throbber

`
`
`
`
`
`
`
` Exhibit A - 1
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`U.S. Patent No. 6,836,654
`The asserted claims of the ’654 patent are anticipated and/or obvious in view of the User’s Manual for the Nokia 9000i
`Communicator, Issue 1.1 (“Nokia”), either alone or combination with the knowledge of a person of ordinary skill in the art (“POSA”),
`or in combination with one or more other references disclosed in Samsung’s Invalidity Contentions, including the other charted
`references, U.S. Patent Publication No. US2002/0147028 (“Alos”), U.S. Patent No. 4,868,846 (“Kemppi”), U.S. Patent No. 5,864,757
`(“Parker”), and/or U.S. Patent No. 5,913,175 (“Pinault”).
`
`Nokia was distributed along with the 9000i Communicator device at least as of October 1997. Therefore, Nokia qualifies as prior art
`under pre-AIA 35 U.S.C. § 102(b). Alos was filed on December 11, 1998, and was published on October 10, 2002. Alos therefore
`qualifies as prior art under pre-AIA 35 U.S.C. § 102(e). Kemppi issued on September 19, 1989, and therefore qualifies as prior art
`under pre-AIA 35 U.S.C. § 102(b). Parker issued on January 26, 1999, from an application filed on December 12, 1995. Parker
`therefore qualifies as prior art under pre-AIA 35 U.S.C. §§ 102(a) and (e). Pinault was filed on December 20, 1996, and issued on
`June 15, 1999. Pinault therefore qualifies as prior art under pre-AIA 35 U.S.C. § 102(b).
`
`Claim Language
`1(pre) A mobile
`radiotelephony device,
`comprising:
`
`Nokia
`To the extent the preamble is determined to be limiting, Nokia describes a mobile device for making
`phone calls, which discloses the claimed “mobile radiotelephony device”:
`
`
`Nokia at 1-1 (displaying a mobile phone).
`
`
`
`
`1
`
`
`
`
`
`Nokia
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Id.1
`
`
`Claim Language
`
`1(a) blocking means for
`preventing a normal operation
`of the mobile radiotelephony
`device, wherein the normal
`operation includes a
`processing of outgoing calls;
`
`Nokia
`The Nokia 9000i Communicator, with a mobile phone, messaging device, Internet access
`terminal and palmtop organizer all in one compact unit, is more than just the sum of its
`components.
`
`
`For example, when placing a call from the phone interface, although you may be scrolling
`the keys on the keypad or performing a search with the communicator cover closed, the
`search engine will be searching the information within the communicator interface.
`
`The phone interface is designed for quickly making and receiving calls. It looks and
`operates like other Nokia mobile phones (except that the earpiece and microphone are on
`the backside of the device).
`
`Id. at 1-2.
`
`See also id. at Chapter 4 – Telephone.
`
`Nokia discloses this limitation. Nokia describes a blocking means for preventing a normal operation
`of the mobile radiotelephony device wherein the normal operation includes a processing of outgoing
`calls.
`
`For example, Nokia describes “locking” the communicator to “prevent outgoing calls from being
`made” and “unlocking” the communicator with a lock code. Nokia at 10-2 through 10-4.
`
`
`After the communicator has been locked, it cannot be used until the correct lock code is
`given. Incoming voice calls can, however, be answered via the phone interface.
`
`
`1 Emphasis added unless otherwise specified.
`
`
`
`2
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`
`
`Id. at 10-2.
`
`Nokia also teaches that this lock mode (which prevents outgoing calls) is initiated automatically after
`a predetermined elapsed time, or can be initiated manually:
`
`
`If autolock is on, the communicator will lock automatically after the defined inactivity
`period. Press Lock system to lock the device manually at any time.
`
`
`Id.
`
`
`Autolock period — Autolock off (default) / 1 / 2 / 5 / 10 / 15 minutes
`This setting determines the security time-out period, after which the system will lock.
`The timer is reset by any input, calls or data transfer/printing activity.
`
`
`Id. at 10-3.
`
`See also id. at 13-11 and 13-12 (“Security options,” including the “System lock”).
`
`Nokia also discloses blocking means for preventing a normal operation of the mobile radiotelephony
`device wherein the normal operation includes a processing of outgoing calls. For example, Nokia
`discloses a blocking means connected to a PIN code for the SIM card:
`
`
`IMPORTANT! If you enter the PIN code incorrectly three times in a row, you will need a
`PUK (PIN Unblocking Key) code to unblock the SIM card. When the SIM card is blocked,
`you cannot make or receive any calls (including faxes, short messages, e-mail, etc.), except
`emergency calls. Otherwise, the communicator can be used normally. If you misplace or
`forget your PIN code, contact your network operator.
`
`
`Id. at 10-3.
`
`
`
`
`3
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`1(b) timing means for
`activating the blocking means
`in response to the mobile
`radiotelephony device being
`inactive during the normal
`operation of the mobile
`radiotelephony device for a
`defined period of time
`subsequent to a mounting of a
`linked user identification
`module inside the mobile
`radiotelephony device; and
`
`Nokia
`For example, Nokia also discloses a blocking means connected to mounting a valid SIM card:
`
`
`A valid SIM card (supplied by your network operator) is required for making and receiving
`calls.
`
`The network operator may prevent the use of the communicator with any other but the
`operator’s own SIM cards. If an unacceptable SIM card is inserted, the message INVALID
`SIM CARD will be displayed. Should this happen, contact your retailer or network operator.
`
`
`Id. at 2-2; see also 4-4 (“An activated SIM card must be inserted” to make phone calls).
`
`Nokia discloses this limitation. Nokia describes timing means for activating the blocking means in
`response to the mobile radiotelephony device being inactive during the normal operation of the
`mobile radiotelephony device for a defined period of time subsequent to a mounting of a linked user
`identification module inside the mobile radiotelephony device.
`
`For example:
`
`Nokia teaches an “Autolock period” in which the device is automatically placed in the locked state
`after a period of inactivity. Nokia at 10-2 and 10-3.
`
`
`If autolock is on, the communicator will lock automatically after the defined inactivity
`period. Press Lock system to lock the device manually at any time. . . .
`
`After the communicator has been locked, it cannot be used until the correct lock code is
`given. Incoming voice calls can, however, be answered via the phone interface.
`
`
`Id.
`
`Nokia also explains that the inactivity period is a “defined period of time”:
`
`
`
`
`4
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`Autolock period — Autolock off (default) / 1 / 2 / 5 / 10 / 15 minutes
`
`This setting determines the security time-out period, after which the system will lock. The
`timer is reset by any input, calls or data transfer/printing activity.
`
`
`Id. at 10-3; see also 13-12.
`
`Further, Nokia’s timing means is only activated “subsequent to a mounting of a linked user
`identification module inside the mobile radiotelephony device.”
`
`First, Nokia teaches that a linked SIM card is required for making and receiving calls:
`
`
`A SIM (Subscriber Identity Module) card is a “smart chip” that is used with all handsets
`operating on GSM networks. The SIM contains all the information the GSM1900 network
`needs to identify the network user and also performs specific functions required by the
`network. Among other things, the SIM card contains subscriber and billing information,
`makes periodic location updates with the network, and provides enhanced security
`features.
`
`The SIM card can also store contact information. The number of contacts that can be stored
`on a SIM will vary from manufacturer to manufacturer. The SIM memory is referred to as
`Memory A, and the phone memory as Memory B. You can copy contact information from
`one memory location to the other using the phone interface Menu 8 3, see Chapter 13
`"Phone interface: Detailed menus list - Memory functions (Menu 8)" on page 13-13.
`
` A
`
` valid SIM card (supplied by your network operator) is required for making and receiving
`calls.
`
`The network operator may prevent the use of the communicator with any other but the
`operator’s own SIM cards. If an unacceptable SIM card is inserted, the message INVALID
`SIM CARD will be displayed. Should this happen, contact your retailer or network operator.
`
`
`
`
`
`5
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`Id. at 2-2; see also 4-4 (“An activated SIM card must be inserted” to make phone calls).
`
`Second, Nokia teaches that the Autolock default state is “off.”
`
`
`Autolock period — Autolock off (default) / 1 / 2 / 5 / 10 / 15 minutes
`
`Id. at 10-3. Thus, to use the timing means in Nokia, the timing means must be turned on and set to
`one of the predefined time limits by the user:
`
`
`To use the Lock system key in System security, the Autolock period setting (defined in
`System security, Settings) must be set to On.
`
`Highlight Autolock period and press Change. Enter the correct lock code (provided in the
`sales package) to change the setting status.
`
`Id.at 10-2. Because the “PIN code request” (which requests the “PIN (Personal Identity Number)” of
`the SIM card) is default “on,” the device must first have a mounted SIM card before the user can
`move to the security settings and activate the Autolock feature:
`
`
`PIN code request — On (default) / Off
`
`If you set the PIN (Personal Identity Number) code request on, the system requests the code
`every time the phone interface is turned on (by pressing []). You can also turn the PIN code
`request on or off in the phone interface Security options menu (Menu 5 1). This setting
`cannot be changed if the phone interface is switched off.
`
`Note: Some SIM cards do not allow you to turn the PIN code request off.
`
`Id. at 10-3.
`
`
`The PIN code is supplied with the SIM card (i.e., the network operator who activates your
`
`
`
`6
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`SIM will give you the PIN code). When the PIN code request is enabled, the code is required
`each time the phone interface is switched on. The PIN code request must be turned on to
`change the code.
`
`Id. at 10-4.
`
`Additionally, Nokia teaches a feature for linking particular SIM cards to a particular device
`(communicator)—“SIM change security”:
`
`
`SIM change security – On / Off (default)
`
`When active, this security option checks whether the SIM card in the communicator has
`been changed. The check is made every time the phone interface is switched on. The SIM
`change security option can also be activated in the phone interface Security options menu
`(Menu 5 2).
`
`If the SIM card has been changed and the new SIM card has not previously been used with
`your communicator, the communicator locks itself until the lock code, supplied with the
`communicator sales package, is correctly entered. The communicator recognizes five
`different SIM cards as the owner’s cards.
`
`
`Id. at 10-3.
`
`Alternatively, it would have been obvious to POSA to improve the safety of a mobile phone by
`implementing a linked user identification module, e.g., a SIM card, in view of the other references
`cited in these Invalidity Contentions which disclose this limitation, including Alos, Kemppi, Parker,
`and/or Pinault.
`
`For example, Alos teaches:
`
`Alos describes a mobile radio-telephone terminal that is only activated if used with a SIM card
`
`
`
`7
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`storing information that matches corresponding information stored on the terminal, i.e., subsequent
`to a mounting of a linked user identification module inside the mobile radiotelephony device.
`
`Alos describes problems with prior art systems that allow usage of terminals with unauthorized SIM
`cards:
`
`
`In the first place, any subscriber having misappropriated a terminal could in some cases use it
`with his own SIM card. Provision is made to input, via a keypad on the terminal, an
`identification code word for each subscriber, called a PIN (personal identification number)
`but it can control only the usage of the associated SIM card and thus be ineffective against
`fraudulent usage of a terminal.
`
`
`Id. at ¶ 3.
`
`Alos aims to solve these problems by requiring the use of a SIM card that is linked to a terminal.
`Whether the correct SIM card is inserted is determined by comparing information on the SIM card
`(e.g., PIN and/or international mobile subscriber identity (“IMSI”) number) with information on the
`terminal:
`
`
`To this end the invention relates to a mobile radiotelephone terminal comprising radio
`means arranged to be activated by a chip card, the chip card comprising memory means
`containing a subscriber identification word and connected to an input of a comparator, the
`terminal comprising means for receiving the card, which are connected to the radio means,
`means for inputting a particular identification word, associated with the card, and
`arranged to be connected to the other input of the comparator, characterised in that it
`comprises means for matching it with the card, which are arranged to control the
`activation of the radio means from the subscriber identification word.
`
`
`Id. at ¶ 6.
`
`
`In another preferred embodiment the matching means comprise memory means containing
`
`
`
`8
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`data matched with the data contained in the memory means of the card, controlling
`comparator means arranged to read the memory means of the card and to authorise
`activation of the radio means only after the said match has been verified.
`
`Id. at ¶ 14.
`
`
`The card 10 comprises a comparator 11, actually a microprocessor, connected, once the card
`10 has been connected, to an input path from the output of the unit 3 via the connectors 4
`and 14. A second input path of the comparator 11 is connected to a memory 12 of the card
`10 comprising a user identification number, PIN, referenced 121, as well as other data of
`the same type such as IMSI (international mobile subscriber identity), referenced 122. The
`output of the comparator 11 commands the activation, via the connectors 4 and 14 of a radio
`transceiver unit 7 of the terminal 1. The activation/deactivation of the radio unit 7 is,
`moreover, controlled by a comparator 6 connected at the input, on the one hand, to the
`zone 122 (IMSI) of the memory 12 of the card 10 and, on the other hand, to a memory
`zone 522 of a memory 5 of the terminal 1, also containing the IMSI data. The functions of
`the unit 3 and of the comparator 6 are, in practice, carried out by a microprocessor 9.
`
`Id. at ¶ 18.
`
`It would have been obvious to a POSA to combine the teachings of Nokia and Alos such that the
`timing features in Nokia that result in a locked state after a set elapsed time of inactivity occurs
`subsequent to the mounting of a linked SIM card.
`
`For example, Kemppi teaches:
`
`Kemppi describes a “method for locking to the user’s card in a portable radio telephone.”
`Specifically, Kemppi teaches the mounting of a linked user identification module inside the mobile
`radiotelephony device to protect the phone from unauthorized use:
`
`
`The identification data (21) of the card (1) of the user authorized to use the radio
`
`
`
`9
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`telephone concerned are recorded in the non-erasable memory (5) of the processor (4),
`whereupon the radio telephone shifts into a mode locked to this card in such a way that its
`use is possible with only a certain card (1). By means of this method, protection is achieved
`against unauthorized use of the radio telephone.
`
`
`Id. at Abstract.
`
`
`According to the invention, the radio telephone thus has, available for the user to choose, a
`locking level the activation of which locks the telephone to the magnetic card in the card
`reader at that moment. The telephone functions completely normally as long as the correct
`card in in the telephone, but if an attempt is made to use the apparatus with a wrong card,
`its operation is prevented. If the telephone locked to a card is stolen together with the card,
`calls made using the card concerned can be prevented at the system level.
`
`Id. at 1:55-64.
`
`
`After the card is fed in, the identification code on the card is compared with the identification
`code recorded in the memory, and when the card is the correct one the telephone functions
`normally but, in the case of a wrong card, operation is prevented.
`
`Id. at 2:6-10.
`
`
`The method works in such a way that, when the user wishes to lock the radio telephone
`depicted as a block diagram in FIG. 1 to a certain magnetic card 1, he feeds the card into
`the magnetic card reader 3 in the telephone, activates the locking by pressing the locking
`key 8 in the keyboard, and keys in a four-digit locking code from the keyboard 7. At this
`time the telephone number (FIG. 2) or its part 12 on the card 1 is recorded, together with
`the locking code 22, into the indelible memory 5 of the telephone. (The data contained in
`the magnetic card depicted in FIG. 2 pertain to the use of the radio telephone system, which
`is not explained here in greater detail.)
`
`
`
`
`
`10
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`
`Id. at 2:54-66.
`
`It would have been obvious to a POSA to combine the teachings of Nokia and Kemppi such that the
`timing features in Nokia that result locked state after a set elapsed time of inactivity occurs
`subsequent to the mounting of a linked user identification card.
`
`For example, Parker teaches:
`
`Parker is directed to “methods and apparatus for locking communications devices,” and specifically
`describes that the “handset is capable of receiving a readable subscriber identity module (SIM)
`having a network (or other) ID and a codeword, and its operation is to be locked and unlocked with
`respect to the entity corresponding to the ID on the SIM.” Parker at Abstract. Accordingly, Parker
`teaches the mounting of a linked user identification module inside the mobile radiotelephony device
`to prevent unauthorized use:
`
`
`The problems described in the preceding section are solved by the methods and apparatus
`according to the present invention, which permit a telecommunications handset, or other
`device, to be electronically locked to a particular service provider, to a particular network, to
`a particular reseller, or even to an individual SIM.
`
`
`Id. at 3:49-54.
`
`
`Handset 20, using available technology, should be capable of receiving a conventional SIM
`40 containing information including a subscriber identification number including a
`network ID 42 (e.g., without limitation, International Mobile Subscriber Identification
`(IMSI) (incorporating MNC)). SIM 40 also should be capable of containing an authorization
`codeword 44. Processor 22 and circuitry (not shown) of handset 20 also should be capable
`of reading such values from, and writing new ones to, SIM 40.
`
`Id. at 7:40-49.
`
`
`
`
`11
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`At the time of purchase, handset 20 remains in the locked state in which it was manufactured.
`In this state, handset 20 preferably is not enabled for anything but making emergency
`telephone calls (e.g., 911 service in most areas of the United States of America), and for
`activating the subscriber's account. Activation of a subscriber's account is a precondition to
`unlocking handset 20 according to the method of the present invention.
`
`Id. at 7:66-8:6.
`
`
`If desired, the locking scheme according to the present invention could be maintained in
`effect for a handset 20 or other device indefinitely. For example, the device might,
`according to the present invention, be locked to a particular SIM 40 in order that the
`locked device be used only by the rightful owner or operator-in possession of that SIM 40.
`
`
`Id. at 11:32-37.
`
`It would have been obvious to a POSA to combine the teachings of Nokia and Parker such that the
`timing features in Nokia that result in locked state after a set elapsed time of inactivity occurs
`subsequent to the mounting of a linked user identification card, e.g., a SIM card.
`
`For example, Pinault teaches:
`
`Pinault is directed to a “method of making the use of a terminal of a cellular mobile radio system
`more secure, and corresponding terminal and user card,” and specifically describes the use of a
`linked user identification module:
`
`
`Making the use of a terminal more secure generally consists in proposing, in addition to the
`normal operating mode, a so-called locked mode in which the terminal can be used only
`with a user card with which it is “locked”, called the linked user card. In other words, a
`link is established between the terminal and a particular user card (the linked user card).
`
`
`Id. at 2:14-21.
`
`
`
`12
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`
`
`Indeed, the ’654 patent states that Pinault discloses the mounting of a linked user identification
`module inside the mobile radiotelephony device:
`
`
`U.S. Pat. No. 5,913,175, published Jun. 15, 1999 describes a method of protecting a
`radiotelephone which permits to avoid that the lost or stolen telephone can be used
`by a third party with another user identification module. This method comprises
`establishing a link between the device and a specific user identification module and
`blocking the normal operation of the device when the user identification module that is
`placed inside the device is not the one that is linked to the device.
`
`When the device is lost or stolen with the identification module to which it is linked, the user
`is to warn the operator so that the use of his identification module is blocked at network
`level.
`
`This means that the device can be freely used until the identification module to which it is
`linked is blocked via the network. This may take a certain period of time.
`
`
`’654 patent at 1:20-37.
`
`
`In the link creation phase, the terminal reads the user identification data stored on the
`user card and Stores it in its memory.
`
`During the link verification phase the terminal reads the user identification data Stored on the
`user card with which it is cooperating and compares it with that stored in its memory during
`the link creation phase, authorizing operation of the terminal or not according to whether the
`data read and that stored are identical or not.
`
`This prior art technique therefore prevents a terminal being used with a user card other than
`that with which it has been locked. This prevents unauthorized use of a terminal lost or stolen
`without its linked user card. This contributes to reducing the number of terminal thefts.
`
`
`
`13
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`Nokia
`
`1(c) deblocking means for
`permitting the normal
`operation of the mobile
`radiotelephony device in
`response to a supply of a
`deblocking code to the mobile
`radiotelephony device
`subsequent to the mounting of
`the linked user identification
`module inside the mobile
`radiotelephony device and
`subsequent to the defined
`period of time.
`
`
`Pinault at 2:28-41.
`
`It would have been obvious to a POSA to combine the teachings of Nokia and Pinault such that the
`timing features in Nokia that result in locked state after a set elapsed time of inactivity occurs
`subsequent to the mounting of a linked user identification card, e.g., a SIM card.
`
`Nokia discloses this limitation. Nokia describes a user-inputted “lock code” causing the mobile
`device to disengage the lock state, which may be engaged after a “defined inactivity period,” as
`discussed above, which discloses “deblocking means for permitting the normal operation of the
`mobile radiotelephony device in response to a supply of a deblocking code to the mobile
`radiotelephony device…subsequent to the defined period of time”:
`
`Locking the communicator
`
`To prevent outgoing calls from being made, you can lock the communicator in the Security
`application’s main view. . . .
`
`If autolock is on, the communicator will lock automatically after the defined inactivity
`period. . . .
`
`Unlocking the communicator
`
`After the communicator has been locked, it cannot be used until the correct lock code is
`given. Incoming voice calls can, however, be answered via the phone interface.
`
`Nokia at 10-2; see also id. at 10-4 (describing the “Lock code”) and 13-12 (describing the “System
`lock”).
`
`As discussed above in connection with limitation 1(b), Nokia’s timing means is only activated
`“subsequent to a mounting of a linked user identification module inside the mobile radiotelephony
`
`
`
`14
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Nokia
`device,” and thus, the deblocking means must also be only used “subsequent to a mounting of a
`linked user identification module inside the mobile radiotelephony device”:
`
`
`A SIM (Subscriber Identity Module) card is a “smart chip” that is used with all handsets
`operating on GSM networks. The SIM contains all the information the GSM1900 network
`needs to identify the network user and also performs specific functions required by the
`network. Among other things, the SIM card contains subscriber and billing information,
`makes periodic location updates with the network, and provides enhanced security
`features.
`
`The SIM card can also store contact information. The number of contacts that can be stored
`on a SIM will vary from manufacturer to manufacturer. The SIM memory is referred to as
`Memory A, and the phone memory as Memory B. You can copy contact information from
`one memory location to the other using the phone interface Menu 8 3, see Chapter 13
`"Phone interface: Detailed menus list - Memory functions (Menu 8)" on page 13-13.
`
` A
`
` valid SIM card (supplied by your network operator) is required for making and receiving
`calls.
`
`The network operator may prevent the use of the communicator with any other but the
`operator’s own SIM cards. If an unacceptable SIM card is inserted, the message INVALID
`SIM CARD will be displayed. Should this happen, contact your retailer or network operator.
`
`
`Id. at 2-2; see also 4-4, and 10-2 through 10-4, discussed above.
`
`Alternatively, it would have been obvious to POSA to improve the safety of a mobile phone by
`implementing a linked user identification module, e.g., a SIM card, in view of the other references
`cited in these Invalidity Contentions which disclose this limitation, including Alos, Kemppi, Parker,
`and/or Pinault as described above in connection with limitation 1(b). Thus, in the combination(s), a
`POSA would have recognized that providing a code would not disengage the dial lock unless the
`linked SIM card has already been mounted. As discussed above, based on the teachings of Nokia
`
`Claim Language
`
`
`
`15
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`3. The mobile radiotelephony
`device of claim 1, wherein an
`activation of the blocking
`means prevents all
`transmissions of non-
`emergency outgoing calls and
`permits all transmissions of
`emergency outgoing calls.
`
`4. The mobile radiotelephony
`device of claim 1, further
`comprising:
`
`locking means for facilitating
`an activation of the block
`means by the timing means.
`
`Nokia
`and Alos, Kemppi, Parker, and/or Pinault, a POSA would have recognized that this restriction would
`have prevented the fraudulent use of the device and the SIM card.
`
`Nokia discloses this limitation. Nokia expressly contemplates permitting outgoing emergency calls
`while in the lock state.
`
`
`Note: When the communicator is locked, it may be possible to make a call via the phone
`interface to the emergency number programmed into your phone (e.g., 911 or other official
`emergency number).
`
`
`Id. at 10-2.
`
`See also id. at 10-3 (“When the SIM card is blocked, you cannot make or receive any calls (including
`faxes, short messages, e-mail, etc.), except emergency calls.”); 10-4 (“If you enter a wrong PUK
`code ten times in succession, the SIM card is rejected and you cannot make or receive any calls,
`except emergency calls.”); 13-11 (“When call restrictions, fixed dialing, closed user group, or system
`lock is in use, calls may be possible to certain emergency numbers in some networks (e.g., 911).”)
`
`In its Infringement Contentions, Uniloc points to the “Screen Timeout feature…which activates the
`lock screen/pattern/PIN entry screen after a predefined time period” as the claimed “locking means.”
`
`Nokia discloses this limitation. For example, as discussed above with respect to claim limitation
`1(b), Nokia describes a similar feature where the mobile device engages a lock state after passing of
`a set time that requires entry of a lock code in order to disengage the lock state:
`
`
`To prevent outgoing calls from being made, you can lock the communicator in the Security
`application’s main view.
`
`To use the Lock system key in System security, the Autolock period setting (defined in
`System security, Settings) must be set to On.
`
`
`
`
`16
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Claim Language
`
`5. The mobile radiotelephony
`device of claim 1, further
`comprising:
`
`connecting means for
`establishing a link between the
`mobile radiotelephony device
`and the linked user
`identification module.
`
`Nokia
`Highlight Autolock period and press Change. Enter the correct lock code (provided in the
`sales package) to change the setting status.
`
`If autolock is on, the communicator will lock automatically after the defined inactivity
`period. . . .
`
`After the communicator has been locked, it cannot be used until the correct lock code is
`given.
`
`
`Id. at 10-2.
`
`
`Access codes
`The communicator uses several access codes to protect against unauthorized use of your
`communicator and the SIM card. You can make changes to the lock code . . . from the
`communicator interface in the Security application by pressing Settings.
`
`
`Id. at 1-2.
`
`See also analysis above for claim limitation 1(b).
`
`In its Infringement Contentions, Uniloc points to the following functionality: “During activation,
`your SIM card is loaded with your subscription details.” Uniloc also points to the ability to “view the
`ICCID (SIM card number)” from within the settings menu.
`
`Nokia discloses this limitation. For example, Nokia describes a similar functionality of linking
`particular SIM cards to a particular device (communicator) via the “SIM change security” feature.
`
`
`SIM change security – On / Off (default)
`
`When active, this security option checks whether the SIM card in the communicator has
`been changed. The check is made every time the phone interface is switched on. The SIM
`
`
`
`17
`
`Nokia
`
`
`
`

`

`Uniloc v. Samsung, Case No. 2:18-cv-00508-JRG-RSP
`
`
`
`Nokia
`change security option can also be activated in the phone interface Security options menu
`(Menu 5 2).
`
`If the SIM card has been changed and the new SIM card has not previously been used with
`your communicator, the communicator locks itself until the lock code, supplied with the
`communicator sales package, is correctly entered. The communicator recognizes five
`different SIM cards as the owner’s cards.
`
`Nokia at 10-3.
`
`
`A SIM (Subscriber Identity Module) card is a “smart chip” that is used with all handsets
`operating on GSM networks. The SIM contains all the information the GSM1900 network
`needs to identify the network user and also performs specific functions required by the
`network. Among other things, the SIM card contains subscriber and billing information,
`makes periodic location updates with the network, and provides enhanced security
`features.
`
`The SIM card can also store contact information. The number of contacts that can be stored
`on a SIM will vary from manufacturer to manufacturer. The SIM memory is referred to as
`Memory A, and the phone memory as

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket