throbber
Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Invalidity of U.S. Patent No. 10,212,586
`by
`U.S. Patent Application Publication No. 2006/0041746 to Kirkup, et al. (“Kirkup ’746”)
`
`
`The excerpts cited herein are exemplary. For any claim limitation, Defendant may rely on excerpts cited for any other limitation and/or
`additional excerpts not set forth fully herein to the extent necessary to provide a more comprehensive explanation for a reference’s
`disclosure of a limitation. Where an excerpt refers to or discusses a figure or figure items, that figure and any additional descriptions
`of that figure should be understood to be incorporated by reference as if set forth fully therein.
`
`Except where specifically noted otherwise, this chart applies the apparent constructions of claim terms as used by Plaintiff in its
`infringement contentions; such use, however, does not imply that Defendant adopts or agrees with Plaintiff’s constructions in any way.
`
`U.S. Patent No. 10,212,586 (“the ’586 Patent”) claims priority to Japanese Application No. 2012-117105, filed May 23, 2012. For
`purposes of these invaldity contentions, Defendant applies the May 23, 2012, priority date for the ’586 Patent. However, Defendant
`reserves the right to contest Plaintiff’s reliance on the May 23, 2012, priority date, should the priority date become an issue in this
`proceeding.
`
`Kirkup ’746 was filed on August 17, 2004 and published on Feb 23, 2006. As such, Kirkup ’746 qualifies as prior art with regard to
`the ’586 Patent under 35 U.S.C. §§ 102(a), 102(b), and 102(e) (pre-AIA). Alternatively, should the claims of the ’586 Patent be found
`to not be entitled to priority to the foreign filing date, Kirkup ’746 qualifies as prior art under §§ 102(a)(1) and 102(a)(2) (post-AIA).
`Using Plaintiff’s interpretation of the claims, Kirkup ’746 anticipates claims 1-2, 6-7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 102(a),
`(b) and (e).
`
`Alternatively, Kirkup ’746 renders obvious claims 1-2, 6-7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 103(a).
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 7,941,534 to de la Huerga (“de la Huerga ’534”) renders obvious claims 1-2, 6-
`7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 103(a). de la Huerga ’534 was filed on June 26, 2004 and was published on April 28, 2005.
`As such, de la Huerga ’534 qualifies as prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a), 102(b) and 102(e).
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 6,871,063 to Schiffer (“Schiffer ’063”) renders obvious claims 1-2, 6-7, 9-10,
`13-14, and 16-18 under 35 U.S.C. § 103(a). Schiffer ’063 was filed on Jun 20, 2000 and issued on March 22, 2005. As such, Schiffer
`’063 qualifies as prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a), 102(b) and 102(e).
`
`
`
`
`1
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 1 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 8,149,089 to Lin (“Lin ’089”) renders obvious claims 1-2, 6-7, 9-10, 13-14, and
`16-18 under 35 U.S.C. § 103(a). Lin ’089 was filed on November 21, 2008 and issued on April 3, 2012. As such, Lin ’089 qualifies as
`prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a) and 102(e).
`
`
`Kirkup ’746
`
`U.S. Patent No. 10,212,586
`Claim 1
`[1(pre)]A mobile terminal
`configured to switch between
`an unlocked state and a locked
`state in which a predetermined
`operation is limited,
`comprising:
`
`[1(a)] a transceiver which
`performs short-range wireless
`communications;
`
`To the extent the preamble is limiting, Kirkup ’746 teaches a mobile terminal that can be locked
`and unlocked:
`
`
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`Kirkup ’746 at ¶ [0045]
`Kirkup ’746 teaches a transceiver which performs short-range communications:
`
`
`Short-range communications subsystem 340 provides for communication between handheld
`electronic device 120 and different systems or devices, such as PC 110. […] Examples of short
`range communication include standards developed by the Infrared Data Association (IrDA),
`Bluetooth, and the 802.11 family of standards developed by IEEE.
`Kirkup ’746 at ¶ [0093]; see also FIG. 3 (depicting “short-range communications subsystem 340”):
`
`
`
`2
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 2 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`Short-range communications subsystem 340 establishes wireless communications link 145:
`
`
`infrared
`for example, be established by
`link 145 may,
`Wireless communication
`communications or short-range radio frequency communications, such as those specified by
`the Bluetooth or 802.11 standards. […] Other short-range wireless communications media
`and/or protocols may be used to provide communication link 145.
`Wireless communication link 145 may be employed in place of communication link 115 in
`any of the embodiments of systems 100A, 100B, 100C, 100D and 100F (described
`hereinafter).
`
`3
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 3 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(b)] a memory which
`previously stores information
`about an another mobile
`terminal; and
`
`Id. at ¶¶ [0067]-[0068].
`Kirkup ’746 teaches storing the user’s authetication code for PC 110 (which “may be of any kind
`of computer, such as a normal desktop computer, laptop or other portable or fixed computer
`system,” see ¶ [0047]) in a memory of the mobile device:
`
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Kirkup ’746 at ¶ [0068].
`
`This memory can be, in various disclosed embodiments, smartcard 130, SIM 316 or non-volatile
`memory 324:
`
`
`
`4
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 4 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`
`
`Alternatively, de la Huerga ’534 teaches this limitation. De la Huerga ’534 teaches that security
`device 10 stores information about other computer devices it can unlock:
`
`
`In some cases the electronic security device can include an address of one or more trusted
`computer systems or servers.
`de la Huerga ’534 at 15:3-4.
`
`These computer devices can include mobile devices (e.g., patient monitoring devices) to which the
`user may authenticate (“mobile terminals”):
`
`
`5
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 5 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`System 194 includes a plurality of personal computers or computer terminals comprising
`workstations 60 and 60’, which may be located in patient rooms, at nurse stations, in doctor
`offices and administrative offices, a plurality of network devices including databases 158 and
`162 and servers including an Admit, Discharge, and Transfer system or server 166, at least
`one laboratory system or server 170, various bedside treatment devices 116 and 116’ such as
`ventilators and IV infusion pumps, patient monitoring devices 80 and 80’, a pharmacy system
`or server 186, a security verification system or server 168, a billing system or server 171, a
`patient historical records system or server 173 and a unit dose medication dispenser 150.”
`Id. at 20:1-15 (parentheticals omitted).
`
`De la Huerga ’534 further contemplates mobile terminals including patient bracelets (see FIG. 2)
`and locking pill containers (FIG. 5):
`
`
`The other devices include two smart devices including a patient monitor 80’ and a patient
`treatment device 116’, each equipped with a wireless transceiver input device 64 which is
`similar to transceiver 81’ on band 40 (see FIG. 2) and transceiver 81’ on container 200 (see
`FIG. 5)
`Id. at 24:1-5; see also FIGs 2, 5:
`
`
`
`6
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 6 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`Furthermore, de la Huerga ’534 disparages the prior art as not being suitable for portable devices:
`
`
`This [prior art] system is primarily directed to accessing desktop computer terminals on a
`sensitive computer network and is not easily adaptable, however, for restricting access to
`laptops, portable instruments, medical equipment such as respirators, or electronically-
`controlled medication dispensers.
`Id. at 11:38-42.
`
`The motivation to incorporate de la Huerga ’534’s memory storing information about another
`mobile terminal into the system of Kirkup ’746 would be to allow for additional devices to be
`unlocked by the handheld device 120. Modifying Kirkup ’746 in this way would be the use of a
`known technique to improve a similar device in the same way.
`Kirkup ’746 teaches that the microprocessor 338 of handheld device 120 performs all functions:
`
`
`Handheld electronic device 120 comprises a number of components, the controlling
`component being microprocessor 338. Microprocessor 338 controls the overall operation of
`the handheld electronic device 120. The hardware and software control functions described
`above in relation to FIGS. 1A to 1F and FIG. 2 are performed by microprocessor 338.
`Kirkup ’746 at ¶ [0085].
`
`These functions include locking (disabling the use of) and unlocking the device:
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`Kirkup ’746 at ¶ [0045]; see also FIG. 3:
`
`[1(c)] a controller which
`switches the mobile terminal
`between an unlocked state and
`a locked state based on an
`authentication input to the
`mobile terminal, wherein the
`locked state prevents
`unauthorized access to the
`mobile terminal;
`
`
`
`7
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 7 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(d)] wherein, when
`conditions are met, the
`controller controls the mobile
`terminal to transmit
`information to the another
`mobile terminal for switching
`a state of the another mobile
`terminal from a locked state to
`an unlocked state, wherein the
`conditions include:
`
`
`
`
`Kirkup ’746 teaches that handheld electronic device 120, controlled by the controller, transmits the
`authentication information to PC 110 when the conditions are met, as described below.
`
`
`
`
`The handheld electronic device is configured to transmit the authentication code to the
`computer so as to enable the user to unlock the desktop of the computer and thus gain access
`to the computer functions.
`Kirkup ’746 at ¶ [0040].
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120. Advantageously, the PIN code or other
`
`8
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 8 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`unlocking code for the handheld electronic device 120 may be entered either into a user
`interface of the handheld electronic device 120 or that of the PC 110 so as to unlock handheld
`electronic device 120 (if it is not already unlocked) and PC 110. … [I]f the user interfaces
`directly with handheld electronic device 120 then, upon authentication of the user (if
`required), the authentication code for PC 110 is extracted from Smart-card 130 and provided
`to PC 110 over communication link 115.
`Kirkup ’746 at ¶ [0053]; see also Fig. 2:
`
`
`
`
`9
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 9 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(e)] first, the mobile terminal
`is in a locked state, the another
`mobile terminal is in a locked
`state, and the another mobile
`terminal is within
`communication range of the
`
`
`
`
`
`
`Kirkup ’746 teaches that entering the PIN into handheld electronic device 120 serves to unlock
`both it and PC 110 (thus, at the beginning of the authentication process, both devices are necessarily
`in the locked state):
`
`
`10
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 10 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`short-range wireless
`communications of the
`transceiver while in the locked
`state;
`
`[1(f)] second, after the mobile
`terminal is in the locked state,
`the another mobile terminal is
`in the locked state, and the
`another mobile terminal is
`within communication range
`of the short-range wireless
`communications of the
`transceiver while in the locked
`state, performing, via the
`transceiver, the short-range
`wireless communications with
`the another mobile terminal;
`and
`[1(g)] third, after the
`performing, receiving, by the
`controller, the authentication
`input for switching the mobile
`
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120.
`Kirkup ’746 at ¶ [0053].
`
`Kirkup ’746 further teaches that the process may be initiated when handheld electronic device 120
`enters short-range wireless communications range of PC 110:
`
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Id. at ¶ [0068]; see also [0066]-[0067], [0093].
`Kirkup ’746 teaches that wireless communication device 120 automatically communicates over
`communication link 115 (and therefore over wireless communication link 145; see element [1(a)]
`above) with PC 120 when both devices are locked (see element [1(e)] above), when PC 120 detects
`the presence of wireless communication device 120 and initiates the authentication process by
`seeking the authentication code:
`When the user wishes to use PC 110, he or she may perform an activation action, such as
`typing on the keyboard or moving the mouse, whereupon the user may be requested to provide
`a user identification code (either to the PC 110 or the handheld electronic device 120) to
`unlock the PC desktop and enable use thereof […] PC 110 is preferably configured to
`automatically seek the authentication code from handheld electronic device 120 over
`communication link 115 in response to activation.
`Kirkup ’746 at ¶¶ [0048]-[0049]; see also Fig. 2 (supra).
`
`Kirkup ’746 teaches that, responsive to the request for authentication by PC 120, mobile device
`110 requests and receives an authentication code from the user:
`
`Alternatively, if greater security is desired, the handheld electronic device can be configured
`to require entry of a user code, Such as a personal identification number (PIN) or other form
`
`11
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 11 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`terminal from the locked state
`to the unlocked state.
`
`Claim 2
`terminal
`[2] The mobile
`according to claim 1, wherein
`the operation
`includes a
`biometrics authentication.
`
`
`
`of authorization, to initiate release of the authentication code for transmission to the
`computer.
`Kirkup ’746 at ¶ [0042].
`
`Depending on the configuration of the handheld electronic device 120, receipt of a
`communication from PC 110 […] may cause the handheld electronic device 120 to request
`user authentication before retrieving the authentication code and communicating it to PC
`110 (or authorization).
`Id. at ¶ [0049].
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120. Advantageously, the PIN code or other
`unlocking code for the handheld electronic device 120 may be entered either into a user
`interface of the handheld electronic device 120 or that of the PC 110 so as to unlock handheld
`electronic device 120 (if it is not already unlocked) and PC 110. … [I]f the user interfaces
`directly with handheld electronic device 120 then, upon authentication of the user (if
`required), the authentication code for PC 110 is extracted from Smart-card 130 and provided
`to PC 110 over communication link 115.
`Id. at ¶ [0053]; see also Fig. 2 (supra).
`
`
`Kirkup ’746 teaches that the handheld device must be unlocked before the user has access to the
`computer functions:
`
`
`The handheld electronic device is configured to transmit the authentication code to the
`computer so as to enable the user to unlock the desktop of the computer and thus gain access
`to the computer functions.
`Kirkup ’746 at ¶ [0040].
`
`Thus, the “predetermined operation to which access is limited” includes biometric authentication
`together with all other “computer functions” accessed by the user.
`
`
`12
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 12 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Alternatively, de la Huerga ’534 teaches this limitation. De la Huerga ’534 teaches that, in the
`disabled state, ICD 401 (“essentially identical” to security device 10; see 32:17-22) disables itself
`(including its biometric authentication functions) when it locks itself:
`
`
`Where the discerned fingerprint characteristics do no match the stored characteristics, ICD
`401 may do any of several different things. First, ICD 401 may simply disable itself until an
`authorized facility administrator resets the ICD 401 for another identification attempt.
`Second, ICD 401 may allow several (e.g. 3 or 4) attempts to generate a match and only after
`several failed attempts disable itself. Moreover, when ICD 401 disables itself, ICD 401 may
`either cause an audible or a visual signal indicating a mismatch and may continue to cause
`the signal to alert passersby that an unauthorized person attempted to use the ICD 401.
`de la Huerga ’534 at 32:63-33:6 (allowing only one authentication attempt as in the first option
`implicitly discloses disabling the biometric authentication function).
`
`The motivation to modify Kirkup ’746’s system to incorporate the biometric authentication
`teachings of de la Huerga ’534 would be to increase user convenience by not requiring the user to
`remember and enter a password or PIN. Doing so would the the use of a known technique to
`improve a similar device in the same way.
`
`Alternatively, to the extent that this claim is construed to require biometric authentication to unlock
`the device, de la Huerga ’534 teaches biometric authentication to electronic security device 10 as
`well:
`
`
`Authenticating a user to device 10 using device authentication protocol information 1153 can
`include presenting a biometric indicia to sensor 405, which measures or images the indicia.
`Processor 250 then compares it to biometric reference information, measurements, or images
`1152 stored in memory 262. When there is a match the user is authenticated to device 10,
`which then retrieves stored authentication protocol 1165 (e.g. user name 1166 and password
`1167, a time varying algorithm to compute a time based response code, or other user unique
`code) for corresponding to received computer identifier 1202.
`Id. at 72:65-73:7
`
`
`13
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 13 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Alternatively, Schiffer ’063 teaches this limitation. In particular, Schiffer ’063 teaches that the user
`can authenticate via “voice recognition” (biometrics):
`
`
`Authentication of a user to the mobile phone may be accomplished by, for example, the user
`entering a password onto keypad 105 of mobile phone 100 of FIG. 1. […] Alternatively,
`authentication of the user by the mobile phone may include performing voice recognition of
`the user.
`Schiffer ’063 at 3:25-37.
`
`The motivation to modify Kirkup ’746’s system to incorporate the biometric authentication
`teachings of Schiffer ’063 would be to increase user convenience by not requiring the user to
`remember and enter a password or PIN. Doing so would the the use of a known technique to
`improve a similar device in the same way.
`
`Alternatively, Lin ’089 teaches this limitation. In particular, Lin ’089 teaches that the user can
`authenticate via “biological recognition technology:”
`
`
`The present invention relates to a method for unlocking a locked computing device and, more
`specifically, to a method that utilizes biological recognition technology to unlock a locked
`computing device.
`Lin ’089 at 1:9-12.
`
`
`The locked computing device 220 then obtains biometric infor mation, Step 120, by using a
`camera sensor 230 to capture an image of the external environment in this scenario 200.
`Then the computing device 220 determines in Step 130 whether the biometric information
`meets a predetermined requirement; in this scenario 200, the biometric information obtained
`is a facial profile of user 210, and the predetermined requirement is whether the obtained
`image comprises a facial profile of a human face (such as that of user 210). When the obtained
`biometric information (facial profile) does not meet the requirement, the computing device
`220 proceeds to Step 180 and remains locked; when the predetermined requirement is met,
`then the process continues to Step 150.
`Id. at 3:20-33
`
`
`
`
`14
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 14 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`For example, in another embodiment of the present invention, the locked computing device
`220 includes a fingerprint reader (touch screen 240) utilized for capturing a fingerprint
`image of a finger 250 of the user 210 to thereby obtain the biometric information. If specific
`user authorization is (step 150) is not enabled, the computing device 220 unlocks upon
`recognition of the fingerprint image. On the other hand, if further security is required, the
`locked computing device 220 can also check to see if the fingerprint image matches a
`predetermined fingerprint image of an authorized user of the computing device and only
`unlock upon the fingerprint image matching that of the authorized user.
`Id. at 4:34-45; see also FIGs 1, 2 infra:
`
`
`
`15
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 15 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`The motivation to modify Kirkup ’746’s system to incorporate the biometric authentication
`teachings of Lin ’089 would be to increase user convenience by not requiring the user to remember
`and enter a password or PIN. Doing so would the the use of a known technique to improve a similar
`device in the same way.
`
`
`
`
`
`
`16
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 16 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Kirkup ’746 teaches that the handheld device must store information about the computer in order
`to communicate with it. See element [1(b)]. supra. Kirkup ’746 further contemplates
`communicating with multiple systems and devices such as the computer:
`
`
`Short-range communications subsystem 340 provides for communication between handheld
`electronic device 120 and different systems or devices, such as PC 110.
`Kirkup ’746 at ¶ [0093]. Thus Kirkup ’746 necessarily contemplates storing information in the
`memory about each of these “different systems or devices.”
`
`Alternatively, de la Huerga ’534 teaches this limitation. De la Huerga ’534 teaches that security
`device 10 can unlock multiple devices, and therefore stores information about each of them (see
`element [1(b)] supra):
`
`
`In some cases the electronic security device can include an address of one or more trusted
`computer systems or servers.
`de la Huerga ’534 at 15:3-4; see also FIG. 34 (showing “list of computer systems 1160”), each of
`which can be unlocked by security device 10:
`
`
`FIG. 34 shows the expanded list of trusted or registered computer system information 1160
`stored in memory 262 of device 10. For each electronic or computer system 194 the user is
`to access, security information 1161 is provided including trusted computer system identifier
`1162 that electronic device 10 has been programmed to recognize or trust and may be in the
`form of a name, a URL address, an internet protocol (IP) address, or other method of
`identifying a computer system.
`Id. at 66:39-49.
`
`The motivation to incorporate de la Huerga ’534’s teaching of storing information about multiple
`mobile terminals into the system of Kirkup ’746 would be to allow Kirkup ’746’s handheld
`elevtronic device 120 to unlock multiple devices such as PC 110, thereby further increasing
`convenience for the user. Doing so would be the simple use of known technique to improve a
`similar devices in the same way.
`
`17
`
`Claim 6
`[6] The mobile terminal
`according to claim 1, further
`configured to store
`information about two or more
`another mobile terminals.
`
`Claim 7
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 17 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[7] The mobile terminal
`according to claim 1, wherein
`the short-range wireless
`communication is via a
`Bluetooth connection.
`
`Claim 9
`[9(pre)] A method for
`controlling a mobile terminal
`to transit between an unlocked
`state and a locked state in
`which a predetermined
`operation is limited,
`comprising the steps of:
`
`[9(a)] performing short-range
`wireless communications;
`[9(b)] storing information
`about an another mobile
`terminal in a memory; and
`
`[9(c)] transmitting information
`from the mobile terminal to
`the another mobile terminal
`
`
`
`Kirkup ’746 teaches that the short-range communication may be estbilied via a Bluetooth
`connection:
`
`
`infrared
`for example, be established by
`link 145 may,
`Wireless communication
`communications or short-range radio frequency communications, such as those specified by
`the Bluetooth or 802.11 standards.
`Kirkup ’746 at ¶ [0067].
`
`To the extent that the preamble is limiting, Kirkup ’746 teaches a method for unlocking a mobile
`terminal. In particulat, Kirkup ’746 teached method for authenticating a user of a computer (which
`may be a mobile device; see ¶ [0047):
`
`
`The invention relates generally to methods, systems and devices for authenticating a user of
`a computer by using a handheld electronic device.
`Kirkup ’746 at ¶ [0001].
`
`This authentication process unlocks the device:
`
`
`If the entered authentication code is correct, the handheld electronic device 120 then provides
`the authentication code for the PC 110 (as extracted from smart-card 130) across
`communication link 115, thereby authenticating the user and unlocking the desktop of PC
`110.
`Id. at ¶ [0052].
`Kirkup ’746 teaches a step of performing short-range communications. See element [1(a)], supra.
`
`Kirkup ’746 teaches a step of storing information about another mobile terminal in memory. See
`element [1(b)], supra.
`
`Alternatively, de la Huerga ’534 teaches this limitation. See id.
`
`Kirkup ’746 teaches a step of transmitting unlocking information when conditions are met. See
`elements [1(c)] and [1(d)], supra.
`
`
`18
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 18 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Alternatively, de la Huerga ’534 teaches this limitation. See id.
`
`
`which is for switching a state
`of the another terminal from a
`locked state to an unlocked
`state when conditions are met,
`wherein the locked state
`prevents unauthorized access
`to the mobile terminal, and
`wherein the conditions
`include:
`[9(d)] first, the mobile
`terminal is in a locked state;
`the another mobile terminal is
`in a locked state; and the
`another mobile terminal is in
`communication range of the
`short-range wireless
`communications;
`[9(e)] second, after the mobile
`terminal is in the locked state,
`the another mobile terminal is
`in the locked state, and the
`another mobile terminal is
`within communication range
`of the short-range wireless
`communications, performing,
`via the mobile terminal, the
`short-range wireless
`communication with the
`another mobile terminal; and
`[9(f)] third, after the
`performing, receiving the
`authentication input by the
`mobile terminal for switching
`
`
`
`Kirkup ’746 teaches this claim limitation. See element [1(e)], supra.
`
`Kirkup ’746 teaches this claim limitation. See element [1(f)], supra.
`
`Kirkup ’746 teaches this claim limitation. See element [1(g)], supra.
`
`19
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 19 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`the mobile terminal from the
`locked state to the unlocked
`state.
`Claim 10
`[10] The method according to
`claim 9, wherein the operation
`includes a biometrics
`authentication.
`
`Kirkup ’746 teaches this claim limitation. See claim [2], supra.
`
`
`Alternatively, de la Huerga ’534 teaches this limitation. See id.
`
`Alternatively, Schiffer ’063 teaches this limitation: See id.
`
`Alternatively, Lin ’089 teaches this limitation: See id.
`
`Kirkup ’746 teaches this claim limitation. See claim [6], supra.
`
`Alternatively, de la Huerga ’534 teaches this limitation. See id.
`
`
`Kirkup ’746 teaches this claim limitation. See claim [7], supra.
`
`To the extent that the preamble is limiting, Kirkup ’746 discloses a lock state control system. In
`particular, Kirkup ’746 teaches an authentication system:
`
`
`The invention relates generally to methods, systems and devices for authenticating a user of a
`computer by using a handheld electronic device.
`Kirkup ’746 at ¶ [0001].
`
`
`20
`
`Claim 13
`[13] The method according to
`claim 9, the method further
`comprising the step of storing
`information about two or more
`another mobile terminals.
`Claim 14
`[14] The method according to
`claim 9, wherein the short-
`range wireless communication
`is performed via a Bluetooth
`connection.
`Claim 16
`[16(pre)] A lock state control
`system comprising:
`
`
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 20 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`This authentication system controls the lock state of the computer by unlocking it:
`
`
`[16(a)] a first mobile terminal
`and a second mobile terminal
`which are configured to switch
`between an unlocked state and
`a locked state in which a
`predetermined operation is
`limited;
`
`[16(b)] wherein the first
`mobile terminal comprises a
`transceiver which performs
`short-range wireless
`communications, a memory
`which previously stores
`information about the second
`mobile terminal, and a
`controller which switches the
`first mobile terminal between
`an unlocked state and a locked
`state based on an
`authentication input to the first
`mobile terminal from a user,
`
`
`
`If the entered authentication code is correct, the handheld electronic device 120 then provides
`the authentication code for the PC 110 (as extracted from smart-card 130) across
`communication link 115, thereby authenticating the user and unlocking the desktop of PC
`110.
`Id. at ¶ [0052].
`
`Kirkup ’746 teaches the first mobile terminal. See element [1(pre)], supra.
`
`Kirkup ’746 futher teaches the second mobile terminal. In particular, Kirkup ’746 teaches PC 110
`which may be a mobile device; see ¶ [0047]. Both the handheld device and the PC can switch
`between a locked state and an unlocked state:
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120.
`Kirkup ’746 at ¶ [0053].
`
`Kirkup ’746 teaches the claimed transceiver. See element [1(a)], supra.
`
`Kirkup ’746 further teaches the claimed memory. See element [1(b)], supra.
`
`Alternatively, de la Huerga ’534 teaches the claimed memory. See id.
`
`
`Kirkup ’746 still further teaches the claimed controller. See element [1(c)], supra.
`
`21
`
`Apple v. Maxell
`IPR2020-00202
`Maxell Ex. 2012
`
`Page 21 of 23
`
`

`

`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Kirkup ’746 teaches this claim l

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket