throbber

`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`PATENT TRIAL AND APPEAL BOARD
`
`
`
`
`APPLE INC.,
`Petitioner
`
`v.
`
`CPC PATENT TECHNOLOGIES PTY, LTD.,
`Patent Owner
`
`
`
`CASE: IPR2022-00602
`U.S. PATENT NO. 9,665,705
`
`
`
`
`PATENT OWNER RESPONSE
`
`
`
`
`
`
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`TABLE OF CONTENTS
`
`V. 
`
`I. 
`Introduction ...................................................................................................... 1 
`ʼ705 Patent Overview ...................................................................................... 4 
`II. 
`III.  Level of Ordinary Skill .................................................................................... 5 
`IV.  Claim Construction .......................................................................................... 6 
`A. 
`“Accessibility Attribute” ....................................................................... 6 
`B. 
`“A Series of Entries of the Biometric Signal, Said Series Being
`Characterised According to at Least One of the Number of Said
`Entries and a Duration of Each Said Entry” .......................................... 7 
`C. 
`“Populate the Data Base According to the Instruction” ...................... 11 
`D. 
`“Configured To” v. “Capable Of” ....................................................... 12 
`THE PRIOR ART FAILS TO RENDER THE CHALLENGED CLAIMS
`OBVIOUS ...................................................................................................... 14 
`A. 
`The Prior Art Does Not Teach the “Accessibility Attribute”
`Limitation ............................................................................................ 14 
`1.  Mathiassen Does Not Teach an “Accessibility Attribute” ....... 14 
`2. 
`There is No Motivation to Combine Apple’s Cited Prior Art to
`Arrive at the “Accessibility Attribute” as Properly Construed . 18 
`The Prior Art Does Not Teach the Biometric Signal Duration
`Limitation ............................................................................................ 26 
`1. 
`Anderson Does Not Teach a Durational Component to a
`Biometric Signal Entry ............................................................. 26 
`There is No Motivation to Combine Mathiassen and Anderson
` ................................................................................................... 28 
`C.  Apple’s Cited Prior Art Does Not Populate the Data Base
`According to the Instruction ................................................................ 32 
`D. 
`Independent Claims 10, 11 & 14-17 ................................................... 35 
`E. 
`Dependent Claims ............................................................................... 35 
`VI.  CONCLUSION .............................................................................................. 35 
`
`
`
`B. 
`
`2. 
`
`i
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`LIST OF EXHIBITS
`
`Exhibit No.
`2001
`
`Description
`Scheduling Order, CPC Patent Technologies Pty Ltd. v. HMD
`Global Oy, 6:21-cv-00166 (Dkt. 27) (Sept. 23, 2021)
`
`2002
`
`2003
`
`2004
`
`2005
`
`2006
`
`2007
`
`2008
`
`2009
`
`2010
`
`2011
`
`2012
`
`HMD Final Invalidity Contentions, Chart B15 – Mathiassen,
`dated March 16, 2022
`
`Apple Inc. – Final Invalidity Contentions dated March 16, 2022
`
`Scheduling Order, CPC Patent Technologies Pty Ltd. v. Apple
`Inc., 6:21-cv-00165 (Dkt. 37) (Sept. 23, 2021)
`
`March 19, 2020 Letter from George Summerfield to Brian
`Ankenbrandt
`
`Defendant Apple Inc.’s Notice of Motion and Motion to Stay
`Pending Inter Partes Review, 5:22-cv-02553 (Dkt. 119) (June
`14, 2022)
`
`HMD Global Oy – Final Invalidity Contentions dated March 16,
`2022
`
`Declaration of George C. Summerfield in Support of Motion
`for Pro Hac Vice Admission
`
`Biography of George C. Summerfield
`
`Declaration of Jonah Heemstra in Support of Motion for Pro
`Hac Vice Admission
`
`Apple’s Opening Claim Construction Brief, CPC Patent
`Technologies Pty Ltd. v. Apple Inc., 6:21-cv-00165 (Dkt. 46)
`(Nov. 19, 2021)
`
`Final Deposition Transcript of Dr. Andrew Sears, dated
`November 8, 2022
`
`ii
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`Exhibit No.
`2013
`
`Description
`Declaration of William C. Easttom II (Chuck Easttom) Ph.D.,
`D.Sc.
`
`2014
`
`CV of Dr. Chuck Easttom
`
`
`
`
`
`
`iii
`
`

`

`I.
`
`INTRODUCTION
`
`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`The limitations of the independent claims of U.S. Patent No. 9,665,705 (“the
`
`ʼ705 Patent”) can be divided as follows: 1) the preamble; 2) a memory with the
`
`biometric signature database (representative clause 1(a));1 3) a transmitter subsystem
`
`and its components involved in capturing and matching of biometric data
`
`(representative clause 1(b)); 4) a receiver subsystem to give access to a device based
`
`upon information received from the transmitter subsystem (representative clause
`
`1(c)); 5) the transmitter subsystem to the extent it is involved in the capture and
`
`registration of biometric data associated with a user (representative clause 1(d)); and
`
`6) the device to be unlocked (representative clause 1(e)). Apple cobbles together a
`
`single, three-reference challenge to the claims of the ʼ705 Patent. Even with these
`
`three references in hand, Apple must ignore its own characterization of the prior art
`
`and its construction of the subject claims to mount an obviousness challenge.
`
`
`1 These clauses refer to the numbering system used by the Board to label the various
`
`claim limitations in claim 1 of the ʼ705 Patent. As the Board notes, the only
`
`difference between claim 1 and claim 15 (the only other independent claim directed
`
`to a “system for providing secure access to a controlled item”) is the phrase
`
`“configured to” in the former and the phrase “capable of” in the latter. Paper No. 11
`
`at 6. The distinction between those terms is addressed later herein.
`
`1
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`First, the “transmitter subsystem” (representative clause 1(b)) specifies a
`
`“controller configured to match the biometric signal against members of the database
`
`of biometric signatures to thereby output an accessibility attribute” (emphasis
`
`added). Apple successfully urged that “accessibility attribute” be construed as an
`
`“attribute that establishes whether and under which conditions access to the
`
`controlled item should be granted to a user” (emphasis added). According to Apple,
`
`the challenged claims go beyond the binary access decision of “yes” or “no.” Yet,
`
`Apple improperly calls upon prior art teachings that are limited to this very binary
`
`decision as allegedly teaching the “accessibility attribute” limitation.
`
`Second, the transmitter subsystem limitation (representative clause 1(d))
`
`specifies “a series of entries of the biometric signal, said series being characterised
`
`according to at least one of the number of said entries and a duration of each said
`
`entry” (representative clause 1(d)(1)) (emphasis added) (“the Biometric Signal
`
`Duration Limitation”). In discussing the prior art that allegedly teaches this
`
`limitation, Apple’s expert, Dr. Andrew Sears, initially draws a bright line distinction
`
`between biometric security devices, such as a fingerprint sensor, and knowledge-
`
`based security devices, such as a capacitive touch sensor and Morse code.
`
`Yet, when cobbling together a multi-reference challenge to the validity of the
`
`subject claims, Dr. Sears and Apple completely blur that distinction, combining
`
`teachings from both realms, and treating knowledge-based security features as
`
`2
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`biometrics to satisfy the Biometric Signal Duration Limitation. This necessarily
`
`dooms Apple’s challenge, lest the Board also ignore the fundamental distinction
`
`between “knowledge,” which can be learned and stolen, and “biometrics,” which
`
`cannot. Apple also provides no explanation as to how or why teachings from these
`
`disparate technologies could be combined to arrive at the claimed invention,
`
`especially when the afore-referenced simpler solutions had presented themselves.
`
`Third, the claim specifies that the received series of biometric signals be
`
`mapped into an instruction (representative clause 1(d)(2)), and that instruction is
`
`used to populate the data base (representative clause 1(d)(3)). In other words, as
`
`Apple acknowledges, the series of biometric signal is used in the user enrollment
`
`process. Yet, in describing its principal reference, Apple points to one thing - finger
`
`movements – as purportedly satisfying the “receive” and “map” limitations, and to
`
`another thing – “master minutiae tables” of fingerprints – for the “populate”
`
`limitation. This clearly contravenes the plain language of the claims and the
`
`antecedents therein.
`
`Finally, if Apple is somehow correct that combining knowledge-based and
`
`biometric security is fair game in challenging the claims of the ʼ705 Patent, Apple
`
`fails to explain why one of ordinary skill in the art would have been motivated in the
`
`name of enhancing security to modify an existing biometric sensor in some fashion,
`
`with the reprogramming that would be required therefor, rather than employing
`
`3
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`myriad simpler, albeit unpatented, security alternatives, such as a physical push
`
`button, to be used in conjunction with such existing biometric sensor. This is
`
`particularly problematic, given that one of the three prior art references relied upon
`
`by Apple in its single challenge ground (Anderson) denigrates fingerprint
`
`recognition as requiring “sophisticated software for implementation,” and itself
`
`teaches the use of a push button,
`
`Any one of the foregoing problems with Apple’s single challenge ground is
`
`sufficient to defeat the instant petition. The combination of all four issues, however,
`
`means that the Board should give the petition the short shrift it deserves.
`
`II.
`
`ʼ705 PATENT OVERVIEW
`
`The ʼ705 Patent issued on May 30, 2017 from an application claiming priority
`
`of August 13, 2003. The ʼ705 Patent has 17 claims, claims 1, 10, 11, and 14-17 of
`
`which are independent. Representative claim 1 of the ʼ705 Patent reads:
`
`A system for providing secure access to a controlled item, the system
`comprising: a memory comprising a database of biometric signatures;
`
`a transmitter sub-system comprising:
`
`a biometric sensor configured to receive a biometric signal; a transmitter sub-
`system controller configured to match the biometric signal against
`members of the database of biometric signatures to thereby output an
`accessibility attribute;
`
`and a transmitter configured to emit a secure access signal conveying
`information dependent upon said accessibility attribute;
`
`4
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`and a receiver sub-system comprising: a receiver sub-system controller
`configured to: receive the transmitted secure access signal;
`
`and provide conditional access to the controlled item dependent upon said
`information;
`
`wherein the transmitter sub-system controller is further configured to: receive
`a series of entries of the biometric signal,
`
`said series being characterised according to at least one of the number of said
`entries and a duration of each said entry;
`
`map said series into an instruction;
`
`and populate the data base according to the instruction,
`
`wherein the controlled item is one of: a locking mechanism of a physical
`access structure or an electronic lock on an electronic computing device.
`
`Ex. 1001, 15:62-16:24.
`
`As the Board noted, “[t]he ʼ705 Patent discloses a system ‘or providing secure
`
`access to a controlled item.’” Paper No. 11 at 4 (citation omitted). “The ‘controlled
`
`item’ can be, for example, the locking mechanism of a door or an electronic lock on
`
`a personal computer.” Id. (citation omitted). “The system uses a database of
`
`‘biometric signatures’ such as a fingerprint for determining authorized access.” Id.
`
`(internal citations omitted).
`
`III. LEVEL OF ORDINARY SKILL
`
`CPC does not dispute Apple’s characterization that a hypothetical person of
`
`ordinary skill in the art “would have had at least a bachelor’s degree in computer
`
`engineering, computer science, electrical engineering, or a related field, with at least
`
`5
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`one year experience in the field of human-machine interfaces and device access
`
`security,” and “[a]dditional education or experience may substitute for the above
`
`requirements.” Paper No. 1 at 3.
`
`IV. CLAIM CONSTRUCTION
`A.
`
`“Accessibility Attribute”
`
`Claim 1 of the ʼ705 Patent requires an output of an “accessibility attribute”
`
`based upon a biometric signal match, and emitting “a secure access signal conveying
`
`information dependent upon said accessibility attribute.” Ex. 1001, 16:1-8. Apple
`
`proposed, and the Board adopted, an “attribute that establishes whether and under
`
`which conditions access to the controlled item should be granted to a user” as the
`
`construction of “accessibility attribute.” Paper No. 1 at 6; Paper No. 11 at 13.
`
`According to Apple this construction “is consistent with the description of the
`
`invention throughout the specification and the claims, which goes beyond mere
`
`matching—the binary decision of “yes” or “no”—and instead describes a system
`
`that provides for different types of access.” Ex. 2011, 26 (emphasis added). See
`
`also id., 28 (“[b]inary matching—“match/no match”—is not what the inventor was
`
`trying to invent”).
`
`The ʼ705 Patent teaches the following examples of accessibility attributes:
`
`[A]n access attribute (granting unconditional access), a duress attribute
`
`(granting access but with activation of an alert tone to advise authorities
`
`6
`
`

`

`of the duress situation), an alert attribute (sounding a chime indicating
`
`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`that an unauthorised, but not necessarily hostile, person is seeking
`
`access).
`
`Ex. 1001, 8:28-35.
`
`In short, a mere binary decision to grant access to a device does not constitute
`
`an “accessibility attribute” under Apple’s claim construction. As discussed below,
`
`however, Apple improperly tries to back away from that distinction in challenging
`
`the validity of the subject claims.
`
`B.
`
`“A Series of Entries of the Biometric Signal, Said Series Being
`Characterised According to at Least One of the Number of Said
`Entries and a Duration of Each Said Entry”
`
`As the Board noted, “[t]he ʼ705 Patent discloses a system ‘for providing
`
`secure access to a controlled item,’” wherein “[t]he ‘controlled item’ can be . . . an
`
`electronic lock on a personal computer.” Paper No. 11 at 4. “The system uses a
`
`database of ‘biometric signatures,’ such as a fingerprint for determining authorized
`
`access.” Id. (internal citations omitted).
`
`Representative claim 1 of the ʼ705 Patent requires, inter alia, a transmitter
`
`sub-system controller that is configured to “receive a series of entries of the
`
`biometric signal, said series being characterised according to at least one of the
`
`number of said entries and a duration of each said entry” (representative clause
`
`1(d1)). Paper No. 11 at 29 (emphasis added). Subsumed within this Biometric
`
`7
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`Signal Duration Limitation is the term “biometric signal.” Apple proposed, and the
`
`Board adopted, “physical attribute of the user (i.e., fingerprint, facial pattern, iris,
`
`retina, voice, etc.)” as the construction of that term. Paper No. 1 at 6; Paper No. 11
`
`at 13. In other words, biometric information identifies “an individual via unique
`
`physiological or behavioral characteristics” Ex. 1003, ¶ 39. See also Ex. 2012, 20:9-
`
`21, 21:13-15 (a biometric signal is unique to an individual user). According to
`
`Apple’s own expert, a biometric signal is based on an inherent attribute of an
`
`individual, cannot be learned, and cannot be stolen. Ex. 1003, ¶ 38; Ex. 2012 at
`
`28:12-21.
`
`The claimed “biometric signal” is in contradistinction to what Dr. Sears
`
`references in the prior art as “knowledge-based” security measures, such as a
`
`password. Ex. 1003, ¶¶ 37-38. A knowledge-based approach is “not based on any
`
`inherent attributes of an individual.” Id., ¶ 38. The ʼ705 Patent itself speaks of a
`
`“biometric signal” as an “alternative” to a “secret code,” i.e., a knowledge-based
`
`security measure. Ex. 1001, 1, limes 21-29. The following table summarizes the
`
`distinctions between knowledge-based and biometric-based security measures:
`
`Knowledge-Based Security
`Knowledge can be learned by another.
`Ex. 2012, 28:12-21.
`
`Knowledge is not based on an inherent
`attribute of an individual. Ex. 1003, ¶
`38.
`
`Biometric-Based Security
`A biometric
`feature
`cannot be
`“learned.” Ex. 2012, 36:5-11 (cannot
`“teach” a mug shot).
`identified an
`Biometric
`information
`individual via unique physiological or
`behavioral characteristics. Ex. 2012,
`
`8
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`20:9-21, (“unique to the user”). See also
`id. at 29:4-16 (“essentially part of a
`person”);
`id. at 33:11-16 (“unique
`patterns form via
`the ridges and
`bifurcations on the skin of fingerprints”
`are “biometric”); and Ex. 1003, ¶¶ 37,
`40.
`biometric
`“steal”
`cannot
`One
`information. Ex. 1003, ¶ 38; Ex. 2012,
`20:9-21, 21:13-15.
`
`Knowledge, e.g., a password, can be
`stolen. Ex. 1003, ¶ 38.
`
`Despite proposing this construction, Apple seeks to blur the lines between
`
`what its expert calls “knowledge-based” security features (those based on
`
`knowledge, such as a passcode or particular pattern, and not on any attribute of the
`
`user), and a biometric signal based on the unlearnable attribute of the user, in an
`
`effort to show the Biometric Signal Durational Limitation is taught by its single
`
`challenge ground. Indeed, Apple itself proposed, the District Court found, and the
`
`Board has preliminarily adopted, a construction that the claimed “series [is]
`
`characterised according to at least one of the number of said entries and a duration
`
`of each said entry.” Crucially, the antecedent for this series is “a series of entries of
`
`the biometric signal,” i.e., the entries and corresponding series are “of the biometric
`
`signal,” and the “number of said entries and a duration of each said entry” refers to
`
`the entries of the biometric signal, and not an entry of some other information, such
`
`as knowledge-based information.
`
`9
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`The distinction between knowledge-based and biometric information is also
`
`evident in the prosecution history. The Examiner found the closest prior art of record
`
`to be two references disclosing biometric security. Ex. 1002, 155-56 (Hoffman’s
`
`“biometric samples” and Pu’s “fingerprints”). The applicant successfully pointed
`
`out, however, that combining Hoffman biometric sampling with Pu’s use of human
`
`body parts to form a “secret sequence code,” i.e., knowledge-based information,
`
`required impermissible hindsight. Id. at 121.2
`
`Blurring the line between knowledge-based and biometric information is
`
`improper given the construction Apple proposed, and the Board adopted, for the term
`
`“biometric signal” - “[p]hysical attribute of the user (i.e., fingerprint, facial pattern,
`
`iris, retina, voice, etc.).” Paper No. 1 at 6; Paper No. 11 at 13. It is also improper
`
`considering the claims’ clear requirement of a number and duration of each entry of
`
`the biometric signal. Ex. 2011, 17-18; Ex. 1077, 2.
`
`In short, given the foregoing, the Biometric Signal Durational Limitation
`
`cannot be disclosed by the duration of a signal generated by a knowledge-based
`
`
`2 The Examiner allowed these claims (which eventually became Claims 1, 10, 11,
`
`and 15-17) based on the “reasons argued by applicant in pages 13-15 of the Remarks,
`
`filed 10/19/2016,” which included applicant’s statement regarding impermissible
`
`hindsight. Ex. 1002 at 121, 155.
`
`10
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`security feature. As discussed herein, however, that is precisely what Apple has
`
`attempted to do in its single challenge ground.
`
`C.
`
`“Populate the Data Base According to the Instruction”
`
`Apple points to “enrolling a new user’s fingerprint by providing control
`
`information via a sequence of presses of certain amount and duration” as one of the
`
`purportedly distinguishing features of the invention claimed in the ʼ705 Patent.
`
`Paper No. 1 at 1. The “populate” limitation in claim 1 is part of that enrolling feature.
`
`Ex. 2013, ¶ 82. Representative Claim 1 makes clear that, once the series of biometric
`
`signals characterized by number and duration is received by the transmitter
`
`subsystem (representative clause 1(d1)), that series is mapped into an instruction
`
`(representative clause 1(d2)), and the resulting instruction is used to populate the
`
`database of biometric signatures (representative clause 1(d)(3)). Ex. 1001, 16:13-
`
`23. To satisfy the requirements for antecedent claiming, “said series” in clause 1(d2)
`
`must refer to the “series of entries of the biometric signal” in clause 1(d1),3 and “the
`
`instruction” in clause 1(d3) must refer to “an instruction” in clause 1(d2). See, e.g.,
`
`MPEP, § 2173.05(e). The following is a depiction of this information flow:
`
`
`3 The Board recognized that “said series” refers to the “series of entries of the
`
`biometric signal” as shown by the board placing “of entries of the biometric signal”
`
`in brackets. Paper No. 11 at 32.
`
`11
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`Ex. 2013, ¶ 82.
`
`
`
`To show a teaching of these limitations, Apple must identify the same
`
`“biometric signal” series received by the transmitter sub-system, mapped into an
`
`instruction, and resulting in an instruction for populating the database. As discussed
`
`below, Apple did not do that.
`
`D.
`
`“Configured To” v. “Capable Of”
`
`The Board requested the parties address the difference between “configured
`
`to” which appears in Claims 1, 10, and 11, and “capable of” which appears in Claims
`
`15, 16, and 17. Paper 11 at 14. The Federal Circuit addressed the distinction
`
`between terms falling onto either side of a line in Parkervision, Inc. v. Qualcomm
`
`Inc., 903 F.3d 1354, 1361 (Fed. Cir. 2018). See also Aspex Eyewear, Inc. v. Marchon
`
`Eyewear, Inc., 672 F.3d 1335, 1349 (Fed. Cir. 2012) (recognizing the distinction
`
`between the narrower “configured to” and the broader “capable of”).
`
`For claims which are recited using “capable of” language, the Federal Circuit
`
`held that prior art other references are sufficient for invalidity if they “disclose[] an
`
`apparatus that is reasonably capable of operating so as to meet the claim limitations,
`
`even if it does not meet the claim limitations in all modes of operation.”
`
`12
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`Parkervision, 903 F.3d at 1361. This is consistent with the description of “capable
`
`of” being broader than “configured to” in Aspex. Aspex, 672 F.3d at 1349.
`
`In contrast, the Federal Circuit described that when the claim is written using
`
`“configured to”-type language, whether an accused product was “reasonable capable
`
`of being put into the claimed configuration was insufficient for a finding of
`
`infringement.” Parkervision, 903 F.3d at 1361. By the same token, in the context
`
`of invalidity, in order to invalidate a claim which is written with “configured to”
`
`language, the prior art must be more than just “capable of” being put into the claimed
`
`configuration. In re Giannelli, 739 F.3d 1375, 1379-80 (Fed. Cir. 2014) (finding
`
`that the Board’s conclusion that a function could be performed using the prior art
`
`was insufficient; the correct inquiry was whether it would have been obvious to
`
`modify the prior art to contain structure “adapted to” or configured to perform the
`
`function). This is consistent with the Federal Circuit’s earlier analogizing between
`
`this term, “configured to,” with “adapted to,” “made to,” or “designed to.” Id.; see
`
`also Aspex, 672 F.3d at 1349.
`
`Looking at the claims challenged in this proceeding, the Federal Circuit’s
`
`reasoning means that Claims 1, 10, and 11 should be construed to mean the claimed
`
`inventions are “configured to,” “designed to,” “adapted to,” or “made to” achieve
`
`what is claimed. Prior art that is “capable of” teaching the claimed configuration
`
`will not invalidate these claims unless a POSITA would have found it obvious that
`
`13
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`the prior art is not only “capable of” achieving the claimed configuration, but also
`
`renders obvious the narrower construction of “configured to.” Claims 15, 16, and
`
`17, therefore, should be construed such that prior art will not invalidate these claims
`
`unless the prior art is capable of achieving the claimed configuration.
`
`As discussed below, the prior art combination proposed in Apple’s single-
`
`challenge ground is not capable of, much less configured to, achieve the claimed
`
`configuration at least because a POSITA would not have combined the references,
`
`and even if they would have combined the references, the resulting combination
`
`would not teach, or render obvious, the capabilities of the claimed invention.
`
`V. THE PRIOR ART FAILS TO RENDER THE CHALLENGED CLAIMS
`OBVIOUS
`A. The Prior Art Does Not Teach the “Accessibility Attribute”
`Limitation
`1. Mathiassen Does Not Teach an “Accessibility Attribute”
`
`Apple’s position on the “accessibility attribute” limitation is muddied at best.
`
`As explained above, Apple successfully argued before the district court that such
`
`limitation should be construed as having both “whether” and “under which
`
`conditions” components to an access decision, eschewing a construction limited to
`
`a binary (yes/no) access decision. Ex. 2011, 26 (“The definition…goes beyond mere
`
`matching—the binary decision of ‘yes’ or ‘no’….”); see also id., 28 (“Binary
`
`matching—“match/no match”—is not what the inventor was trying to invent”).
`
`14
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`Now, however, Apple and its expert appear to argue that “accessibility attribute” can
`
`include a binary access decision. Paper 1 at 18-20.
`
`Specifically, according to Dr. Sears, the binary decision whether to unlock a
`
`car door using Mathiassen’s portable control, in addition to determining “whether”
`
`to grant access to the car, also constitutes determining “under which conditions”
`
`such “access should be granted,” as such access grant in the event of a fingerprint
`
`match is “unconditional.” Ex. 1003, ¶¶ 139-140. The only alternative to granting
`
`access is to deny access by aborting the process in the event that there is no
`
`fingerprint match. See id., ¶ 139. Such access does not provide any incremental
`
`condition to access beyond the “whether” inquiry, and Apple’s reading of
`
`Mathiassen consequently merges the “whether” and “under which conditions”
`
`components of its own construction of the “accessibility attribute” limitation.
`
`Dr. Sears, for his part, could not point to another type of accessibility attribute
`
`taught in Mathiassen, volunteering at deposition that Mathiassen somehow renders
`
`other accessibility attributes “obvious.” Ex. 2012, 60:1-12. Apart from the fact that
`
`Dr. Sears was not asked what Mathiassen by itself rendered obvious with regard to
`
`the “accessibility attribute,” neither Dr. Sears nor Apple ever raised Mathiassen as a
`
`15
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`single-reference obviousness challenge.4 As such, Apple should not be allowed to
`
`avail itself of that theory now. See, e.g., Intelligent Bio-Sys., Inc. v. Illumina
`
`Cambridge Ltd., 821 F.3d 1359, 1369 (Fed. Cir. 2016) (“It is of the utmost
`
`importance that petitioners in the IPR proceedings adhere to the requirement that the
`
`initial petition identify ‘with particularity’ the ‘evidence that supports the grounds
`
`for the challenge to each claim.’”) (citing 35 U.S.C. § 312 (a)(3)).
`
`The Board, in instituting this proceeding, adopted Apple’s reasoning which
`
`plainly ignores the “under which conditions” aspect of Apple’s own construction of
`
`“accessibility attribute:”
`
`Here, consistent with the proposed construction, Petitioner relies solely
`
`on Mathiassen to satisfy the proposed claim construction of an attribute
`
`that establishes whether and under which conditions access to the
`
`
`4 As Apple argues that, while “Mathiassen teaches portable door control outputting
`
`an encrypted command to grant access to the car door locks,” “McKeeth teaches
`
`outputting other signals indicating when a user is under duress or when a user is
`
`unauthorized,” and “[m]odifying Mathiassen’s portable control
`
`to output
`
`information indicating duress access and alert access, in addition to Mathiassen’s
`
`taught grant access . . . would have been obvious to a POSITA.” Paper No. 1 at 3
`
`(emphasis added).
`
`16
`
`

`

`controlled item should be granted to a user. If the processor 2 in
`
`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`
`Mathiassen does not find a match, then no access will be granted.
`
`That is all this clause of claim 1 requires.
`
`Paper No. 11 at 25 (emphasis added).
`
`In other words, the Board preliminarily found that the type of binary decision
`
`that Apple characterized as antithetical to the claimed invention in fact falls within
`
`the scope of the “accessibility attribute” limitation. Under the Board’s treatment of
`
`Mathiassen, a binary decision limited to access/abort satisfies both the “whether”
`
`and “under which conditions” requirement for “accessibility attribute.” This is
`
`inconsistent with the construction Apple fought for in the district court litigation,
`
`proposed in this proceeding, and adopted by the Board. Ex. 2011, 26; Paper 1 at 6;
`
`Paper 11 at 13.
`
`After Apple expended its energy championing a construction of “accessibility
`
`attribute” that excludes binary access decisions, it cannot now challenge the claims
`
`of the ʼ705 Patent based upon a construction that incorporates such a binary decision.
`
`The necessary result is that Mathiassen’s access/abort teaching does not correspond
`
`to an “accessibility attribute” under the controlling construction of that term, and any
`
`invalidity decision based upon such correspondence is simply wrong.
`
`17
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`There is No Motivation to Combine Apple’s Cited Prior Art
`to Arrive at the “Accessibility Attribute” as Properly
`Construed
`
`2.
`
`Recognizing that Mathiassen does not satisfy Apple’s construction of
`
`“accessibility attribute,” Dr. Sears falls back on the opinion that “Mathiassen in
`
`combination with McKeeth teaches outputting two or more accessibility attributes,”
`
`i.e., it is non-binary. See Ex. 1003, ¶ 143. The teaching from McKeeth to which Dr.
`
`Sears refers is a “geometric pattern (e.g., using a mouse)” that when incorrectly
`
`entered “concurrently with, or after a predetermined duration from, scanning his/her
`
`fingerprint,” allows for a duress signal. Ex. 1003, ¶ 145; Ex. 1005, 4:10-32.
`
`Apart from being a tacit admission that Mathiassen only teaches binary
`
`access, this opinion, to be cognizable, must rely upon a motivation to combine these
`
`two references going beyond improper hindsight reconstruction. See, e.g.,
`
`Ecolochem, Inc. v. Southern California Edison Co., 227 F.3d 1361, 1371 (Fed. Cir.
`
`2000) (citation omitted) (impermissible to use hindsight reconstruction to pick and
`
`choose among isolated disclosures in the prior art to deprecate the claimed
`
`invention).
`
`This purported combination presupposes that one would have thought it
`
`necessary to look beyond Mathiassen to add a duress signal to the existing
`
`fingerprint security thereof. However, as Dr. Sears notes, Mathiassen teaches finger
`
`movement that can provide for additional security. Ex. 1003, ¶ 86 (“Mathiassen
`
`18
`
`

`

`IPR2022-00602
`U.S. Patent No. 9,665,705
`
`teaches commands other than ‘open door’ may be implemented in the secure access
`
`control system by a user providing certain finger movements”). One such command
`
`could be to send a distress signal. Ex. 2012, 55:2-6. There would have been no
`
`reason, then, to look to McKeeth to modify Mathiassen in the fashion that Dr. Sears
`
`describes. See Kinetic Concepts, Inc. v. Smith & Nephew, Inc., 688 F.3d 1342, 1369
`
`(Fed. Cir. 2012); Ex. 201

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket