throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`GOPRO, INC., GARMIN INT’L. AND GARMIN USA, INC.
`Petitioners
`
`vs.
`
`CELLSPIN SOFT, INC.,
`Patent Owner
`
`
`Case IPR2019--01108
`Patent No. 9,258,698
`
`
`PATENT OWNER’S PRELIMINARY RESPONSE
`UNDER 37 C.F.R. § 42.107
`
`
`
`
`
`

`

`The undersigned, acting on behalf of the patent owner, Cellspin Soft, Inc.
`
`(“Cellspin”), and, pursuant to 37 U.S.C. § 42.120107(a) and 35 U.S.C. § 316313,
`
`respectfully responds in opposition to the petition of GoPro, Inc., Garmin
`
`International, Inc. and Garmin USA, Inc. (collectively “Petitioner”) for Inter Partes
`
`Review (“IPR”) and request that institution be denied, including because Petitioner
`
`fails to establish a reasonable likelihood that it would prevail on any claim.
`
`
`
`Dated: August 22, 2019
`
`
`
`
`
`
`
`Respectfully submitted,
`
`
`/s/ John J. Edmonds
`John J. Edmonds, Reg. No. 56,184
`EDMONDS & SCHLATHER, PLLC
`355 South Grand Avenue, Suite 2450
`Los Angeles, CA 90071
`Telephone: 213-973-7846
`Facsimile: 213-835-6996
`Email: pto-edmonds@ip-lit.com
`
`
`Stephen F. Schlather, Reg. No. 45,081
`EDMONDS & SCHLATHER, PLLC
`2501 Saltus Street
`Houston, TX 77003
`P: 713-234-0044
`F: 713-224-6651
`E: sschlather@ip-lit.com
`
`
`
`
`
`P a g e 1 | 75
`
`

`

`TABLE OF CONTENTS
`
`
`EXHIBIT LIST .......................................................................................................... 5
`I. INTRODUCTION ................................................................................................. 7
`II. SUMMARY OF ARGUMENTS ......................................................................... 8
`III. SUPPORTING EVIDENCE ............................................................................... 9
`IV. LEGAL PRINCIPLES ........................................................................................ 9
`IV. THE ’698 PATENT .......................................................................................... 10
`V. THE LEVEL OF ORDINARY SKILL IN THE ART ...................................... 13
`VI. ANALYSIS ....................................................................................................... 14
`A. Claim Construction ...................................................................................... 14
`B. Claim Construction Summary ..................................................................... 29
`C. Prior Art Relied Upon by Petitioner ............................................................. 29
`1. Mashita ..................................................................................................... 29
`a. Mashita’s local wireless link termination issue .................................... 34
`b. Mashita teaches away from a cellular phone using HTTP ................... 39
`2. Onishi ........................................................................................................ 41
`3. Hiraishi ..................................................................................................... 42
`D. Non-obviousness of Claims 1,3–5,7,8,10–13 and 15–20 over
` Mashita, Onishi, and Hiraishi ....................................................................... 43
`1. “Limitation C” – No paired Connection ................................................... 43
`2. “Limitation C” – No Cryptographic Authentication ................................ 42
`3. “Limitation D” – No Established Paired Connection ............................... 49
`4. “Limitation G” – No Data Transfer Request ............................................. 51
`5. “Limitation H – No Established Paired Connection ................................. 53
`6. “Limitation J” – No HTTP Upload of New-Media .................................. 54
`7. “Limitation K” – No GUI Deletion of New-Media File .......................... 57
`7. N73 ............................................................................................................ 61
`8. Z520A ....................................................................................................... 61
`E. Response to Dr. Strawn’s Overview of the State of the Art and the Knowledge
` of a Person of Ordinary Skill in the Art ...................................................... 61
`F. Lack of Motivation to Combine Mashita, Onishi and Hiraishi ................... 63
`G. Claim 5 and Claim 8 – No Single Application Performing Steps ............... 64
`H. Claim 6 – Mobile Application Performing All Steps Lacking .................... 67
`I. Conclusions regarding independent claims 1, 5, 8, and 13 ........................... 68
`J. Dependent Claims 3, 4, 7, 10, 11, 12, 15, 16, 17, 18, 19, and 20 ................. 68
`VII. THIS PROCEEDING AND ANY INVALIDITY RULINGS
`P a g e 2 | 75
`
`

`

` BASED THEREON ARE UNCONSTITUTIONAL, INCLUDING
`UNDER THE FIFTH AND FOURTEENTH AMENDMENTS ..................... 69
`
`VIII. CONCLUSION .............................................................................................. 71
`
`P a g e 3 | 75
`
`

`

`TABLE OF AUTHORITIES
`
`Cases
`Allscripts Healthcare Solutions, Inc. et al. v. Uniloc Luxembourg S.A., IPR2015-
`01615, Paper 13 at p. 9 (Feb. 17, 2016) ............................................................... 36
`KSR Int'l Co. v. Teleflex Inc., 550 U.S. 398, 418 (2007) ......................................... 36
`Perreira v. Dep't of Health and Human Serv., 33 F.3d 1375, 1377 n.6
` (Fed.Cir. 1994) ....................................................................................................... 37
`Tre Milano, LLC v. TF3, Ltd., IPR2015-00649, Paper 37
`(P.T.A.B. May 2, 2016) ........................................................................................... 37
`Eldred v. Ashcroft, 537 U.S. 186, 203,206 (2003) .................................................. 55
`Concrete Pipe & Prods. of Cal. v. Construction Laborers Pens. Trust, 508 U.S.
`602, 617-18 (1993) ............................................................................................... 56
`In re Murchison, 349 U.S. 133, 136 (1955) .............................................................56
`Brown v. Duchesne, 60 U.S. 183, 197 (1857) ......................................................... 56
`Horne v. Dept’ of Ag., 135 S. Ct. 2419, 2427 (2015) .............................................. 56
`Celgene Corp. v. Peter, No. 18-1167 (Fed. Cir. July 30,2019) ............................... 56
`
`
`
`Statutes
`35 U.S.C. § 313 .......................................................................................................... 2
`35 U.S.C. § 42.107 ..................................................................................................... 2
`
`
`
`
`
`P a g e 4 | 75
`
`

`

`EXHIBIT LIST
`
`
`Exhibit
`No. Short Name
`2001 AIRCable
`AIRcable User Manual Rev 0.95 December 7, 2004
`Manual
`U.S. Patent No. 9,398,891 to Bagha
`2002
`‘891 Patent
`Silicon Labs UG103.10: RF4CA Fundamentals
`2003 RF4CA
`IEEE Part 15.4: Low-Rate Wireless Personal Area
`2004 LR-WPANs
`Networks (LR-WPANs)
`2005 NIST Glossary Glossary of Key Information Security Terms by NIST
`2006
`--Skipped--
`--Skipped--
`2007
`--Skipped--
`--Skipped--
`2008 Mobile Comm
`Mobile Communications and Networks by Prentice Hall
`& Net.
`2009 Foley
`Declaration of Michael Foley, Ph.D.
`Declaration
`2010 Foley CV
`2011 Techopedia
`definition for
`encryption
`2012 Science
`Dictionary
`definition of
`cryptographic
`2013 Schneier
`Excerpt
`
`CV of Michael Foley, Ph.D.
`Definition of “encryption” from the Techopedia
`dictionary from
`https://www.techopedia.com/definition/5507/encryption
`Definition of “cryptographic” from Academic Press
`Dictionary of Science And Technology 556 (1992)
`(second edition)
`
`2014 Stallings
`Excerpt
`
`2015 CNSSI
`Excerpt
`2016 NISTIR
`Excerpt
`
`2017 ZigBee
`Analysis
`
`Excerpt from Bruce Schneier, Applied Cryptography:
`Protocols, Algorithms and Source Code in C, 2nd
`Edition, 1996, pp. 1-2.
`Excerpt from W. Stallings, "Cryptography And Network
`Security", 2nd, Edition, Chapter 13, IP Security, Jun. 8,
`1998, pp. 399-440.
`Excerpt from CNSSI No. 4009, which is a Committee
`on National Security Systems Glossary
`Excerpt from NISTIR 7298, Revision 2, entitled
`“Glossary of Key Information Security Terms,” which
`was published by the National Institute of Standards and
`Technology
`Security Analysis of Zigbee
`
`P a g e 5 | 75
`
`

`

`2021 ‘802
`Application
`2022 Webster
`Definition of
`“along with”
`2023 Bluetooth BIP
`Profile
`2024 Foley
`Supplemental
`Dec.
`
`
`
`
`Exhibit
`No. Short Name
`2018 Bluetooth v2.1 Bluetooth v2.1 + EDR Core Specification
`2019 Techopedia
`Definition of “authentication” from the Techopedia
`definition for
`dictionary from
`authentication
`https://www.techopedia.com/definition/342/Authenticati
`on
`Definition of “graphical user interface” from the
`Techopedia dictionary from
`https://www.techopedia.com/ definition/5435/graphical-
`user-interface-gui
`U.S. Patent Application No. No. 11/901,802
`
`2020 Techopedia
`definition for
`GUI
`
`Definition of “along with” from the Merriam-Webster
`dictionary: https://www.merriam-
`webster.com/dictionary/along%20with
`Bluetooth Basic Imaging Profile, Interoperability
`Specification, dated July 30, 2003
`Supplemental Declaration of Dr. Michael Foley
`
`
`
`P a g e 6 | 75
`
`

`

`I.
`
`INTRODUCTION
`
`Pending before the Board is Petitioner’s motion for joinder with IPR2019-
`
`00131 filed by Panasonic. As stated in Petitioner’s Motion for Joinder:
`
`The GoPro/Garmin Petition does not present any new grounds of
`unpatentability; rather it is substantively identical to the Panasonic IPR
`Petition and is therefore a “copycat” of the Panasonic IPR Petition…
`Regarding the claim construction standards (i.e., BRI vs. Phillips), any
`proposed constructions in the Panasonic IPR are at least included
`within the scope of either construction. Therefore, the difference in
`standards should not have any material effect... In sum, there are no
`changes to the facts, citations, evidence, or arguments presented...
`
`Paper 4,p.4.
`
`Although the Board has already instituted IPR proceedings in the ‘131-IPR,
`
`even if joinder is allowed,1 proceedings should not be instituted on this Petition. This
`
`Preliminary Response is substantially different from, and more detailed than, Patent
`
`Owner’s Preliminary Response in the ‘127 IPR. This Preliminary Response
`
`primarily tracks the substance of Cellspin’s actual, detailed Response filed in the
`
`‘131-IPR. Further, this Preliminary Response is supported by the Foley Declaration
`
`at Ex.2009. Further, this Preliminary Response is supported by the Foley
`
`Declaration at Ex. 2009. Further, the Phillips standard for claim construction applies
`
`in this proceeding, while the BRI standard applies in the ‘131-IPR.
`
`
`1 Petitioner concedes that its Petition would be untimely unless joinder is allowed. Paper 4,p.3. As
`noted by Petitioner, its May 2019 Petition was filed over seventeen months after Cellspin’s
`Complaints for patent infringement were filed against Petitioners in October 2017 in N.D.
`California.Id.,pp.1-2.
`
`P a g e 7 | 75
`
`

`

`Petitioner fails to demonstrate a reasonable likelihood that any of the
`
`challenged claims 1,3,4,5,7,8,10,11,12,13,15,16,17,18,19 or 20 are invalid or
`
`otherwise unpatentable. Petitioner’s argument fails to render any claim obvious due
`
`to, inter alia, at least six essential claimed requirements noted in the Summary of
`
`Arguments below. Moreover, Petitioner’s declaration of Dr. Strawn impermissibly
`
`uses hindsight to arrive at alleged obviousness, it fails to provide a logical nexus
`
`between alleged motivations to combine and the specific features being combined,
`
`and it fails to support rendering any of the challenged claims obvious.
`
`I.
`
`SUMMARY OF ARGUMENTS.
`
`The references and combination of refences do not disclose many of the
`
`teachings of the ‘698 patent. Without limitation, these key points are not shown or
`
`rendered obvious any of the prior art asserted by Petitioner:
`
` Paired wireless connection between a camera and a mobile device;
`
` Cyrtographic authentication of the mobile device by the camera;
`
` Mashita teaches away from a cellular phone using HTTP;
`
` Combining Mashita with Hiraishi would not work;
`
` GUI’s in general and specifically not for image deletion on the wirelessly
`
`connected digital camera; and
`
` For claims 5 and 8, a single mobile application performing all the required
`
`functions (e.g., request, store, HTTP media upload, delete using GUI).
`
`
`
`P a g e 8 | 75
`
`

`

`III. SUPPORTING EVIDENCE
`
`The exhibit numbers of the supporting evidence relied upon and the relevance
`
`of the evidence to the challenges raised are provided herein. An Exhibit List
`
`identifying the exhibits is included supra. In support of the proposed grounds, this
`
`Petition is accompanied by the declaration of Michael Foley, Ph.D., an expert in the
`
`fields of electrical and computer engineering, with extensive experience with
`
`wireless communications including Bluetooth.Ex.2009.
`
`III. LEGAL PRINCIPLES
`
`A patent claim is unpatentable as obvious if the differences between the
`
`claimed subject matter and the prior art are such that the subject matter as a whole
`
`would have been obvious at the time the invention was made to a person having
`
`ordinary skill in the art to which said subject matter pertains.
`
`In satisfying its burden of proving obviousness, Petitioner cannot employ
`
`mere conclusory statements. Petitioner must instead articulate specific reasoning,
`
`based on evidence of record, to support the conclusion of obviousness.
`
`In assessing the prior art, one must consider whether a POSITA would have
`
`been motivated to combine the prior art to achieve the claimed invention. It can be
`
`important to identify a reason that would have prompted a POSITA in the relevant
`
`field to combine the elements in the way of the claimed invention at the relevant
`
`time of the priority date.
`
`A POSITA may consider whether the prior art teaches a combination. Proving
`P a g e 9 | 75
`
`

`

`obviousness cannot involve hindsight reconstruction. Modifications that render the
`
`prior art unsatisfactory for its intended purpose may not be obvious.
`
`IV. THE ’698 PATENT
`
`The application for ‘698 patent is a continuation of application no.
`
`12/333,303, filed on December 11,2008, and it claims priority to provisional
`
`application No. 61/017,202, filed on December 28,2007. For purposes of this
`
`declaration and analysis, Cellspin assumes (as did Petitioner) that the claims of the
`
`‘698 patent are entitled to a priority date of December 28,2007. Ex.2009,¶21.
`
`The ‘698 patent states that, prior to the ‘698 invention, capture methods were
`
`crude. Ex.1003,1:46–55. As for the invention, the ‘698 specification describes
`
`embodiments comprising digital data capture device 201, e.g., a digital camera,
`
`paired with a physically separate mobile device 202, e.g., a Bluetooth enabled
`
`cellular phone with client application 203. See Ex.1001,3:39-46. Figure 2
`
`“illustrates a system for utilizing a digital data capture device in conjunction with a
`
`Bluetooth enabled mobile device.”Id.,3:14–18. As stated in the specification,
`
`Bluetooth “pairing occurs when the BT communication device 201a agrees to
`
`communicate with the mobile device 202 in order to establish a connection.”Id.,4:1-
`
`3. As noted hereinbelow, a POSITA understands that Bluetooth pairing involves
`
`other aspects as well.
`
`In one embodiment, “In order to initiate the pairing process between the BT
`
`communication device 201a and the mobile device 202, a common password known
`P a g e 10 | 75
`
`

`

`as a passkey is exchanged between the BT communication device 201a and the
`
`mobile device 202.Id.,4:5-7.
`
`As stated in the specification, “[a] passkey is a code shared by the Bluetooth
`
`communication device 201a and the mobile device 202.”Id.,4:7-8.
`
`In request/response mode, client application 203 on the cellular phone (i.e.,
`
`mobile device 202) detects the captured image on the digital camera (i.e., digital data
`
`capture device 201), and, over the established, paired Bluetooth connection, initiates
`
`transfer of the captured image and associated files.Id., Abstract, 2:35-37,6:36-
`
`40,8:37-40. Digital data capture device 201 responds by transferring the captured
`
`image and associated files to client application 203 on mobile device 202.Id.,8:40-
`
`42.
`
`User information and translation to HTTP are applied in transit and on mobile
`
`device 202. See Id.,8:52-55,9:61-10:9. The captured data is then transferred via
`
`HTTP from client application 203 of mobile device 202 to publishing service 401
`
`via network 402, including as illustrated in FIG. 4.Id.,5:9-11,8:43-50.
`
`A Bluetooth device that wants to communicate only with a trusted device can
`
`cryptographically authenticate the identity of another Bluetooth device.Id.,3:59-61.
`
`In a preferred embodiment communication is authenticated cryptographically using
`
`the passkey noted above.Id.,4:3-7.
`
`30. The claims of the ’698 patent are broken down in the Foley Declaration.
`
`Ex. 2009,¶30. A diagram showing the inventive way of claim 5 is as follows:
`P a g e 11 | 75
`
`

`

`mflm Dimital Camera
`bill
`a” w
`
`Device Claim
`
`“whim?
`
`wireless
`Device
`I593 Gain; 5
`“Exam g
`
`
`
`sh
`
`“"u'afphme
`
`11m User Media
`“It!
`
`cm Publishins
`
`Webslte
`
`
`Mum
`"°"°"° " wirelesslnternet u. u-uu’
`cmnection
`
`
`W
`
`
`
`Establish amen-range um wireiess connection
`
`mmermmfayummmng
`
`GUI ho Delete
`
`QM
`New-Media
`File
`
`
`
`
`
`
`
`P a g e 12 | 75
`Page 12|75
`
`

`

`V.
`
`THE LEVEL OF ORDINARY SKILL IN THE ART
`
`The Petitioner states that a person of ordinary skill in the art at the relevant
`
`time would have at least a bachelor’s degree in electrical engineering or computer
`
`science, or an equivalent degree, and at least two years of industry experience with
`
`software development and/or electronic system design. More education can
`
`supplement relevant experience and vice versa. Pet.,9; Ex. 1001,¶24. For purposes
`
`of institution, the Board determined that a POSITA would have had a person of
`
`ordinary skill in the art would have had a bachelor’s degree in electrical engineering
`
`or computer science, or an equivalent degree, and two years of industry experience
`
`with software development, electronic system design, digital camera technology,
`
`and/or wireless communications. ‘131-IPR Institution Decision,15. Cellspin agrees
`
`that either the Board’s determination of a POSITA’s qualifications is correct, and
`
`that Petitioner’s formulation of a POSITA’s qualifications is also correct. Cellspin
`
`agrees that either the Board’s determination of a POSITA’s qualifications is correct,
`
`and that Petitioner’s formulation of a POSITA’s qualifications is also correct.
`
`Ex.2009,¶32. In this Response, Cellspin applies the Board’s determination of a
`
`POSITA’s qualifications.Id.
`
`
`
`
`
`
`
`P a g e 13 | 75
`
`

`

`VI. ANALYSIS
`
`A. Claim Construction
`
`With respect to claim constructions, Petitioner relies merely upon Panasonic’s
`
`proposed BRI constructions and its statement that “any proposed constructions in
`
`the Panasonic IPR are at least included within the scope of either [a BRI or Phillips]
`
`construction.” Paper 4,p.4.
`
`Including since Petitioner has purportedly sought to parrot the ‘131-IPR
`
`petition, which will be decided under BRI, Cellspin is primarily addressing the
`
`proper BRI constructions for “paired,” “cryptographically authenticating” and
`
`“graphical user interface,” including subsidiary and related terms where applicable,
`
`from the perspective of a POSITA and in view of the specification, prior art and
`
`relevant knowledge of a POSITA.Ex.2009,¶41. For purposes of this Preliminary
`
`Response, Cellspin does not need to brief the proper Phillips constructions since
`
`no reasonable likelihood of unpatentability has been shown under BRI
`
`constructions. The Board should decline institution due to the noted claimed
`
`combinations not being met (or rendered obvious) because the Phillips constructions
`
`could not possibly be broader than the correct BRI constructions noted by Cellspin.
`
`References herein to BRI constructions should be understood in the foregoing light.
`
`Cellspin will fully brief the issue of Phillips constructions if institution is granted.
`
`Petitioner (in copycatting Panasonic’s petition) proposes that the above-noted
`
`“wherein” clause be construed under BRI as: “wherein as part of establishing the
`P a g e 14 | 75
`
`

`

`short-range paired wireless connection between the digital camera device and the
`
`cellular phone, the digital camera authenticates the identity of the cellular phone
`
`using some form of secrecy, security, or encryption, including by use of a shared
`
`passkey on the digital camera device and the cellular phone.” Id. 11. However, the
`
`construction proposed by Petitioner’s expert Dr. Strawn is not the same. The
`
`difference is that Dr. Strawn does not agree with Petitioner that “some form of
`
`secrecy” is sufficient. Ex. 1001, 38, 39.
`
`Panasonic/Petitioner argue their proposed BRI construction “is consistent
`
`with the ordinary meaning of the words ‘cryptographically authenticating’ to those
`
`skilled in the art.” Pet. 11–12 (citing Ex. 1012 (McGraw-Hill Dictionary of
`
`Computing & Communications, 2003) (defining “cryptography” as “[t]he science of
`
`preparing messages in a form which cannot be read by those not privy to the secrets
`
`of the form”); Ex. 1013 (Wiley Electrical and Electronics Engineering Dictionary,
`
`2004), (defining “authentication” as “In computers and communications, the
`
`processes of verifying the legitimacy of a transmission, user, or system. Measures
`
`such as passwords and digital signatures are employed.”)
`
`Cellspin is primarily addressing the proper BRI constructions for “paired,”
`
`“cryptographically authenticating” and “graphical user interface,” including
`
`subsidiary and related terms where applicable, from the perspective of a POSITA
`
`and in view of the specification, prior art and relevant knowledge of a POSITA. Ex.
`
`2009,¶40.
`
`P a g e 15 | 75
`
`

`

`Figure 1 of the ‘698 patent illustrates a method of utilizing a digital data
`
`capture device 201 in conjunction with a physically separate Bluetooth enabled
`
`mobile device 202. Ex. 1003, 3:34-41. “The digital data capture device 201 may,
`
`for example, be a digital camera, a video camera, digital modular camera systems,
`
`or other digital data capturing systems.”Id.,3:41-44. As noted in the patent:
`
`BT pairing involves establishing a connection between two BT devices
`that mutually agree to communicate with each other. A BT device that
`wants to communicate only with a trusted device can cryptographically
`authenticate the identity of another BT device. BT pairing occurs when
`the BT communication device 201a agrees to communicate with the
`mobile device 202 in order to establish a connection. In order to initiate
`the pairing process between the BT communication device 201a and
`the mobile device 202, a common password known as a passkey is
`exchanged between the BT communication device 201a and the mobile
`device 202. A passkey is a code shared by the BT communication
`device 201a and the mobile device 202. A user sets a discoverable mode
`for the mobile device 202… the entered passkey is matched with the
`passkey of the BT communication device 201a. If a match is found, a
`trusted pair is automatically established.
`
`Ex. 1003, 3:60-4:25.
`
`Thus, Bluetooth pairing involves (among other things) establishing a
`
`connection between two Bluetooth devices that mutually agree to communicate with
`
`each other.Id. 4:1-3. Further, the specification states that:
`
`The BT communication device 201a comprises a BT association
`protocol module 201b and a data transfer protocol module 201c. The
`client application 203 on the mobile device 202 comprises a BT
`association protocol module 203a, a data and file monitoring and
`detection module 203b, a data transfer protocol module 203c, a data
`storage module 203d, a graphical user interface (GUI) 203e, and a
`media publishing module 203f. The BT association protocol module
`201b of the digital data capture device 201and the BT association
`P a g e 16 | 75
`
`

`

`protocol module 203a of the client application 203 enable the pairing
`between the BT communication device 201a and the mobile device 202.
`The pairing of the BT communication device 201a and the mobile
`device 202is explained in the detailed description of FIG. 1. The data
`capture module 201d captures the data and the multimedia content on
`the digital data capture device 201.
`
`Id. 6:23-39 (emphasis added).
`
`
`Thus, the ‘698 specification states that Bluetooth pairing involves association
`
`and establishing a connection between two Bluetooth devices that mutually agree to
`
`communicate with each other.Id. 4:1-3. To a POSITA, this points out that pairing
`
`involves association and an exchange of credentials to fulfilling the agreement in
`
`addition to merely communicating back and forth. Ex. 2009,¶45.
`
`On this issue the Bluetooth specification includes the following:
`
`
`
`
`
`P a g e 17 | 75
`
`

`

`BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 1]
`
`page 6 of 96
`
`8 Bluetooth’
`
`3.5.6
`
`Extended synchronous connection-oriented (eSCO)....44
`
`3.5.? Active slave broadcast (ASB) ........................................ 45
`
`3.5.8
`
`Parked slave broadcast (PSB) ...................................... 46
`
`3.5.9
`
`Logical links .................................................................. 47
`
`3.5.10 User Asynchronousllsochronous Logical Link (ACL-U)48
`
`3.5.11 User Synchronous/Extended Synchronous Logimi Links
`(SCO-SfeSCO-S) .......................................................... 48
`L2CAP Channels ....................................................................... 49
`
`3.6
`
`4
`
`Communication Topology ................................................................ 50
`
`4.1
`
`Piconet Topology ....................................................................... 50
`
`4.2 Operational Procedures and Modes .......................................... 52
`
`4.2.1
`
`Inquiry (Discovering) Procedure .................................... 52
`
`4.2.2
`
`Paging (Connecting) Procedure .................................... 53
`
`4.2.3 Connected mode ........................................................... 53
`
`4.2.4 Hold mode ..................................................................... 54
`
`4.2.5
`
`Sniff mode ..................................................................... 54
`
`4.2.6
`
`Parked state .................................................................. 55
`
`4.2.? Role switch procedure................................................... 55
`
`4.2.8
`
`Enhanced Data Rate ..................................................... 56
`
`5
`
`Secure Simple Pairing Overview57
`
`5.1
`
`Security Goals ........................................................................... 57
`
`Passive Eavesdropping Protection ............................................ 57
`5.2
`5. 3 Man-ln—The-Middle Protection" 58
`5.4 -Aodels .................................................................... 59
`54.1
`Numeric Comparison .................................................... 59
`
`5.4.2
`
`Just Works .................................................................... 59
`
`5.4.3 Out of Band ................................................................... 60
`
`5.4.4
`
`Passkey Entry ............................................................... 60
`
`5.4.5 Association Model Overview ......................................... 61
`
`
`
`and
`
`and
`
`P a g e 18 | 75
`Page 18|75
`
`

`

`
`Ex. 2018, 80, 135. As noted above, the Bluetooth specification refers to a passkey
`as being one of the association models. Ex. 2009,¶46.
`To a POSITA, in the context of the ‘698 patent and in other contexts as well,
`the BRI of a “paired connection” is a “bidirectional communications link
`between devices which provides encrypted data exchange between the devices,
`and the communication link can be disconnected and reconnected without
`having to repeat pairing or authentication.” Ex. 2009, 46. This is consistent with
`how paired connections were defined while creating the Bluetooth specifications as
`well as other technologies, such as Zigbee, which have implemented the paired
`connection concept.Id. To a POSITA under BRI, pairing is the steps taken which
`
`P a g e 19 | 75
`
`

`

`result in a paired connection.Id.
`
`To a POSITA, in the context of the ‘698 patent but in other contexts as well,
`
`the BRI of a paired connection must be distinguished from mere authentication
`
`and from other methods of communications that involve exchanges of
`
`credentials but not pairing.Id.,¶47.
`
`For purposes of determining whether to institute this proceeding, the Board
`
`determined that “cryptographically authenticating identity of the cellular phone”
`
`encompasses “authenticating the identity of the cellular phone using some form of
`
`security or encryption, including by use of a shared passkey on the digital camera
`
`device and the cellular phone.” Here the Board essentially agreed with
`
`Panasonic/Petitioner’s proposed construction from the ‘131-IPR, except that the
`
`Board, like Petitioner’s expert Dr. Strawn, did not include the word “secrecy.”
`
`To a POSITA, in the context of the ‘698 patent but in other contexts as well,
`
`“encryption is the process of using an algorithm to transform information to make it
`
`unreadable
`
`for
`
`unauthorized
`
`users.”
`
`Ex.
`
`2009,¶50.
`
`See
`
`https://www.techopedia.com/definition/5507/encryption, Ex. 2011.2
`
`
`
` “This
`
`cryptographic method protects sensitive data such as credit card numbers by
`
`
`2 Cellspin’s Ex. 2011 to is a true and correct copy of a printout from the Techopedia dictionary
`which was printed on July 22, 2019 (as reflected on the exhibit itself) and which accurately reflects
`the
`definition
`of
`encryption
`on
`the
`webpage
`at
`https://www.techopedia.com/definition/5507/encryption. Ex. 2025,p.2.
`P a g e 20 | 75
`
`

`

`encoding and transforming information into unreadable cipher text. This encoded
`
`data may only be decrypted or made readable with a key.”Id. In the ’131-IPR for
`
`which joinder is sought, Panasonic cited its Ex. 1012, the McGraw-Hill Dictionary
`
`of Computing & Communications, 2003 at 3, as defining “cryptography” as “The
`
`science of preparing messages in a form which cannot be read by those not privy to
`
`the secrets of the form”. To a POSITA, the way in which messages cannot be read
`
`by those not privy to the secrets of the form is by the use of an algorithm to encode
`
`the data. See Academic Press Dictionary of Science And Technology 556 (1992)
`
`(second edition) (Ex. 2012). See also Bruce Schneier, Applied Cryptography:
`
`Protocols, Algorithms and Source Code in C, 2nd Edition, 1996, pp. 1-2 (“The
`
`process of disguising a message in such a way as to hide its substance is encryption.
`
`An encrypted message is ciphertext. The process of turning ciphertext back into
`
`plaintext is decryption.”) (Ex. 2013);3 W. Stallings, "Cryptography And Network
`
`Security", 2nd, Edition, Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440 (“A
`
`cryptographic algorithm, also called a cipher, is the mathematical function used for
`
`encryption and decryption.”) (Ex. 2014)4; CNSSI 4009-2015 (NSA/CSS Manual
`
`
`3 Cellspin’s Ex. 2013 is a true and correct copy of an excerpt from Bruce Schneier, Applied
`Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition, 1996, pp. 1-2.
`(“Schneier”). Ex. 2025,p.2. Schneier is a textbook which is widely available including on
`www.amazon.com.Id.
`4 Cellspin’s Ex. 2014 is a true and correct copy of an excerpt from W. Stallings, "Cryptography
`And Network Security", 2nd, Edition, Chapter 13, IP Security, Jun. 8, 1998, pp. 399-440
`(“Stallings”). Ex. 2025,p.2. Stallings is a textbook which is widely available including on
`www.amazon.com.Id.
`
`P a g e 21 | 75
`
`

`

`Number 3-16 (COMSEC)) (cryptography is the “Art or science concerning the
`
`principles, means, and methods for rendering plain information unintelligible and
`
`for restoring encrypted information to intelligible form.) (Ex. 2015) . Further, the
`
`National Institute of Standards and Technology defines “cryptographic algorithm”
`
`as “[a] well-defined computational procedure that takes variable inputs, including a
`
`cryptographic key, and produces an output.” Ex. 2016. Further, the cryptographic
`
`mechanism in ZigBee, another well-known means of short-range wireless
`
`communication, is “based on symmetric-key cryptograp

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket