9
`
`

`

`That is, both the “passkey” (Secure Simple Pairing) and “PIN” models used
`
`paired connections and encryption algorithms; the difference is the type of
`
`algorithm. See id.; Ex. 2018, 134-135 (explaining that in the “PIN Entry model,”
`
`the PIN is an “input to” the “security algorithm”). These distinctions do not matter
`
`to the Challenged Claims, which, Cellspin/Foley admit, are not limited to Secure
`
`Simple Pairing or any type of encryption. Foley Depo., 52:17-24; Response, 18-
`
`19.
`
`Mashita’s description matches not just the ’698 patent’s description of
`
`pairing, but also the descriptions of “pairing” in the Bluetooth specification
`
`documents. The best example may be the one cited by Cellspin/Foley in their
`
`discussion of Limitation C (see Response, 34), a diagram showing how a Bluetooth
`
`connection is established between two devices:
`
`10
`
`

`

`In Step 7a, “Optional Pairing,” a user inputs a PIN code into both devices—just
`
`as Mashita describes:
`
`11
`
`

`

`Ex. 2018, 866 (highlighting added); Ex. 1024, ¶¶13, 18. The Bluetooth
`
`specifications repeatedly describe pairing occurring by a user entering a PIN, for
`
`example:
`
` Ex. 2018, 412 (“When two devices do not have a common link key an
`
`initialization key (Kinit) shall be created using either the pairing or Secure
`
`Simple Pairing procedures. When pairing is used, Kinit shall be created
`
`based on a PIN, and a random number and a BD_ADDR.”) (emphasis
`
`12
`
`

`

`added) (see also Ex. 1017 (Bluetooth version 2.0+EDR Specification
`
`excerpts), 29 (similar description)).
`
` Ex. 2018, 1258 (“The PIN is used in the pairing procedure (see Section
`
`11.2 on page 241) to generate the initial link key that is used for further
`
`authentication.”).
`
`Both expert witnesses agree that a POSITA would be familiar with the
`
`Bluetooth specification documents. Ex. 1001, ¶¶54, 87; Foley Depo., 48:14-21,
`
`56:18-25. A POSITA thus would have known that the PIN inputs disclosed in
`
`Mashita would result in a paired connection. Ex. 1024, ¶¶12-13, 15-16.
`
`Against the clear evidence discussed above, Cellspin offers various
`
`arguments for why Mashita does not disclose establishing a paired connection.
`
`Each is demonstrably factually wrong.
`
`First, Cellspin repeatedly claims that Mashita only discloses
`
`“authentication,” not “pairing,” (Response, 23-24, 35). As shown in the Bluetooth
`
`specification excerpts above, authentication is part of the Bluetooth pairing process
`
`and uses the PIN. Ex. 1024, ¶¶14-16. It is thus correct to describe Bluetooth
`
`pairing as an “authentication process,” as Mashita does. Mashita, [0051].
`
`Similarly, Cellspin argues that Mashita does not “mention the concept of a link
`
`key” (Response, 24). Again, as shown above, the Bluetooth pairing process
`
`described in Mashita results in a link key. Ex. 1024, ¶¶15-16; Ex. 2018, 414
`
`13
`
`

`

`(“When Kinit is calculated in both devices the link key shall be created.”) (emphasis
`
`added). Notably, the ’698 patent does not mention a link key either. Foley Depo.,
`
`57:4-8. This illustrates the point: both Mashita and the ’698 patent disclose
`
`establishing a paired Bluetooth connection despite not explicitly disclosing every
`
`detail described in the Bluetooth specifications. See Foley Depo., 49:23-50:1,
`
`88:24-89:8.
`
`Notably, Cellspin/Foley do not cite a single description in the Bluetooth
`
`specifications of a user inputting a PIN other than pairing. Referring again to the
`
`Bluetooth connection diagram shown above, the description of Step 7b, “Optional
`
`Authentication,” in instructive. Unlike “Optional Pairing,” this step does not
`
`involve entering a PIN into either device. Ex. 2018, 867.
`
`Likewise, while Cellspin/Foley claim that Bluetooth allows for an
`
`authenticated connection without pairing (Response, 35, 37; Ex. 2009, ¶¶105, 111),
`
`they cite no evidence that this is true from the 1400-plus pages of Bluetooth
`
`specification documents they submitted as exhibits. See 37 C.F.R. § 42.65(a); Ex.
`
`1024, ¶19. To the contrary, the “optional authentication” step described above
`
`happens only if “a common link key exists between the devices.” Ex. 2018, 867;
`
`Ex. 1024, ¶17. This common link key is created during pairing. That is,
`
`authentication without pairing would only happen if the devices previously had
`
`been paired. Id.
`
`14
`
`

`

`Second, Cellspin/Foley assert that “Mashita teaches a technique more similar
`
`to LMP authentication than pairing.” Response, 24; Ex. 2009, ¶78. This claim is
`
`wholly unsupported by evidence or rationale. See 37 C.F.R. § 42.65(a). Dr. Foley
`
`confirmed that the “LMP Authentication” he was referring to is described as a
`
`phase of “Secure Simple Pairing,” which was introduced in 2007 as discussed
`
`above. Foley Depo., 87:12-88:20; Ex. 2018, 1058 (“Phase 5: LMP Authentication
`
`and Encryption”). Mashita, filed in 2001, could not be describing Secure Simple
`
`Pairing. Even that section of the Bluetooth specifications does not describe LMP
`
`authentication as distinct from pairing, but rather as “the same as the final steps in
`
`legacy pairing.” Ex. 2018, 1067.
`
`Third, Cellspin argues that because Mashita discloses IrDA as an alternative
`
`to Bluetooth, Mashita’s Bluetooth connection must not be paired. Response, 24-
`
`25; Ex. 2009, ¶79. This argument has it backwards. Bluetooth and IrDA are
`
`“vastly different.” See Foley Depo., 104:22-105:24. Mashita gives both as
`
`options. Id. So a POSITA would know to select between them based on the
`
`desired characteristics, e.g., if IrDA does not allow paired connections, a POSITA
`
`would choose Bluetooth if a paired connection was desired.
`
`Fourth, and finally, Cellspin argues that Mashita terminates the Bluetooth
`
`connection “after every transaction,” and this is the “antithesis” of pairing.
`
`Response, 25-30. But the cited Figures of Mashita (6 and 7) actually show that the
`
`15
`
`

`

`Bluetooth connection does not terminate after every image transfer. Figures 6 and
`
`7 describe the same process of image transfer from the perspective of the cellular
`
`phone and digital camera, respectively. Ex. 1023, 100:1-102:6; Mashita, [0059];
`
`Ex. 1024, ¶49.
`
`The key is step S610 in Figure 6:
`
`Here, Dr. Foley’s deposition testimony speaks for itself:
`
`Q So looking back at Figure 6, at step S610, there are two lines
`coming out of S610. One is labeled yes. One is labeled no. Right?
`A Correct.
`
`16
`
`

`

`…
`Q Did you describe in your declaration what happens if the answer
`is no in step S610?
`A No, I don't believe so.
`…
`
`Q Paragraph 71 [of Mashita] is describing what happens when the
`answer is no in Figure 6, right, when the user has not instructed the
`end of the file transfer program, right?
`A Correct.
`Q And in that case, the cellular phone transitions back to a file
`reception mode, step S604, right?
`A Correct.
`Q And after returning back to S604, the cellular phone could receive
`another image file from the digital camera, correct?
`A It could, yes.
`…
`Q It depends on the user input as to whether or not to end the file
`transfer program, right?
`A Correct.
`Q So if the user decides to not end the file transfer program,
`multiple images could be transferred from the digital camera to the
`phone before the wireless link is terminated, right?
`
`A In one session, multiple images could be transferred.
`Foley Depo., 103:7-104:21 (emphasis added).
`
`17
`
`

`

`Thus, Mashita indeed does have a “waiting” state machine (see Response,
`
`29)— Mashita’s system reverts to Step S604, “file reception mode,” after every
`
`image transfer at Step S610 unless and until the user instructs the phone to end the
`
`file transfer program (and in turn, the Bluetooth connection). Ex. 1024, ¶¶50-56;
`
`Mashita, [0070]-[0072], [0078]. What Mashita describes is like any other paired
`
`Bluetooth connection where a user can unpair the devices. Ex. 1024, ¶57; see Ex.
`
`1023, 58:18-59:15.
`
`B. Mashita Also Discloses The “Cryptographically Authenticating
`Identity” Portion Of Limitation C.
`
`Cellspin acknowledges that Mashita discloses the two Bluetooth devices
`
`authenticating the identity of each other. Response, 23-24, 35. Mashita’s paired
`
`connection clearly is “cryptographically” doing so under the correct claim
`
`construction, as it uses a shared passkey (PIN) on the digital camera and cellular
`
`phone. Institution Decision, 10-13; Petition, 11-12, 39-42.
`
`Mashita’s disclosure meets even Cellspin’s incorrect claim construction.
`
`First, Cellspin explains that cryptographically authenticating is inherent in
`
`Bluetooth pairing. Response, 17-18. This is consistent with the Challenged
`
`Claims’ language (“establishing a short-range paired wireless connection
`
`comprises [includes], the digital camera device cryptographically authenticating
`
`identity of the cellular phone.”) Likewise, the ’698 patent’s specification only
`
`describes Bluetooth pairing as a way “cryptographically authenticating” occurs.
`18
`
`

`

`’698 patent, 3:65-4:21. Because Mashita discloses pairing, it also discloses
`
`“cryptographically authenticating [the] identity” of the two paired devices.
`
`Furthermore, the Bluetooth specifications show that Mashita’s Bluetooth
`
`connection would use “encryption and decryption involving an algorithm.” The
`
`specifications describe how “[t]he key used for authentication” is derived using a
`
`“key generating algorithm” which exploits a “cryptographic function.” Ex. 2018,
`
`1055-57 (emphasis added). That algorithm uses as inputs “the PIN [] augmented
`
`with the BD_ADDR” to generate Kinit, and in turn, a link key, which is “used in the
`
`authentication between the two devices.” Id., 414, 1055-57. BD_ADDR is the
`
`Bluetooth physical address. Ex. 1024, ¶¶15-16. Mashita likewise discloses
`
`authentication using a PIN and the devices’ Bluetooth physical addresses. Id.;
`
`Mashita, [0030], [0040], [0051]. A POSITA would thus understand that Mashita’s
`
`described authentication process would be “cryptographic” using an “algorithm.”
`
`Ex. 1024, ¶15.
`
`C.
`
`At Minimum, it Would Have Been Obvious to a POSITA to
`Implement the Bluetooth Connections described in Mashita,
`Onishi, and Hiraishi as a Paired Connection.
`
`The Petition specifically argues that Limitation C at least would have been
`
`obvious given the prior art’s disclosure of Bluetooth connections. Petition, 41
`
`(regarding “cryptographically authenticating”), see also 39 (referring to this
`
`19
`
`

`

`discussion when discussing “paired” connections); Institution Decision, 23
`
`(acknowledging Petitioners made this argument), 26.
`
`Here are the undisputed facts:
`
` Mashita, Onishi, and Hiraishi each expressly disclose a Bluetooth
`
`connection between a cellular phone and digital camera. Petition, 33-35.
`
` Bluetooth connections, including specifically for image transfer, had to be
`
`either paired or not—as Dr. Foley affirmed, “those were the only two
`
`options.” Foley Depo., 42:25-43:6.
`
` Products containing Bluetooth wireless technology were “compliant with
`
`the Bluetooth specification.” Id., 28:21-23.
`
` All Bluetooth devices “must support pairing as defined in” the Bluetooth
`
`specifications. Ex. 1020, 16 (emphasis added); Foley Depo., 47:1-20.
`
` Hundreds of millions of Bluetooth devices were shipped annually by the
`
`’698 patent’s priority date. Foley Depo., 27:23-28:16.
`
` The benefits of paired connections included authentication, a mechanism
`
`for secure data exchange, and saving information about the devices for
`
`future use. Foley Depo., 44:14-45:1.
`
` A POSITA would have understood these benefits of using a paired
`
`connection. Foley Depo., 45:25-46:3.
`
`20
`
`

`

` And, as Dr. Foley testified, “a POSITA could have downloaded and read
`
`the Bluetooth specifications and implemented as defined within those
`
`specifications” a paired connection for image transfer. Foley Depo.,
`
`48:14-21.
`
`This is textbook obviousness. There was a finite number—only two—of
`
`identified and known ways to implement the Bluetooth connections disclosed in
`
`Mashita, Onishi, and Hiraishi, and a POSITA would have reasonably expected
`
`success in implementing the connections in one of those ways (paired). See KRS
`
`Int’l Co. v. Teleflex, Inc., 550 U.S. 398, 421 (2007) (“a person of ordinary skill has
`
`good reason to pursue the known options within his or her technical grasp”).
`
`Moreover, a POSITA would have found it obvious to do so to benefit from the
`
`well-understood advantages of pairing. See, e.g., E.I. du Pont De Nemours & Co.
`
`v. MacDermid Printing Sols., 657 Fed.Appx. 1004, 1011-15 (Fed. Cir. 2016)
`
`(claimed process was obvious where there were only a finite number of options
`
`and the benefits of the claimed options were known).
`
`The Bluetooth specifications even explicitly teach that a paired connection is
`
`suitable for image transfer. Cellspin states that “[t]ypically, pairing requirements
`
`for a given use case are specified in the Bluetooth Profile defining that use case”
`
`and that the “scenarios most in line with those in the ’698 patent, i.e. pull based or
`
`push based image transfer” are described in the Basic Imaging Profile (“BIP”).
`
`21
`
`

`

`Response, 37-38, 49. These are critical admissions, because the BIP instructs that
`
`“pairing can be performed as necessary and is left to the implementer’s
`
`discretion.” Ex. 1020, 16 (emphasis added). This is an express suggestion in the
`
`prior art to use a paired connection. Further, Dr. Foley admits that whether to use
`
`pairing is simply an “implementation detail” for a POSITA. Ex. 2009, ¶113; Foley
`
`Depo., 39:24-43:25. In other words, a POSITA could “implement [pairing as] a
`
`predictable variation and would see the benefit of doing so,” a hallmark of
`
`obviousness. See KSR, 550 U.S. at 401.
`
`D.
`
`Cellspin’s Arguments Do Not Apply to the Non-Method
`Challenged Claims.
`
`Cellspin’s arguments turn on the prior art’s supposed failure to disclose the
`
`“actual method step” of pairing. See Response, 34, 36. But Challenged Claims 5,
`
`7, 8, 10-13, and 15-20 require only a digital camera “configured to” establish a
`
`paired connection with a cellular phone (or instructions for doing the same), not an
`
`“actual method step.” The digital cameras in Mashita, Onishi, and Hiraishi
`
`indisputably are configured to meet Limitation C in these non-method claims
`
`because they have Bluetooth capability. Response, 35 (“a POSITA would
`
`understand that Bluetooth allows for an optional short-range paired wireless
`
`connection.”) Indeed, every Bluetooth device necessarily was configured to
`
`establish a paired Bluetooth connection and, in turn, cryptographically authenticate
`
`the identity of other Bluetooth devices. See supra Section IV.B.
`22
`
`

`

`V.
`
`LIMITATION G IS OBVIOUS IN VIEW OF THE COMBINATION
`
`Cellspin argues that Mashita and Hiraishi cannot be combined to yield this
`
`limitation because Mashita’s Bluetooth connection terminates after every
`
`transaction (Response, 40-41); this is not what Mashita actually discloses as
`
`explained above in Section IV.A.
`
`Besides, the Challenged Claims do not require a “waiting” state machine as
`
`Cellspin suggests. Claim 1’s method requires only transferring one file, and the
`
`other claims require only the capability to transfer one file. The Challenged
`
`Claims impose no temporal requirement on the Bluetooth connection. Foley
`
`Depo., 98:23-25, 99:2-4, 99:10-13, 99:15-17 (“after it’s [the method of claim 1]
`
`done, if the connection was unpaired, I don’t see where Claim 1 says that once you
`
`paired it, it has to remain paired indefinitely.”)
`
`VI. LIMITATION J IS OBVIOUS IN VIEW OF THE COMBINATION.
`
`Faced with compelling evidence

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket