throbber
IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`Lehtovirta et al.
`In re Patent of:
`11,039,312
`U.S. Patent No.:
`June 15, 2021
`Issue Date:
`Appl. Serial No.: 17/153,522
`Filing Date:
`January 20, 2021
`Title:
`HANDLING OF MULTIPLE AUTHENTICATION
`PROCEDURES IN 5G
`
`Attorney Docket No. 50095-0100IP1
`
`Mail Stop Patent Board
`Patent Trial and Appeal Board
`U.S. Patent and Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`DECLARATION OF NARAYAN B. MANDAYAM, Ph.D.
`
`I declare that all statements made herein on my own knowledge are true and
`
`that all statements made on information and belief are believed to be true, and
`
`further, that these statements were made with the knowledge that willful false
`
`statements and the like so made are punishable by fine or imprisonment, or both,
`
`under Section 1001 of Title 18 of the United States Code.
`
`By: ________
`
`____
`
`Narayan B. Mandayam, Ph.D.
`
`Date: ______ April 1, 2022________
`
`1
`
`APPLE 1003
`
`

`

`Table of Contents
`Introduction ....................................................................................................... 8
`
`I.
`
`II. Background and Qualifications ........................................................................ 9
`
`III. Level of Ordinary Skill in the Art ................................................................... 14
`
`IV. Materials Considered and Relied Upon .......................................................... 15
`
`V.
`
`Legal Standards ............................................................................................... 17
`
`A.
`
`B.
`
`Anticipation ......................................................................................... 17
`
`Obviousness ......................................................................................... 18
`
`VI. Overview of the ’312 Patent ........................................................................... 19
`
`A.
`
`B.
`
`C.
`
`Subject Matter Overview .................................................................... 19
`
`File History of the ’312 Patent ............................................................ 29
`
`Interpretation of the ’312 Patent Claims at Issue ................................ 30
`
`VII. Overview of the Cited References .................................................................. 31
`
`A.
`
`Tiwari (EX1004) ................................................................................. 31
`
`1.
`
`Tiwari is entitled to a priority date of April 8, 2019
`(Dynamic Drinkware analysis) ................................................. 36
`TS 33.501 (EX1006) ........................................................................... 47
`
`B.
`
`C. Werner (EX1007) ................................................................................ 51
`
`D. Wang (EX1011) .................................................................................. 52
`
`E.
`
`F.
`
`G.
`
`Ground 1B: Combination of Tiwari and Werner ................................ 53
`
`Ground 1C: Combination of Tiwari and Wang................................... 57
`
`Ground 1D: Combination of Tiwari, Werner, and Wang ................... 59
`
`2
`
`

`

`[1Pre] A method by an Authentication Server Function, AUSF,
`of a home public land mobile network, PLMN, configured
`to communicate through an interface with electronic
`
`[1a] receiving a first authentication request from a first PLMN
`
`[1b] obtaining a first security key used for integrity protection of
`messages delivered from the home PLMN to the electronic
`device, wherein the first security key is obtained in
`response to successful authentication based on the first
`
`[1c] receiving a second authentication request from a second
`
`[1d] obtaining a second security key used for integrity protection
`of the messages delivered from the home PLMN to the
`electronic device, wherein the second security key is
`obtained in response to successful authentication based on
`
`H. Ground 1E: Combination of Tiwari and S3-172482 ........................... 61
`I.
`Ground 1F: Combination of Tiwari, S3-172482, and Werner ............ 64
`VIII. GROUNDS 1A – 1F ....................................................................................... 67
`A. Grounds 1A-1F: Tiwari alone or in combination with one or
`more references renders obvious claims 1-3, 6, 8-12, and 15-18 ....... 67
`devices, the method comprising:............................................... 67
`that is authenticating an electronic device; ............................... 70
`authentication request; .............................................................. 71
`PLMN that is authenticating the electronic device; .................. 72
`the second authentication request; ............................................ 73
`[1e] receiving a message protection request; ...................................... 73
`security key is a latest security key; and ................................... 74
`with the message protection request. ........................................ 75
`
`[1f] determining which of the first security key and the second
`
`[1g] using the latest security key to protect a message associated
`
`[2] The method of claim 1, further comprising: generating a first
`time stamp indicating a first time when the first security
`key is obtained and associating the first time stamp with
`the first security key; and generating a second time stamp
`indicating a second time when the second security key is
`
`
`
`3
`
`

`

`obtained and associating the second time stamp with the
`
`[3Pre] The method of claim 2, wherein determining which of the
`first security key and the second security key is the latest
`
`second security key. .................................................................. 75
`security key comprises: ............................................................. 77
`[3a] obtaining the first time stamp; ..................................................... 77
`[3b] obtaining the second time stamp; ................................................ 77
`key; and ..................................................................................... 78
`security key. .............................................................................. 78
`key. ............................................................................................ 79
`responsive to the second security key being stored. ................. 80
`update message. ........................................................................ 80
`comprising: ................................................................................ 81
`comprising: ................................................................................ 81
`
`[3c] responsive to the first time of the first time stamp being later
`than the second time of the second time stamp,
`determining that the first security key is the latest security
`
`[3d] responsive to the second time of the second time stamp
`being later than the first time of the first time stamp,
`determining that the second security key is the latest
`
`[6] The method of claim 1, further comprising: responsive to the
`first security key being the latest security key, deleting the
`second security key; and responsive to the second security
`key being the latest security key, deleting the first security
`
`[8] The method of claim 6 wherein deleting the second security
`key comprises deleting the second security key responsive
`to the first security key being stored and deleting the first
`security key comprises deleting the first security key
`
`[9] The method of claim 1, wherein the message protection
`request is a message protection request for one of a
`steering of roaming, SoR, message or a UE parameter
`
`[10Pre] An Authentication Server Function, AUSF, of a
`communications system that comprises a home public land
`mobile network, PLMN, configured to communicate
`through an interface with electronic devices, the AUSF
`
`[10a] at least one processor configured to perform operations
`
`
`
`4
`
`

`

`[10b] receiving a first authentication request from a first PLMN
`
`that is authenticating an electronic device; ............................... 82
`authentication based on the first authentication request; .......... 82
`PLMN that is authenticating the electronic device; .................. 83
`
`[10c] obtaining a first security key used for integrity protection
`of messages delivered from a home public land mobile
`network, PLMN, to the electronic device, wherein the first
`security key is obtained in response to successful
`
`[10d] receiving a second authentication request from a second
`
`[10e] obtaining a second security key used for integrity
`protection of the messages delivered from the home
`PLMN to the electronic device, wherein the second
`security key is obtained in response to successful
`authentication based on the second authentication request;
`
` ................................................................................................... 83
`[10f] receiving a message protection request; ..................................... 83
`security key is a latest security key; and ................................... 83
`with the message protection request. ........................................ 84
`
`[10g] determining which of the first security key and the second
`
`[10h] using the latest security key to protect a message associated
`
`[11] The AUSF of claim 10, wherein the at least one processor is
`configured to perform further operations comprising:
`generating a first time stamp when the first security key is
`obtained and associating the first time stamp with the first
`security key; and generating a second time stamp when the
`second security key is obtained and associating the second
`
`time stamp with the second security key. ................................. 84
`latest security key comprises: ................................................... 84
`first security key was obtained;................................................. 85
`when the second security key was obtained; ............................ 85
`
`[12Pre] The AUSF of claim 10, wherein determining which of
`the first security key and the second security key is the
`
`[12a] obtaining a first time stamp indicating a first time when the
`
`[12b] obtaining a second time stamp indicating a second time
`
`
`
`5
`
`

`

`[12c] responsive to the first time being later than the second time,
`determining that the first security key is the latest security
`
`[12d] responsive to the second time being later than the first time,
`determining that the second security key is the latest
`
`[15Pre] A method in an electronic device configured to
`communicate through a wireless air interface with a home
`public land mobile network, PLMN, and visiting PLMNs,
`
`[15a] transmitting a first authentication request to a first PLMN
`
`[15b] generating a first security key used for integrity protection
`of messages delivered from the home PLMN to the
`electronic device upon successful authentication based on
`
`[15c] transmitting a second authentication request to a second
`
`[15d] generating a second security key used for integrity
`protection of the messages delivered from the home
`PLMN
`to
`the electronic device upon successful
`authentication based on the second authentication request;
`
`key; and ..................................................................................... 85
`security key. .............................................................................. 85
`the method comprising: ............................................................. 86
`to authenticate the electronic device; ........................................ 88
`the first authentication request; ................................................. 89
`PLMN to authenticate the electronic device; ............................ 91
` ................................................................................................... 92
`[15e] receiving a protected message from the home PLMN; ............. 93
`security key is a latest security key; and ................................... 96
`message received from the home PLMN. ................................. 97
`steering of roaming message. .................................................... 98
`
`[15f] determining which of the first security key and the second
`
`[15g] using the latest security key to determine contents of a
`
`[16] The method of claim 15, wherein the protected message
`comprises one of a UDM parameter update message or a
`
`[17] The method of claim 15, further comprising: generating a
`first time stamp indicating a time when the first security
`key is generated and associating the first time stamp with
`the first security key; and generating a second time stamp
`indicating a time when the second security key is
`
`
`
`6
`
`

`

`generated and associating the second time stamp with the
`
`[18Pre] The method of claim 17, wherein determining which of
`the first security key and the second security key is the
`
`second security key. .................................................................. 99
`latest security key comprises: .................................................101
`[18a] obtaining the first time stamp; .................................................101
`[18b] obtaining the second time stamp; ............................................102
`key; and ...................................................................................102
`security key. ............................................................................103
`IX. Additional Remarks ....................................................................................103
`
`[18c] responsive to the first time of the first time stamp being
`later than the second time of the second time stamp,
`determining that the first security key is the latest security
`
`[18d] responsive to the second time of the second time stamp
`being later than the first time of the first time stamp,
`determining that the second security key is the latest
`
`
`
`
`
`
`
`
`
`
`
`7
`
`

`

`
`I, Narayan B. Mandayam, Ph.D., declare that:
`
`I.
`
`Introduction
`
`1. My name is Narayan B. Mandayam, and I have been retained by
`
`counsel for Petitioner Apple Inc. (“Apple” or “Petitioner”) as an expert witness to
`
`provide assistance regarding U.S. Patent No. 11,039,312 (“the ’312 Patent”).
`
`Specifically, I have been asked to consider the validity of claims 1-3, 6, 8-12, and
`
`15-18 of the ’312 Patent (the “Challenged Claims”) in view of prior art,
`
`anticipation and obviousness considerations, and understanding of a person of
`
`ordinary skill in the art at the time of the alleged invention (“POSITA”) as it relates
`
`to the ’312 Patent. I have personal knowledge of the facts and opinions set forth in
`
`this declaration and believe them to be true. If called upon to do so, I would testify
`
`competently thereto.
`
`2.
`
`I am being compensated for my time at my standard consulting rate. I
`
`am also being reimbursed for expenses that I incur during the course of this work.
`
`My compensation is not contingent upon the results of my study, the substance of
`
`my opinions, or the outcome of any proceeding involving the challenged claims. I
`
`have no financial interest in the outcome of this matter or on the pending litigation
`
`between Petitioner and Patent Owner.
`
`3. My analysis here is based on my years of education, research and
`
`experience, as well as my investigation and study of relevant materials, including
`8
`
`
`
`

`

`those cited herein.
`
`4.
`
`I may rely upon these materials, my knowledge and experience,
`
`and/or additional materials to rebut arguments raised by the Patent Owner.
`
`Further, I may also consider additional documents and information in forming any
`
`necessary opinions, including documents that may not yet have been provided to
`
`me.
`
`5. My analysis of the materials produced in this proceeding is ongoing
`
`and I will continue to review any new material as it is provided. This declaration
`
`represents only those opinions I have formed to date. I reserve the right to revise,
`
`supplement, and/or amend my opinions stated herein based on new information
`
`and on my continuing analysis of the materials already provided.
`
`II. Background and Qualifications
`
`6.
`
`I am a Distinguished Professor of Electrical and Computer
`
`Engineering at Rutgers University. My current curriculum vitae is included as
`
`Appendix A to this Declaration and some highlights follow.
`
`7.
`
`I received a bachelor degree (with Honors) in 1989 from the Indian
`
`Institute of Technology, Kharagpur, and M.S. and Ph.D. degrees in 1991 and 1994
`
`from Rice University, Houston, TX, all in electrical engineering.
`
`8.
`
`I was a Research Associate at the Wireless Information Network
`
`Laboratory (“WINLAB”), Department of Electrical and Computer Engineering,
`
`
`
`9
`
`

`

`Rutgers University, between 1994 and 1996. In September 1996, I joined the
`
`faculty of Department of Electrical & Computer Engineering at Rutgers where I
`
`became Associate Professor in 2001, Professor in 2003, and Distinguished
`
`Professor in 2014. I also served as the Peter D. Cherasia Endowed Faculty Scholar
`
`at Rutgers University from 2010 to 2014. Currently, I also serve as the Chair of
`
`the Electrical and Computer Engineering Department as well as Associate Director
`
`at WINLAB where I conduct research in various aspects of wireless systems and
`
`networks. I teach courses at Rutgers on the topics of Wireless System Design,
`
`Wireless Communication Technologies, Wireless Revolution, Detection and
`
`Estimation Theory and Introduction to Computing for Engineers. I was a visiting
`
`faculty fellow in the Department of Electrical Engineering at Princeton University
`
`in Fall 2002 and a visiting faculty at the Indian Institute of Science in Spring 2003.
`
`9. My research focuses on wireless networks and communications, and I
`
`have worked on various aspects of networking and wireless devices. Over the last
`
`25 years, I have published a wide range of articles on various aspects of wireless
`
`systems, including techniques for data transmission and multimedia
`
`communications, resource allocation strategies, algorithms for wireless security,
`
`mathematical modeling, and performance analysis. Using constructs from game
`
`theory, communications and networking, my work has focused on system
`
`modeling and performance, signal processing as well as radio resource
`
`
`
`10
`
`

`

`management for enabling wireless technologies to support various applications . I
`
`have coauthored two books on wireless networks (Principles of Cognitive Radio,
`
`Cambridge (2012) and Wireless Networks: Multiuser Detection in Cross-Layer
`
`Design, Springer (2005)), eight book chapters and published over 200 papers in
`
`prestigious international journals and conferences. I have also given numerous
`
`invited presentations at a variety of industry, government, and academic forums.
`
`10. Specifically, I have been doing research in various aspects of wireless
`
`data transmission for over 30 years addressing PHY, MAC, and Network layer
`
`issues. I have made seminal research contributions to wireless data
`
`communications on issues ranging from the systems level (such as power control,
`
`base station assignment, capacity evaluation, protocol design, medium access
`
`control, and radio resource management) to the physical layer (such as data
`
`transmission and reception). I have also done seminal work in the area of the PHY
`
`layer security, where properties of the radio channel are exploited for the purposes
`
`of key generation, authentication and encryption. My expertise includes cellular
`
`systems such as for 2G, 3G, 4G, and 5G, and I have published papers on a wide
`
`variety of topics related to the design and operation of GSM/TDMA, CDMA and
`
`LTE based systems. During this time, I have also worked extensively on wireless
`
`local area network (WLAN) technologies as well as wireless ad-hoc and sensor
`
`networks, and as such, I am quite familiar with 802.11 and Bluetooth.
`
`
`
`11
`
`

`

`11.
`
`I also teach both graduate and undergraduate courses at Rutgers where
`
`I introduce students to the wide area network (WAN) cellular and local area
`
`network (LAN) technologies mentioned above. I have also served as a technical
`
`consultant since its inception in 2002 to the company Mojo Networks Inc. (recently
`
`acquired by Arista Networks), a world leader in enterprise network security for
`
`WLANs that offers the next generation of intelligent edge, secure, and flexible Wi-
`
`Fi solutions. I am familiar with the early developments in the area of cellular
`
`systems (2G, 3G, 4G, and 5G) and have served on several graduate thesis defense
`
`committees pertaining to all aspects of wireless systems operation.
`
`12.
`
`I have received several prestigious awards relating to my research on
`
`wireless networks and communications: the 2015 IEEE COMSOC Advances in
`
`Communications Award for seminal work on power control in wireless data
`
`networks (this is the highest paper award given by the IEEE Communications
`
`Society to the most impactful publication in the preceding 15 years), the 2014
`
`IEEE Donald G. Fink Award (recognizes the most outstanding tutorial paper
`
`across all IEEE publications) for the paper titled “Frontiers of Wireless and Mobile
`
`Communications” that discusses the historical and future landscape of both WAN
`
`and LAN wireless technologies, and the Fred W. Ellersick Prize from the IEEE
`
`Communications Society in 2009 for work on dynamic spectrum access models
`
`and spectrum policy. I also received the Peter D. Cherasia Faculty Scholar Award
`
`
`
`12
`
`

`

`from Rutgers University in 2010, the National Science Foundation Career Award
`
`in 1998, the Institute Silver Medal from the Indian Institute of Technology,
`
`Kharagpur, in 1989 and its Distinguished Alumnus Award in 2018.
`
`13.
`
`I have served as an Editor for the journals IEEE Communication
`
`Letters (1999- 2002) and IEEE Transactions on Wireless Communications (2002-
`
`2004). I have also served as a guest editor of the IEEE JSAC Special Issues on
`
`Adaptive, Spectrum Agile and Cognitive Radio Networks (2007) and Game
`
`Theory in Communication Systems (2008). I was elected Fellow of the IEEE for
`
`“contributions to wireless data transmission.” I have also served as a
`
`Distinguished Lecturer of the IEEE Communications Society.
`
`14. My experience of over 30 years with networking and
`
`telecommunications in academic and practical situations as well as my hands on
`
`experience, has given me a detailed appreciation of the technology involved with
`
`the ’312 Patent.
`
`15.
`
`In writing this Declaration, I have considered the following: my own
`
`knowledge and experience, including my work experience in the above fields; my
`
`experience in teaching those subjects; and my experience in working with others
`
`involved in those fields. In addition, I have analyzed the following publications
`
`and materials, in addition to other materials I cite in my declaration.
`
`16. Based on my experiences described above, and as indicated in my
`
`
`
`13
`
`

`

`Curriculum Vitae, I am qualified to provide the following opinions with respect to
`
`the patents in this case. Additionally, I was at least a person having ordinary skill
`
`in the art as of the Critical Date of the ’312 Patent.
`
`III. Level of Ordinary Skill in the Art
`
`17.
`
`In rendering the opinions set forth in this declaration, I have been
`
`asked to consider the patent claims and the prior art through the eyes of a person of
`
`ordinary skill in the art (“POSITA”) at the time of the alleged invention, which I
`
`understand to be April 29, 2019 (“Critical Date”). A person of ordinary skill in the
`
`art as of the Critical Date of the ’312 Patent (hereinafter a “POSITA”) would have
`
`had at least a Bachelor’s degree in an academic area emphasizing electrical
`
`engineering or a similar discipline, and at least two years of experience in the field
`
`working with, teaching, or researching wireless communication networks.
`
`Superior education could compensate for a deficiency in work experience, and
`
`vice-versa. I base this on my own practical and educational experiences, including
`
`my knowledge of colleagues and others at the time.
`
`18.
`
`I am familiar with the knowledge and capabilities of a POSITA as
`
`noted above. Specifically, my experience working with industry, undergraduate
`
`and post-graduate students, colleagues from academia, and designers and engineers
`
`practicing in industry has allowed me to become directly and personally familiar
`
`with the level of skill of individuals and the general state of the art.
`
`
`
`14
`
`

`

`19. My opinions, as explained below, are based on my education,
`
`experience, and background in the fields discussed above. Unless otherwise stated,
`
`my testimony below refers to the knowledge of a POSITA in the fields as of the
`
`Critical Date.
`
`IV. Materials Considered and Relied Upon
`
`20.
`
`In reaching the conclusions described in this declaration, I have relied
`
`on the documents and materials cited herein as well as those identified in this
`
`declaration, including the ’312 Patent, the prosecution history of the ’312 Patent,
`
`and prior art references cited herein. These materials comprise patents, related
`
`documents, and printed publications. Each of these materials is a type of document
`
`that experts in my field would have reasonably relied upon when forming their
`
`opinions.
`
`21.
`
`I have also relied on my education, training, research, knowledge, and
`
`personal and professional experience in the relevant technologies and systems that
`
`were already in use prior to, and within the timeframe of the Critical Date of
`
`the ’312 Patent.
`
`
`
`EX1001: U.S. Patent No. 11,309,312 to Lehtovirta et al. (the “’312
`
`Patent”)
`
`
`
`
`
`
`
`EX1002:
`
`Excerpts from the Prosecution History of the ’312 Patent
`
`EX1004:
`
`International Publication No. 2020/208996 to Tiwari et
`
`15
`
`

`

`al. (“Tiwari”)
`
`
`
`EX1005:
`
`Indian Provisional Application No. 201941014041 (“the
`
`Tiwari provisional”)
`
`
`
`EX1006:
`
`3GPP TS 33.501 V15.3.1, Technical Specification, 3rd
`
`Generation Partnership Project; Technical Specification Group Services and
`
`System Aspects; Security architecture and procedures for 5G System (Release 15),
`
`December 2018 (“TS 33.501”)
`
`
`
`EX1007: U.S. Patent Pub. No. 2012/0310882 to Werner et al.
`
`(“Werner”)
`
`
`
`EX1008:
`
`International Publication No. 2020/179665 to De Kievit
`
`et al. (“De Kievit”)
`
`
`
`EX1009:
`
`3GPP TS 33.501 V15.0.0, Technical Specification, 3rd
`
`Generation Partnership Project; Technical Specification Group Services and
`
`System Aspects; Security architecture and procedures for 5G System (Release 15),
`
`March 2018 (“TS 33.501-V15.0.0”)
`
`
`
`EX1010:
`
`3GPP TS 23.501 V15.1.0, Technical Specification Group
`
`Services and System Aspects; System Architecture for the 5G System; Stage 2
`
`(Release 15) March 2018 (“TS 23.501-V15.1.0”)
`
`
`
`EX1011: U.S. Patent Pub. No. 2010/0064344 to Wang et al.
`
`(“Wang”)
`
`
`
`16
`
`

`

`
`
`EX1012: 3GPP TSG-SA WG3 Meeting #95, “KAUSF
`
`desynchronization problem and solutions,” NEC, Reno (USA), May 6-10, 2019,
`
`S3-19xyza (revision of S3-19xabc) (“S3-19xyza”)
`
`
`
`EX1013:
`
`3GPP TSG-SA WG3 Meeting #95, “KAUSF
`
`desynchronization problem and solutions – updated version after conf call on 25
`
`Apr.,” NEC, Reno (USA), May 6-10, 2019, S3-191204 (revision of S3-19xabc)
`
`(“S3-191204”)
`
`
`
`EX1014:
`
`3GPP TSG-SA WG3 (Security) Meeting #88Bis,
`
`“Discussion on protection of Network Steering Information,” Ericsson, Singapore,
`
`October 9-13, 2017, S3-172482 (revision of S3-17xabc) (“S3-172482”)
`
`
`
`EX1015: Declaration of Friedhelm Rodermund
`
`
`V. Legal Standards
`
`22.
`
`In forming my analysis and conclusions expressed in this declaration,
`
`I have applied the legal principles described in the following paragraphs, which
`
`were provided to me by counsel for the Petitioner.
`
`A. Anticipation
`
`23.
`
`I have been informed by counsel that a patent claim is invalid as
`
`“anticipated” under 35 U.S.C. § 102 if each and every element of a claim, as
`
`properly construed, is found either explicitly or inherently in a single prior art
`
`
`
`17
`
`

`

`reference. Under the principles of inherency, if the prior art necessarily functions
`
`in accordance with, or includes the claimed limitations, it anticipates.
`
`24.
`
`I have been informed by counsel that a claim is invalid under 35
`
`U.S.C. § 102(a)(1) if the claimed invention was patented, described in a printed
`
`publication, or in public use, on sale, or otherwise available to the public before the
`
`effective filing date of the claimed invention. I further have been informed that a
`
`claim is invalid under 35 U.S.C. § 102(a)(2) if the claimed invention was described
`
`in a patent issued under section 151, or in an application for patent published or
`
`deemed published under section 122(b), in which the patent or application, as the
`
`case may be, names another inventor and was effectively filed before the effective
`
`filing date of the claimed invention.
`
`B. Obviousness
`
`25.
`
`I have been informed by counsel that a patent claim is invalid as
`
`“obvious” under 35 U.S.C. § 103 in light of one or more prior art references if it
`
`would have been obvious to a person of ordinary skill in the art at the time of the
`
`alleged invention (“POSITA”), taking into account (1) the scope and content of the
`
`prior art, (2) the differences between the prior art and the claims, (3) the level of
`
`ordinary skill in the art, and (4) any so called “secondary considerations” of non-
`
`obviousness, which include: (i) “long felt need” for the claimed invention, (ii)
`
`commercial success attributable to the claimed invention, (iii) unexpected results
`
`
`
`18
`
`

`

`of the claimed invention, and (iv) “copying” of the claimed invention by others.
`
`26.
`
`I have been informed by counsel that a claim can be obvious in light
`
`of a single prior art reference or multiple prior art references. To be obvious in
`
`light of a single prior art reference or multiple prior art references, there must be a
`
`reason to modify the single prior art reference, or combine two or more references,
`
`in order to achieve the claimed invention. This reason may come from a teaching,
`
`suggestion, or motivation to combine, or may come from the reference or
`
`references themselves, the knowledge or “common sense” of one skilled in the art,
`
`or from the nature of the problem to be solved, and may be explicit or implicit
`
`from the prior art as a whole. I have been informed that the combination of
`
`familiar elements according to known methods is likely to be obvious when it does
`
`no more than yield predictable results. I also understand it is improper to rely on
`
`hindsight in making the obviousness determination.
`
`VI. Overview of the ’312 Patent
`
`A.
`
`Subject Matter Overview
`
`27. The ’312 Patent, which is titled “Handling of Multiple Authentication
`
`Procedures in 5G,” is related to a “method by an AUSF of a home PLMN
`
`configured to communicate through an interface with electronic devices.” EX1001,
`
`Title and Abstract.
`
`28.
`
`In the background section, the ’312 Patent explains that the “3GPP
`
`
`
`19
`
`

`

`security standardization working group SA3 has finalized the security specification
`
`for the Release 15 of the 5G System in TS 33.501.” Id., 1:23-25 (referencing
`
`EX1009)1. “The 5G System includes many new features that require the
`
`introduction of additional security mechanisms,” including “the 5G System
`
`integrat[ing] non-3GPP access (e.g. WLAN) alongside 3GPP access (New Radio
`
`and LTE) in a seamless manner.” Id., 1:25-30.
`
`29. The ’312 Patent indicates 3G security mechanisms described in TS
`
`33.501 “rely on multiple different security keys,” which are “organized in a
`
`hierarchy.” Id., 1:53-61. “A successful Primary Authentication between the UE
`
`and the AUSF in the Home PLMN may lead to the establishment of the KAUSF key
`
`which is the second level key in the hierarchy.” Id., 1:62-65. The KAUSF key “may
`
`be used for the integrity protection of the messages delivered from the Home
`
`PLMN to the UE,” including for new features such as the Steering of Roaming
`
`(SoR) and the UDM parameter delivery procedures. Id., 2:1-5. The ’312 Patent
`
`further acknowledges that Release 15 of TS 33.501 further defines other aspects of
`
`
`1 I note that while the ’312 Patent references Release 15 of TS 33.501, Applicant
`
`never cited any version of TS 33.501 in any Information Disclosure Statement, nor
`
`did the Patent Office ever acknowledge that it had considered any version of TS
`
`33.501 during prosecution of the ’312 Patent. See, generally, EX1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket