throbber

`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`GOPRO, INC., GARMIN INTERNATIONAL, INC., AND GARMIN USA,
`INC.
`Petitioners,
`
`vs.
`
`CELLSPIN SOFT, INC.,
`Patent Owner
`
`
`Case IPR2019-01107
`Patent No. 9,258,698
`
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`UNDER 37 C.F.R. § 42.107
`
`
`
`
`
`
`
`

`

`
`
`The undersigned, acting on behalf of the patent owner, Cellspin Soft, Inc.
`
`(“Cellspin”), and, pursuant to 37 U.S.C. § 42.107(a) and 35 U.S.C. § 313,
`
`respectfully requests the petition of GoPro, Inc., Garmin International, Inc. and
`
`Garmin USA, Inc. (collectively “Petitioner”) for Inter Partes Review (“IPR”) be
`
`denied, including because Petitioner fails to establish a reasonable likelihood of
`
`prevailing on any claim.
`
`
`Dated: August 22, 2019
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`/s/ John J. Edmonds
`John J. Edmonds, Reg. No. 56,184
`EDMONDS & SCHLATHER, PLLC
`355 South Grand Avenue, Suite 2450
`Los Angeles, CA 90071
`Telephone: 213-973-7846
`Facsimile: 213-835-6996
`Email: pto-edmonds@ip-lit.com
`
`
`Stephen F. Schlather, Reg. No. 45,081
`EDMONDS & SCHLATHER, PLLC
`2501 Saltus Street
`Houston, TX 77003
`P: 713-234-0044
`F: 713-224-6651
`E: sschlather@ip-lit.com
`
`
`
`
`
`P a g e 1 | 74
`
`

`

`
`
`TABLE OF CONTENTS
`
`
`EXHIBIT LIST .......................................................................................................... 5
`I. INTRODUCTION ................................................................................................. 7
`II. SUMMARY OF ARGUMENTS ....................................................................... 10
`III. SUPPORTING EVIDENCE ............................................................................. 10
`IV. LEGAL PRINCIPLES ...................................................................................... 11
`IV. THE ’698 PATENT .......................................................................................... 11
`V. THE LEVEL OF ORDINARY SKILL IN THE ART ...................................... 15
`VI. ANALYSIS ....................................................................................................... 16
`A. Claim Construction ....................................................................................... 16
`B. Claim Construction Summary ....................................................................... 30
`C. Prior Art Relied Upon by Petitioner ............................................................. 31
`1. Hiroishi ..................................................................................................... 31
`2. Takahashi .................................................................................................. 34
`3. Nozaki ....................................................................................................... 35
`4. Hollstrom .................................................................................................. 37
`5. Ando.......................................................................................................... 39
`D. Non-Obviousness of Claims 1–20 over Hiroishi and
`Takahashi (Ground 1) ......................................................................................... 39
`1. Limitations 1(c)-(e) and (h)-(j) of Independent Claims 1,5,8 and 13 ...... 40
`2. Lack of Motivation to Combine ............................................................... 58
`E. Claim 5 and Claim 8 – No Single Application Performing Steps ................ 59
`F. Non-Obviousness of Claims 21 and 22 over Hiroishi, Takahashi,
`and Ando (Ground 2) ..................................................................................... 60
`G. Non-Obviousness of Claims 1–22 over Hiroishi, Takahashi,
`and Nozaki (Ground 3) .................................................................................. 63
`H. Non-Obviousness of Claims 21 and 22 over Hiroishi, Takahashi, Nozaki,
`and Ando (Ground 4). .................................................................................... 64
`I. Non-Obviousness of Claims 1,3–5,7,8,10–13, and 15–20
`over Hollstrom and Takahashi (Ground 5) ..................................................... 64
`J. Non-Obviousness of Claims 2,6,9,14,21 and 22 over
`Hollstrom, Takahashi, and Ando (Ground 6) ................................................. 66
`
`VII. PETITIONER’S PURPORTED EXPERT DECLARATION IS CLEARLY
`INSUFFICIENT AND IT SHOULD BE EXCLUDED OR GIVEN NO
`WEIGHT. ......................................................................................................... 67
`
`P a g e 2 | 74
`
`

`

`
`
`
`IX. THIS PROCEEDING AND ANY INVALIDITY RULINGS BASED
`THEREON ARE UNCONSTITUTIONAL, INCLUDING UNDER THE
`FIFTH AND FOURTEENTH AMENDMENTS ........................................... 69
`
`
`IX. CONCLUSION ................................................................................................. 70
`
`
`
`
`P a g e 3 | 74
`
`

`

`
`
`TABLE OF AUTHORITIES
`
`Cases
`Allscripts Healthcare Solutions, Inc. et al. v. Uniloc Luxembourg S.A., IPR2015-
`01615, Paper 13 at p. 9 (Feb. 17, 2016) ............................................................... 36
`KSR Int'l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) ......................................... 36
`Perreira v. Dep't of Health and Human Serv., 33 F.3d 1375, 1377 n.6
` (Fed.Cir. 1994) ....................................................................................................... 37
`Tre Milano, LLC v. TF3, Ltd., IPR2015-00649, Paper 37
`(P.T.A.B. May 2, 2016) ........................................................................................... 37
`American Key v. Cole National, 762 F.2d 1569,1580 (11thCir.1985) .................... 57
`Member Services v. Sec. Mut. Life Ins., 2010 WL 3907489,*27
`(N.D.N.Y.,Sep. 30,2010) ......................................................................................... 57
`Deutz v. City Light & Power, 2009 WL 2986415, at *6 (N.D.Ga.2009) ................57
`Bouygues Telecom v. Tekelec, 472 F.Supp.2d 722, 729 (E.D.N.C.2007) ...............57
`Yorkey v. Diab, 601 F.3d 1279,1284 (Fed.Cir.2010) .............................................. 58
`McClurg v. Kingsland, 42 U.S. 202, 206 (1843) ..................................................... 58
`Eldred v. Ashcroft, 537 U.S. 186, 203,206 (2003) .................................................. 59
`Concrete Pipe & Prods. of Cal. v. Construction Laborers Pens. Trust, 508 U.S.
`602, 617-18 (1993) ............................................................................................... 59
`In re Murchison, 349 U.S. 133, 136 (1955) .............................................................59
`Brown v. Duchesne, 60 U.S. 183, 197 (1857) ......................................................... 59
`Horne v. Dept’ of Ag., 135 S. Ct. 2419, 2427 (2015) .............................................. 59
`Celgene Corp. v. Peter, No. 18-1167 (Fed. Cir. July 30,2019) ............................... 59
`
`
`
`Statutes
`35 U.S.C. § 313 .......................................................................................................... 2
`35 U.S.C. § 42.107 ..................................................................................................... 2
`Fed. R. Evid. 702 ..................................................................................................... 57
`37 C.F.R. § 42.65(a) ................................................................................................. 58
`
`
`
`P a g e 4 | 74
`
`

`

`
`
`2008
`
`
`Short Name
`No.
`2001 AIRCable
`Manual
`2002
`‘891 Patent
`2003 RF4CA
`2004
`LR-WPANs
`2005 NIST
`Glossary
`2006
`--Skipped--
`2007
`--Skipped--
`Mobile
`Comm &
`Net.
`Foley
`Declaration
`Foley CV
`Techopedia
`definition for
`encryption
`
`2009
`
`2010
`2011
`
`2012
`
`2013
`
`2014
`
`Science
`Dictionary
`definition of
`cryptographic
`Schneier
`Excerpt
`
`Stallings
`Excerpt
`
`2015 CNSSI
`Excerpt
`2016 NISTIR
`Excerpt
`
`2017
`
`Zigbee
`
`EXHIBIT LIST
`
`Exhibit
`AIRcable User Manual Rev 0.95 December 7, 2004
`U.S. Patent No. 9,398,891 to Bagha
`Silicon Labs UG103.10: RF4CA Fundamentals
`IEEE Part 15.4: Low-Rate Wireless Personal Area
`Networks (LR-WPANs)
`Glossary of Key Information Security Terms by
`NIST
`--Skipped--
`--Skipped--
`Mobile Communications and Networks by Prentice
`Hall
`Declaration of Michael Foley, Ph.D.
`
`CV of Michael Foley, Ph.D.
`Definition of “encryption” from the Techopedia
`dictionary from
`https://www.techopedia.com/definition/5507/encrypt
`ion
`Definition of “cryptographic” from Academic Press
`Dictionary of Science And Technology 556 (1992)
`(second edition)
`
`Excerpt from Bruce Schneier, Applied
`Cryptography: Protocols, Algorithms and Source
`Code in C, 2nd Edition, 1996, pp. 1-2.
`Excerpt from W. Stallings, "Cryptography And
`Network Security", 2nd, Edition, Chapter 13, IP
`Security, Jun. 8, 1998, pp. 399-440.
`Excerpt from CNSSI No. 4009, which is a
`Committee on National Security Systems Glossary
`Excerpt from NISTIR 7298, Revision 2, entitled
`“Glossary of Key Information Security Terms,”
`which was published by the National Institute of
`Standards and Technology
`Security Analysis of Zigbee
`
`P a g e 5 | 74
`
`

`

`
`
`No.
`
`Short Name
`Analysis
`2018 Bluetooth
`v2.1
`2019 Techopedia
`definition for
`authentication
`
`2021
`
`2020 Techopedia
`definition for
`GUI
`‘802
`Application
`2022 Webster
`Definition of
`“along with”
`2023 Bluetooth
`BIP Profile
`2024 Madisetti
`Depo
`2025 Supp Foley
`Declaration
`
`
`
`
`
`
`Exhibit
`
`Bluetooth v2.1 + EDR Core Specification
`
`Definition of “authentication” from the Techopedia
`dictionary from
`https://www.techopedia.com/definition/342/Authent
`ication
`Definition of “authentication” from the Techopedia
`dictionary from https://www.techopedia.com/
`definition/5435/graphical-user-interface-gui
`U.S. Patent Application No. No. 11/901,802
`
`Definition of “along with” from the Merriam-
`Webster dictionary: https://www.merriam-
`webster.com/dictionary/along%20with
`Bluetooth Basic Imaging Profile, Interoperability
`Specification, dated July 30, 2003
`Excerpts from Madisetti Deposition
`
`Supplemental Declaration of Michael Foley, Ph.D.
`
`P a g e 6 | 74
`
`

`

`
`
`I.
`
`INTRODUCTION
`
`Pending before the Board is Petitioner’s motion for joinder with IPR2019-
`
`00127 filed by Canon. As noted in the motion, this Petition “does not present any
`
`new grounds of unpatentability, “it is substantively identical to the Canon IPR
`
`Petition… [e]xcept for the identified expert,” and it is a “copycat” petition.”Paper
`
`4,p4. Further, Petitioner asserts no constructions under Phillips, instead arguing that
`
`“any proposed constructions in the Canon IPR are at least included within the scope”
`
`of BRI (‘127-IPR) or Phillips (this IPR).Id.
`
`Although the Board has already instituted IPR proceedings in the ‘127-IPR,
`
`even if joinder is allowed,1 proceedings should not be instituted on this Petition. This
`
`Preliminary Response is substantially different from, and more detailed than, Patent
`
`Owner’s Preliminary Response in the ‘127-IPR. This Preliminary Response
`
`primarily tracks the substance of Cellspin’s actual, detailed Response filed in the
`
`‘127-IPR. Further, this Preliminary Response is supported by the Foley Declaration
`
`at Ex.2009. Further, the Phillips standard for claim construction applies in this
`
`proceeding, while BRI applies in the ‘127-IPR.
`
`Moreover, Petitioner’s purported expert declaration of Dr. Christensen,
`
`Ex.1033 is insufficient, incompetent evidence and it should be excluded or given no
`
`
`1 Petitioner concedes that its Petition would be untimely unless joinder is allowed. Paper 4,p.3. As
`noted by Petitioner, its May 2019 Petition was filed over seventeen months after Cellspin’s
`Complaints for patent infringement were filed against Petitioners in October 2017 in N.D.
`California.Id.,p.2.
`
`P a g e 7 | 74
`
`

`

`
`
`weight. Accordingly, this Petition, unlike Canon’s, lacks expert or declaration
`
`support.
`
`Petitioner (in copycatting Canon’s positions) fails to demonstrate a reasonable
`
`likelihood that any of the challenged claims of the ‘698 patent are invalid or
`
`otherwise unpatentable. Petitioner fails to appreciate the ‘698 patent’s specific
`
`approach to, inter alia, media transfer comprising, inter alia, the use of an already
`
`paired wireless connection, wherein establishing the short- range paired wireless
`
`connection comprises the digital camera cryptographically authenticating identity of
`
`the cellular phone, wherein the cellular phone is configured to use HTTP to upload
`
`the received new-media file along with user information to a user media publishing
`
`website, provides a graphical user interface (GUI) for the received new-media
`
`file and to delete the created new media file. None of Petitioner’s references
`
`practice or render obvious the claimed approaches, which of course have other
`
`meaningful limitations when properly considered as a whole.
`
`
`
` Petitioner erroneously implies the ‘698 patent was only allowed due to adding
`
`language requiring the cellular phone to include “a user interface to delete an image
`
`file created by the digital camera.” Petition at 1, 8-9. Petitioner only cites to a single
`
`addition even though multiple additions were made. See Exhibit 1002 at 394.
`
`Notably, the two substantial other additions were made in the same Examiner
`
`Amendment.Id.,395-396. Similar edits were made elsewhere in the Examiner’s
`
`Amendment. Petitioner misstates the prosecution history. See Exhibit 1002. Further,
`P a g e 8 | 74
`
`

`

`
`
`Petitioner merely assumes that the rejections that prompted certain amendments
`
`were well-founded, which is not the case. SeeId.,327-366.
`
`Petitioner’s argument fails to render any claim obvious due to, inter alia, at
`
`least five essential claimed requirements noted in the Summary of Arguments below.
`
`Moreover, the Madisetti declaration with which Petitioner’s purported expert
`
`allegedly agrees impermissibly uses hindsight to arrive at alleged obviousness, it
`
`fails to provide a logical nexus between alleged motivations to combine and the
`
`specific features being combined, and it fails to support rendering any of the
`
`challenged claims obvious.
`
`Petitioner fails to show, including with any competent evidence, a reasonable
`
`likelihood that any challenged claim is invalid or otherwise unpatentable, and Patent
`
`Owner respectfully requests that the Board deny institution confirm the validity of
`
`claims 1-22.
`
`
`
`
`
`P a g e 9 | 74
`
`

`

`
`
`I.
`
`SUMMARY OF ARGUMENTS.
`
`1.
`
`The references and combination of refences do not disclose many of the
`
`teachings of the ‘698 patent. Indeed, these key points are not shown or rendered
`
`obvious any of the prior art asserted by Petitioner:
`
` Paired wireless connection between a digital camera and a mobile
`
`device;
`
` Cryptographic authentication of the mobile device by the camera;
`
` Using HTTP to upload received media file and additional data;
`
` GUI’s in general and specifically not for image deletion on the
`
`wirelessly connected digital camera; and
`
` For claims 5 and 8, a single mobile application performing all the
`required functions (e.g., request, store, HTTP media upload, delete
`using GUI).
`
`
`
`III. SUPPORTING EVIDENCE
`
`
`The exhibit numbers of the supporting evidence relied upon and the relevance
`
`of the evidence to the challenges raised are provided herein. An Exhibit List
`
`identifying the exhibits is included supra. In support of the proposed grounds, this
`
`Petition is accompanied by the declarations of Michael, Ph.D. (Exhs. 2009 & 2025),
`
`an expert in the fields of electrical and computer engineering, with extensive
`
`experience with wireless communications including Bluetooth.Id.
`
`
`
`P a g e 10 | 74
`
`

`

`
`
`IV. LEGAL PRINCIPLES
`
`A patent claim is unpatentable as obvious if the differences between the
`
`claimed subject matter and the prior art are such that the subject matter as a whole
`
`would have been obvious at the time the invention was made to a person having
`
`ordinary skill in the art to which said subject matter pertains (“POSITA”).
`
`In satisfying its burden of proving obviousness, Petitioner cannot employ
`
`mere conclusory statements. Petitioner must instead articulate specific reasoning,
`
`based on evidence of record, to support the conclusion of obviousness.
`
`In assessing the prior art, one must consider whether a POSITA would have
`
`been motivated to combine the prior art to achieve the claimed invention. I
`
`understand that it can be important to identify a reason that would have prompted a
`
`POSITA in the relevant field to combine the elements in the way of the claimed
`
`invention at the relevant time of the priority date.
`
`A POSITA may consider whether the prior art teaches away from combining
`
`elements in the prior art. Proving obviousness cannot involve hindsight
`
`reconstruction. Modifications that render the prior art unsatisfactory for its intended
`
`purpose may not be obvious.
`
`IV. THE ’698 PATENT
`
`
`The ’698 patent is directed to certain specific claimed methods and
`
`apparatuses comprising “distribution of multimedia content” and also comprising
`
`other claim limitations.Ex.1001, 1:40–41: 11:54-16:36. Such methods and
`P a g e 11 | 74
`
`

`

`
`
`apparatuses comprise, among other things, sending or transferring data from an
`
`Internet-incapable capture device to an Internet-capable mobile device over a
`
`previously-established paired wireless connection through a request/response,
`
`cryptographically authenticating a mobile device identity, and translating captured
`
`data into HTTP format in transit to the publishing web site. See, e.g.,Ex.1001,claim
`
`1.
`
`The ‘698 patent states that, prior to the ‘698 invention, capture methods were
`
`crude.Ex.1003, 1:46–55. The ‘698 specification describes embodiments comprising
`
`digital data capture device 201, e.g., a digital camera, paired with a physically
`
`separate mobile device 202, e.g., a Bluetooth enabled cellular phone with client
`
`application 203. See Ex.1001,3:39-46. Figure 2 “illustrates a system for utilizing a
`
`digital data capture device in conjunction with a Bluetooth enabled mobile
`
`device.”Id.,3:14–18. As stated in the specification, Bluetooth “pairing occurs when
`
`the BT communication device 201a agrees to communicate with the mobile device
`
`202 in order to establish a connection.”Id.,4:1-3. As noted hereinbelow, a POSITA
`
`understands that Bluetooth pairing involves other aspects as well.
`
`In one embodiment, “[i]n order to initiate the pairing process between the BT
`
`communication device 201a and the mobile device 202, a common password known
`
`as a passkey is exchanged between the BT communication device 201a and the
`
`mobile device 202.Id.,4:5-7.
`
`In request/response mode, client application 203 on the cellular phone (i.e.,
`P a g e 12 | 74
`
`

`

`
`
`mobile device 202) detects the captured image on the digital camera (i.e., digital data
`
`capture device 201), and, over the established, paired Bluetooth connection, initiates
`
`transfer of the captured image and associated files.Id.,Abstract,2:35-37,6:36-40 &
`
`8:37-40. Digital data capture device 201 responds by transferring the captured image
`
`and associated files to client application 203 on mobile device 202.Id.,8:40-42.
`
`User information and translation to HTTP are applied in transit and on mobile
`
`device 202. See Id.,‘794/8:52-55 & 9:61-10:9. The captured data is then transferred
`
`via HTTP from client application 203 of mobile device 202 to publishing service
`
`401 via network 402, including as illustrated in FIG. 4.Id.,5:9-11 & 8:43-50.
`
`A Bluetooth device that wants to communicate only with a trusted device can
`
`cryptographically authenticate the identity of another Bluetooth device.Id.,3:59-61.
`
`In a preferred embodiment communication is authenticated cryptographically using
`
`a passkey.Id.,4:3-7.
`
`The claims of
`
`the ’698 patent are broken down
`
`in
`
`the Foley
`
`Declaration.Ex.2009,¶30. A diagram showing the inventive way of claim 5 is as
`
`follows:
`
`P a g e 13 | 74
`
`

`

`Ill\\ User Media
`
`m punishing
`
`
`
`w
`
`
`
`
`
`
`Digital Camera
`
`W“
`
`’698 Claim 5
`Device Claim
`
`Cellular Phone
`wireless
`
`“W“
`“mm“!
`
`
`
`NONQIM
`‘uoouo- I. wirelesslnternet an non-0*
`connection
`
`
`Establish amen-tangle filmd wireless connection
`
`Wogwfikwlb'fiumeuflmflng
`
`
`
`
`
`Receive a. Store
`
`New-Media File
`
`Use H1TPto up . .
`-'
`
`
`WNW-Media
`File
`
`1.
`User lnfonnation
`
`
`Media File
`
`P a g e 14 | 74
`Page 14|74
`
`
`
`

`

`
`
`
`
`V.
`
`THE LEVEL OF ORDINARY SKILL IN THE ART
`
`31. Petitioner, in adopting Canon’s positions, asserts that a POSITA would
`
`have had at least a bachelor’s degree in electrical engineering, computer engineering,
`
`or computer science, and two years of experience in the field consumer electronics,
`
`with exposure to digital camera technology and wireless communications. ‘127 IPR,
`
`Pet. 9.
`
`33. For purposes of instituting the ‘127 IPR, the Board determined that a
`
`POSITA would have had a bachelor’s degree in electrical engineering or computer
`
`science, or an equivalent degree, and two years of industry experience with software
`
`development, electronic system design, digital camera technology, and/or wireless
`
`communications. ‘127 Institution Decision,14. Cellspin and Dr. Foley agree that
`
`either the Board’s determination of a POSITA’s qualifications is correct, and that
`
`Canon’s formulation of a POSITA’s qualifications is also correct.Ex.2009,¶33. In
`
`this Preliminary Response, Cellspin applies the Board’s determination of a
`
`POSITA’s qualifications and it has viewed the relevant matters, including the patent
`
`and prior art, from that perspective of a POSITA.Id.
`
`
`
`
`
`
`
`
`
`P a g e 15 | 74
`
`

`

`
`
`VI. ANALYSIS
`
`A. Claim Construction
`
`Petitioner does not propose any constructions, nor did Canon in the ‘127-IPR
`
`for which joinder is sought. Rather, Petitioner argues, cryptically, that “any
`
`proposed constructions are at least included within the scope of either [the BRI or
`
`Phillips] standard.” Paper 4,4.
`
`Including since Petitioner is merely parroting the ‘127-IPR petition, which
`
`will be decided under BRI, Cellspin is primarily addressing the proper BRI
`
`constructions for “paired,” “cryptographically authenticating”, “graphical user
`
`interface” and “along with,” including subsidiary and related terms where
`
`applicable, from the perspective of a POSITA and in view of the specification, prior
`
`art and relevant knowledge of a POSITA.Ex.2009,¶41. For purposes of this
`
`Preliminary Response, Cellspin does not need to brief the proper Phillips
`
`constructions since no reasonable likelihood of unpatentability has been shown
`
`under BRI constructions. The Board should decline institution due to the noted
`
`claimed combinations not being met (or rendered obvious) because the Phillips
`
`constructions could not possibly be broader than the correct BRI constructions noted
`
`by Cellspin. References herein to BRI constructions should be understood in the
`
`foregoing light. Cellspin will fully brief the issue of Phillips constructions if
`
`institution is granted.
`
`Claim 1 is directed a method comprising: “…performing in the digital camera
`P a g e 16 | 74
`
`

`

`
`
`device: establishing a short-range paired wireless connection between the digital
`
`camera device and the cellular phone, wherein establishing the short-range paired
`
`wireless connection comprises, the digital camera device cryptographically
`
`authenticating identity of the cellular phone…” Claim 5 is directed to a “…digital
`
`camera device, comprising: … a short-range wireless communication device
`
`configured to control the first processor to establish a short-range paired wireless
`
`connection between the short-range wireless enabled digital camera device and a
`
`short-range wireless enabled cellular phone, wherein establishing the short-range
`
`paired wireless connection comprises, the digital camera device cryptographically
`
`authenticating identity of the cellular phone…” Claim 8 is directed to a system
`
`comprising: a digital camera device, comprising: … a short-range wireless
`
`communication device configured to establish a short-range paired wireless
`
`connection with an internet connected cellular phone, wherein establishing the short-
`
`range paired wireless connection comprises,
`
`the digital camera device
`
`cryptographically authenticating identity of the cellular phone…” Claim 13 is
`
`directed to a non-transitory computer-readable medium containing machine
`
`executable instructions that… cause the processor to perform a method comprising:
`
`acquiring new-media, wherein the new-media is acquired after establishing a short-
`
`range paired wireless connection between the digital camera device and a cellular
`
`phone, wherein establishing the short-range paired wireless connection comprises,
`
`the digital camera device cryptographically authenticating identity of the cellular
`P a g e 17 | 74
`
`

`

`
`
`phone…” Each of these claims thus has in common, among other things, a “short-
`
`range paired wireless connection” and also a clause stating, “wherein establishing
`
`the short-range paired wireless connection comprises, the digital camera device
`
`cryptographically authenticating identity of the cellular phone.”
`
`Figure 1 of the ‘698 patent illustrates a method of utilizing a digital data
`
`capture device 201 in conjunction with a physically separate Bluetooth enabled
`
`mobile device 202.Ex.1003,3:34-41. “The digital data capture device 201 may, for
`
`example, be a digital camera, a video camera, digital modular camera systems, or
`
`other digital data capturing systems.”Id.,3:41-44. In this method,
`
`The BT communication device 201a on the digital data capture
`device 201 is paired 103 with the mobile device 202 to establish a
`connection between the digital data capture device 201 and the mobile
`device 202. BT pairing involves establishing a connection between two
`BT devices that mutually agree to communicate with each other. A BT
`device that wants to communicate only with a trusted device can
`cryptographically authenticate the identity of another BT device. BT
`pairing occurs when the BT communication device 201a agrees to
`communicate with the mobile device 202 in order to establish a
`connection. In order to initiate the pairing process between the BT
`communication device 201a and the mobile device 202, a common
`password known as a passkey is exchanged between the BT
`communication device 201a and the mobile device 202. A passkey is a
`code shared by the BT communication device 201a and the mobile
`device 202.
`A user sets a discoverable mode for the mobile device 202… the
`entered passkey is matched with the passkey of the BT communication
`device 201a. If a match is found, a trusted pair is automatically
`established.
`
`Ex.1003,3:60-4:25 (emphasis added).
`
`
`As noted above, the ‘698 specification states that Bluetooth pairing involves
`P a g e 18 | 74
`
`

`

`
`
`establishing a connection between two Bluetooth devices that mutually agree to
`
`communicate with each other.Id. 4:1-3. Further, the specification states that:
`
`The BT communication device 201a comprises a BT association
`protocol module 201b and a data transfer protocol module 201c. The
`client application 203 on the mobile device 202 comprises a BT
`association protocol module 203a, a data and file monitoring and
`detection module 203b, a data transfer protocol module 203c, a data
`storage module 203d, a graphical user interface (GUI) 203e, and a
`media publishing module 203f. The BT association protocol module
`201b of the digital data capture device 201and the BT association
`protocol module 203a of the client application 203 enable the pairing
`between the BT communication device 201a and the mobile device 202.
`The pairing of the BT communication device 201a and the mobile
`device 202is explained in the detailed description of FIG. 1. The data
`capture module 201d captures the data and the multimedia content on
`the digital data capture device 201.
`
`Id.,6:23-39 (emphasis added).
`
`As noted above, the ‘698 specification states that Bluetooth pairing involves
`
`association and establishing a connection between two Bluetooth devices that
`
`mutually agree to communicate with each other.Id.,4:1-3. To a POSITA, this points
`
`out that pairing involves association and an exchange of credentials to fulfilling the
`
`agreement in addition to merely communicating back and forth.Ex.2009,¶45.
`
`On this issue the Bluetooth specification includes the following:
`
`
`
`
`
`P a g e 19 | 74
`
`

`

`
`
`BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 1]
`
`page 6 0196
`
`4
`
`5
`
`9 Bluetooth'
`
`3.5.6
`
`Extended synchronous comedian—oriented (eSCO)....44
`
`3.5.7 Active slave broadcast (ASB) ........................................ 45
`
`3.5.8
`
`3.5.9
`
`Parked slave broadcast (PSB) ...................................... 46
`
`Logical links .................................................................. 47
`
`3.5.10 User Asynchronousllsochronous Logical Link (ACL-U)48
`
`3.5.11 User SynchronouyExtended Synchronous Logimi Links
`(SCO-S/eSCO—S) .......................................................... 48
`LZCAP Channels ....................................................................... 49
`
`3.6
`
`Communication Topology ................................................................. 50
`4.1
`Piconet Topology ....................................................................... 50
`4.2 Operational Procedures and Modes .......................................... 52
`
`4.2.1
`
`Inquiry (Discovering) Procedure .................................... 52
`
`Paging (Connecting) Procedure .................................... 53
`4.2.2
`4.2.3 Connected mode...
`..53
`
`4.2.4 Holdmode54
`
`4.2.5
`
`Snifimode54
`
`4.2.6
`
`Parked state .................................................................. 55
`
`4.2.? Role switch procedure................................................... 55
`4.2.8
`Enhanced Data Rate ..................................................... 56
`
`Secure Simple Pairing Overview ...................................................... 57
`5.1
`Security Goals. 57
`5.2
`Passive Eavesdropping ProtectIon ............................................ 57
`5.3 Man-ln—The—Middle Protection ................................................... 58
`
`5.4 -\nodeIs .................................................................... 59
`54.1
`Numeric Comparison" 59
`5.4.2
`Just Works .................................................................... 59
`
`5.4.3 Out of Band ................................................................... 60
`
`Passkey Entry ............................................................... 60
`5.4.4
`5.4.5 Association Model Overview ......................................... 61
`
`
`
`and
`
`and
`
`P a g e 20 | 74
`Page 20|74
`
`

`

`
`
`
`Ex.2018, 80, 135. As noted above, the Bluetooth specification refers to a passkey
`as being one of the association models.Ex.2009,¶46.xxx
`To a POSITA, in the context of the ‘698 patent and in other contexts as well,
`the BRI of a “paired connection” is a “bidirectional communications link
`between devices which provides encrypted data exchange between the devices,
`and the communication link can be disconnected and reconnected without
`having to repeat pairing or authentication.”Ex.2009, 46-47. This is consistent
`with how paired connections were defined while creating the Bluetooth
`specifications as well as other technologies, such as Zigbee, which have
`implemented the paired connection concept.Id. To a POSITA under BRI, pairing
`
`P a g e 21 | 74
`
`

`

`
`
`is the steps taken which result in a paired connection.Id.
`
`To a POSITA, in the context of the ‘698 patent but in other contexts as well,
`
`the BRI of a paired connection must be distinguished from mere authentication
`
`and from other methods of communications that involve exchanges of
`
`credentials but not pairing.Id.,¶48. This is a critical point, because according to
`
`the Madisetti Declaration relied upon by Petitioner, all two-way communications
`
`are somehow paired, which improperly nullifies the “paired” limitation. See,e.g.,Ex
`
`1003,98&228
`
`(“The connection
`
`is paired because
`
`it allows
`
`two-way
`
`communication...”).
`
`For purposes of determining whether to institute this proceeding, the Board
`
`determined that “cryptographically authenticating identity of the cellular phone”
`
`encompasses “authenticating the identity of the cellular phone using some form of
`
`security or encryption, including by use of a shared passkey on the digital camera
`
`device and the c

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket