throbber

`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`APPLE INC.,
`Petitioner,
`
`v.
`
`KOSS CORPORATION,
`Patent Owner.
`
`
`IPR2021-00600
`U.S. Patent No. 10,298,451
`
`
`
`PATENT OWNER SUR-REPLY
`
`
`
`
`
`
`505742465.8
`
`
`

`

`
`
`
`
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
`TABLE OF CONTENTS
`
`
`C.
`
`3.
`
`
`I.
`INTRODUCTION ............................................................................................... 1
`II. KOSS’S UNREBUTTED POSITIONS .............................................................. 2
`A. McAlexander’s Testimony Regarding a POSITA’s Knowledge of
`Security Features and MAC Address Filtering Is Unrebutted ................... 2
`B. Apple Argued Against “Teaching Away” Arguments Instead of
`Koss’s “References As a Whole” Arguments ............................................ 5
`Problems With The Examples Were Ignored ............................................. 6
`1.
`Scherzer Is Superfluous to the First Example ...................................... 6
`2. A “Snowball-Effect” Results In Widespread, Unfettered
`Dissemination of Scherzer’s Access Credentials ................................ 7
`The Combination Creates a Disincentive to Register with
`Scherzer’s System ................................................................................ 9
`D. Apple Did Not Rehabilitate Cooperstock’s Credibility ........................... 10
`III. FATAL FLAWS IN APPLE’S COUNTERARGUMENTS .............................12
`A.
`Scherzer’s UCAs are Not Limited to Specific Embodiments .................. 13
`1.
`Scherzer’s Use of “In Some Embodiments” Does Not Mean
`UCAs Are Optional ............................................................................ 13
`Exclusion of Scherzer’s UCA Functionality Is Not “Fair” and
`“Equitable” ......................................................................................... 15
`Incorporating Scherzer’s Teachings Related to UCAs Is Not
`Improper Bodily Incorporation .......................................................... 16
`“Unfettered Dissemination of Access Credentials” Results From
`The Combination ...................................................................................... 16
`Scherzer and Subramaniam Are Disparate Systems ................................ 17
`C.
`D. Koss’s Alternative Is Preferable ............................................................... 18
`
`2.
`
`3.
`
`B.
`
`
`
`- i -
`
`

`

`
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
`
`
`IV. THE EVOLUTION OF APPLE’S COMBINATION .......................................19
`A.
`Initial Combination ................................................................................... 20
`B. Revised Combination ............................................................................... 20
`C. Revised Combination Exposes Inconsistencies ....................................... 22
`V. APPLE’S ATTEMPTS TO DISPEL EVIDENCE OF HINDSIGHT ARE
`INSUFFICIENT .................................................................................................23
`VI. COMMERCIAL SUCCESS ..............................................................................25
`VII. CONCLUSION ..............................................................................................28
`
`
`
`
`
`
`
`
`- ii -
`
`

`

`
`
`
`
`
`
`
`TABLE OF AUTHORITIES
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
` Page(s)
`
`Cases
`Arctic Cat Inc. v. Bombardier Recreational Prods. Inc.,
`876 F.3d 1350 (Fed. Cir. 2017) ............................................................................ 5
`Demaco Corp. v. F. Von Langsdorff Lic. Ltd.,
`851 F.2d 1387 (Fed. Cir. 1988) .......................................................................... 27
`FanDuel, Inc. v. Interactive Games LLC,
`966 F.3d 1334 (Fed. Cir. 2020) .......................................................................... 21
`Fox Factory, Inc. v. SRAM, LLC,
`944 F.3d 1366, 1373 (Fed. Cir. 2019) …………………………….................. 26
`In re Huang,
`100 F.3d 135, 140 (Fed. Cir. 1996) ………………………………………….. 26
`Intelligent Bio-Sys., Inc. v. Illumina Cambridge Ltd.,
`821 F.3d 1359 (Fed. Cir. 2016) ……………………………………………….25
`In re Kahn,
`441 F.3d 977 (Fed. Cir. 2006) ............................................................................ 24
`In re Magnum Oil Tools Int’l, Ltd.,
`829 F.3d 1364 (Fed. Cir. 2016) ……………..……...........................................10
`In re NTP, Inc.,
`654 F.3d 1279 (Fed. Cir. 2011) ............................................................................ 7
`Rembrandt Wireless Tech., LP v. Samsung Elecs. Co. Ltd.,
`853 F.3d 1370 (Fed. Cir. 2017) ............................................................................ 5
`TriVascular, Inc. v. Samuels,
`812 F.3d 1056 (Fed. Cir. 2016) .......................................................................... 10
`
`
`
`
`
`- iii -
`
`

`

`
`
`
`
`
`
`
`
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
`EXHIBIT LISTING
`
`DESCRIPTION
`EXHIBIT NO.
`KOSS-2001 Docket Report, Koss Corp. v. Apple Inc., Case No. 6:20-cv-
`00665-ADA (W.D. Tex.) (accessed June 15, 2021)
`
`KOSS-2002
`
`Joint Claim Construction Statement, Koss Corp. v. Apple Inc.,
`Case No. 6:20-cv-00665-ADA, Dkt. 68 (W.D. Tex. April 14,
`2021)
`
`KOSS-2003 Docket Report, Apple Inc. v. Koss Corp., Case No. 4:20-cv-
`05504-JST (N.D. Cal.) (accessed June 15, 2021)
`
`KOSS-2004 Order Denying Defendant’s Motion to Transfer, Koss Corp. v.
`Apple Inc., Case No. 6:20-cv-00665-ADA. Dkt. 76
`(redacted/public version) (W.D. Tex. April 22, 2021)
`
`KOSS-2005 Order Granting Motion to Transfer, Apple Inc. v. Koss Corp.,
`Case No. 4:20-cv-05504-JST, Dkt. 72 (N.D. Cal. May 12,
`2021)
`
`KOSS-2006
`
`Joint Motion to Consolidate Cases, Koss Corp. v. Apple Inc.,
`Case No. 6:20-cv-00665-ADA, Dkt. 84 (W.D. Tex. June 8,
`2021)
`
`KOSS-2007 Order Setting Markman Hearing, Koss Corp. v. Apple Inc.,
`Case No. 6:20-cv-00665-ADA, Dkt. 58 (W.D. Tex. March 24,
`2021)
`
`KOSS-2008 Claim Construction Order, Koss Corp. v. Apple Inc., Case No.
`6:20-cv-00665-ADA, Dkt. 83 (W.D. Tex. June 2, 2021)
`
`KOSS-2009 Order Denying Defendant’s Motion to Transfer, Kerr Machine
`Co. v. Vulcan Industrial Holdings, et al., Case 6:20-cv-00200-
`ADA, Dkt. 76 (W.D. Tex. April 7, 2021)
`
`KOSS-2010 Order Governing Proceedings - Patent Case, W.D. Tex., Waco
`Division, Judge Albright, Feb. 23, 2021
`
`- iv -
`
`

`

`
`
`
`
`
`
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
`EXHIBIT NO.
`KOSS-2011
`
`DESCRIPTION
`Petition for Inter Partes Review, IPR2021-00255, November
`25, 2020
`
`KOSS-2012 R. Davis, “Albright Says He’ll Very Rarely Put Cases On Hold
`For PTAB,” Law360, May 11, 2021
`(www.law360.com/articles/1381597/print?section=ip)
`(accessed June 14, 2021)
`
`KOSS-2013 Order, In re Apple, Inc., Case No. 21-147, D.I. 25 (Fed. Cir.
`Aug. 4, 2021)
`
`KOSS-2014
`
`Patent Owner’s Request For Additional Discovery
`
`KOSS-2015
`
`KOSS-2016
`
`“Apple introduces HomePod mini: A powerful smart speaker
`with amazing sound,” Apple Newsroom, Oct. 20, 2020
`(www.apple.com/newsroom/2020/10/apple-introduces-
`homepod-mini-a-powerful-smart-speaker-with-amazing-
`sound/) (last accessed Sept. 9, 2021)
`“HomePod reinvents music in the home,” Apple Newsroom,
`Jun. 5, 2017 (www.apple.com/newsroom/2017/06/homepod-
`reinvents-music-in-the-home/) (last accessed Sept. 9, 2021)
`
`KOSS-2017 D. Curry, “Apple Statistics (2021),” Business of Apps, Aug.
`16, 2021 (www.businessofapps.com/data/apple-statistics/) (last
`accessed August 18, 2021)
`
`KOSS-2018 Apple Inc., Form 10-K, for fiscal year ended September 26,
`2020
`
`KOSS-2019 C. Gartenberg, “Apple drops HomePod price down to $299,”
`The Verge, Apr. 4, 2019
`(www.theverge.com/2019/4/4/18295084/apple-homepod-price-
`cut-299-smart-speaker) (last accessed Sept. 16, 2021)
`
`- v -
`
`

`

`
`
`
`
`
`
`
`IPR2021-00255
`Patent Owner Sur-Reply
`
`DESCRIPTION
`EXHIBIT NO.
`KOSS-2020 A. King, “HomePod Sales Grow 180% After HomePod Mini
`Launch,” Digital Music News, Jul. 30, 2021
`(www.digitalmusicnews.com/2021/07/30/homepod-sales-
`2021/) (last accessed Sept. 9, 2021)
`
`KOSS-2021 G. Rambo, “HomePod set up similar to AirPods, requires
`iCloud Keychain & two-factor auth,” Jan. 24, 2018
`(9to5mac.com/2018/01/24/homepod-setup-process/) (last
`accessed September 16, 2021)
`
`KOSS-2022
`
`“HomePod arrives February 9,” Apple Newsroom, Jan. 23,
`2018 (www.apple.com/newsroom/2018/01/homepod-arrives-
`february-9-available-to-order-this-friday/) (last accessed Sept.
`16, 2021)
`
`KOSS-2023
`
`Sept/Oct 2021 Email chain with Board re filing Motion
`
`KOSS-2024 Reserved
`
`KOSS-2025 Deposition Transcript, Prof. Jeremy Cooperstock, Ph.D.,
`IPR2021-00600, November 5, 2021
`
`KOSS-2026 Declaration by Joseph C. McAlexander III
`
`KOSS-2027 Deposition Transcript, Prof. Jeremy Cooperstock, Ph.D.,
`IPR2021-00600, April 22, 2022
`
`KOSS-2028 U.S. Patent No. 8,751,648
`
`
`
`
`- vi -
`
`

`

`
`I.
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`INTRODUCTION
`Koss submits this Sur-Reply to Apple’s Reply (Paper 36, “Reply”). Apple
`
`failed to show that claims 1-21 (“Challenged Claims”) in U.S. Patent No. 10,298,451
`
`(“the ’451 Patent”) are invalid. The Board should confirm the patentability of the
`
`Challenged Claims.
`
`
`
`Koss’s Patent Owner Response (Paper 20, “POR”) explained that a POSITA
`
`would not attempt to use Scherzer’s access credentials with an unrecognized device
`
`as proposed in Apple’s Scherzer-Subramaniam combination (“the combination”).
`
`Apple’s Reply focused on proving that Scherzer’s user contribution accounts
`
`(UCAs) and associated functionality are optional and would be excluded from the
`
`combination. However, without these features, the combination would lead to
`
`widespread and unfettered dissemination of Scherzer’s access credentials and
`
`corresponding network access by unrecognized devices, which undermines
`
`Scherzer’s collaborative intent and discourages users from registering with
`
`Scherzer’s system. Apple’s arguments fail for at least the following reasons.
`
`
`
`First, many arguments and corroborating evidence in the POR, which show
`
`that a POSITA would not implement the combination, are unrebutted.
`
`
`
`Second, Apple’s counterarguments to Koss’s four criticisms of the
`
`combination misconstrue and/or ignore arguments that are determinative to the
`
`obviousness analysis.
`
`- 1 -
`
`

`

`Third, the combination has evolved to impose limits on the dissemination and
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`
`
`
`use of Scherzer’s access credentials.
`
`
`
`Fourth, Apple attempted to dispel evidence of hindsight with new assertions
`
`of predictability. In addition to being untimely, the new predictability assertions rely
`
`on circuitous reasoning.
`
`
`
`Finally, the commercial success of the HomePods is a direct result of
`
`practicing the Challenged Claims and confirms non-obviousness.
`
`
`
`II. KOSS’S UNREBUTTED POSITIONS
`
`Apple’s Reply and Cooperstock’s Supplemental Declaration failed to rebut
`
`arguments and evidence in the POR that show that the combination would not have
`
`been obvious.
`
`A. McAlexander’s Testimony Regarding a POSITA’s Knowledge of
`Security Features and MAC Address Filtering Is Unrebutted
`Koss presented evidence that a POSITA would be aware of security features
`
`
`
`for safeguarding Scherzer’s access credentials and limiting access to Scherzer’s
`
`wireless access points (WAPs). POR, 27; KOSS-2026, ¶¶61-65. McAlexander
`
`testified:
`
`A POSITA implementing Scherzer’s system would utilize security
`
`features …. For example, the Scherzer software client … could use
`
`access credentials from Scherzer’s server without revealing the access
`
`- 2 -
`
`

`

`
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`credentials to the registered user. The Scherzer software client could
`
`also safeguard the access credentials… and preclude the transfer of
`
`access credentials to other devices.
`
`KOSS-2026, ¶64.1
`
`
`
`Apple did not challenge this testimony. Instead, Apple relied on Scherzer’s
`
`silence with respect to security features as evidence that a POSITA would not
`
`incorporate security features into the combination. Reply, 4-5 (citing APPLE-1028,
`
`¶24) (“there is no prohibition in Scherzer….”; “Scherzer provides no teaching…”;
`
`“Scherzer does not teach…”). Inferring disclosure (e.g., exclusion of security
`
`features) from Scherzer’s silence is logically flawed. Furthermore, the absence of
`
`explicit teachings in Scherzer does not rebut McAlexander’s testimony that a
`
`POSITA would know about these security features. Moreover, Cooperstock
`
`acknowledged that a POSITA would be knowledgeable about security features.
`
`KOSS-2027, 39:3-8 (testifying, “[y]es. A POSITA would be aware of encryption.”)
`
`McAlexander also explained that user identifier information provided during
`
`Scherzer’s registration process allows tracking and managing of network access,
`
`such as MAC address filtering, which was known to a POSITA. KOSS-2026, ¶¶60-
`
`62 (“MAC filtering based on a list of MAC addresses … were techniques known to
`
`
`1 Emphases are added to quotations throughout, unless otherwise indicated.
`
`- 3 -
`
`

`

`
`a POSITA…. Scherzer’s system would implement some means of restricting
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`unregistered users and unrecognized devices … such as by MAC filtering….”).
`
`Neither Apple nor Cooperstock challenged McAlexander’s testimony on MAC
`
`addresses for tracking/restricting network access. Instead, Apple merely asserted
`
`that McAlexander’s testimony on MAC address filtering was “uncorroborated.”
`
`Reply, 9.
`
`Scherzer and Cooperstock both corroborate McAlexander’s testimony.
`
`Scherzer describes that MAC addresses can be collected during registration as
`
`“identifier information.” APPLE-1004, ¶[0016]. Cooperstock acknowledged that a
`
`POSITA, upon reading Scherzer, could utilize MAC addresses for tracking. KOSS-
`
`2025, 49:8-12 (“access point could track the amount of data that was transferred …
`
`by virtue of its MAC address”). Cooperstock also testified about MAC address
`
`filtering, “[i]f a network is configured to not allow access to unknown MAC
`
`addresses, or to MAC address that have not identified themselves as belonging to a
`
`user, then the access of those devices could be limited or could be blocked.” Id.
`
`58:11-17. Therefore, both experts described tracking and filtering by MAC address
`
`as techniques available to a POSITA to track Scherzer’s users.
`
`
`
`A POSITA’s understanding of security features like encryption and
`
`tracking/filtering by MAC address is undisputed. The unrebutted evidence shows
`
`that a POSITA would not ignore these consideration and would not combine
`
`- 4 -
`
`

`

`
`Scherzer and Subramaniam such that an unrecognized device could obtain and use
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`Scherzer’s access credentials to obtain corresponding network access.
`
`B. Apple Argued Against “Teaching Away” Arguments Instead of
`Koss’s “References As a Whole” Arguments
`The Reply disregarded Koss’s arguments that a POSITA would not
`
`
`
`implement the combination upon considering the references as a whole, particularly
`
`Scherzer’s collaboration between registered users for their mutual benefit (which
`
`is incompatible with the dissemination and use of access credentials to unrecognized
`
`devices without such usage being tracked/attributed to a UCA) and Subramaniam’s
`
`teachings that access credentials are confidential (which is incompatible with free
`
`dissemination of Scherzer’s confidential access credentials to unrecognized
`
`devices). POR, 40-41 (citing KOSS-2026, ¶¶42-43, 46, 53, 65). Instead of
`
`addressing the “references as a whole” arguments, Apple argued the references do
`
`not explicitly “teach away” because “[m]ere silence does not amount to teaching
`
`away.” Reply, 2. However, Koss demonstrated that “Scherzer does not contemplate
`
`relaying information to unrecognized devices or to unregistered users.” POR, 19
`
`(citing KOSS-2026, ¶58). A “formal teaching away” is not required to refute
`
`Apple’s combination. Rembrandt Wireless Tech., LP v. Samsung Elecs. Co. Ltd.,
`
`853 F.3d 1370, 1379-80 (Fed. Cir. 2017); Arctic Cat Inc. v. Bombardier
`
`Recreational Prods. Inc., 876 F.3d 1350, 1360 (Fed. Cir. 2017) (no motivation to
`
`- 5 -
`
`

`

`
`make combination even without explicit teaching away).
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`C. Problems With The Examples Were Ignored
`The POR explained specific defects in the examples, which were unaddressed
`
`
`
`in the Reply.
`
`Scherzer Is Superfluous to the First Example
`1.
`Reliance on Scherzer in the First Example is misplaced and extraneous
`
`
`
`because the tablet could acquire the access credentials via Subramaniam alone to
`
`access the Internet and download Scherzer’s software client. POR, 44-47. Neither
`
`the Petition nor the Reply explained (a) why the smartphone is initially registered
`
`with Scherzer’s system or (b) why the access information to the work WAP is
`
`uploaded to Scherzer’s system—despite the POR identifying these defects. Instead,
`
`Cooperstock admitted to employing hindsight:
`
`Broadly speaking, the first example is not just an example
`
`of any usage scenario, but specifically, an example of a
`
`usage scenario involving the Scherzer-Subramaniam
`
`combination. This scenario involves application of the
`
`Scherzer-Subramaniam combination,
`
`so Scherzer’s
`
`teachings would already be understood to be incorporated
`
`into the smartphone ….
`
`APPLE-1028, ¶57. In other words, Cooperstock formulated the combination before
`
`- 6 -
`
`

`

`
`considering the allegedly “predictable scenario” modeled in the First Example. Id.,
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`¶55. The combination exploited hindsight to “combin[e] the right references in the
`
`right way so as to achieve the result of the claims in suit.” In re NTP, Inc., 654 F.3d
`
`1279, 1299 (Fed. Cir. 2011) (internal citations and quotations omitted). Cooperstock
`
`then applied the combination to demonstrate the claim recitation related to access
`
`credentials that are stored on a remote server being transmitted to an electronic
`
`device. This is classic hindsight reconstruction.
`
`
`
`Subramaniam alone provides a simplified solution: a POSITA can “use the
`
`tablet to access the Internet while at work” with Subramaniam’s configuration
`
`technique irrespective of the user registering with Scherzer’s system, irrespective of
`
`the smartphone being a recognized device, and irrespective of access credentials to
`
`the work WAP being stored on Scherzer’s server. POR, 44-47. Apple seemingly
`
`recognized the defects in the First Example and abandoned it in the Reply: Apple
`
`only identified the Second Example as the one in which “specific advantages ...
`
`emerge.” Reply, 13. Logically, therefore, advantages do not “emerge” in the First
`
`Example.
`
`2.
`
`A “Snowball-Effect” Results In Widespread, Unfettered
`Dissemination of Scherzer’s Access Credentials
`Apple alleged, “[n]either Koss nor Mr. McAlexander explain how—or cite to
`
`
`
`any evidence suggesting that—a registered user providing credential information to
`
`- 7 -
`
`

`

`
`a commonly-owned devices leads to ‘unfettered access’ to such information.”
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`Reply, 10 (citing POR, 40-41; KOSS-2026 ¶¶42-43, 46, 53, 65.). Apple’s allegation
`
`is false.
`
`
`
`Koss explained that dissemination of Scherzer’s access credentials to an
`
`unrecognized device is problematic even when the unrecognized device is also
`
`owned by the registered user because it “results in a snowball-effect in which device
`
`upon device can freely circulate Scherzer’s access credentials outside the confines
`
`of Scherzer’s community.” POR, 16, fn. 2 (citing KOSS-2026, ¶46) (“Whether an
`
`unrecognized device is owned by a registered user or not is inconsequential to the
`
`concerns described herein…”).
`
` McAlexander testified, “[e]ven when an
`
`unrecognized device is owned by a registered user, the dissemination of access
`
`credentials is not limited to only one unrecognized device or one registered user in
`
`the Petitioner’s combination.” KOSS-2026, ¶46. This is because “a single
`
`unrecognized device can freely obtain and circulate Scherzer’s access credentials
`
`without any practical constraints outside the confines of Scherzer’s community.” Id.
`
`Though Apple’s examples only contemplate the dissemination of access credentials
`
`to a commonly-owned device, a POSITA would have understood that providing
`
`Scherzer’s access credentials and corresponding network access to a first
`
`unrecognized device (e.g. the tablet) opens a Pandora’s Box with respect to
`
`permitting other unrecognized devices to obtain those access credentials/network
`
`- 8 -
`
`

`

`
`access. Id.
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`
`
`Cooperstock confirmed the snowball-effect of access credential dissemination
`
`from a first unrecognized device (even if owned by a registered user) to other devices
`
`testifying that the only limit to the transfer of access credentials from an
`
`unrecognized device is the device’s physical longevity. KOSS-2025, 58:5-8. Even
`
`when the initial transfer is between two commonly-owned devices of a registered
`
`user, “a nearly limitless number of unrecognized devices can freeload….” POR, 38.
`
`
`
`Apple disregarded that the combination permits Scherzer’s access credentials
`
`to be freely and widely disseminated even when the initial transmission of access
`
`credentials is between two commonly-owned devices, as in the examples.
`
`3.
`
`The Combination Creates a Disincentive to Register with
`Scherzer’s System
`The Reply also failed to sufficiently respond to Koss’s evidence that the tablet
`
`
`
`in both examples receives Scherzer’s access credentials prior to registration, which
`
`creates a disincentive for the user to register the tablet with Scherzer’s system.
`
`KOSS-2026; ¶59. Because network access prior to registration would not be tracked
`
`or attributed to an appropriate UCA, the user of the tablet would have free, unlimited
`
`wireless access without corresponding forfeiture of any of his/her own wireless
`
`access. POR, 31. Cooperstock agreed that registration is not “necessary in any
`
`scenario.” KOSS-2025, 44.
`
`- 9 -
`
`

`

`The Reply ignored the disincentive created by the combination and examples
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`
`
`and, instead, simply relied on the Board’s earlier determination. Reply, 5-6 (citing
`
`Institution Decision, 34). The Board stated that Koss’s concerns may be relieved
`
`because the tablet is ultimately registered with Scherzer’s system. Paper 9 at 34.
`
`However, at the time of the Institution Decision, Cooperstock’s testimony was
`
`unrebutted. Since the Institution Decision, Koss provided compelling evidence from
`
`McAlexander describing why Scherzer’s teachings would not be implemented as
`
`Apple and Cooperstock proposed, and explaining the disincentive created by the
`
`examples. KOSS-2026; ¶59. “[T]he Board has an obligation to assess the question
`
`anew after trial based on the totality of the record” and should “change its view of
`
`the merits after further development of the record, … if convinced its initial
`
`inclinations were wrong.” In re Magnum Oil Tools Int’l, Ltd., 829 F.3d 1364, 1377
`
`(Fed. Cir. 2016); see also TriVascular, Inc. v. Samuels, 812 F.3d, 1056, 1068 (Fed.
`
`Cir. 2016). In view of the unrebutted evidence that the examples destroy any
`
`incentive for registering the unrecognized tablet with Scherzer’s system, a POSITA
`
`would not combine Scherzer and Subramaniam such that unrecognized devices can
`
`enjoy the benefits of Scherzer’s system. POR, 25-28.
`
`D. Apple Did Not Rehabilitate Cooperstock’s Credibility
`Cooperstock admitted not considering the references in their entireties,
`
`
`
`testifying that “his analysis did not need to consider the relevance of [Scherzer’s]
`
`- 10 -
`
`

`

`
`tracking.” KOSS-2025, 38:16-17. Cooperstock also failed to follow the Graham
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`framework and ignored an important factor in the analysis—comparing the applied
`
`references to the claimed subject matter—admitting, “I’m not sure how that is
`
`relevant to my analysis.” KOSS-2025, 14:18-22. The Reply ignored Cooperstock’s
`
`self-admitted failings to consider the references as a whole and make a determination
`
`regarding each of the Graham factors. Similarly, Apple ignored parallel deficiencies
`
`in its Reply.
`
`
`
`In addition to botching the obviousness analysis, Cooperstock’s credibility is
`
`undermined by his testimony that Scherzer includes an “explicit” teaching that is, in
`
`fact, absent from Scherzer. POR, 34-36 (citing KOSS-2025, 29-31). McAlexander
`
`subsequently testified that the temporary user account in Scherzer is still an account
`
`that requires registration with Scherzer’s system in order to utilize any of Scherzer’s
`
`WAPs. KOSS-2026, ¶57. Though McAlexander’s testimony directly contradicted
`
`Cooperstock’s unsupported interpretation of Scherzer, neither Cooperstock nor
`
`Apple addressed Koss’s arguments or McAlexander’s testimony on this point.
`
`
`
`Cooperstock also refused to answer questions about the relevant technology,
`
`the proposed combination, and the teachings in the references. POR, 53-54. For
`
`example, Cooperstock refused to provide a definition of “confidential” multiple
`
`times on cross-examination. Id., 53. Despite the problems with Cooperstock’s
`
`testimony, Apple avoided
`
`these problems with Cooperstock’s
`
`testimony.
`
`- 11 -
`
`

`

`
`Accordingly, Cooperstock’s testimony should be afforded little, if any, weight.
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`
`
`Cooperstock’s unwillingness to answer questions on cross-examination
`
`continued in his second deposition (KOSS-2027). For example, his answers
`
`regarding device ownership in the combination were inconsistent. Compare KOSS-
`
`2027, 30-31 and 32 (showing unwillingness to settle whether devices 220 and 240
`
`in his combination could be owned by different users). Cooperstock was not
`
`forthcoming on cross-examination further undermining his credibility.
`
`III. FATAL FLAWS IN APPLE’S COUNTERARGUMENTS
`
`Apple alleged Koss’s criticisms of the combination are “fatally flawed”
`
`because, one, Scherzer’s UCA functionality is only limited to certain embodiments,
`
`two, the two examples do not envision “unfettered dissemination of access
`
`credentials,” three, McAlexander acknowledged that the teachings in Subramaniam
`
`are not explicitly limited to at-home networks, and, four, Koss’s “simpler”
`
`approaches to network connectivity ignore the advantages of the combination.
`
`Reply, 6. None of these counterarguments are determinative or particularly
`
`compelling with respect to the non-obviousness of the Challenged Claims.
`
`Nonetheless, Koss addresses each one in turn.
`
`- 12 -
`
`

`

`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`A. Scherzer’s UCAs are Not Limited to Specific Embodiments
`Apple’s Reply confirmed that the combination does not incorporate
`
`
`
`
`
`Scherzer’s UCA functionality. Reply, 17. Cooperstock similarly testified that the
`
`combination “did not incorporate Scherzer’s teachings of [UCAs].” APPLE-1028,
`
`¶62. It is unsurprising that Apple’s Scherzer-Subramaniam combination excludes
`
`Scherzer’s UCA functionality, which would prevent unrecognized devices (like
`
`device 240) from obtaining and using Scherzer’s access credentials to connect to
`
`Scherzer’s WAPs. Apple’s exclusion of Scherzer’s UCA functionality is
`
`problematic. First, exclusion of Scherzer’s user contribution account functionality
`
`is not justified by Scherzer’s use of “in some embodiments” and similar phrases.
`
`Second, a combination without Scherzer’s UCA functionality results in a system that
`
`is not “fair” or “equitable” to Scherzer’s registered users (to use Cooperstock’s
`
`description of Scherzer’s advantages). APPLE-1028, 10. Third, Koss does not
`
`improperly bodily incorporate Scherzer’s teachings.
`
`1.
`
`Scherzer’s Use of “In Some Embodiments” Does Not Mean
`UCAs Are Optional
`Apple and Cooperstock relied on Scherzer’s use of phrases like “in some
`
`embodiments” to exclude UCA functionality from the combination. Reply, 7-8
`
`(citing APPLE-1028, ¶30). Cooperstock asserted that a POSITA would “conclude
`
`that the user contribution account feature is an optional element of the invention.”
`
`- 13 -
`
`

`

`
`APPLE-1028, ¶18. However, upon reading Scherzer as a whole, a POSITA would
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`understand that Scherzer’s UCA functionality enables sharing of network access for
`
`the mutual benefit of its registered users, which is Scherzer’s goal. KOSS-2026,
`
`¶¶42, 43. Instead of focusing on Scherzer as a whole, Apple pointed to three
`
`“occasions” where teachings related to UCAs and associated functionality are
`
`described in connection with the phrase “in some embodiments.” Reply, 7-8. In
`
`fact, none of the three “occasions” limit the existence of UCAs in general to narrow
`
`embodiments. Rather, each “occasion” simply provides a further implementation
`
`detail.
`
`In the first “occasion,” Scherzer describes that “a collaborative community of
`
`users allows a percentage of bandwidth to be accessed by one or more other
`
`users….” APPLE-1004, ¶[0015]. The following sentence in Scherzer is the second
`
`“occasion” and it describes that a percentage of a user’s bandwidth is not always
`
`shared with other users. Id. The use of “in some embodiments” in Apple’s first and
`
`second “occasions” clearly applies to the “percentage of bandwidth” detail, not to
`
`UCA functionality in general.
`
`In the third and final “occasion,” Scherzer describes, “a user contribution
`
`account is established when a user registers.” APPLE-1004, ¶[0015]. This sentence
`
`describes an implementation detail related to the timeline for establishing the
`
`UCA—when, not if, the account is established. In other embodiments, the UCA
`
`- 14 -
`
`

`

`
`may be established at a different time, such as after registration upon satisfying
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`additional conditions.
`
`None of these “occasions” supports Apple’s assertion that the UCA is an
`
`optional feature in Scherzer. Apple’s focus on these “occasions” distracts from
`
`Scherzer’s comprehensive description of UCA functionality and the many instances
`
`where the UCA is identified as an imperative element. Scherzer uses the phrase
`
`“user contribution account” more than 80 times throughout the six-page Detailed
`
`Description, including in the Abstract. APPLE-1004. The UCA is also recited in
`
`each of the six independent claims. Indeed, claim 1 recites the step of “determining
`
`user contribution account acceptability....” APPLE-1004, Claim 1. Each
`
`independent claim in the corresponding issued patent, U.S. Patent No. 8,751,648
`
`(KOSS-2028), also recites the UCA. Based on Scherzer as a whole, including the
`
`broadest statements of the invention found in the independent claims, Scherzer’s
`
`UCA is clearly a non-optional element in all embodiments.
`
`2.
`
`Exclusion of Scherzer’s UCA Functionality Is Not “Fair” and
`“Equitable”
`Cooperstock testified that Scherzer’s UCA functionality “has certain
`
`advantages, such as ensuring that usage of network resources is fair and equitable
`
`amongst users that are part of Scherzer’s community.” APPLE-1023, ¶18.
`
`Logically, therefore, excluding Scherzer’s UCA and associated tracking results in a
`
`- 15 -
`
`

`

`
`system that is not “fair and equitable” to its registered users. Without tracking and
`
`Case IPR2021-00600
`Patent Owner Sur-Reply
`
`reasonable limits, Scherzer’s access credentials would be freely and widely
`
`disseminated and used by unrecognized devices. POR, 38-39 (citing KOSS-2026,
`
`¶59). “Registered users lose the ability to control their own wireless networks” and
`
`“might even be crowded out of their own network.” Id. A POSITA would not be
`
`motivated to modify Scherzer in a way that is unfair and inequitable to it registered
`
`users.
`
`3.
`
`Incorporating Scherzer’s Teachings Related to UCAs Is Not
`Improper Bodily Incorporation
`Despite Apple’s contrary allegations, Koss did not suggest bodily
`
`incorporation of all Scherzer’s teachings into the combination. However, some way
`
`of managing network access, e.g., Scherzer’s UCA functionality, for the benefit of
`
`its registered users is necessary. KOSS-2026, ¶¶62-63. Successful implementation
`
`of Scherzer requires managing the network access that is provided by and to its
`
`regist

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket