throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`______________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`______________________
`
`PANASONIC CORPORATION OF NORTH AMERICA, ET AL.
`Petitioners
`
`v.
`
`CELLSPIN SOFT, INC.
`Patent Owner
`
`______________________
`
`Patent No. 9,258,698
`Inter Partes Review No. 2019-00131
`
`______________________
`
`DECLARATION OF DR. MICHAEL FOLEY CONCERNING PATENT OWNER’S
`SUR-REPLY TO PETITIONER’S REPLY
`
`
`
`1
`
`
`
`

`
`CELLSPIN
`EX. 2026, Page 1
`
`

`

`I, Dr. Michael Foley, declare as follows:
`
`I.
`
`INTRODUCTION, BACKGROUND AND QUALIFICATIONS
`
`1.
`
`My name is Michael Foley, and I am currently the CEO of Innovative Yachtter
`
`Solutions, which provides consulting services relating to Internet-of-Things products, for example
`
`products that utilize Bluetooth® Low Energy technology.
`
`2.
`
`Panasonic Corporation and Panasonic Corporation of North America (collectively
`
`“Petitioner” or “Panasonic”) filed a Petition (Doc 1,) to institute an inter partes review of claims
`
`1, 3–5, 7, 8, 10–13, and 15–20 (“challenged claims”) of U.S. Patent No. 9,258,698 (“’698 patent”).
`
`Ex. 1003. The Petition is supported by the first declaration of Dr. John Strawn, which is Ex. 1001.
`
`The Patent Trial & Appeal Board (“PTAB” or “Board”) instituted inter parties review (Doc 11,
`
`“Institution Decision”). The Patent Owner Cellspin Soft, Inc. (“Cellspin”) filed its Preliminary
`
`Response (Doc 7) on January 30, 2019. Cellspin filed its Response (Doc 19) on July 22, 2019,
`
`along with my prior declaration at Exhibit 2009. Panasonic filed its Reply (Doc 24) on October
`
`15, 2019. Panasonic’s Reply is supported by the Second Declaration of Dr. John Strawn, which
`
`is Ex. 1024. Unless specifically indicated otherwise herein, references herein to Dr. Strawn’s
`
`contentions or to his “Declaration” are directed at his Second Declaration at Ex. 2014. Cellspin
`
`filed objections (Doc 25) to Panasonic’s Reply and to the Strawn Declaration on October 22, 2019.
`
`3.
`
`I have been asked by Cellspin to provide my opinions and analysis responsive to
`
`issues raised by in Petitioner’s Reply and/or the Strawn Declaration at Ex. 2014. For this work I
`
`am being compensated at the rate of $400 per hour. The amount of my compensation is not
`
`dependent upon the substance of my opinions or upon the outcome of this matter.
`
`4.
`
`A true and correct copy of my CV is at Ex. 2010. I received a Bachelor of Science
`
`degree in Electrical Engineering (“EE”) from the University of Iowa, and a Master’s degree and
`

`
`2
`
`CELLSPIN
`EX. 2026, Page 2
`
`

`

`Ph.D. in EE from Arizona State University.
`
`5.
`
`From 1999 to 2004, I worked at Microsoft Corporation as a wireless systems
`
`architect, where I worked on integrating wireless technology into Windows® and WinCE®
`
`platforms. I was also the Microsoft representative to several standards groups, including the
`
`Bluetooth Special Interest Group (“SIG”), the WAP Forum, and the Wi-Fi Alliance.
`
`6.
`
`From 2004 to 2012, I worked at the Bluetooth SIG as Executive Director and CEO.
`
`My responsibilities as Director and CEO of the Bluetooth SIG included, but were not limited to,
`
`directing strategy, member relations, operations, and technology development, expanding the
`
`Bluetooth SIG into Europe and Asia, and managing Bluetooth SIG board meetings.
`
`II.
`
`SUMMARY OF OPINIONS
`
`7.
`
`In addition to the points made in my original declaration at Ex. 2009, Panasonic’s
`
`Reply and the Strawn Declaration highlight that at least these key points are not shown in any of
`
`the materials in which I have reviewed:
`
` a paired wireless connection between a camera and a mobile device;
`
` cryptographic authentication of the mobile device by the camera;
`
` none of the proposed combinations disclose limitation G (request from the mobile device)
`
` using HTTP to upload received file and additional data, e.g., Mashita teaches away from a
`
`cellular phone using HTTP;
`
` combining Mashita with Hirashi would not work;
`
` GUI’s in general and specifically not for image deletion on the wirelessly connected
`
`camera; and
`
`
`
`for claims 5 and 8, a single mobile application performing all the required functions (e.g.,
`
`request, store, HTTP media upload, delete using GUI).
`

`
`3
`
`CELLSPIN
`EX. 2026, Page 3
`
`

`

`8.
`
`In the analysis that follows, I supplement any prior pertinent analysis, focusing on
`
`responding to the Reply and Strawn Declaration, and present my detailed analyses providing clear
`
`rational as to why these and other items are not disclosed or rendered obvious by the asserted prior
`
`art. To the extent necessary or appropriate to provide background, context of support to the matters
`
`herein, my prior Declaration at Ex. 2009 is incorporated by reference herein.
`
`III.
`
`LEGAL UNDERSTANDINGS
`
`9.
`
`I am not a lawyer. My initial legal understandings are stated in my prior Declaration
`
`at Ex. 2009. Any other legal understandings are stated in the body of my report. I have received
`
`my understanding of legal standards, but not factual matters, from Counsel for Cellspin.
`
`IV.
`
`PANASONIC’S ASSUMPTIONS ABOUT MY PRIOR DECLARATION ARE
`INCORRECT
`
`10.
`
`Panasonic incorrectly assumes that my Declaration at Ex. 2009 was copied or
`
`“parroted” from Cellspin’s Response. I am the author of my Declaration at Ex. 2009. I never saw
`
`Cellspin’s Response while I was authoring or drafting my prior Declaration. I did not copy, parrot,
`
`paraphrase or even borrow anything from a Response document that I had not seen. The only
`
`Response that I had seen prior to drafting my prior Declaration was Cellspin’s Preliminary
`
`Response (Doc 7). The opinions and analysis expressed in my prior Declaration, and in this
`
`Declaration, are my own. The similarities between Cellspin’s Response and my Declaration are
`
`due to Cellspin’s Response, which was drafted by Cellspin’s counsel, having copied or
`
`paraphrased matters from my Declaration, including as I was close to reaching a final draft of that
`
`Declaration, and also including from the near final and ultimately final draft of the Declaration.
`
`The foregoing process is also being used for this Declaration, namely, that I have not copied,
`
`parroted, paraphrased or even borrowed anything from Cellspin’s Sur-Reply, which I have not
`
`seen as of the completion and signing of this Declaration.
`

`
`4
`
`CELLSPIN
`EX. 2026, Page 4
`
`

`

`V.
`
`CLAIM CONSTRUCTION
`
`A.
`
`11.
`
`“Pairing” is different from “Authentication” and both are different from
`“Encryption”.
`
`As shown in the figure below [Ex 2006, p. 19], there are 15 different optional
`
`activities after a Bluetooth connection is established. Pairing, Authentication and Encryption are
`
`different optional activities. Also, as shown in Figure 3.1 in the v2.1+EDR Bluetooth Core
`
`Specification [Ex. 2006, p. 861] it again clearly shows that the Pairing is different from
`
`Authentication and both of them are different from Encryption.
`
`
`

`
`5
`
`CELLSPIN
`EX. 2026, Page 5
`
`

`

`
`
`
`
`12.
`
`A POSITA would clearly understand that pairing is different from
`
`authentication and both are different from encryption. Which, if any, of these options are
`
`chosen for a connection depends on the requirements of the solution being implemented. In the
`
`Bluetooth family of specifications, Profile specifications are used to describe how to implement a
`
`particular use case or family of related use cases. Petitioner in his petition and in his reply brief
`
`has tried to conflate these three issues.
`

`

`
`
`
`6
`
`CELLSPIN
`EX. 2026, Page 6
`
`

`

`B.
`
`13.
`
`Cellspin’s Construction of “Paired Connection” is Correct.
`
`Panasonic’s Reply appears to at least mainly take issue with two aspects of
`
`Cellspin’s construction, which is of course my construction as well. For simplicity herein I will
`
`refer to my constructions as Cellspin’s constructions. The issues appear to be whether a “paired
`
`connection” must be capable of providing encrypted data exchange, and whether a paired
`
`connection must be capable of being disconnected and reconnected without having to repeat
`
`pairing and authentication. Reply, p. 3. Contrary to what Panasonic has written, Cellspin’s
`
`construction states that a paired connection provides for encrypted data exchange, not that it
`
`requires it. Indeed, a paired connection may be encrypted or unencrypted and even change from
`
`encrypted to unencrypted during a connection. Panasonic’s implication that providing for
`
`encrypted data equates to requiring it is incorrect.
`
`14.
`
`The concept of a paired connection, as established by the Bluetooth SIG became
`
`known and adopted by certain other industry organizations creating wireless technology for device
`
`connections, such as WiFfi Alliance and Zigbee Forum to name but a few. For example, when
`
`WiFi Alliance created WiFi Direct, it adopted the notion of pairing for creating a relationship
`
`between devices. This can be seen on the Canon website when Canon is describing connecting a
`
`digital camera to a personal computer using Canon’s own EOS Utility software, it states as follows:
`
`“Once you’ve paired the camera and the computer via WiFi they should then talk to each
`any
`time
`in
`the
`future.”
`other
`happily
`at
`[https://cpn.canon-
`europe.com/content/product/canon_software/inside_eos_utility_3_0.do]; and
`
`WiFi pairing is like the paring process to get a mobile phone to pair with your car using
`Bluetooth. A camera can pair with multiple different networks and devices, and store
`them. [https://www.p4pictures.com/2014/08/wifi-pairing-eos-camera-utility-3/]
`
`

`
`7
`
`CELLSPIN
`EX. 2026, Page 7
`
`

`

`Ex. 2027, p. 4;1 Ex. 2028, p. 1.2 The reason for storing the pairing information is so that it may be
`
`used again to avoid having to re-pair when communications are recommenced. This is fundamental
`
`to pairing, and this distinguishes paired connections from mere two-way communications.
`
`15.
`
`Similarly, Zigbee also adopted the concept of pairing as defined by Bluetooth SIG.
`
`In the Zigbee RF4CE Fundamentals paper, Ex. 2003, a discovery and pairing process is described
`
`for establishing relationships between devices. In this document it states that, “[b]oth the originator
`
`and recipient will store information about the other node in an entry in its pairing table.” Ex. 2003,
`
`p. 6.
`
`1.
`
`Pairing under BRI as Contrasted with Pairing under Phillips
`
`Thus far I have been discussing the broadest reasonable interpretation (BRI) of the term
`
`“paired connection.” I am informed by counsel for Cellspin that, under the Phillips standard, the
`
`words of a claim are generally given the ordinary and customary meaning that the term would
`
`have to a person of ordinary skill in the art in question at the time of the invention. To make this
`
`determination, one may consider evidence intrinsic to the patent, i.e., the words of the claims
`
`themselves, the remainder of the specification, and the prosecution history, as well as extrinsic
`
`evidence, which consists of all evidence external to the patent and prosecution history, including
`
`expert opinion, dictionaries, and learned treatises. I also understand that claims must be read in
`
`view of the specification, of which they are a part because the specification is the single best
`
`guide to the meaning of a disputed term. I also understand that extrinsic evidence, considered in
`

`1 Cellspin’s Exhibit 2027 is a true and correct printout from the URL at https://cpn.canon-
`europe.com/content/product/canon_software/inside_eos_utility_3_0.do, which was printed to
`PDF on November 23, 2019.
`2 Cellspin’s Exhibit 2028 is a true and correct printout from the URL at
`https://www.p4pictures.com/2014/08/wifi-pairing-eos-camera-utility-3/, which was printed to
`PDF on November 23, 2019.
`

`
`8
`
`CELLSPIN
`EX. 2026, Page 8
`
`

`

`the context of the intrinsic evidence, may help educate the court regarding the field of the
`
`invention and help the court determine what a person of ordinary skill in the art would
`
`understand claim terms to mean.
`
`In addition to the other documents noted in my prior Declaration and further noted
`
`herein, I have also reviewed the prosecution history for the ‘698 patent at Exhibit 1004, as well
`
`as the prior art that was discussed with the examiner during prosecution, including that noted
`
`herein.
`
`My understanding is that at some point in this proceeding, which very recently came to
`
`involve GoPro and Garmin via a joinder ruling, that I may also be allowed to present different,
`
`and potentially narrower, constructions representing the true meaning of terms to a POSITA
`
`under the above Phillips standard. At present, I will only be addressing the term “paired wireless
`
`connection” in summary to illustrate differences between BRI and Phillips. In doing so, a
`
`POSITA following the guidance of Phillips would alter, by narrowing, the BRI construction,
`
`from:
`
`to:
`
`bidirectional communications link between devices which provides encrypted data
`exchange between the devices, and the communication link can be disconnected and
`reconnected without having to repeat pairing or authentication
`
`bidirectional communications link between devices which provides for authentication and
`encrypted data exchange between the devices by generating one or more cryptographic
`keys, and the communication link can be disconnected and reconnected without having to
`repeat pairing or authentication by saving the cryptographic key(s) for reuse in future
`connections.
`
`This definition for “paired wireless connection,” which is how a POSITA would
`
`understand the term to mean in the context of Bluetooth and in the context of the ‘681 patent, has
`
`been widely adopted in the short-range wireless industry by organizations such as Bluetooth SIG,
`

`
`9
`
`CELLSPIN
`EX. 2026, Page 9
`
`

`

`Zigbee Alliance and WiFi Alliance. Over ten billon products will ship in 2019 containing one or
`
`more of these wireless technologies.
`
`My prior analysis of the “encrypted” aspect of “paired wireless connection” is pertinent
`
`here. If we look further at Bluetooth technology, as shown below, the cryptographic key created
`
`and saved during pairing is the link key.
`
`The Zigbee RF4CE specification v1.01 section 2.4.8 Pairing, discuses pairing of devices.
`
`In that section it states that “if the pairing request was successful, both nodes store a pairing link
`
`in their respective pairing tables.” It then goes on to describe the information stored in the
`
`pairing table:
`
`Each entry in the pairing table contains the following information:
`
`Pairing reference
`Source network address
`Destination logical channel
`Destination IEEE address
`Destination PAN identifier
`Destination network address
`Recipient node capabilities
`Recipient frame counter
`Security link key
`
`•
`•
`•
`•
`•
`•
`•
`•
`•
`
`[Ex. 2032, p. 8-9].3
`
`The last item stored is the cryptographic key. This key is further explained in section 2.4.9
`
`Security. There it is stated “A 128-bit cryptographic key is generated by the recipient of the
`
`pairing request and exchanged with the originator. [Ex. 2032, p. 9].
`

`3 Cellspin’s Exhibit 2032 is a true and correct copy of the ZigBee RF4CE Specification Version
`1.01.
`

`
`10
`
`CELLSPIN
`EX. 2026, Page 10
`
`

`

`The key is stored in the respective pairing tables.” [Ex. 2032, p. 9]. This is the same key
`
`referenced in section 2.4.8. The security section also defines the security services available as
`
`follows:
`
`This mechanism provides the following security services:
`
`•
`
`Data confidentiality: To ensure that the data contained in a ZigBee RF4CE transmission
`
`can only be disclosed to the intended recipient.
`
`•
`
`Data authenticity: To ensure that the intended recipient of a ZigBee RF4CE transmission
`
`knows that the data was sent from a trusted source and not modified during transmission.
`
`•
`
`Replay protection: To ensure that a secure transmission cannot simply be repeated by an
`
`attacking device if overheard.
`
`[Ex. 2032, p. 9]. From this it is clear that Zigbee offers all the components in the narrower
`
`construction for paired wireless connection.
`
`Finally, if we look at the WiFi peer-to-peer specification, aka WiFi Direct, we will see
`
`similar features available for connection pairing. WiFi Direct allows two devices to communicate
`
`without the need to go through an access point as opposed to traditional WiFi where stations
`
`connect to an access point to communicate with the Internet and potentially with other devices
`
`connected to the access point. [Ex. 2033, p. 13] 4.
`
`WiFi Direct leverages traditional WiFi and reuses many portions of it to make
`
`implementing the standard easier. This includes reusing many setup and security aspects of WiFi
`
`within WiFi Direct including WiFi Protected Setup (WPS) and WiFi Protected Access (WPA).
`

`4 Cellspin’s Exhibit 2033 is a true and correct copy of the Wi-Fi Peer-to-Peer (P2P) Technical
`Specification, Version 1.7. 
`

`
`11
`
`CELLSPIN
`EX. 2026, Page 11
`
`

`

`Thus, WPS provides an authentication key distribution method enabling devices to
`
`authenticate with each other and join a WiFi Direct connection. WPA provides for creating
`
`encryptions keys from a pre-shared key known to each device. WPA does provide different levels
`
`of security, enterprise and personal, which can be implemented depending on the targeted
`
`environment for the product.
`
`Through the combination of these WiFi specifications, WiFI Direct implements all the
`
`requirements of the narrower construction of paired wireless connection.
`
`Although I have only addressed the Phillips construction above, I do note that the BRI
`
`constructions previously advanced in my prior Declaration and elsewhere herein serve as a
`
`baseline for proper Phillips constructions, inasmuch as the if a limitation is required by BRI then,
`
`at a minimum, it would also be required by Phillips, even though the Phillips construction is
`
`likely broader, as shown by the example of above.
`
`The v2.1+EDR Bluetooth Core Specification list many optional activities. The
`2.
`mere mention of “Bluetooth connection” in Mashita, Onishi or Hiraishi prior art does
`not establish that the connections described in those references are paired.
`
`16.
`
`The v2.1+EDR Bluetooth Core Specification list many optional activities. The
`
`mere mention of “Bluetooth connection” in Mashita, Onishi or Hiraishi prior art does not establish
`
`that the connections described in those references are paired. The words “pair,” “paired” or
`
`“pairing” do not appear in Mashita, Onishi or Hiraishi reference.
`
`17.
`
`Over time, the concept of pairing as defined by the Bluetooth SIG became an
`
`industry accepted term with the meaning set forth in Cellspin’s construction for “paired wireless
`
`connection.” Cellspin’s construction accords with this meaning and serves to distinguish paired
`
`wireless connections from unpaired ones.
`
`
`

`
`12
`
`CELLSPIN
`EX. 2026, Page 12
`
`

`

`18.
`
`Panasonic asserts that Cellspin’s construction of “paired wireless connection” is
`
`intended to encompass a paired Bluetooth connection. That is correct. However, Panasonic has
`
`failed to cite any disclosure in Onishi, Hiraishi or Mashita, of either a device that has performed
`
`Bluetooth pairing or even one that is capable of performing Bluetooth pairing. Panasonic’s
`
`apparent assumption that the mere use of the word “Bluetooth” or “Bluetooth capability” means
`
`that a device is capable of performing every function described in the voluminous Bluetooth
`
`specification is incorrect and unsupported. I am very well-versed in Bluetooth (as noted above, I
`
`previously worked at the Bluetooth SIG as Executive Director and CEO) and I am not aware of
`
`any consumer products which implement each and every feature in the Bluetooth specifications.
`
`Even if the devices taught by Onishi, Hiraishi or Mashita had been disclosed as being Bluetooth
`
`compliant, which they were not, there is no requirement that Bluetooth compliant devices be
`
`capable of pairing with other devices, that they be capable of cryptographic authentication, or that
`
`they be capable of many other features disclosed in the applicable Bluetooth specification. For
`
`example, v2.1+EDR has error codes for when one device attempts to pair with another that does
`
`not allow pairing: (1) Pairing Not Allowed (0X18); AND (2) Simple Pairing Not Supported
`
`(0X37). If a device that claimed to be Bluetooth complaint actually was Bluetooth compliant, and
`
`if its manufacturer gave it the ability to pair and/or the ability to cryptographically authenticate,
`
`then such pairing or cryptographic authentication would need to be compliant with the Bluetooth
`
`specification. There are, in fact, Bluetooth compliant devices that lack the capability to pair or
`
`cryptographically authenticate their connections. For example, in some stores there are, and have
`
`for many years been, devices that broadcast Bluetooth advertisements without pairing or
`
`cryptographic authentication. Further, the discussion of the Bluetooth Basic Imaging Profile in
`
`my prior Declaration and below illustrates that pairing was not recommended, much less required,
`

`
`13
`
`CELLSPIN
`EX. 2026, Page 13
`
`

`

`for requesting images from a camera. If a manufacturer did not have any requirement for Bluetooth
`
`pairing for image transfer like one suggested in BIP for image pull then it could produce Bluetooth
`
`compliant devices which lacked any programming or ability to pair.
`
`C.
`
`19.
`
`Cellspin’s Construction of “Cryptographically Authenticating” is Correct.
`
`Dr. Strawn and Panasonic’s contention that “encryption” is an “unclaimed concept”
`
`from the term “cryptographically authenticating” is unfounded. Including as noted in Cellspin’s
`
`Response and my prior Declaration, cryptography necessarily entails encryption and decryption.
`
`Including as previously noted, for cryptographic authentication to occur, there needs to be at least
`
`one cryptographic algorithm involved which defines the cryptographic means employed by the
`
`devices. Including as noted in Cellspin’s Response and my prior Declaration, the touchstone of
`
`cryptography is that a person intercepting a transmission cannot understand it without having the
`
`cipher, which to POSITA requires an algorithm to encrypt and decrypt. The cryptographic
`
`algorithm(s) utilized may require key exchanges, challenge/response techniques or other methods
`
`to authenticate the devices.
`
`20.
`
`The notion that cryptographically is so broadly interpreted beyond encryption that
`
`it also includes mere secrecy or security is erroneous. The issue of Mashita’s PIN illustrates the
`
`point. Panasonic and Dr. Strawn have no reasoned argument that merely exchanging a four-digit
`
`PIN, which is all that Mashita teaches, is cryptographic. Panasonic and Dr. Strawn’s main
`
`argument for exchanging a PIN being cryptographic is an overbroad construction that includes
`
`mere secrecy. See, e.g., Ex. 1026, ¶8 (“Thus, entering a secret PIN into both the camera and the
`
`cellular phone constitutes cryptographically authenticating.”). To a POSITA, if one intercepted
`
`the PIN, then they would know the PIN, which illustrates why a secret PIN is not cryptographic.
`
`
`

`
`14
`
`CELLSPIN
`EX. 2026, Page 14
`
`

`

`21.
`
`Panasonic’s assertion that Mashita’s entering of a PIN into each of two devices
`
`constitutes cryptographic authentication is, at most, based upon speculation of what might happen
`
`once the PIN was entered. The unstated implication made by Panasonic and Dr. Strawn is that
`
`Mashita’s PIN might theoretically be used to generate encryption keys. To get from Mashita’s
`
`mere PIN entry to cryptographic authentication requires either speculation that the PINs might
`
`theoretically be used in additional cryptographic processes involving cryptographic algorithms, or
`
`it simply requires disregarding the requirement of cryptographic authentication altogether.
`
`22.
`
`Panasonic and Dr. Strawn attempt to side-step their erroneous position on the
`
`construction of “cryptographically authenticating” by constructing an argument that (1)
`
`unspecified prior art “discloses (or at least would have rendered obvious) a paired Bluetooth
`
`connection;” and that (2) Bluetooth pairing uses a cryptographic algorithm for authentication. The
`
`fallacy of argument (1) is addressed in Section IV.A below and otherwise hereon. Argument (2)
`
`is merely an unsupported statement found once in Panasonic’s Reply. Including as explained in
`
`m my prior Declaration, a POSITA understands that, in Bluetooth communications, authentication
`
`and pairing are separate acts, and that two devices could pair without authenticating, or it could
`
`authenticate without pairing.
`
`D.
`
`23.
`
`Cellspin’s Construction of “Graphical User Interface” (i.e., “GUI”) is Correct.
`
`Panasonic and Dr. Strawn make the remarkable assertion that Cellspin’s
`
`construction of GUI errs in distinguishing graphical interfaces from “text-based” interfaces. Here
`
`Panasonic misses the basic point that an important distinction between graphical interfaces and
`
`text-based interfaces is that the former are graphical and the latter are not.
`

`

`

`
`15
`
`CELLSPIN
`EX. 2026, Page 15
`
`

`

`24.
`
`Panasonic’s basic argument is that using keystrokes to highlight different areas of
`
`a character-based interface constitutes GUI. Panasonic’s invalidity positions are based upon this
`
`overbroad notion of text-based interfaces being GUIs. Even if Cellspin’s proposed construction
`
`was rejected in part, an overbroad construction of GUI would not be reasonable or otherwise
`
`correct if it allowed using keystrokes to highlight different areas of a character-based interface to
`
`constitute a GUI.
`
`25.
`
`Panasonic and Dr. Strawn argue that the record does not support a GUI having the
`
`graphics-based requirements in Cellspin’s construction. This erroneous argument fails to
`
`understand that the ‘698 specification incorporates in its entirety U.S. Patent Application No.
`
`11/901,802 (the “802 Application). See Ex. 1002, 1:32-36. In the incorporated ‘802 application,
`
`FIG. 3 exemplarily illustrates the publishing of multimedia content using the client application 202
`
`on the mobile device. Ex. 2021, para. 40-42. The “enter screen” as illustrated on the graphical user
`
`interface (GUI) 202a of the client application 202 provides options for the selection of the medium
`
`for the multimedia content to be created. The user 201 selects the preferred publication websites
`
`or publication virtual spaces 205 using an `add publishers` menu option provided on the enter
`
`screen.
`
`26.
`
`Panasonic argues that the GUI disclosed in Cellspin’s incorporated patent
`
`application does not meet Cellspin’s definition of GUI because the devices allowed user inputs
`
`including a button “click or touch.” See Ex. 2021, Fig. 3, 7:17-20. Panasonic’s reasoning is flawed.
`
`Devices with a GUI can accept keystroke commands, but that does not mean that devices that only
`
`accept keystroke commands have GUIs.
`

`

`
`
`
`16
`
`CELLSPIN
`EX. 2026, Page 16
`
`

`

`  
`
`E.
`
`
`27.
`
`Cellspin’s Construction of “A Software Application” to Refer to One Software
`Application is Correct
`
`Claims 5 and 8 each refers to singular “a mobile software application” and “a
`
`software application,” respectively, and each subsequent reference to “said” or “the” software
`
`application is to the antecedent singular “a” application. Clearly this “application” is required to
`
`perform multiple functions in claims 5, 8 and their dependent claims. When the ‘698 patent refers
`
`to a software or mobile software application, in every instance it refers to a single “client
`
`application 203.” There are numerous references to this application in the specification and all are
`
`to a single application. Furthermore, Figures 2 and 4 of the ‘698 patent depict one box for client
`
`application 203.
`
`
`

`
`PANASONIC
`EX. 1003, Page 4
`
`
`
`17
`
`CELLSPIN
`EX. 2026, Page 17
`
`

`

`
`In both figures 2 and 4, within client application 203, there are multiple boxes
`
`28.
`
`which could be implemented in different modules as Panasonic and Dr. Strawn suggest. Many of
`
`these boxes are even labeled as modules. However, in the figures, those modules are clearly
`
`consolidated into a single application running on the cellular phone.
`
`29.
`
`In his second declaration, Dr. Strawn states “Even leaving aside this rule, from a
`
`technical perspective I do not see a distinction between using a client application composed of
`
`multiple modules and the combination of Mashita and Hiraishi, which would render such an
`
`approach obvious.” [Ex 1024 ¶25] There are both technical and usability aspects as to why this is
`
`incorrect. To teach HTTP uploads to the server, Petitioner is relying on Hirashi. In Hirashi a web
`
`browser is utilized for the image upload and a separate application for obtaining the image from
`
`the camera. Hirashi requires two applications to accomplish obtaining the image from the digital
`
`camera and a web browser to upload the image to the server.
`

`

`
`
`
`18
`
`CELLSPIN
`EX. 2026, Page 18
`
`

`


`
`30. When separate applications are used for obtaining the image from the digital
`
`camera and uploading it to the server, the uploading application must be made aware that there is
`
`a new image ready to be uploaded and where that image resides on the cellular phone. Typically,
`
`this was accomplished by manual steps undertaken by the user. Even with user intervention, due
`
`to the fact that applications were sandboxed in an iPhone it was difficult, if not impossible, to share
`
`images directly between arbitrary applications making the multi-application solution difficult or
`
`impossible to implement. Due to these technical and usability limitations, a POSITA would not
`
`look to implement the single application taught in the ‘698 patent with multiple applications as
`
`would be required when combining Mashita and Hirashi.
`
`
`VI.
`
`
`
` LIMITATION C (I.E., A PAIRED WIRELESS CONNECTION) IS NOT
`DISCLOSED IN MASHITA, ONISHI or HIRAISHI. FURTHER, PANASONIC
`AND DR. STRAWN’S NEW OBVIOUSNESS THEORY IS UNFOUNDED.
`
`A. Mashita, Onishi or Hiraishi Does Not Disclose Establishing a Paired wireless
`connection Between a Cellular Phone and Digital Camera.
`
`Panasonic and Dr. Strawn somehow continue to contend that Mashita authenticates
`
`31.
`
`the identity of the cellular phone by use of a shared PIN which is mischaracterized as a passkey.
`
`See, e.g., Ex. 1024, ¶¶ 9,40 & 94. To the contrary, with only the physical addresses being saved,
`
`future connections would need the PIN to be reentered for authentication to occur. This is opposed
`
`to the proper construction of pairing wherein future connections don’t require the user to enter
`
`information again.
`
`32.
`
`The concept of a passkey isn’t even raised in Mashita, nor is the word “passkey”
`
`found in the text of Mashita. Ex. 1006. As shown below, Mashita states twice that only the physical
`
`device addresses are stored:
`

`
`19
`
`CELLSPIN
`EX. 2026, Page 19
`
`

`

`Reference numeral 208 represents a local wireless unit composed of a wireless protocol, a
`baseband, and a Radio Frequency (RF) unit needed for Bluetooth communication. A
`physical address (a 48-bit address for identification of the portable device 101 in Bluetooth
`communication) 210 is recorded in the local wireless unit 208.
`…
`“The connection authentication leads to establishment of a local wireless link (step
`S901). Here, the physical address 210 of the digital camera 101 is saved in the
`application memory 304 of the cellular phone 102. Furthermore, the physical address 311
`of the cellular phone 102 is saved in the RAM 203 of the digital camera 101.”
`
`Ex. 1006, ¶30 & 94; A link key, or other cryptographically created entity isn’t saved. Ex. 1006,
`
`¶ 30. A 48-bit Physical address is NOT a cryptographically created entity.
`
`33.
`
`In the v2.1+EDR Bluetooth Core Specification, the concept of a PIN and passkey
`
`are very different and not synonymous. For example, the v2.1+EDR Bluetooth Core Specification
`
`states:
`
`“Note that there is a significant difference from a cryptographic point of view between
`Passkey Entry and the PIN entry model used by Bluetooth Core Specification 2.0 + EDR
`and earlier versions. In the Passkey Entry association model, the six digit number is
`independent of the security algorithm and not an input to it, as is the case in the 2.0 + EDR
`security model. Knowing the entered number is of no benefit in decrypting the encoded
`data exchanged between the two devices.”
`
`Ex. 2006,135; The

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket