`
`____________________________________________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`____________________________________________
`
`
`APPLE INC.,
`
`Petitioner
`
`v.
`
`CPC PATENT TECHNOLOGIES PTY, LTD.,
`
`Case IPR2022-00601
`
`U.S. Patent No. 9,269,208
`____________
`
`
`PETITIONER APPLE INC.’S REPLY
`TO CPC’S PATENT OWNER RESPONSE
`
`
`
`
`
`
`
`
`
`TABLE OF CONTENTS
`
`INTRODUCTION ........................................................................................ 1
`I.
`II. CPC PROVIDES NO REBUTTAL TO MATHIASSEN'S
`TEACHING OF OUTPUTTING THE “ACCESSIBILITY
`ATTRIBUTE” RESPONSIVE TO A CAR
`OWNER/ADMINISTRATOR’S BIOMETRIC ........................................ 1
`III. MATHIASSEN’S SERIES OF FINGERPRINT
`REPRESENTATIONS IS A SERIES OF BIOMETRIC SIGNAL
`ENTRIES ....................................................................................................... 6
`IV. CPC’S LACK OF MOTIVATION TO COMBINE
`ARGUMENTS HAVE NO BASIS IN FACTS OR THE LAW ............... 8
`A.
`CPC’S “PUSH-BUTTON” THEORY FOR MODIFYING MATHIASSEN ........... 8
`B.
`CPC’S “COMPUTER ART” THEORY REGARDING MCKEETH AND
`ANDERSON ........................................................................................... 12
`CPC RESORTS TO BODILY INCORPORATION ARGUMENTS ................... 15
`CPC’S MISCELLANEOUS ISSUES REGARDING THE PROPOSED
`GROUND .............................................................................................. 16
`V. CPC PRESENTS NO NEW ARGUMENTS SUPPORTING ITS
`COMPLAINTS OF ANDERSON .............................................................. 20
`VI. THE CITED ART RENDERS OBVIOUS POPULATING THE
`DATABASE ACCORDING TO THE INSTRUCTION ......................... 22
`VII. CLAIM CONSTRUCTION ....................................................................... 26
`VIII. CONCLUSION ........................................................................................... 26
`
`
`
`C.
`D.
`
`
`
`
`
`i
`
`
`
`TABLE OF AUTHORITIES
`
`
`Cases:
`
`Cisco Systems, Inc. v. K.Mizra LLC, IPR2021-00594, Paper 35 (PTAB Aug.
`12, 2022) ................................................................................................................. 12
`Draftkings Inc., v. Interactive Games LLC, IPR2020-01107, Paper 39
`(PTAB Jan. 4, 2021) ............................................................................................... 12
`Home Depot U.S.A., Inc., v. Lynk Labs, Inc., IPR2021-01368, Paper 49
`(PTAB Jan. 27, 2023) ............................................................................................. 15
`In re Clay, 966 F.2d 656 (Fed. Cir. 1992) .............................................................. 12
`In re Fulton, 391 F.3d 1195 (Fed. Cir. 2004) ......................................................... 12
`In re Merck & Co., Inc., 800 F.2d 1091, 231 USPQ 375 (Fed. Cir. 1986) ............ 21
`Ingenico Inc. v. Ioengine LLC, IPR2019-00416, Paper 62 (PTAB Sept. 10,
`2020) ....................................................................................................................... 18
`Intel Corp. v. Health Discovery Corp., IPR2021-00550, Paper 36 (PTAB
`Sept. 6, 2022) .......................................................................................................... 10
`Intel Corp. v. PACT XPP Schweiz AG, No. 2022-1037, 2023 WL 2469631
`(Fed. Cir. Mar. 13, 2023) ........................................................................................ 11
`Intel Corp. v. Qualcomm Inc., No. 2020-2092, WL 880681 (Fed. Cir. Mar.
`24, 2022) ................................................................................................................. 11
`Intel Corporation v. Parkervision Inc., IPR2020-01265, Paper 44 (PTAB
`Jan. 21, 2022) ............................................................................................................ 3
`Keynetik, Inc. v. Samsung Elecs. Co., No. 2022-1127, 2023, WL 2003932 .......... 10
`KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398 (2007) ............................................... 14
`MCM Portfolio LLC v. Hewlett-Packard Co., 812 F.3d 1284 (Fed. Cir.
`2015) ...................................................................................................................... 15
`Micron Tech., Inc. v. Unification Technologies LLC, IPR2021-00343, Paper
`42 (PTAB July 8, 2022) .......................................................................................... 11
`Personal Web Techs., LLC v. Apple, Inc., 848 F.3d 987 (Fed. Cir. 2017) ............. 10
`
`
`
`ii
`
`
`
`PNC Bank, N.A., v. United Services Automobile Association, Paper 681
`(PTAB Jan. 19, 2023) ............................................................................................. 18
`Xerox Corp. v. Bytemark, Inc., IPR 2022-00624, Paper 9 (PTAB Aug 24,
`2022) (designated precedential) .............................................................................. 15
`
`Regulations:
`37 C.F.R. § 42.6 ...................................................................................................... 29
`37 C.F.R. § 42.6(e) ................................................................................................. 29
`37 C.F.R. § 42.8 ...................................................................................................... 28
`37 C.F.R. § 42.23(b) ................................................................................................. 3
`37 C.F.R. § 42.24 .................................................................................................... 28
`
`
`
`
`
`
`iii
`
`
`
`I.
`
`INTRODUCTION
`The proposed Ground of Mathiassen-McKeeth-Anderson requires two
`
`minimal modifications to Mathiassen to render obvious the challenged independent
`
`claims. First, Mathiassen’s biometric security system is modified to output a duress
`
`and/or alert condition, per McKeeth, responsive to a user’s biometric signature.
`
`Mathiassen already contemplates outputting various commands based on different
`
`user-inputted biometric signals, indicating a duress and/or alert condition based on
`
`a particular inputted biometric requires only simple programming. Second,
`
`Mathiassen is modified to recognize a touch duration, per Anderson, of the
`
`fingerprint representation on the fingerprint sensor. Mathiassen already receives a
`
`series of fingerprint representations of touch/no-touch finger movements on the
`
`fingerprint sensor, so modifying Mathiassen to recognize a duration of a touch/no-
`
`touch requires only simple programming. Because Mathiassen is a strong reference,
`
`and the Petition and supporting Declaration provide a thorough analysis supported
`
`by factual underpinnings, CPC presents arguments having no legal and factual basis.
`
`II. CPC PROVIDES NO REBUTTAL TO MATHIASSEN'S TEACHING
`OF OUTPUTTING THE
`“ACCESSIBILITY ATTRIBUTE”
`RESPONSIVE
`TO A CAR OWNER/ADMINISTRATOR’S
`BIOMETRIC
`The Parties agree to apply the District Court’s construction for the claimed
`
`“accessibility attribute” as an “attribute that establishes whether and under which
`
`conditions access to the controlled item should be granted to a user[.]” (Paper 1,
`
`
`
`1
`
`
`
`Petition, 9; Paper 17, Patent Owner Response, 6). CPC contends Mathiassen teaches
`
`a binary “whether” access is granted and does not teach “under which conditions[.]”
`
`(Paper 17, 12-15).
`
`As an initial matter, the Petition relies on McKeeth for teaching two
`
`accessibility attributes (duress and alert), whereas the ’208 Patent’s independent
`
`claims only require outputting a single accessibility attribute. (Paper 1, 41-46; Ex.
`
`1003, ¶¶ 245-248). These duress and alert attributes are substantially similar to the
`
`’208 Patent’s described “duress attribute” and “alert attribute[.]” Ex. 1003, compare
`
`¶¶ 143-144 with ¶¶ 247-248. CPC does not dispute McKeeth teaches two
`
`accessibility attributes. (Paper 17, 16-23 (CPC only arguing motivation to combine
`
`for McKeeth)). Therefore, even if the Board determines Mathiassen does not teach
`
`an accessibility attribute, McKeeth teaches such.
`
`Contrary to CPC’s assertions, Apple maintains the accessibility attribute
`
`requires establishing “whether and under which conditions” access should be
`
`granted. CPC’s argument only addresses Apple’s mapping of Mathiassen for
`
`“whether” access is granted, thus mischaracterizing the mapping. (Paper 17, 12-13).
`
`CPC does not address the Petition’s mapping and Declaration support establishing
`
`Mathiassen teaches “under which conditions” access is granted. (Paper 1, 43-44; Ex.
`
`1003, ¶¶ 242-244).
`
`
`
`2
`
`
`
`Mathiassen teaches a car owner/administrator requesting access to the car
`
`door locks. (Paper 1, 43; Ex. 1004, Mathiassen, [0175-0182]). The Petition mapped,
`
`with Declarant support, that Mathiassen’s car owner/administrator is granted
`
`“unconditional” or “full” access. (Paper 1, 43-44; Ex. 1003, ¶¶ 242-244). CPC does
`
`not address the Petition’s mapping that a car owner/administrator has unconditional
`
`or full access. The Board should waive future arguments by CPC attempting to rebut
`
`the Petition’s mapping at pages 43-44 and Ex. 1003, ¶¶ 242-244 addressing the
`
`“under which conditions” component of the construction. Intel Corporation v.
`
`Parkervision Inc., IPR2020-01265, Paper 44, 67-68 (PTAB Jan. 21, 2022) (citing 37
`
`C.F.R. § 42.23(b) and Consolidated TPG).
`
`CPC argues Mathiassen “does not provide any incremental condition to
`
`access[.]” (Paper 17, 13). Applying CPC’s own theory of what satisfies the “under
`
`which conditions[,]” Mathiassen’s granted car owner/administrator access is an
`
`“incremental condition” to access. The car owner/administrator is granted access
`
`(i.e., whether access is granted) and the access is full or unconditional (i.e., granted
`
`access without any conditions, due to, for example, being a car owner/administrator).
`
`(Paper 1, 42-43; Ex. 1003, ¶ 242).
`
`CPC does not have a viable argument rebutting Mathiassen’s teaching of the
`
`claimed “accessibility attribute” for at least two reasons. First, Mathiassen’s car
`
`owner/administrator access is substantially similar to the “access” accessibility
`
`
`
`3
`
`
`
`attribute described in the ’208 Patent. (Paper 1, 43; Ex. 1003, ¶ 244). The ’208 Patent
`
`describes an “access” accessibility attribute where access is granted without
`
`conditions based on the user’s biometric matching “a legitimate signature in the
`
`database[,]” as also taught in Mathiassen. (Paper 1, 42) (citing Ex. 1001, 12:1-10).
`
`The ’208 Patent also describes an administrator enrolling a first finger for
`
`administrator access and another finger for ordinary user access, thus distinguishing
`
`a user requesting administrator access (e.g., access without conditions) from
`
`ordinary access. (Ex. 1001, 10:38-42; id. at 10:43-44 (describing class overlap, such
`
`as a stored signature belonging to an administrator in the duress class); Ex. 1089,
`
`21:6-121 (Dr. Easttom opining the ’208 Patent “describes both standard users and
`
`administrative use[r]s that have different access”)). Even the claims of the ’208
`
`Patent recite an “accessibility attribute preferably compris[es] an access attribute if
`
`the biometric signal matches a member of the database of biometric signatures[.]”
`
`(Ex. 1001, Claim 3, 16:13-18).
`
`Therefore, the ’208 Patent describes outputting an accessibility attribute that
`
`includes “access” without any conditions, which satisfies the “under which
`
`conditions” construction component. Because the ’208 Patent also describes an
`
`
`1 Dr. Easttom opined on the ’705 Patent’s description during deposition. The ’705
`Patent description is identical to the ’208 Patent description, and the ’208 Patent is
`the parent of the ’705 Patent. Thus, Dr. Easttom’s testimony also relates to what
`the ’208 Patent describes.
`
`
`
`4
`
`
`
`administrator access as an exemplary access without conditions, as compared to an
`
`ordinary user, and because Mathiassen teaches a substantially similar car
`
`owner/administrator granted access, Mathiassen teaches an accessibility attribute, as
`
`claimed.
`
`Second, even CPC’s own declarant, Dr. Easttom, admits that administrator
`
`access is an “accessibility attribute” encompassed within the ’208 Patent’s claims2:
`
`Q. So would an administrator whose signature is stored in the database
`be a legitimate user?
`A. The user would certainly be legitimate.
`Q. And if that legitimate user is granted access, would the system output
`an access attribute?
`A. Well, I believe it outputs an accessibility attribute that is now
`saying whether or not to grant them access in our hypothetical, yes,
`would be the answer to that. Under what conditions? Well, they are
`an administrator so we’re going to grant them a much broader access
`than a standard user. So, yes, an accessibility attribute would be
`output from that process.
`(Ex. 1089, 21:20–22:7).3
`
`
`2 Dr. Easttom answered questions regarding the term “accessibility attribute”
`recited in the ’705 Patent claim 1, which is also recited in all independent claims of
`the ’208 Patent. Thus, Dr. Easttom’s testimony relates to both the “accessibility
`attribute” recited in the ’705 and ’208 Patents’ claims.
`3 Emphases added unless otherwise noted.
`
`
`
`5
`
`
`
`
`
`Because (1) Mathiassen teaches a substantially similar administrator access
`
`as described in the ’208 Patent; and (2) because CPC’s own declarant admits that an
`
`administrator granted “broader access” is a type of accessibility attribute,
`
`Mathiassen teaches an accessibility attribute, as claimed, including “under which
`
`conditions” access is granted.
`
`III. MATHIASSEN’S SERIES OF FINGERPRINT REPRESENTATIONS
`IS A SERIES OF BIOMETRIC SIGNAL ENTRIES
`CPC argues that Mathiassen’s “finger movements” do not involve a biometric
`
`signal because “something more than the fingerprint sensor” tracks the finger
`
`movements. (Paper 17, 17). CPC additionally argues Mathiassen’s translation means
`
`“is not acting like a fingerprint sensor[,]” ignoring Mathiassen’s teaching that the
`
`translation means analyzes finger movements obtained from fingerprint
`
`representations captured by Mathiassen’s fingerprint sensor. (Paper 17, 17);
`
`Mathiassen, [0192]. CPC concludes, without explanation, that there would have
`
`been no motivation to “arrive at a duress signal[.]” (Paper 17, 17).
`
`CPC ignores Mathiassen’s teachings that the finger movements on the
`
`fingerprint sensor are obtained from a “series of consecutive fingerprint
`
`representations,” where the representations comprise the user’s fingerprint
`
`minutiae, i.e., biometric information. (Ex. 1004, [0192], [0050] (disclosing capturing
`
`the user’s fingerprint), [0177-0178] (same); Ex. 1003, ¶¶ 165-166, 194 (opining the
`
`“series of consecutive fingerprint representations” indicate “omni-directional finger
`
`
`
`6
`
`
`
`movements across the sensor”), 127 (opining fingerprint data generated by the pre-
`
`processing block are biometric signals); Paper 1, 14-15, 17-18 (discussing the
`
`“biometric signal” is the user’s fingerprint images reduced to minutiae); Ex. 1089,
`
`27:14-17 (Dr. Easttom agreeing fingerprint representations are the user’s
`
`fingerprint)).
`
`Mathiassen teaches the system “store[s] a series of consecutive fingerprint
`
`representations generated by the fingerprint sensor signal capturing and pre-
`
`processing block (5C).” (Ex. 1004, [0192]); Ex. 1089, 26:21–28:2 (Dr. Easttom
`
`agreeing recording (i.e., storing) a fingerprint representation is an “entry of a
`
`biometric signal”). Movement analyzing means analyzes the obtained series of
`
`fingerprint representations to measure movements across the fingerprint sensor. (Ex.
`
`1004, [0192]). The translation software then categorizes and translates the obtained
`
`omni-directional finger movements to a specific command. Id. Because Mathiassen
`
`teaches the series of fingerprint representations applied to the fingerprint sensor
`
`are analyzed and categorized to finger movements ([0192]), Mathiassen teaches the
`
`user’s series of finger movements includes a biometric signal, contrary to CPC’s
`
`assertions. (Ex. 1003, ¶ 194).
`
`Dr. Easttom opines, without factual support or discussion of Mathiassen, that
`
`the “finger movements” are “distinct from fingerprints themselves[.]” (Ex. 2011, ¶
`
`53). Dr. Sears disagrees, opining Mathiassen’s omni-directional finger movements
`
`
`
`7
`
`
`
`are analyzed from the fingerprint representations. (Ex. 1090, Supp. Dec. of Dr.
`
`Andrew Sears, ¶¶ 9-13). The movement analyzing means analyzes the fingerprint
`
`representations to determine the finger movement ([0192]), further confirming
`
`Mathiassen teaches the claimed “receiving a series of entries of the biometric
`
`signal.” Id. at ¶ 9.
`
`IV. CPC’S LACK OF MOTIVATION TO COMBINE ARGUMENTS
`HAVE NO BASIS IN FACTS OR THE LAW
`A. CPC’s “Push-Button” Theory for Modifying Mathiassen
`CPC’s primary argument for why there allegedly would have been no
`
`motivation to modify Mathiassen to include McKeeth’s output of a duress signal and
`
`Anderson’s determination of a fingerprint press duration is that “a push button is the
`
`simpler solution.” (Paper 17, 23, 28, 21 (“Mathiassen could have been modified by
`
`adding a well-known physical push button to generate a duress signal.”)). CPC’s
`
`theory fails for several reasons.
`
`First, it would have been far simpler to modify Mathiassen to output a duress
`
`signal by simply programming the system to recognize an inputted fingerprint
`
`representation indicating a duress condition, as mapped in the Petition, rather than
`
`CPC’s strained push-button theory. Mathiassen already teaches a fingerprint sensor
`
`and corresponding processor that (1) recognize fingerprint representations and
`
`corresponding finger movements across the fingerprint sensor (e.g., “touch/no-touch
`
`finger movement sequences”); (2) output various commands according to the
`
`
`
`8
`
`
`
`fingerprint movements; and (3) are capable of enrolling more than one fingerprint
`
`or fingerprint movement for a user for the purpose of commanding the system, “[a]s
`
`an additional safety feature.” (Ex. 1004, [0192]; Paper 1, 23-25, 46-47; Ex. 1003, ¶¶
`
`126-127, 165-168, 194-198, 208-213, 233, 250-255). CPC even admits “if the sole
`
`purpose of modification were to enable sending additional signals, Mathiassen
`
`already provides the mechanism for doing so without modifications taught in other
`
`references.” (Paper 17, 27).
`
`As Dr. Sears opined, the modification to Mathiassen to recognize and output
`
`a duress signal would have required simply enrolling another fingerprint or finger
`
`movement (as already taught by Mathiassen) and encoding another command (e.g.,
`
`duress or alert) into the command table (which is also taught in Mathiassen). (Ex.
`
`1003, ¶ 252). The modification to detect the duration and number of biometric
`
`entries would have required simply programming Mathiassen’s translation means to
`
`detect the duration of each fingerprint touch and the number of touches in the series
`
`of touches (detecting series of fingerprint touches already taught by Mathiassen). Id.
`
`at 212-213. Thus, the Mathiassen modification is relatively trivial given Mathiassen
`
`already includes the necessary hardware and software components for instructing
`
`commands via fingerprints and finger movement sequences, including touch/no-
`
`touch finger movement sequences of a particular duration (as modified by
`
`Anderson). (Ex. 1003, ¶¶ 209, 212-213). Per Dr. Sears, a POSITA would already
`
`
`
`9
`
`
`
`have the expertise to implement the required simple re-programming. Id. at ¶¶ 250-
`
`252, 212-213. Dr. Sears detailing the modified function of the software and opining
`
`such modification would be “simple” is “sufficient to establish a reasonable
`
`expectation of success[,]” as writing code to achieve the identified functions “is
`
`within the skill of the art.” Keynetik, Inc. v. Samsung Elecs. Co., No. 2022-1127,
`
`2023, WL 2003932 at *2 (Fed. Cir. Feb. 15, 2023).
`
`Rather than respond to Dr. Sears’s extensive discussion for why Mathiassen’s
`
`modifications would have been obvious, CPC falsely asserts Apple and Dr. Sears
`
`made a “blind assumption that these references could be combined without
`
`explaining how the resulting combination would be achieved.…” (Paper 17, 19). Far
`
`from a “blind assumption,” Apple and Dr. Sears provided a thorough analysis
`
`underscored with factual support. (Paper 1, 23-25, 35-36, 46-47; Ex. 1003, ¶¶ 126-
`
`127, 164-168, 194-198, 208-213, 233, 250-255). Regardless, a proper legal analysis
`
`for obviousness does not address whether the reference could be combined, but why
`
`it would have been obvious to combine the references. Intel Corp. v. Health
`
`Discovery Corp., IPR2021-00550, Paper 36, 30-31 (PTAB Sept. 6, 2022) (petitioner
`
`must show “why” a POSITA would have combined references); Personal Web
`
`Techs., LLC v. Apple, Inc., 848 F.3d 987, 993 (Fed. Cir. 2017) (whether references
`
`“could be combined” is a “deficient” argument in establishing obviousness). CPC’s
`
`push-button theory does not rebut why the modification is allegedly non-obvious.
`
`
`
`10
`
`
`
`The second reason CPC’s push-button theory fails is that Mathiassen applies
`
`fingerprint access to car locking systems to “prevent” non-authorized car use. (Ex.
`
`1004, [0145]; Ex. 1003, ¶ 153). Because Mathiassen is concerned with blocking un-
`
`authorized users, a simple push button (with no biometric identification) would not
`
`have blocked un-authorized use, and thus a POSITA would not have been motivated
`
`to include a push button, as CPC purports. (Ex. 1090, ¶¶ 2-8). Unlike a push button,
`
`fingerprint recognition would have differentiated an authorized user from an un-
`
`authorized user, thus identifying an authorized user under duress. (Ex. 1090, ¶ 4).
`
`Third, CPC’s argument that there would have been an allegedly simpler
`
`modification to Mathiassen is irrelevant to the legal analysis for obviousness. (Paper
`
`17, 20-22 (discussing McKeeth), 28-29 (discussing Anderson)). Obviousness does
`
`not require “a particular combination” be preferred or “most desirable[.]” Intel Corp.
`
`v. Qualcomm Inc., No. 2020-2092, WL 880681, at *4 (Fed. Cir. Mar. 24, 2022);
`
`Micron Tech., Inc. v. Unification Technologies LLC, IPR2021-00343, Paper 42, 50-
`
`51 (PTAB July 8, 2022); Intel Corp. v. PACT XPP Schweiz AG, No. 2022-1037,
`
`2023 WL 2469631 at *4-5 (Fed. Cir. Mar. 13, 2023). Dr. Sears explained why
`
`combining Mathiassen with McKeeth to output a duress and alert attribute and with
`
`Anderson to detect duration variations in the series of fingerprint presses was
`
`desirable. (Ex. 1003, ¶¶ 249 (citing the motivation to combine Mathiassen with
`
`McKeeth at ¶¶ 153-163), 208-211). Obviousness does not require the proposed
`
`
`
`11
`
`
`
`combination be “preferred[] or ‘optimal[]’” over an allegedly simpler push button.
`
`Draftkings Inc., v. Interactive Games LLC, IPR2020-01107, Paper 39, 52-53 (PTAB
`
`Jan. 4, 2021) (citing In re Fulton, 391 F.3d 1195, 1201-02 (Fed. Cir. 2004)).
`
`B. CPC’s “Computer Art” Theory Regarding McKeeth and Anderson
`CPC argues a POSITA would not have looked to McKeeth or Anderson to
`
`solve the problem of Mathiassen’s car locking system security, stating McKeeth and
`
`Anderson “do[] not teach an automotive embodiment[,]” but are “computer art[,]”
`
`and this is a “major distinction between these references.” (Paper 17, 18-19, 27-28).
`
`As an initial note, it is unclear the legal basis for CPC’s argument, which is
`
`that a POSITA would not look to McKeeth or Anderson for modifying Mathiassen.
`
`CPC’s argument reads like a non-analogous art discussion, although the question of
`
`non-analogous art is whether the cited prior art references are analogous to the
`
`patent-in-suit, i.e., the ’208 Patent. In re Clay, 966 F.2d 656, 658-659 (Fed. Cir.
`
`1992) (“prior art is analogous” when the reference is within the field of endeavor of
`
`the asserted patent); Cisco Systems, Inc. v. K.Mizra LLC, IPR2021-00594, Paper 35,
`
`38 (PTAB Aug. 12, 2022).
`
`CPC does not argue that McKeeth and Anderson are non-analogous to the ’208
`
`Patent, and could not. The ’208 Patent is directed to utilizing fingerprint recognition
`
`to access controlled items, such as a secure door lock or a PC’s “electronic key
`
`circuit[.]” (Ex. 1001, 6:13-16). McKeeth and Anderson are directed to utilizing
`
`
`
`12
`
`
`
`fingerprints and/or various access codes (e.g., Anderson’s durational finger presses)
`
`for accessing a controlled item, similar to Mathiassen’s teaching of using
`
`fingerprints to access a car locking system and fingerprint representations of finger
`
`movement sequences to instruct a command. (Ex. 1005, Abstract, 3:52-4:2, 4:29-36;
`
`Ex. 1006, Abstract, 7:4-11; Ex. 1004, [0175-0186], [0192]). Therefore, Mathiassen,
`
`McKeeth, and Anderson is each analogous art to the ’208 Patent for at least the
`
`reasons provided herein and in the Petition and supporting documents.
`
`Regarding CPC’s arguments, characterizing McKeeth and Anderson as
`
`“computer art” does not advance CPC’s position, as Mathiassen is broadly directed
`
`to “computer art.” (Paper 17, 19, 28). Mathiassen’s car locking system includes a
`
`“central car computer” that forms part of the biometric car locking system, and
`
`employs processors and other computing elements for performing the biometric
`
`recognition taught in Mathiassen. (Paper 1, 13; Ex. 1003, ¶¶ 87-88). Mathiassen’s
`
`car door locks in the central locking system are a controlled item, where access is
`
`controlled by the central car computer. (Paper 1, 13-14). Therefore, Mathiassen’s
`
`embodiment controlling access to the car door locks is, like McKeeth and Anderson,
`
`“computer art[.]” (Ex. 1090, ¶ 14). Mathiassen teaches other controlled items
`
`implementing the biometric secure access system, such as a computer, medicine
`
`cabinet, safe, and others. (Paper 1, 12; Ex. 1004, [0054], [0100], [0119], [0122-
`
`0123]; Ex. 1003, ¶ 111). Regardless of the controlled item, the biometric secure
`
`
`
`13
`
`
`
`access system still employs a computer. See, e.g., Ex. 1004, [0167]. The Board
`
`agreed Mathiassen teaches implementing the biometric access system for providing
`
`secure access to “computers[.]” (Paper 11, 14, 35).
`
`Mathiassen’s central car computer for controlling access to the car door locks
`
`is a “door locking mechanism on a secure door.” (Ex. 1001, 6:13-16). That
`
`Mathiassen uses fingerprint recognition to access a secure item (e.g., car door locks)
`
`and McKeeth and Anderson use fingerprint recognition to access another type of
`
`secure item (i.e., a computer) does not create a “major distinction between these
`
`references[,]” as CPC contends. (Ex. 1090, ¶ 15; Paper 17, 18-19; KSR Int’l Co. v.
`
`Teleflex Inc., 550 U.S. 398, 417 (2007) (obviousness does not require teachings
`
`come from the same field). This is especially true as CPC admits Mathiassen and
`
`McKeeth are in the same field of “fingerprint recognition[.]” (Paper 17, 22).
`
`Dr. Sears provided a detailed discussion of the incentives for modifying
`
`Mathiassen to include McKeeth’s duress and alert access and to include Anderson’s
`
`durational variation. (Ex. 1003, ¶¶ 153-163, 208-211). Dr. Sears also opined each
`
`reference is “directed to a biometric access system[,]” which leads a POSITA to
`
`conclude the references would be “appropriate” for combination, “with a reasonable
`
`expectation of success.” (Ex. 1003, ¶ 109). CPC does not rebut Dr. Sears’s opinions,
`
`and CPC’s declarant merely repeats back the attorney argument in CPC’s Response
`
`without any factual basis underlying his opinions. Compare Ex. 2011, ¶¶ 51, 60-61,
`
`
`
`14
`
`
`
`75-80, with Paper 17, 16-17, 22, 27-29. The Board should entitle “little weight” to
`
`Dr. Easttom’s “verbatim” testimony. Xerox Corp. v. Bytemark, Inc., IPR 2022-
`
`00624, Paper 9, 15 (PTAB Aug 24, 2022) (designated precedential).
`
`Because Mathiassen, McKeeth, and Anderson is each directed to providing
`
`secure access to a controlled item via a biometric security system, CPC’s
`
`“automotive” versus “computer” art theory should be rejected.
`
`C. CPC Resorts to Bodily Incorporation Arguments
`CPC argues the modification of Mathiassen with McKeeth and Anderson
`
`would require incorporating McKeeth’s peripheral device and Anderson’s cursor
`
`control stick. (Paper 17, 18-19, 29-30). CPC’s arguments are not responsive to the
`
`Petition’s mapping, as the Petition does not propose incorporating McKeeth’s
`
`peripheral device or Anderson’s cursor control stick in Mathiassen’s system.
`
`Bodily incorporation of features from a secondary reference into a primary
`
`reference is not required for determining obviousness. MCM Portfolio LLC v.
`
`Hewlett-Packard Co., 812 F.3d 1284, 1294 (Fed. Cir. 2015); Home Depot U.S.A.,
`
`Inc., v. Lynk Labs, Inc., IPR2021-01368, Paper 49, 16 (PTAB Jan. 27, 2023). Here,
`
`the Board’s evaluation is simpler, as Apple is not proposing to modify Mathiassen
`
`to include McKeeth’s or Anderson’s hardware. McKeeth is cited for outputting a
`
`duress condition and an alert condition via user instruction. (Paper 1, 44-45, 46-47
`
`(additionally citing the motivation to combine McKeeth’s duress and alert access
`
`
`
`15
`
`
`
`into Mathiassen from Claim 10(Pre3) at 23-25). Anderson is cited for pressure pulses
`
`of varying durations. (Paper 1, 32-35). Mathiassen’s secure access system already
`
`includes a fingerprint sensor and the necessary software for recognizing fingerprint
`
`representations of finger movement sequences on the fingerprint sensor and
`
`responsively outputting multiple commands from various fingerprint movement
`
`inputs. (Paper 1, 46; Ex. 1003, ¶¶ 165-166, 250, 252; Ex. 1004, [0192]). There is no
`
`need to include McKeeth’s hardware, as CPC purports. (Paper 1, 18-21). Similarly,
`
`Mathiassen’s remote biometric control already detects a series of biometric signals
`
`(i.e., series of fingerprint representations) forming fingerprint presses (e.g.,
`
`touches/no-touches), requiring only simple programming to “count the amount and
`
`the duration of touches in the touch/no-touch sequence.” (Paper 1, 36; Ex. 1003, ¶¶
`
`212-213, pinpoint at ¶ 213).
`
`Because McKeeth’s peripheral device and Anderson’s cursor control stick are
`
`not required in the modification, and because CPC’s arguments amount to bodily
`
`incorporation of unnecessary features from the secondary references, CPC’s
`
`arguments should be rejected.
`
`D. CPC’s Miscellaneous Issues Regarding the Proposed Ground
`CPC presents several arguments regarding Ground 1 that amount to
`
`procedural complaints of the Ground or the proffered motivation to combine without
`
`any basis in the Board’s rules, the IPR statutes, or Federal Circuit law.
`
`
`
`16
`
`
`
`First, CPC argues that Apple is “tacit[ly]” admitting Mathiassen does not
`
`teach the claimed “accessibility attribute” because Ground 1 also cites McKeeth as
`
`teaching two other accessibility attributes. (Paper 17, 16). Apple disagrees with
`
`CPC’s unsupported hypothesis.
`
`As expressly mapped in the Petition, Mathiassen alone teaches the
`
`“accessibility attribute,” including the “under which conditions” component. (Paper
`
`1, 43-44; Ex. 1003, ¶¶ 242-244). McKeeth was cited for teaching two other
`
`accessibility attributes (duress and alert) described in the ’208 Patent, further
`
`evidencing the obviousness of the ’208 Patent’s purported invention of outputting
`
`various types of accessibility attributes. (Paper 1, 44-46). Mathiassen does not need
`
`to teach a duress command to meet the independent claims’ recited “accessibility
`
`attribute.” For the Board’s reference, the independent claims do not require a
`
`“duress” accessibility attribute or any particular accessibility attribute. Apple
`
`proposed modifying Mathiassen with McKeeth’s duress and alert attributes to match
`
`the ’208 Patent’s exemplary accessibility attributes. (Ex. 1001, 8:17-25; Ex. 1003,
`
`compare ¶¶143-144 (discussing the ’208 Patent’s duress attribute and alert attribute)
`
`with ¶¶ 247-248 (discussing McKeeth’s substantially similar duress condition and
`
`alert condition).
`
`Simply because Apple chose to cite a combination of references that teaches
`
`the same types of accessibility attributes described in the ’208 Patent—even though
`
`
`
`17
`
`
`
`the types of accessibility attributes are not recited in the independent claims—is not
`
`a tacit admission. Rather, it shows the thorough obviousness of the ’208 Patent.
`
`Additionally, Claim 10 requires granting “more than two types of access” (Ex.
`
`1001, 17:19-24), thus necessitating reliance on McKeeth’s duress and alert access,
`
`in addition to Mathiassen’s unconditional/full access. (Paper 1, 21-25; Ex. 1003, ¶¶
`
`151-168).
`
`