throbber
KSUNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`KOSS CORPORATION,
`Patent Owner.
`
`
`
`
`
`
`
`
`
`
`
`
`Case IPR2021-00255
`Patent 10,298,451
`
`
`
`
`
`
`
`PETITIONER’S REPLY TO PATENT OWNER’S RESPONSE
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`
`
`TABLE OF CONTENTS
`
`2. 
`
`3. 
`
`INTRODUCTION ........................................................................................................... 5 
`I.   
`II.   MOTIVATION TO COMBINE BROWN AND SCHERZER ........................... 7 
`The Brown-Scherzer Combination Is Consistent With Scherzer’s
`A. 
`Disclosure .............................................................................................. 8 
`B.  Koss’s Three Reasons Why The Brown-Scherzer Combination
`Deviates From Scherzer’s Disclosure Are Fatally Flawed ................. 12 
`The First Reason Is Not Credible Because PO’s Allegations Of
`1. 
`“Scherzer’s Account Acceptability Requirement And Associated
`Tracking” Are Limited To Specific Embodiments. ................... 13 
`The Second Reason Fails Because Koss’s Allegations Of
`“Unfettered Dissemination Of Access Credentials” Finds No
`Support In Scherzer ................................................................... 14 
`The Third Reason Is Flawed Because Koss’s “Simpler”
`Approach To Network Connectivity Ignores Specific
`Advantages Of The Brown-Scherzer Combination ................... 16 
`C.  Koss’s Positions on the Brown-Scherzer Combination Are Also
`Legally Deficient ................................................................................. 18 
`1. 
`Koss’s “Teaching Away” Arguments Are Unpersuasive ......... 18 
`2. 
`Koss’s Position Also Improperly Requires Bodily Incorporation
`Of Scherzer’s Account Acceptability Requirement and
`Associated Tracking .................................................................. 18 
`III.  THE BROWN-SCHERZER COMBINATION IS NOT A PRODUCT OF
`HINDSIGHT ................................................................................................................... 20 
`The Brown-Scherzer Combination Is A Predictable Solution To
`A. 
`Known Problems of Network Connectivity ........................................ 20 
`The Petition’s Examples of The Brown-Scherzer Combination Both
`Implicate Predictable Problems ........................................................... 22 
`The First Example Implicates Predictable Problems Relating to
`1. 
`Configuring WiFi Connectivity For A Tablet ........................... 23 
`
`B. 
`
`i
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`
`2. 
`
`The Second Example Implicates Predictable Problems Of
`Accessing the Internet In Locations Where A User Does Not
`Have Access To Network Credential Information .................... 24 
`IV.  SECONDARY CONSIDERATIONS ...................................................................... 25 
`A.  Unclaimed Features In The PowerBeats Pro Prevent Any Presumption
`Of Nexus .............................................................................................. 26 
`B.  Koss Fails To Show That Any Alleged Commercial Success Is The
`Direct Result Of The Unique Characteristics Of The Challenged
`Claims .................................................................................................. 29 
`V.  CONCLUSION .............................................................................................................. 29 
`
`
`ii
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`
`LIST OF EXHIBITS
`
`APPLE-1001
`
`U.S. Patent No. 10,298,451 to Koss, et al. (“the ’451 patent”)
`
`APPLE-1002
`
`Excerpts from the Prosecution History of the ’451 patent (“the
`Prosecution History”)
`
`APPLE-1003
`
`Declaration of Dr. Jeremy Cooperstock
`
`APPLE-1004
`
`U.S. Pat. No. 9,021,108 (“Brown”)
`
`APPLE-1005
`
`U.S. Pat. App. Pub. No. 2007/0033197 (“Scherzer”)
`
`APPLE-1006
`
`U.S. Provisional Pat. App. No. 60/687,463 (“’463 Provisional”)
`
`APPLE-1007
`
`U.S. Provisional Pat. App. No. 60/728,918 (“’918 Provisional”)
`
`APPLE-1008
`
`U.S. Pat. App. Pub. No. 2007/0245028 (“Baxter”)
`
`APPLE-1009
`
`U.S. Pat. App. Pub. No. 2011/0025879 (“Drader”)
`
`APPLE-1010
`
`U.S. Pat. App. Pub. No. 2010/0307916 (“Ramey”)
`
`APPLE-1011
`
`U.S. Pat. App. Pub. No. 2010/0165879 (“Gupta”)
`
`APPLE-1012
`
`U.S. Provisional Pat. No. 61/386,716 (“’716 Provisional”)
`
`APPLE-1013
`
`RESERVED
`
`APPLE-1014
`
`Plaintiff KOSS Corporations’ Preliminary Infringement
`Contentions, KOSS Corporation v. Apple Inc., 6:20-cv-00665
`(W.D.Tex.)
`
`APPLE-1015
`
`Example Order Governing Proceedings - Patent Case
`
`APPLE-1016
`
`Agreed [Proposed] Scheduling Order, KOSS Corporation v.
`Apple Inc., 6:20-cv-00665 (W.D.Tex.)
`
`iii
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`
`APPLE-1017
`
`APPLE-1018
`
`Katie Buehler, “Texas Patent Trials Halted Due to COVID-19
`Spike,” Law360, available at
`https://www.law360.com/ip/articles/1330855/texas-patent-
`trials-halted-due-to-covid-19-spike.
`
`Scott McKeown, District Court Trial Dates Tend to Slip After
`PTAB Discretionary Denials, available at
`https://www.patentspostgrant.com/district-court-trial-dates-
`tend-to-slip-after-ptab-discretionary-denials/ (Jul. 24, 2020)
`
`APPLE-1019
`
`Transcript of November 5, 2020 Telephonic Hearing from
`Fintiv, Inc. v. Apple, Inc., Civil Action No. A-19-CV-1238
`(WDTX)
`
`APPLE-1020
`
`Declaration of Seth Sproul ISO Motion for Pro Hac Vice
`Admission
`
`APPLE-1021
`
`Updated Declaration of Seth Sproul
`
`APPLE-1022
`
`Declaration of Michael Pieja
`
`APPLE-1023
`
`Supplemental Declaration of Jeremy Cooperstock
`
`APPLE-1024
`
`Joseph C. McAlexander III Deposition Transcript, Dec. 15,
`2021
`
`APPLE-1025
`
`IPR2021-00600, Ex. No. KOSS-2025, Jeremy Cooperstock
`Deposition Transcript
`
`APPLE-1026
`
`U.S. Pat. App. Pub. No. 2008/0119138 (“Kim”)
`
`iv
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`
`I.
`
`INTRODUCTION
`Koss’s primary argument against the Petition is that a POSITA would not
`
`have been led to combine Brown and Scherzer. This position focuses exclusively
`
`on motivation to combine, and does not dispute that the prior art teaches the
`
`substantive limitations recited in claims 1-21 of the ’451 patent (“Challenged
`
`Claims”). But Koss’s purported lack of combinability relies heavily on an overly
`
`narrow interpretation of Scherzer that departs from Scherzer’s express disclosure
`
`by picking and choosing only certain portions of Scherzer while entirely
`
`disregarding other portions. For example, Koss characterizes Scherzer’s user
`
`contributions account and tracking features to be the key aspect to its disclosure
`
`despite Scherzer unambiguously teaching that these features are limited to specific
`
`embodiments of its invention. Instead, when properly accounting for the full
`
`breadth of Scherzer’s disclosure, a POSITA would have understood Scherzer to
`
`provide a broader teaching and motivation—i.e., to improve access to the Internet
`
`in different locations—a motivation that is not only consistent with, but advanced
`
`by, the Brown-Scherzer combination.
`
`Koss’s incessantly demands that the Brown-Scherzer combination bodily
`
`incorporate Scherzer’s user account and tracking embodiments. But no such
`
`requirement exists to demonstrate obviousness, and the law in fact states the
`
`opposite. Consistent with obviousness jurisprudence, the Board has repeatedly
`

`
`5
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`declined to credit attacks on prior art combinations that are premised on bodily
`
`incorporation of a secondary prior art reference. The same holds true here,
`
`particularly when the Petition does not rely on these embodiments for the proposed
`
`combination. Nor does the Petition apply teachings of these embodiments to any
`
`feature recited in the Challenged Claims. Koss’s attacks, therefore, are hollow and
`
`should be dismissed.
`
`Koss’s attempt to limit the scope of Scherzer’s teachings in criticizing the
`
`Brown-Scherzer combination also reveals that its overall position is legally
`
`untenable. Its position effectively advocates that Scherzer’s disclosure of user
`
`contributions account and tracking features teaches away from the Brown-Scherzer
`
`combination. But the law is clear that a reference only teaches away from a feature
`
`when it discourages or disparages the feature. Scherzer does neither. Thus, even if
`
`Koss’s myopic view of Scherzer were improperly credited, Scherzer is at best
`
`silent in addressing the configurations present in the Brown-Scherzer combination.
`
`Mere silence does not amount to teaching away.
`
`To further its attack on the Brown-Scherzer combination, Koss accuses the
`
`proposed combination as being a product of improper hindsight and superficially
`
`charges that there is no other reason to have combined the prior art other than to
`
`achieve satisfaction of the claim language. In doing so, Koss completely ignores
`
`the clearly predictable nature of the problems addressed by the Brown-Scherzer
`

`
`6
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`combination that a POSITA would have readily recognized based on the teachings
`
`of Brown and Scherzer. The Petition addressed these problems with two examples
`
`identifying opportunities to improve the individual disclosures of Brown and
`
`Scherzer and demonstrating how the Brown-Scherzer combination provides
`
`solutions in each circumstance.
`
`In a last-ditch effort to save the claims, Koss then asserts that sales of
`
`HomePod and HomePod Mini (“HomePod Products”)—products it accuses Apple
`
`of infringing—demonstrate non-obviousness based on secondary considerations of
`
`commercial success. As an initial matter, the HomePod Product do not practice
`
`any of the challenged claims, and Koss makes no serious effort to prove otherwise.
`
`Further, Koss’s allegations of nexus are both factually and legally deficient. They
`
`are factually deficient because Koss failed to analyze claim features and, in doing
`
`so, ignored several critical unclaimed features in the HomePod Products. They are
`
`also legally deficient because they failed to sufficiently demonstrate how the sales
`
`of the HomePod Products were a direct result of the unique characteristics of the
`
`Challenged Claims.
`
`II. MOTIVATION TO COMBINE BROWN AND SCHERZER
`Despite Koss’s attempt to derail the Brown-Scherzer combination,
`
`Scherzer’s disclosure is not only consistent with the combination, but actually
`
`reinforces it. A close inspection of Scherzer reveals that Koss’s attack is premised
`

`
`7
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`on an overly narrow interpretation of Scherzer that focuses only on specific
`
`embodiments while turning a blind eye to Scherzer’s broader disclosure. Indeed,
`
`the specific embodiments that form the basis of Koss’s attack are not even relied
`
`on in the Petition. See APPLE-1003, ¶¶17-18.
`
`A. The Brown-Scherzer Combination Is Consistent With Scherzer’s
`Disclosure
`The Petition explained that the Brown-Scherzer combination involves
`
`complementary disclosures that a POSITA would have understood to improve
`
`network access by allowing users to access the Internet on multiple devices and in
`
`multiple locations. See Pet., 24-28. Indeed, by allowing a secondary device of a
`
`registered user to obtain Internet access using network credential information
`
`stored on a Scherzer-like server, the user is able to access the Internet on multiple
`
`devices. Id. Such a configuration is consistent with, and indeed supported by,
`
`Scherzer’s overall motivation to provide increased Internet connectivity through a
`
`collaborative community of users. Id., 20-25; APPLE-1005, ¶[0005].
`
`Koss detracts from this basic understanding and focuses instead on specific
`
`teachings within Scherzer relating to user contribution accounts and tracking
`
`bandwidth usage that it claims would undercut the proposed combination. See
`
`Resp., 20-22, 24-30. But Scherzer clearly describes—in various locations within
`
`its disclosure—that these teachings are limited to “some embodiments.” See, e.g.,
`
`Scherzer, ¶[0015], [0016]. Scherzer is therefore clear that the broadest conception
`

`
`8
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`of its disclosed invention is to facilitate different users to quickly download access
`
`credentials onto their device so that they can access the Internet via wireless access
`
`points located in different locations. Notably, Scherzer’s disclosure makes it clear
`
`that strict accounting and tracking of subsequent access by the users to the wireless
`
`access points are added features limited to only certain embodiments of this
`
`broader invention. APPLE-1023, ¶¶11-12.
`
`Koss characterizes Scherzer’s system as “control[ling] the dissemination of
`
`access credentials such that only registered users can obtain the benefit of other
`
`registered user’s access credentials.” Resp., 20. This characterization is irrelevant
`
`to the Brown-Scherzer combination, where both devices are associated with the
`
`same “registered user” who would “obtain the benefit” of shared credentials. See
`
`Pet., 24-33. Further, there is no prohibition in Scherzer regarding what a registered
`
`user can do with downloaded credential information, such as providing the
`
`credential information to another device or providing the credential information to
`
`other users. Koss tacitly admits this as it fails to cite to any disclosure in Scherzer
`
`to support its characterization. See id., 21-22; APPLE-1023, ¶¶13-16.
`
`Indeed, Dr. Cooperstock confirmed this point in deposition in a related IPR
`
`proceeding involving the same parties and the ’451 Patent (IPR2021-00592):
`
`Q. Dr. Cooperstock, does Scherzer include any teachings indicating
`that devices of unregistered users are prohibited from accessing
`credential information of wireless access points of Scherzer’s service?
`

`
`9
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`A. No, Scherzer does not prescribe any limits to what kind of users,
`either registered or unregistered, can make use of the service.
`Q. Does Scherzer include any teachings indicating that an
`unregistered device of a registered user, for example, a second device
`of a registered user that has not been registered is prohibited from
`accessing credential information of wireless access points of
`Scherzer’s service?
`A. No. Scherzer’s descriptions throughout, I mean, from the very
`beginning of the detailed description, are all about the user. It’s about
`providing the user with access and user’s access points, and the user
`may choose to deny or – to grant or deny. Scherzer is user specific
`and user centered, not device-centric. And it would defeat the
`purposes of Scherzer to limit what devices or how many devices a
`user can connect to access points.
`APPLE-1025, 74:13-75:14
`Dr. Cooperstock further explains that “Scherzer provides no teaching that
`
`would be understood as prohibiting how credential information, once downloaded
`
`using Scherzer’s service, can be used to connect to a wireless access point.”
`
`APPLE-1023, ¶22; see also id., ¶¶13-18. For example, “Scherzer does not teach
`
`that the network credential information downloaded from Scherzer’s server is
`
`encrypted.” Id., ¶22. In failing to disclose any such security mechanism for
`
`protecting or otherwise obfuscating the downloaded credential information,
`
`Scherzer suggests a lack of “concern about the user that receives the credential
`
`information subsequently accessing and providing the downloaded credential
`

`
`10
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`information to other devices or users.” Id. In deposition, Koss’s expert, Mr.
`
`Joseph C. McAlexander III confirmed the same understanding. APPLE-1024,
`
`316:21-317:1. When further cross-examined, Mr. McAlexander could not point to
`
`anything in Scherzer discussing encrypting the credential information provided to
`
`users. Instead, he retreated to an irrelevant discussion of what encryption protocol
`
`may or may not be used by a wireless access point:
`
`Paragraph 15 does not indicate that that -- that information generally
`is encrypted…if you look at figure 4 as an example in Scherzer when
`you determine the access information with respect to a visible access
`point, the information that’s associated with that point may or []
`may not be encrypted. It depends upon the access point.
`
`See id., 326:21-327:5 (emphasis added). This confusion is just one of several
`
`examples of his and Koss’s misunderstandings of Scherzer’s disclosure.
`
`Koss also attempts to attack the combination by suggesting that a user’s
`
`second device would be unable to connect to a wireless access point “if the MAC
`
`address was not identified by Scherzer’s server.” Resp., 28 (citing KOSS-2022,
`
`¶¶50-52). But this position confuses (i) the process by which Scherzer’s server
`
`determines whether it will enable downloading of credential information to a
`
`requesting user and (ii) the process by which a wireless access point determines
`
`whether it will allow a device that provides credential information to connect to
`
`the wireless access point. To clarify, Dr. Cooperstock explains that “[w]hile it is
`

`
`11
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`true that the MAC address can be used by the Scherzer server to determine whether
`
`to provide credential information to a certain device, there is no disclosure of a
`
`wireless access point using the MAC address of a device to authenticate the device
`
`prior to permitting a connection.” APPLE-1023, ¶23 (citing Scherzer, [0016],
`
`[0021], [0024]). Dr. Cooperstock also observes that “Scherzer teaches that
`
`registration information can include a device MAC address, but does not disclose
`
`or suggest that a wireless access point verifies the MAC address prior to allowing a
`
`device to connect to the wireless access point.” Id.
`
`B. Koss’s Three Reasons Why The Brown-Scherzer Combination
`Deviates From Scherzer’s Disclosure Are Fatally Flawed
`Koss provides three flawed reasons to support its position that the Brown-
`
`Scherzer combination deviates from Scherzer’s disclosure. First, Koss states that
`
`transmission and use of Scherzer’s access credentials by an unregistered device
`
`ignores the account acceptability requirement and associated tracking in Scherzer.
`
`Resp., 24-29. Second, Koss states that Scherzer discourages unfettered
`
`dissemination of access credentials to unregistered devices. Id., 29-30. Finally,
`
`Koss states that a simpler approach to network connectivity already exists and
`
`therefore the Brown-Scherzer combination is unnecessary. Id., 30. Each of these
`
`purported reasons, however, are either misguided and/or rely on superficially
`
`narrow interpretations of Scherzer’s disclosure.
`

`
`12
`
`

`

`1.
`
`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`The First Reason Is Not Credible Because PO’s Allegations Of
`“Scherzer’s Account Acceptability Requirement And Associated
`Tracking” Are Limited To Specific Embodiments.
`This argument is flawed because (1) it assumes an unduly narrow
`
`interpretation of Scherzer’s disclosure, disregarding Scherzer’s teachings that user
`
`account acceptability requirements and associated tracking are limited to specific
`
`embodiments, (2) it fails to support this unduly narrow interpretation through
`
`specific citations to Scherzer’s disclosure, and (3) it effectively argues that
`
`Scherzer teaches away from the Brown-Scherzer combination and yet Scherzer
`
`lacks the type of disparaging disclosure against the proposed combination
`
`necessary to support a teaching away. APPLE-1023, ¶19.
`
`As discussed above, Scherzer makes clear—on several occasions—that
`
`teachings relating to “account acceptability requirement and associated tracking”
`
`are limited to “some embodiments” and not applicable to the disclosure as a whole.
`
`See, e.g., Scherzer, ¶¶[0015], [0016]. These disclosures indicate that in some other
`
`embodiments, account acceptability and registration information is not needed to
`
`send a request to a user’s access point to obtain access. See APPLE-1023, ¶¶20-
`
`24.
`
`Moreover, Koss’s statement that “Scherzer only provides access credentials
`
`to registered users having an acceptable user account” has no bearing on the
`
`Brown-Scherzer combination because the two examples discussed in the Petition
`

`
`13
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`involve a registered user with a user account accessing credential information on a
`
`secondary device (Brown’s device 101, or a tablet). Resp., 25. Indeed, in the
`
`Petition’s contemplated scenarios, the access credentials are limited to registered
`
`users—consistent with even Koss’s narrow understanding of Scherzer.
`
`2.
`
`The Second Reason Fails Because Koss’s Allegations Of
`“Unfettered Dissemination Of Access Credentials” Finds No
`Support In Scherzer
`Koss mischaracterizes the Brown-Scherzer combination, alleging that it
`
`“permit[s] the widespread and unfettered dissemination of network/access point
`
`access credentials of registered user to unregistered devices for use by the
`
`unregistered devices.” Resp., 21-22. But in each example discussed in the
`
`Petition, the unregistered device that is provided with access credentials is
`
`specifically associated with a registered user (i.e., a user that has previously
`
`registered with Scherzer’s service on a registered device). This type of credential
`
`sharing is not “widespread and unfettered.” Neither Koss nor Mr. McAlexander
`
`explain how—or cite to any evidence suggesting that—a registered user providing
`
`credential information to a commonly-owned device leads to “unfettered access” to
`
`such information. Id., 29-30; KOSS-2022, ¶63. Indeed, there is also no teaching
`
`in Scherzer that this type of configuration is prohibited or undesirable. APPLE-
`
`1023, ¶25.
`

`
`14
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`Further, Scherzer does not discourage or disparage dissemination of access
`
`credentials once a registered user has obtained them. APPLE-1023, ¶26. Rather,
`
`Scherzer’s teachings describe that device registration is required for a user to
`
`obtain access credentials through Scherzer’s service in the first instance. Id.
`
`However, Scherzer does not disclose any protection mechanisms that prevent
`
`dissemination of the access credentials once the registered user has obtained them.
`
`Id. For example, as Dr. Cooperstock explains, “Scherzer does not disclose that the
`
`access credentials are encrypted or that the registered user is restricted in some
`
`fashion as to how he/she uses the obtained access credentials.” Id.
`
` To distract from this shortcoming, Koss introduces the concept of tracking
`
`by MAC address—even though this concept is absent from Scherzer. Resp., 25.
`
`In deposition, Mr. McAlexander admitted that Scherzer does not disclose tracking
`
`using MAC address:
`
`Q: You would agree that Scherzer does not specifically describe
`tracking a device via a MAC address, right?
`A: I believe I said that. He doesn't specifically say that.
`
`APPLE-1024, 334:12-16.
`
`Scherzer also lacks any teaching that MAC address is used to determine
`
`whether any device should be able to access a wireless access point that is part of
`
`Scherzer’s service. Rather, Scherzer references MAC addresses only three times
`
`within its disclosure, two of which describe that registration information includes
`

`
`15
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`MAC address (APPLE-1005, ¶¶[0016], [0021]) and one of which describes that
`
`MAC address can be used to generate credential information (id., ¶[0024]).
`
`Scherzer also does not address unregistered devices using credential information to
`
`access wireless access points that are part of its service, and thus, does not
`
`specifically describe that these devices would be “denied connection” as Koss
`
`alleges. Resp., 25; APPLE-1023, ¶27.
`
`3.
`
`The Third Reason Is Flawed Because Koss’s “Simpler”
`Approach To Network Connectivity Ignores Specific
`Advantages Of The Brown-Scherzer Combination
`Koss argues that “a more straightforward and legitimate approach to
`
`improving network connectivity is available” since “Brown’s mobile device 105
`
`could transfer access credentials that were not obtained from Scherzer’s service to
`
`the mobile device 101.” Resp., 22-23. But this argument ignores specific
`
`advantages provided by the Brown-Scherzer combination that improve upon the
`
`individual disclosures of Brown and Scherzer. See APPLE-1023, ¶¶28-30.
`
`These specific advantages emerge in the second example discussed in the
`
`Petition when the user is in a location where “neither the smartphone nor tablet
`
`have the access information necessary to establish a connection with any WiFi
`
`access points in their vicinity since the devices are out of range of the user’s work
`
`WiFi access point.” Pet., 30. The Brown-Scherzer combination is advantageous in
`
`this example because the disclosures of either reference alone would not provide a
`

`
`16
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`better solution. Id., 30-34. Brown assumes that a first device already has network
`
`credential information, so its techniques do not help the user obtain network
`
`credential information on either the smartphone or the tablet. As for Scherzer,
`
`though a Scherzer-like software client installed on the first device would allow a
`
`user to access network credential information, the user would still need to
`
`manually input the network credential information onto the tablet to allow it to
`
`connect to the Internet. With the Brown-Scherzer combination, a user could not
`
`only obtain network credential information (using Scherzer’s teachings) on the
`
`smartphone, but then utilize Brown’s automated configuration technique to allow
`
`the tablet to access the Internet without requiring any manual entry. APPLE-1023,
`
`¶29.
`
`Koss’s proposal for the tablet to “simply download the Scherzer-like
`
`software” onto it to “gain access to Scherzer’s community of wireless
`
`networks/access points” similarly ignores the second example. Resp., 22. As
`
`discussed above, in this scenario, neither the smartphone nor the tablet have access
`
`to credential information since the user is located in an area where the only nearby
`
`wireless access points are those of other users. See Pet., 30-34. The tablet would
`
`not be able to able to access the Internet to download the Scherzer-like software
`
`since it (a) is unable to connect to the nearby wireless access points and (b) lacks
`
`cellular connectivity. Id.; APPLE-1023, ¶30.
`

`
`17
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`C. Koss’s Positions on the Brown-Scherzer Combination Are Also
`Legally Deficient
`1.
`Koss’s “Teaching Away” Arguments Are Unpersuasive
`As discussed above, Koss’s sole evidentiary support for its overall position
`
`is declaration testimony of Mr. McAlexander. But the McAlexander Declaration
`
`essentially parrots the same deficient analysis discussed in the previous section.
`
`Compare Resp., 24-30 and KOSS-2022, ¶¶48-57. And, as explained above, this
`
`position finds no support in Scherzer, which does not criticize, discredit, or
`
`discourage the teachings in the Brown-Scherzer combination. The Board has
`
`previously found similar teaching away arguments unpersuasive. See IPR2017-
`
`00707, Pap. 81, 33-35 (PTAB July 31, 2018) (stating that patent owner’s argument
`
`that a reference teaches away from a certain feature was conclusory because patent
`
`owner fails to show any portion of the reference that criticizes, discredits, or
`
`discourages use of the feature).
`
`2.
`
`Koss’s Position Also Improperly Requires Bodily Incorporation
`Of Scherzer’s Account Acceptability Requirement and
`Associated Tracking
`The bedrock of obviousness is “what the combined teachings of those
`
`references would have suggested to those of ordinary skill in the art,” not “whether
`
`the features of a secondary reference may be bodily incorporated into the structure
`
`of the primary reference.” In re Keller, 642 F.3d 413, 425 (CCPA 1981). In
`
`determining whether a prior art combination is obvious, courts consider
`

`
`18
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`“inferences and creative steps that a person of ordinary skill in the art would
`
`employ” in addition to the teachings themselves. KSR Int’l Co. v. Teleflex Inc.,
`
`550 U.S. 398, 418 (2007). For a combination to be obvious, “it is not necessary
`
`that the inventions of the references be physically combinable to render obvious
`
`the invention under review.” In re Sneed, 710 F.2d 1544, 1550 (Fed. Cir. 1983).
`
`Applying this jurisprudence, the Board has found arguments assuming bodily
`
`incorporation unpersuasive and inconsistent with assertions in the Petition
`
`unpersuasive. See, e.g., IPR2017-00705, Pap. 87, 52-53 (PTAB July 31, 2018)
`
`(finding Patent Owner’s argument regarding incompatible solutions within a prior
`
`art combination unpersuasive for assuming a requirement of bodily incorporation).
`
`The Board has also found arguments addressing irrelevant teachings in a secondary
`
`reference similarly unpersuasive. See, e.g., IPR2020-00041, Pap. 29, 28-30
`
`(PTAB Jan. 19, 2021).
`
`Koss’s positions against the Brown-Scherzer combination both assume
`
`bodily incorporation of Scherzer and focus on irrelevant teachings relating to
`
`Scherzer’s user contribution accounts and associated tracking. Nowhere in the
`
`Petition is there a discussion of Scherzer’s tracking capabilities, let alone an
`
`assertion that these teachings are relied upon in combining Brown and Scherzer.
`
`Pet., 24-33. Koss’s unremitting focus on Scherzer’s tracking capabilities reveals
`
`that it has violated obviousness jurisprudence by focusing almost exclusively on
`

`
`19
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`concerns relating to Scherzer that are not even relevant to the Brown-Scherzer
`
`combination.
`
`The Petition instead explained that the Brown-Scherzer combination
`
`involves improving Brown’s system by modifying device 105 to include a
`
`Scherzer-like client to enjoy the benefits of Scherzer’s community by obtaining
`
`access to network credential information of Scherzer’s wireless access points from
`
`a Scherzer-like server. Pet., 24-28. This combination does not involve physically
`
`incorporating Scherzer’s account acceptability and associated tracking. Nor does it
`
`require such incorporation since these teachings from Scherzer are not relevant to
`
`the overall motivation—that “[u]se of a Scherzer-like software client would have
`
`increased the number of WiFi connections available to Brown’s device 105 at
`
`various locations” thereby providing the ability to “connect to networks in different
`
`locations.” Id., 25-26.
`
`III. THE BROWN-SCHERZER COMBINATION IS NOT A PRODUCT
`OF HINDSIGHT
`A. The Brown-Scherzer Combination Is A Predictable Solution To
`Known Problems of Network Connectivity
`Koss asserts that “[o]nly hindsight reconstruction of the claimed invention
`
`justifies the Petition’s combination.” Resp., 23. But, as explained in the Petition
`
`and further clarified by Dr. Cooperstock, the Brown-Scherzer combination is
`
`entirely predictable in light of a POSITA’s knowledge and the teachings of the
`

`
`20
`
`

`

`Case IPR2021-00255
`Attorney Docket No: 50095-0020IP1
`prior art, and therefore, not a product of hindsight. See Pet., 24-33; see also
`
`APPLE-1003, ¶¶42-61; APPLE-1023, ¶¶38-40. Koss’s speculation of hindsight is
`
`a clear attempt to avoid the prior art teachings, which is confirmed by its failure to
`
`identify any claim limitations that are not disclosed or suggested in the prior art.
`
`The Brown-Scherzer combination is not based on hindsight because, as
`
`explained in the Petition, the combination provides a predictable solution to well-
`
`known problems of network connectivity. The Petition explained that a POSITA
`
`would have combined Brown and Scherzer since it provided “advantages to
`
`network connectivity,” and specifically, WiFi connectivity. Pet., 27-28 (citing
`
`APPLE-1003, ¶47).
`
`These advantages would have been predictable solutions because problems
`
`of WiFi connectivity were well-known by the Critical Date. APPLE-1003, ¶¶38-
`
`40. Scherzer demonstrates this by recognizing that “to provide wireless coverage
`
`for many locations, as, for example, cell phone networks do, requir

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket