throbber
1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`KORULA T. CHERIAN (SBN 133697)
`ROBERT M. HARKINS, JR. (SBN 179525)
`RUYAKCHERIAN, LLP
`1936 University Ave, Suite 350
`Berkeley, CA 94704
`Telephone: (510) 944-0190
`sunnyc@ruyakcherian.com
`bobh@ruyakcherian.com
`
`JOHN L. NORTH, ESQ. (GA SBN: 545580) (pro hac vice motion to be filed)
`jln@hkw-law.com
`STEVEN G. HILL, ESQ. (GA SBN: 354658) (pro hac vice motion to be filed)
`sgh@hkw-law.com
`JERRY C. LIU, ESQ. (GA SBN: 454899) (pro hac vice motion to be filed)
`jl@hkw-law.com
`MARTHA L. DECKER, ESQ. (GA SBN: 420867) (pro hac vice motion to be filed)
`md@hkw-law.com
`HILL, KERTSCHER & WHARTON, LLP
`3625 Cumberland Blvd., Suite 1050
`Atlanta, GA 30339
`Tel: (770) 953-0995
`Fax: (770) 953-1358
`
`13
`
`Attorneys for R.N Nehushtan Trust Ltd.
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`UNITED STATES DISTRICT COURT
`
`NORTHERN DISTRICT OF CALIFORNIA
`
`SAN JOSE DIVISION
`
`R.N NEHUSHTAN TRUST LTD.,
`
`v.
`
`APPLE INC.,
`
`Plaintiff,
`
`Defendant.
`
`Case No. ____________________
`
`COMPLAINT FOR PATENT
`INFRINGEMENT
`
`R.N Nehushtan Trust Ltd. (“RNN Trust”) hereby institutes this patent litigation against
`
`Apple Inc. (“Apple”) for direct infringement of U.S. Patent Nos. 9,642,002 (the “002 Patent”) and
`
`9,635,544 (the “544 Patent”), attached as Exhibits A and B hereto. Apple’s cellular communication
`
`devices (including iPhones, Apple Watches and iPads) directly infringe one or more claims of each
`
`of these patents.
`
`- 1 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`APPLE 1010
`
`

`

`
`
`
`
`I.
`
`THE PARTIES
`
`1.
`
`RNN Trust is an Israeli Corporation, which holds all right, title and interest to the 544 and
`
`002 Patents, including all rights to sue for and recover on all past, present and future infringements
`
`of the 002 and 544 Patents.
`
`2.
`
`Apple is a California corporation with its headquarters located at 1 Infinite Loop, Cupertino
`
`California, 95014.
`
`3.
`
`Apple can be served this complaint via its registered agent, CT Corporation System, at 330
`
`N. Brand Blvd., Ste 700, Glendale, CA 91203.
`
`II.
`
`VENUE
`
`4.
`
`This Court has federal subject matter jurisdiction under 28 U.S.C. §§ 1331, 1338(a) as this
`
`action arises under the United States Patent laws, including but not limited to 35 U.S.C. § 271(a).
`
`5.
`
`This Court has personal jurisdiction over Apple as its headquarters lies in Cupertino
`
`California and, upon information and belief, a substantial amount of the infringing activity has
`
`taken place and currently takes place in this jurisdiction.
`
`6.
`
`Venue is appropriate in this jurisdiction under 28 U.S.C. § 1400(b) because Apple resides
`
`in this judicial district.
`
`III. BACKGROUND REGARDING THE 002 AND 544 PATENTS
`
`7.
`
`The 002 and 544 Patents are members of a family of patents that have a priority date
`
`spanning back to 2004. The invention took place during the nascent growth of the smart phone
`
`market.
`
`8.
`
`Rafi Nehushtan is the inventor of the 002 and 544 Patents. Rafi worked in the area of
`
`network security and foresaw problems associated with cloning and hacking of smart phones. The
`
`existent password technology did not adequately address these problems, as described in the
`
`specifications of the 002 and 544 Patents. For instance, the 002 Patent states,
`
`A security vulnerability exists in cellular devices. In even the most
`secure of current devices it is currently possible to read sensitive
`information from a cellular device (source) and write it into a new
`cellular device (destination) thus making the destination device
`identical to the source device with regards to the cellular network.
`
`- 2 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`
`
`This enables the destination device to make calls, which are then
`billed to the source device. Such sensitive information may include
`device information such as the network identity of the device. It may
`also include personal information such as the user’s personal
`telephone book.
`
`
`Exploiting the same vulnerability it is also possible to copy sensitive
`information from a source device to a destination device, thus
`enabling an end-user device upgrade without the know ledge of the
`cellular provider. Likewise it is possible to steal a device in one
`country and sell it in another country after a new operating system has
`been written into the stolen device.
`
`
`Col. 1, lines 25-42 (emphasis added).
`
`9.
`
`Rafi Nehushtan solved these problems and vulnerabilities through the development of
`
`cellular communication security technology that included, amongst other components, an access
`
`restrictor and a device unique security setting (“DUSS”) that would permit operating system and
`
`settings updates and the like once the access restrictor verified that the DUSS received with the
`
`update was correct.
`
`10.
`
`The 002 and 544 Patents describe in great deal the numerous ways in which the DUSS can
`
`be constructed, including from information derived from device unique information (e.g., electronic
`
`serial number or A-Key) in combination with random information. For instance, the 002 Patent
`
`states,
`
`In the following, the production of individual passwords or command
`codes is explained.
`
`Whether considering password values, read instructions, write
`instructions, DM code or other device commands which are to be
`changed or added, the values may be constructed as follows:
`
`The construction may use one or more random values, whether
`numeric, alphabetic, alphanumeric or any other. The random values
`may be memory areas in the device’s operating system or designated
`fields.
`
`The construction may use a value generated from the contents of the
`NUM field.
`
`The construction may use a value generated from the contents of the
`ESN field.
`
`
`- 3 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`
`
`The construction may use a value generated from the contents of the
`A-KEY field.
`
`The construction may use a value generated from the contents of the
`SSD field.
`
`The construction may use a product or a function of the contents of
`one or more of the following value fields:
`
`NUM field,
`ESN field,
`A-KEY field,
`SSD field, and
`
` a
`
` random value or random values. The random values may be
`memory areas in the device's operating system or designated fields as
`before.
`
`The construction may further use a value generated from an algorithm
`which is time-dependent and generates a different code for every
`second, minute or time interval. Further variation or alternative
`variation may then be introduced into the result based upon for
`example one or more of the following:
`
`Time.
`Challenge-response from the device's keypad.
`NUM field,
`ESN field,
`A-KEY field,
`SSD field,
`
` A
`
` random value or random values (The random values may be
`memory areas in the device's operating system or designated fields),
`and
`
` A
`
` seed value or values.
`
`
`The above described value is hereinafter designated ALGI.
`
`The value can be changed every time the device is connected to the
`system so that a one-time password, command or code results.
`
`
`Col. 12, lines 9-56 (emphasis added).
`
`- 4 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`
`
`1
`
`11.
`
`The 002 and 544 Patents also provide numerous and detailed examples of how the inventive
`
`2
`
`technology could be implemented. For instance, the 002 Patent describes the use of the inventive
`
`3
`
`technology for device initialization as follows:
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`Device Initialization:
`Device initialization according to the preferred embodiments
`comprises writing a new ESN to the database, reading the A-KEY
`from the database, generating a new password for the device from a
`function of one or more of the NUM, ESN, A-KEY fields and random
`values, writing the password to the database, and setting the password
`in the device. Setting the password comprises sending the appropriate
`commands in data packets which, when written into the interface to
`which the cellular device is connected, are able to affect a password
`change. The server then waits for the appropriate response from the
`cellular device as received from the client program, makes additional
`necessary changes to the device and, if needed, replaces the operating
`system.
`
`
`Col. 20, lines 43-57 (emphasis added).
`
`13
`
`12.
`
`The claims of the 002 and 544 Patents specifically describe and encompass the inventive
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`technology, including Claim 5 of the 002 Patent as follows:
`
`A cellular communication device comprising a processor, a memory
`and a data mode, said data mode allowing reading and writing of data
`in said memory and changing of settings on said cellular
`communication device, said settings comprising personal data,
`cellular communication device configuration data and technical data
`relating to the cellular communication device; wherein
`
`said cellular communication device also comprises an access
`restrictor to restrict use of said data mode in accordance with a device
`unique security setting, the device unique security setting provided
`remotely to said cellular communication device using a predetermined
`security protocol;
`
`said device unique security setting is obtained remotely and provided
`to the cellular communication device before the data mode is used;
`
`said data mode permits actions comprising uploading, maintaining or
`replacing an operating system in said cellular communication device
`that are provided by a cellular provider using an active connection;
`the device further being configured to carry out one member of the
`group consisting of:
`
`
`- 5 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`

`

`
`
`enabling said cellular communication device to use said data mode
`when it is determined that said device unique security setting is
`correct; and
`
`disabling use of said data mode when said active connection is no
`longer active.
`
`
`(Emphasis added.)
`
`13.
`
`Claim 5, and the other claims of the 002 and 544 Patents, provide a technical improvement
`
`over the conventional technology then existent for securing cellular communication devices. The
`
`elements or combination of the elements of the claims describe security technology that was not
`
`well-understood, routine or conventional.
`
`IV. COUNT I: DIRECT INFRINGEMENT OF THE 002 PATENT
`
`RNN Trust incorporates herein by reference Paragraphs 1 - 13, as if stated herein.
`
`Apple has made, offered for sale and sold cellular communications devices for at least the
`
`14.
`
`15.
`
`last six years that directly infringe at least Claim 5 of the 002 Patent in violation of 35 U.S.C. §
`
`271(a). These devices include i-Phones, iPads and Apple Watches including the models identified in
`
`the charts attached hereto as Exhibits C-E (the “Accused Products”).
`
`16.
`
`The charts attached hereto as Exhibits C-E set forth evidence establishing that the Apple
`
`Accused Products meet each and every limitation of Claim 5 of the 002 Patent.
`
`17.
`
`The infringements by the Accused Products of the 002 Patent have proximately caused
`
`injury to RNN Trust in an amount to be calculated by a reasonable royalty.
`
`V. COUNT II: DIRECT INFRINGEMENT OF THE 544 PATENT
`
`RNN Trust incorporates herein by reference Paragraphs 1 - 13, as if stated herein.
`
`Apple has made, offered for sale and sold Accused Products for at least the last six years
`
`18.
`
`19.
`
`that directly infringe at least Claim 17 of the 544 Patent in violation of 35 U.S.C. § 271(a).
`
`20.
`
`The charts attached hereto as Exhibits F-H hereto set forth evidence that the Apple Accused
`
`Products meet each and every limitation of Claim 17 of the 544 Patent.
`
`21.
`
`The infringements by the Accused Products of the 544 Patent have proximately caused
`
`injury to RNN Trust in an amount to be calculated by a reasonable royalty.
`
`- 6 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`

`

`
`
`1
`
`PRAYER FOR RELIEF
`
`2
`
`
`
`WHEREFORE, RNN Trust prays that it be awarded the following relief:
`
`1. A reasonable royalty based on Apple’s past, present and future making, offer for sale
`
`and sale of the Accused Products, going back the last six years.
`
`2. Interest on the reasonable royalty amount for past infringements.
`
`3. Such other relief as this Court may deem just and appropriate.
`
`JURY DEMAND
`
`RNN Trust hereby demands a trial by jury on all issues triable to a jury.
`
`
`
`
`
`DATED: March 23, 2022
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/s/Robert Harkins
`Korula T. Cherian, Cal. Bar No. 133697
`Robert Harkins, Cal. Bar No. 179525
`RUYAKCHERIAN LLP
`1936 University Ave, Ste 350
`Berkeley, CA 94704
`Telephone: (510) 944-0190
`sunnyc@ruyakcherian.com
`bobh@ruyakcherian.com
`
`Attorneys for Plaintiff R.N Nehushtan Trust Ltd.
`
`- 7 -
`COMPLAINT FOR PATENT INFRINGEMENT
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket