throbber
 
`

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`PANASONIC CORPORATION OF NORTH AMERICA ET AL.
`Petitioners,
`
`vs.
`
`CELLSPIN SOFT, INC.,
`Patent Owner
`
`
`CASE: PR2019-00131
`Patent No. 9,258,698
`
`
`PATENT OWNER’S SUR-REPLY TO PETITIONER’S REPLY
`
`1 
`
`

`


`
`I.
`II.
`
`III.
`
`IV.
`
`V.
`

`VI.
`
`
`
`B.
`C.
`
`TABLE OF CONTENTS
`INTRODUCTION ...................................................................................................1
`PANASONIC’S ALLEGATIONS ABOUT THE FOLEY
`DECLARATION ARE GROUNDLESS. THE DECLARATION
`SHOULD BE GIVEN FULL WEIGHT ..................................................................2
`CLAIM CONSTRUCTION .....................................................................................2
`A.
`“Pairing” is different from “Authentication,” and both are
`different from “Encryption” .........................................................................2
`
`Cellspin’s Construction of “Paired Connection” is Correct ........................3
`Cellspin’s Construction of “Cryptographically Authenticating”
`is Correct ......................................................................................................4
`Cellspin’s Construction of GUI is Correct ...................................................4
`D.
`Cellspin’s Construction of “A Software Application” is Correct ................5
`E.
`THE V2.1+EDR BLUETOOTH CORE SPECIFICATION LIST
`MANY OPTIONAL ACTIVITIES. THE MERE MENTION OF
`“BLUETOOTH CONNECTION” IN MASHITA, ONISHI OR
`HIRAISHI DOES NOT ESTABLISH PAIRED CONNECTIONS ........................6
` LIMITATION C (I.E., A PAIRED CONNECTION) IS NOT
`DISCLOSED IN MASHITA, ONISHI or HIRAISHI. FURTHER,
`PANASONIC AND DR. STRAWN’S NEW OBVIOUSNESS
`THEORY IS UNFOUNDED ...................................................................................7
`A.
`Mashita, Onishi or Hiraishi Does Not Disclose Establishing a
`Paired Connection Between a Cellular Phone and Digital
`Camera .........................................................................................................7
`Mashita Does Not Disclose
`the
`“Cryptographically
`Authenticating Identity” Portion of Limitation C ......................................15
`
`Cellspin’s Arguments Apply to the Non-Method Challenged
`Claims. .......................................................................................................20
`
`B.
`
`C.
`
`LIMITATION G IS NOT OBVIOUS IN VIEW OF THE
`COMBINATION, INCLUDING BECAUSE THE COMBINATION
`LACKS THE PATENTED FEATURE .................................................................20
`
`
`VII. LIMITATION J IS NOT OBVIOUS IN VIEW OF THE ALLEGED
`COMBINATION ...................................................................................................22
`A.
`Cellspin’s “Teaching Away” Contention is Correct ..................................22
`

`
`i 
`
`

`


`
`B.
`
`
`The Disadvantage of HTTP Acknowledged by Mashita is
`Relevant to the Challenged Claims ............................................................24
`
`
`VIII. LIMITATION K IS NOT OBVIOUS IN VIEW OF THE
`COMBINATION ...................................................................................................25
`CELLSPIN’S ANTECEDENT BASIS ARGUMENT FOR
`“APPLICATION” FOR CLAIMS 5 AND 8 IS DISPOSITIVE OF
`THOSE AND THEIR DEPENDENT CLAIMS. FURTHER,
`PANASONIC’S NEW “MODULE” THEORY IS IMPROPERLY
`NEW AND FACTUALLY MERITLESS .............................................................26
`THESE PROCEEDINGS ARE UNCONSTITUTIONAL ....................................26
`
`IX.
`
`X.
`
`
`
`
`

`
`ii 
`
`

`


`
`TABLE OF AUTHORITIES
`O2 Micro Int’l v. Beyond Innovation Tech., 521 F.3d 1351 (Fed.Cir. 2008) ...................4,5
`Baldwin Graphic Sys. v. Siebert, 512 F.3d 1338, 1342 (Fed.Cir.2008) ..............................5
`01 Communique Lab. v. LogMeIn, 687 F.3d 1292, 1297 (Fed.Cir.2012) ...........................5
`Otsuka Pharmaceutical Co. v. Sandoz, 678 F.3d 1280, (Fed.Cir. 2012) ...........................19
`Dippin' Dots v. Mosey, 476 F.3d 1337 (Fed.Cir. 2007) .....................................................25
`Power Mosfet Tech. v. Siemens AG, 378 F.3D 1396 (Fed.Cir. 2004) ...............................25
`McClurg v. Kingsland, 42 U.S. (1 How.) 202 (1843) ........................................................26
`James v. Campbell, 104 U.S. 356 (1881) .........................................................................26
`Usery v. Turner Elkhorn Minin, 428 U.S. 1 (1976) ...........................................................26
`Edmond v. U.S, 520 U.S. 651 (1997) .................................................................................26
`Free Enterprise Fund v. Public Company Accounting Oversight
`Board, 561 U.S. 477, 510 (2010) .......................................................................................26
`
`

`
`iii 
`
`

`


`
`I.
`
`INTRODUCTION
`
`Panasonic’s Reply brazenly attempts to assert improper new theories, evidence and other
`
`matters in what should be a reply. This Sur-Reply is subject to, and without waiving, Cellspin’s
`
`objections at Doc 25.
`
`Panasonic at least tacitly admits that neither Onishi nor Hiraishi disclose a paired Bluetooth
`
`connection. Panasonic’s erroneous assertion that Mashita discloses a paired connection relies upon
`
`improper new theories and assertions, but it is nonetheless groundless.
`
`Panasonic’s erroneous new theory of Bluetooth/pairing obviousness is improper.
`
`Irrespective, Panasonic fails to cite prior disclosure of a device that has performed any
`
`claimed method or a device that would be capable of the claimed functions. Panasonic’s
`
`assumption that all “Bluetooth” devices are capable of performing every function described in the
`
`Bluetooth specification is incorrect.Ex.2026,¶18.
`
`Panasonic fails to show to show teachings to render obvious at least:
`
`(1) a paired wireless connection between a camera and mobile device;
`
`(2) cryptographic authentication of the mobile device by the camera;
`
`(3) none of the proposed combinations disclose limitation G;
`
`(4) using HTTP to upload received files and additional data, e.g., Mashita teaches away from
`
`a cellular phone using HTTP;
`
`(5) combining Mashita with Hirashi would not work;
`
`(6) GUI’s in general and specifically not for image deletion on the wirelessly connected
`
`camera; and
`
`(7) for claims 5 and 8, a single mobile application performing all the required functions.
`

`

`
`
`
`1 
`
`

`


`
`II.
`
`PANASONIC’S ALLEGATIONS ABOUT THE FOLEY DECLARATION ARE
`GROUNDLESS.
`
`Dr. Foley was the author of his Declaration atEx.2009.Ex.2026,¶10. The similarities
`
`between Cellspin’s Response and Dr. Foley’s Declaration are due to Cellspin’s Response, which
`
`was drafted by Cellspin’s counsel, having copied or paraphrased matters from the Declaration. Id.
`
`III. CLAIM CONSTRUCTION
`
`A.
`
`“Pairing” is different from “Authentication,” and both are different from
`“Encryption”.
`
`
`There are 15 different optional activities following a Bluetooth connection:
`
`Ex.2006,p.19; Ex.2026,¶¶11-12.
`
`
`

`
`2 
`
`

`


`
`
`
`Ex.2006,p.861.
`
`Despite Panasonic’s attempt to conflate terms, a POSITA would clearly understand that
`
`pairing is different from authentication, and both are different from encryption, and all are
`
`optional in Bluetooth.Ex.2026,¶¶11-12. Which, if any, of these options are chosen for a
`
`connection depends on the requirements of the solution being implemented, for which profile
`
`specifications are used.Id.
`
`B.
`
`Cellspin’s Construction of “Paired Connection” is Correct.
`
`Panasonic misunderstands Cellspin’s construction, which states that a paired connection
`
`provides for encrypted data exchange, not that it’s required.Ex.2026,¶13. The concept of a paired
`
`connection, as established by the Bluetooth became known and adopted by certain other industry
`
`organizations creating wireless technology for device connections, such as WiFi Alliance and
`

`
`3 
`
`

`


`
`Zigbee Forum.Ex.2026,¶14. For example, WiFi Direct adopted the concept of pairing as defined
`
`by Bluetooth SIG. Id. This can be seen on the Canon website with Canon’s own EOS Utility
`
`software. Id.;Ex.2027,p.4;Ex.2028,p.1. The reason for storing the pairing information is so that it
`
`may be used again to avoid having to reauthenticate/re-pair.Ex.2026,¶14.
`
`Zigbee also adopted the concept of pairing as defined by Bluetooth .Ex.2026,¶14. With
`
`ZigBee, the “originator and recipient will store information about the other node in an entry in its
`
`pairing table.”Ex.2003,6;Ex.2026,¶15.
`
`Due to the parties’ construction/substantive dispute, it would be error not to construe
`
`“paired wireless connection” per Cellspin. See O2 Micro v. Beyond Innovation, 521 F.3d
`
`1351,1362 (Fed.Cir. 2008).
`
`B.
`
`Cellspin’s Construction of “Cryptographically Authenticating” is Correct.
`
`The touchstone of cryptography is that a person intercepting a transmission cannot
`
`understand it without a cipher/algorithm.Ex.2026,¶19. The notion that cryptographically includes
`
`mere secrecy or security is erroneous.Id. Panasonic’s only argument is that Mashita’s PIN is secret.
`
`See,Ex.1026,¶8. But if one intercepted the PIN, then they would know it.Ex.2026,¶20. This is not
`
`encryption.Id. This construction/substantive dispute must be resolved. See O2 Micro, supra.
`
`Panasonic’s assertion that Mashita’s PIN cryptographic authenticates is, at most, based
`
`upon speculation that one might use the PIN to generate encryption keys. Ex.2026,¶21.
`
`C.
`
`Cellspin’s Construction of GUI is Correct.
`
`Panasonic confuses graphical with “text-based” interfaces.Ex.2026,¶23. Panasonic
`
`incorrectly argues that using keystrokes to highlight areas of character-based interfaces constitutes
`
`a GUI. Id. Even if Cellspin’s proposed construction was rejected in part, an overbroad construction
`
`of GUI would be unreasonable if it allowed using keystrokes to highlight areas of a character-
`

`
`4 
`
`

`


`
`based interface.Id. It would be error to fail to resolve the parties’ construction/substantive dispute.
`
`See O2 Micro, supra.
`
`Panasonic misunderstands the incorporated ‘802 application, wherein Figure 3 exemplarily
`
`illustrates
`
`the publishing of multimedia content using application 202.Ex.2021,¶¶40-
`
`42Ex.2026,¶25. The “enter screen” on GUI 202a of the application 202 provides options for the
`
`selection of the medium for the multimedia content to be created. Id. One selects the preferred
`
`publication websites or publication virtual spaces 205 using an `add publishers` menu option
`
`provided on the enter screen.Id.
`
`Panasonic fails to understand that devices with a GUI can accept keystroke commands, but
`
`that does not mean that devices that only accept keystroke commands have GUIs.Ex.2026,¶26.
`
`Cellspin’s Construction of “A Software Application” is Correct.
`
`D.
`
`There are numerous references in the ‘698 patent to a single “client application 203.".
`
`Furthermore, Figures 2 and 4 depict one box for client application 203. The modules in Figures
`
`2/4 are clearly consolidated into a single application.Ex.2026,¶28.
`
`Panasonic’s new improper reply theory “fail[s] to see a distinction between using a client
`
`application composed of multiple modules and the combination of Mashita and Hiraishi, which
`
`would render such an approach obvious.”Ex.1024.¶25. However, there are both technical and
`
`usability aspects as to why this is incorrect.Ex.2026,¶29. Further, to teach HTTP server uploads,
`
`Panasonic relies upon on Hirashi. In Hirashi a browser uploads images to a server and a separate
`
`application obtains the camera image.Id. .
`
`When separate applications are used for obtaining the image from the camera and
`
`uploading it to the server, the uploading application must be made aware that there is a new image
`
`ready to be uploaded and where that image resides on the phone.Ex.2026,¶30. A POSITA would
`

`
`5 
`
`

`


`
`not have a reason to implement the single application taught in the ‘698 patent with multiple
`
`applications such as “browser” and separate “dedicated software” as would be required when
`
`combining Mashita and Hirashi.Id.
`
`Further, during ‘698 prosecution, the Examiner rejected then claims 1,3,8-9 over a
`
`combination including Hardman.Ex.1004,387;Ex.2029 (“Hardman”). Hardman was cited for its
`
`browser making HTTP requests.Ex.1004,p.390. In response, the Patentee acknowledged that “[i]n
`
`applicant's method,
`
`the software application
`
`(not
`
`the browser)” attached
`
`the user
`
`information.”Id.,p.372.
`
`Even the cases erroneously relied upon by Panasonic provide an exception that a/an means
`
`“one” when there is a clear intent expressed in intrinsic evidence or otherwise when the language
`
`of the claims themselves, the specification, or the prosecution history necessitate. See Baldwin
`
`Graphic Sys. v. Siebert, 512 F.3d 1338, 1342 (Fed.Cir.2008)); 01 Communique Lab. v. LogMeIn,
`
`687 F.3d 1292, 1297 (Fed.Cir.2012). At a minimum, even if Panasonic’s erroneous argument was
`
`accepted, the claims, specification and prosecution history meet this exception.
`
`IV.
`
`
`
`THE V2.1+EDR BLUETOOTH CORE SPECIFICATION LIST MANY
`OPTIONAL ACTIVITIES. THE MERE MENTION OF “BLUETOOTH
`CONNECTION” IN MASHITA, ONISHI OR HIRAISHI DOES NOT ESTABLISH
`PAIRED CONNECXTIONS.
`
`The Bluetooth Specification lists many optional activities.Ex.2026,¶16. The mere mention
`
`of “Bluetooth” in Mashita, Onishi or Hiraishi does not establish that the connections described in
`
`those references are paired. Id. The words “pair,” “paired” or “pairing” do not appear in these
`
`references.
`
`Fundamentally, Panasonic fails to cite the prior disclosure of a device that has performed
`
`Bluetooth pairing or even one that is capable of performing Bluetooth pairing.Ex.2026,¶18.
`
`Panasonic’s apparent assumption that the mere use of the word “Bluetooth” or “Bluetooth
`

`
`6 
`
`

`


`
`Connection” capability means that a device is capable of performing every function described in
`
`the voluminous Bluetooth specification is incorrect and unsupported.Id. Cellspin’s expert Dr.
`
`Foley is very well-versed in Bluetooth (e.g., was previously Executive Director and CEO of the
`
`Bluetooth SIG) and he is not aware of any commercial products which implement each and every
`
`feature in the specifications. Id. Panasonic has cited none.
`
`Even if the devices taught by Onishi, Hiraishi or Mashita had been disclosed as Bluetooth
`
`compliant, which they were not, there is no requirement that Bluetooth compliant devices be
`
`capable of pairing with other devices, that they be capable of cryptographic authentication, or that
`
`they be capable of many other features disclosed in a Bluetooth specification. Id. For example,
`
`there are error codes for when pairing is not allowed. Id. Further, there are Bluetooth compliant
`
`devices that lack the capability to pair or cryptographically authenticate.Id.
`
`V.
`
`
`
` LIMITATION C (I.E., A PAIRED CONNECTION) IS NOT DISCLOSED IN
`MASHITA, ONISHI OR HIRAISHI. FURTHER, PANASONIC AND DR.
`STRAWN’S NEW OBVIOUSNESS THEORY IS UNFOUNDED.
`
`A. Mashita, Onishi or Hiraishi Does Not Disclose Establishing a Paired
`Connection Between a Cellular Phone and Digital Camera.
`
`
`Panasonic mischaracterizes Mashita’s “PIN” as a passkey and then leaps to Mashita
`
`allegedly “pairing.”Ex.1026,¶¶9,40,94;Ex.2026,¶31. Panasonic conflates PINs/passkeys and
`
`pairing/authentication.Ex.2026,¶31.
`
`The concept of a passkey isn’t raised or mentioned in Mashita.Ex.2026,¶32;Ex.1006.
`
`Mashita
`
`states
`
`twice
`
`that
`
`only
`
`the
`
`physical
`
`device
`
`addresses
`
`are
`
`stored.Ex.1006,¶30&94;Ex.2026,¶32. No cryptographically created entity is derived from any PIN
`
`or passkey.Ex.1006,¶30;Ex.2026,¶32. Mashita’s 48-bit Physical address
`
`is NOT a
`
`cryptographically created entity derived from a PIN or passkey.Id.
`

`
`7 
`
`

`


`
`In Bluetooth the concept of a PIN and passkey are very different .Ex.2026,¶33. Panasonic
`
`bases its references to pairing in Bluetooth based on the v2.0+EDR Specification or older versions.
`
`However, in December 2007, the v2.1+EDR Bluetooth Core Specification was the current
`
`specification adopted by the Bluetooth SIG.Ex.2026,¶34. In v2.1+EDR, the older security modes
`
`relied upon by Panasonic were excluded. Id. Table 5.1 from the v2.1+EDR specification notes
`
`this:
`
`
`
`Ex.2006,p.1269;Ex.2026,¶34. In late 2007, a POSITA would not look at the excluded security
`
`modes for guidance.Ex.2026,¶34. Instead, they would look to the allowed security modes,
`
`specifically, the mandatory one--Security mode 4.Id.
`
`Even if one used the older, excluded, security modes to gain insight into pairing, one would
`
`still not come to the Panasonic’s conclusions.Ex.2026,¶35. Panasonic contends that the old
`
`Bluetooth security modes require pairing before authentication. This is incorrect as clearly stated
`
`in a page also referenced in the Strawn Declaration:
`

`
`8 
`
`

`


`
`
`
`Ex.2006,pp.865-867;Ex.2026,¶35. The text states “The LM will request if authentication is
`
`required.” This means that for pairing, authentication is optional.Ex.2026,¶35.
`
`Panasonic quotes text from the Bluetooth specification that a PIN is used for authentication,
`
`NOT pairing.Ex.1024,¶15(“authentication is performed”);Ex.2026,¶35. However, Authentication
`
`is not the same as Pairing. A POSITA understands, and Dr. Strawn has not apparently denied, that
`
`pairing may or may not be performed after authentication is performed.Ex.2026,¶37.
`
`Panasonic alleges that “pairing is optional in Step 7a only if pairing had been performed
`
`previously.” Ex 1024,¶17. This is incorrect.Ex.2026,¶38. Figure 3.1 in v2.1+EDR clearly shows
`
`that:
`

`
`9 
`
`

`


`
`
`
`Ex.2006,p.861Ex.2026,¶38. Specifically, “[a] number of these steps may be optionally performed,
`
`such as authentication and encryption.”Ex.2006,p.861;Ex.2026,¶38 .
`
`In Step 7b, it is stated that if a common link key doesn’t exist between the devices, i.e.,
`
`they haven’t previously been paired, and the configuration parameter Authentication_Enable is
`
`set, then the authentication procedure must be executed.Ex.2006,861;Ex.2026,¶39. This
`
`authentication procedure may create link keys used for the authentication without pairing of the
`
`devices.Ex.2026,¶39.
`
`Panasonic incorrectly alleges that, “pairing explicitly happens if a PIN is exchanged as in
`
`Mashita.”Ex.1024,¶17. However, even in the older security modes , a PIN isn’t exchanged between
`
`the devices.Ex.2026,¶40. The PIN is entered into each device and serves as one of multiple inputs
`
`into a key generation algorithm which is utilized in a challenge/response procedure. Id. After
`

`
`10 
`
`

`


`
`authentication has been performed, the devices may or may not have been paired.Id. On this point,
`
`Bluetooth v2.1+EDR is clear:
`
`The foregoing states that, “[t]his PIN code will be requested on both sides of the
`
`connection, and authentication performed based on this PIN code.”Ex.2006,p.696;Ex.2026,¶42.
`
`Thus, the PIN code is used for authentication, before pairing is completed.Ex.2026,¶43.
`
`The specification goes on to describe how the pairing process is finished in optional Step 7a shown
`
`
`

`
`11 
`
`

`


`
`in Figure 3.1: “The last step is for the new link key for this connection to be passed to the host so
`
`that it may store it for future connections.”Ex.2006,866;Ex.2026,¶43.
`
`The descriptions of Figure 3.1 cited above clearly demonstrate how one may authenticate
`
`a device without pairing.Ex.2026,¶45. As such, Mashita does not disclose a paired connection.Id
`
`Mashita only talks about non cryptographic authentication using PIN and saving just the 48-bit
`
`physical addresses of the devices for future connections.Ex.2026,¶49.
`
`Panasonic’s Dr. Strawn admits that, “the keys that result are stored so that when the two
`
`devices talk to each other later, they don’t have to…enter[] the PIN again.”Ex.2030,19:17-20. This
`
`agrees with Cellspin.Ex.2026,¶45.
`
`As shown in the relevant portions of the v2.1+EDR above, it is clear that authenticating
`
`a connection does not necessarily result in the connection becoming paired.Ex.2026,¶49.
`
`Panasonic
`
`contends
`
`that,
`
`“[e]ncrypted
`
`communication…can
`
`only
`
`follow
`
`authentication…”Ex.1024¶22. This is incorrect.Ex.2026,¶51. In for example, in the “Just Works”
`
`association model in Security Mode 4, an unauthenticated link key is created. Id. This link key is
`
`used
`
`to generate an encryption key
`
`for encrypted communication even absent
`
`authentication.Ex.2006,p.1286;Ex.2026,¶51. Even in older security modes, encryption occurred
`
`without authentication.Ex.2006,p.861;Ex.2026,¶51.
`
`The statement cited by Panasonic that, “[w]hen the Bluetooth PIN is referred to on UI level,
`
`the term ’Bluetooth Passkey’ should be used,” relates to “Terms at user interface level.”
`
`Ex.2006,p.1258;Ex.2026,¶55. This Section provides guidelines for presenting terms to end
`
`user.Ex.2006,p.1257;Ex.2026,¶55. These optional recommendations were for consistency
`
`between devices containing any version of Bluetooth technology, making it easier for the end
`

`
`12 
`
`

`


`
`user.Ex.2026,¶55. The term used for end users at the UI level has no bearing on how it is used
`
`within the algorithms or procedures in the device. Id.
`
`Panasonic is mistaken regarding answers provided by Dr. Foley regarding Mashita. Figures
`
`6 and 7 are repeated here:
`
`
`
`
`
`

`
`13 
`
`

`


`
`
`Figure 6 represents the flowchart or state machine for the cellular phone while Figure 7
`
`
`
`provides the same for the digital camera.Ex.2026,¶59. Dr. Foley was asked about the state
`
`machine of the cellular phone.Id. That state machine does have the decision point (step S610) to
`
`return and request another photo.Id. This is consistent with his answer. For the complete system
`
`to work in Mashita, the digital camera would have to have a similar decision point in the camera
`
`state machine to wait for the next image.Id. The digital camera state machine depicted in Figure 7
`
`doesn’t have such a decision point.Id. Instead it goes directly from S704 (Transmit File) to S705
`
`(Terminate Local Wireless Link).Id. The digital camera terminates the wireless link with the
`
`cellular phone immediately after transmitting the file.Id. Even if the user selected the path to
`
`receive another image in step S610 (End Transfer Program) and returned to step S604 (Receive
`
`File) it would be impossible to receive another image from the digital camera because the digital
`
`camera would have already terminated the link. Id. There isn’t a complementary decision point
`
`on the digital camera state machine to wait for a second file request. Id.
`
`Furthermore, if the user choses to receive another image in S610, the flow chart returns to
`
`S604 (Receive File), which is below step S602 (Connect Local Wireless Link) meaning that the
`
`cellular phone will not attempt to open the local wireless link again.Ex.2026,¶60. The missing
`

`
`14 
`
`

`


`
`state isn’t in the cellular phone, as Dr. Foley was cleverly asked about in the deposition, but in the
`
`digital camera, which he described in his prior declaration. Id.
`
`For a POSITA to implement a digital camera which would allow multiple images to be
`
`transferred using the state machine of Mashita Figure 7, a new decision block would need to be
`
`introduced into the camera device, which was not an obvious modification.Ex.2026,¶61. As
`
`noted, the combined system as described in Mashita works in a fashion where the wireless
`
`connection is terminated after every transaction. Id.
`
`What Panasonic states occurs in the “Terminate Local Wireless Link,” steps S611 in the
`
`cellular phone and S705 in the digital camera has evolved.Ex.2026,¶62. Panasonic newly contends
`
`that terminating the local wireless link is akin to unpairing the devices.Reply,p.18. If this was
`
`correct, then the “Connect Local Wireless Link,” step S602 in the cellular phone and step S701 in
`
`the digital camera might include the process of pairing the devices.Ex.2026,¶62. But the combined
`
`system as described in Mashita works in a fashion where the wireless connection is terminated
`
`after every transaction, i.e., after every image transfer. This would be very user unfriendly and
`
`something which a POSITA would not choose nor have a reason to implement.Id.
`
`Panasonic’s changing positions on establishment and termination of the local wireless link
`
`are necessary because Mashita doesn’t teach paired connections.Ex.2026,¶63.
`
`B. Mashita Does Not Disclose “Cryptographically Authenticating Identity.”
`
`As already noted, Mashita’s four digit PIN does not “cryptographically authenticate”
`
`anything because it is not used for encryption or decryption, it does not use an algorithm to encrypt,
`
`and it does not otherwise meet any of the requirements for “cryptographic” as properly construed.
`
`Panasonic alleges that Cellspin somehow admitted at pp. 17-18 of its Response that
`
`cryptographically authenticating is inherent in Bluetooth pairing. No such admission was made,
`

`
`15 
`
`

`


`
`and as noted herein, that is not the case. Further, as shown above, the Bluetooth specification
`
`permits paired but unauthenticated connections.Ex.2026,¶68.
`
`Panasonic’s argument that the specification describes Bluetooth pairing “as a way
`
`‘cryptographically authenticating’ occurs” is incorrect. What the cited specification says is that
`
`cryptographic authentication is optional, just as the Bluetooth Specification states.’698/3:65-
`
`4:21;Ex.2026,¶69.
`
`Panasonic’s new Reply theory that pairing a Bluetooth connection would be obvious is
`
`improper. In any event, Panasonic fails to show any meaningful or persuasive reason for a POSITA
`
`to pair the Mashita connection even if Bluetooth was being used.Ex.2026,¶71. Panasonic states
`
`that there are benefits of pairing, without meaningfully describing such benefits, including for
`
`Mashita specifically.
`
`Moreover, Panasonic fails to mention disadvantages of pairing, such as a poor user
`
`experience.Ex.2026,¶73. In late 2007, a POSITA would be inclined not to create a system which
`
`required pairing devices because the Bluetooth specifications didn’t require pairing. Id. Even in
`
`Security Mode 4 introduced in v2.1+EDR, the default security requirement was an
`
`unauthenticated link key, which doesn’t require the entry of a PIN, passkey or comparison of a
`
`passkey by the user.Ex.2006,p.1273;Ex.2026,¶73.
`
`The specification describing image transfer via Bluetooth, Basic Imaging Profile (BIP),
`
`defines six features including Image Pull and Automatic Archive.Ex.1020,p.15;Ex.2026,¶74.
`
`Image Pull is most applicable to the teachings of the ‘698 patent. Id. Image Pull was envisioned
`
`for browsing through the existing images on the digital camera and pulling an image requested by
`
`the user. Id. Automatic Archive typically downloads all the existing images from the digital camera
`

`
`16 
`
`

`


`
`to the cellular phone for backup purposes. Id. The two features are significantly different and have
`
`difference security requirements defined in BIP.Ex.1020,pp.1516;Ex.2026,¶74.
`
`The fact that different features had difference security recommendations defined in BIP
`
`demonstrates
`
`that
`
`the authors of BIP considered
`
`the security requirements of each
`
`feature.Ex.2026,¶74. The recommendation as to whether or not pairing should be recommended
`
`for each feature was a conscience decision made by the authors of BIP. Id. After this consideration
`
`by the authors, BIP did not recommend pairing for the Image Pull feature. Id.
`
`Furthermore, both BIP Image Pull, and the Archiving feature, relied upon by
`
`Panasonic,
`
`do
`
`not
`
`recommend
`
`“cryptographic
`
`authentication”
`
`in
`
`the
`
`specification.Ex.2026,¶75.
`
`Furthermore, since the Image Pull feature in BIP was envisioned for browsing through the
`
`existing images on the digital camera and pulling an image requested by the user, it does not teach
`
`the methods of the ‘698 patent.Ex.2026,¶76. In the ‘698 claims, the digital camera and cellular
`
`phone must be paired before the image is captured by the digital camera. See, e.g., Ex 1003,11:56-
`
`12:2 (“the new-media is acquired after establishing the short-range paired wireless connection”).
`
`While in BIP it is clear the images already exist on the digital camera for both Archiving and Image
`
`pull: “The Image Pull feature browses through the images stored on the Imaging Responder
`
`device”Ex.1020, p. 16;Ex.2026,¶74. While superficially resembling the teachings of the ‘698
`
`patent, the Image Pull feature in BIP teaches a different sequence of steps and different usage
`
`model.Ex.2026,¶77.
`
`In the relevant 2007 timeframe, Bluetooth technology had a reputation as being too difficult
`
`for end users to pair devices.Ex.2026,¶71. A POSITA would surely look at Secure Simple Pairing,
`

`
`17 
`
`

`


`
`Security Mode 4, the default mode (unpaired, encrypted, unauthenticated and unauthorized), as
`
`the method to implement. Id.
`
`The v2.1+EDR Bluetooth Core Specification lists many optional activities.Ex.2026,¶80.
`
`The mere mention of “Bluetooth connection” in Mashita, Onishi or Hiraishi prior art does not
`
`establish that the connections described in those references are paired. Id. As shown in the figure
`
`below there are 15 optional activities after a Bluetooth connection is established:
`
`
`
`Ex.2006,p.19;Ex.2026,¶80.
`
`With 15 optional activities, there are 215–1=32767 total combinations of optional activities
`
`after ACL connection establishment.Ex.2026,¶81. Even if all the options are not mutually
`
`exclusive, the number of combinations will be reduced from 32767, but will remain a very large
`
`number of possible combinations. Id. The ‘698 patent specification teaches one particular
`

`
`18 
`
`

`


`
`combination from the large number of available options. It is only through hindsight that this one
`
`particular option appears obvious and wasn’t a simple design decision in 2007 when the ‘698
`
`patent was filed. Id. Further, it is improper to select from a laundry list of options, especially here
`
`when hindsight construction is involved, when there are no persuasive reasons to combine, and
`
`when the standard relied upon has a different default and different pertinent use case. See Otsuka
`
`Pharmaceutical, Ltd. v. Sandoz, 678 F.3d 1280,1293–1294 (Fed.Cir. 2012).
`
`Panasonic asserts there are only two options: paired/unpaired. This is an oversimplification
`
`of the Bluetooth connection model.Ex.2026,¶82. Even with only the security modes described in
`
`the Exhibit 2006, v2.1+EDR Bluetooth Core specification, which is what a POSITA would have
`
`consulted for Bluetooth in the 2007 timeframe, there are significantly more options than just paired
`
`or unpaired. A more complete list of options is:
`
`Unpaired, unencrypted, unauthenticated and unauthorized
`Unpaired, unencrypted, unauthenticated and authorized
`Unpaired, unencrypted, authenticated and unauthorized
`Unpaired, unencrypted, authenticated and authorized
`Unpaired, encrypted, unauthenticated and unauthorized (default mode)
`Unpaired, encrypted, unauthenticated and authorized
`Unpaired, encrypted, authenticated and unauthorized
`Unpaired, encrypted, authenticated and authorized
`Paired, unencrypted, unauthenticated and unauthorized
`Paired, unencrypted, unauthenticated and authorized
`Paired, unencrypted, authenticated and unauthorized
`Paired, unencrypted, authenticated and authorized
`Paired, encrypted, unauthenticated and unauthorized
`Paired, encrypted, unauthenticated and authorized
`Paired, encrypted, authenticated and unauthorized
`Paired, encrypted, authenticated and authorized
`
`Ex.2026,¶82. Panasonic’s attempt to oversimplify these connection options as simply
`
`paired/unpaired results in an inaccurate analysis of the Bluetooth specifications and how they are
`
`implemented. Id.
`

`
`19 
`
`

`


`
`The default connection mode described in the v2.1+EDR Bluetooth core specification is
`
`for the connection to be unpaired, encrypted, unauthenticated and unauthorize.Ex.2006,p.1273.
`
`Without other requirements in place for a connection to be paired, there is no substantial reason
`
`that a POSITA would not choose the default connection.Ex.2026,¶84(unencrypted, authenticated
`
`and/or authorized). For example, the most widely used application for image transfer currently
`
`used is AirDrop provided by Apple. Id. AirDrop uses a different connection option that does not
`
`require entering a passkey or doing a numeric comparison on either device. Id. AirDrop doesn’t
`
`pair the devices exchanging images. Id.
`
`C. Cellspin’s Arguments Apply to the Non-Method Challenged Claims.
`
`Eve

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket