throbber
Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 1 of 20
`
`UNITED STATES DISTRICT COURT
`WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`
`
`Civil Action No. 6:23-cv-00319-ADA
`
`
`PROXENSE, LLC,
`
`
`Plaintiff,
`
`
`
`
`
`v.
`
`
`
`
`MICROSOFT, CORP.,
`
`Defendant.
`
`
`
`PLAINTIFF PROXENSE, LLC’s RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`
`Patent Owner Exhibit 2006, Page 1 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 2 of 20
`
`TABLE OF CONTENTS
`INTRODUCTION ............................................................................................................... 1
`
`THE CLAIMED INVENTIONS ......................................................................................... 1
`
`LEVEL OF ORDINARY SKILL IN THE ART ................................................................. 2
`
`AGREED CONSTRUCTIONS ........................................................................................... 2
`
`CONSTRUCTION OF DISPUTED TERMS ...................................................................... 3
`
`I.
`
`II.
`
`III.
`
`IV.
`
`V.
`
`A.
`
`FAMILY A ................................................................................................................. 3
`
`1.
`
`2.
`
`“access message” (730:1, 15; 954, 1; 905:1) ............................................... 3
`
`“wherein the biometric data and the scan data are both based on a
`fingerprint scan by the user” (730:5) ........................................................... 8
`
`B.
`
`FAMILY B ............................................................................................................... 10
`
`1.
`
`2.
`
`“personal digital key” (042:10) ................................................................. 10
`
`“receiver-decoder circuit” (042:10; 289:14, 16) ........................................ 12
`
`VI.
`
`CONCLUSION ................................................................................................................. 15
`
`
`
`
`
`
`
`
`
`
`
`i
`
`Patent Owner Exhibit 2006, Page 2 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 3 of 20
`
`TABLE OF AUTHORITIES
`
`Cases
`
`Athletic Alts., Inc. v. Prince Mfg.,
`73 F.3d 1573 (Fed. Cir. 1996) ..................................................................................................... 6
`
`Page(s)
`
`
`Comark Commc’ns, Inc. v. Harris Corp.,
`156 F.3d 1182 (Fed. Cir. 1998) ................................................................................................. 12
`
`
`Constant v. Advanced Micro-Devices, Inc.,
`848 F.2d 1560 (Fed. Cir. 1988) ................................................................................................. 12
`
`
`Cordis Corp. v. Bos. Sci. Corp.,
`561 F.3d 1319 (Fed. Cir. 2009) ................................................................................................... 6
`
`
`Helmsderfer v. Bobrick Washroom Equip., Inc.,
`527 F.3d 1379 (Fed. Cir. 2008) ............................................................................................... 4, 5
`
`
`Innova/Pure Water, Inc. v. Safari Water Filtration Sys., Inc.,
` 381 F.3d 1111 (Fed. Cir. 2004) ................................................................................................... 6
`
`INVT SPE LLC v. Int'l Trade Comm'n.,
`46 F.4th 1361(Fed. Cir. 2022) ..................................................................................................... 7
`
`
`Liebel-Flarsheim Co. v. Medrad, Inc.,
`358 F.3d 898 (Fed. Cir. 2004) ................................................................................................... 14
`
`
`Linear Technology Corp. v. International Trade Commission,
`566 F.3d 1049 (Fed. Cir. 2009) ................................................................................................. 14
`
`
`Phillips v. AWH Corp.,
`415 F.3d 1303 (Fed. Cir. 2005) ..................................................................................... 3, 6, 8, 10
`
`
`Renishaw PLC v. Marposs Societa’ per Azioni,
`158 F.3d 1243 (Fed. Cir. 1998) ................................................................................................... 7
`
`
`Tinnus Enterprises, LLC v. Telebrands Corp.,
`733 F. App'x 1011 (Fed. Cir. 2018) ............................................................................................ 9
`
`
`
`
`
`
`ii
`
`Patent Owner Exhibit 2006, Page 3 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 4 of 20
`
`I.
`
`INTRODUCTION
`
`The Court has already construed every single term that Defendant Microsoft Corporation
`
`(“Microsoft”) now seeks to re-construe. In the earlier case Proxense, LLC v. Samsung Electronics
`
`Co., Ltd. et al., 6:21-cv-00210-ADA (W.D. Tex.) (hereinafter, “Proxense v. Samsung”), this Court
`
`agreed with Proxense’s proposed constructions for all of the terms in this proceeding. See id. ECF
`
`No. 43 (Claim Construction Order); ECF 149 (Claim Construction Opinion). Proxense requests
`
`that the Court simply adopt its prior rulings on these terms. On the other hand, Microsoft’s
`
`proposed constructions are nearly identical or outright identical to the constructions that this Court
`
`rejected when Samsung presented the same arguments in Proxense v. Samsung. Proxense’s
`
`proposed constructions are supported by the claims and the specifications. In contrast, Microsoft’s
`
`proposed constructions impermissibly change the meaning of claims, add claim limitations, and
`
`inject unnecessary confusing language into the claims. Further, Microsoft’s rationale for its
`
`proposed constructions provides no new credible evidence or arguments that challenge the Court’s
`
`previous determinations. The Court should adopt its prior constructions from Proxense v.
`
`Samsung.
`
`II.
`
`THE CLAIMED INVENTIONS
`
`The inventions set forth in the patents-in-suit (U.S. Patent Nos. 8,352,730 (the “730
`
`Patent”), 8,886,954 (the “954 Patent”), and 9,298,905 (the “905 Patent”) (collectively, “Family
`
`A”) and U.S. Patent Nos. 8,646,042 (the “042 Patent”), 9,679,289 (the “289 Patent”) and
`
`10,073,960 (the “960 Patent”) (collectively, “Family B”) allow users to carry, control, and protect
`
`their own personal data on devices like mobile phones, which allows for secure transactions and
`
`authentication using those devices. Biometric authentication and use of remote (e.g., web-based)
`
`applications requires trust between the user and the service provider. The user must trust that the
`
`service provider can and will protect personal data and that the service provider will not abuse
`
`
`
`1
`
`Patent Owner Exhibit 2006, Page 4 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 5 of 20
`
`such data. Utilizing online services—including social media, office, productivity, financial, travel,
`
`and other similar services—requires the user to trust that the service provider will safeguard the
`
`personally identifying information that a user provides using the service. Such information could
`
`include biometric data used, for example, as a means of verifying an authorized user’s identity.
`
`Safeguarding and limiting the information that is shared with multiple service providers is a
`
`necessity. The inventions of the patents-in-suit address these issues by providing ways to use
`
`biometric information securely to access and/or utilize private, sensitive information.
`
`Family A is directed to inventions ensuring biometric data privacy while enabling
`
`biometric authentication. The claimed inventions improve on the prior art by providing for
`
`multiple levels of authentication, such that a user is verified as properly in possession of a
`
`biometric access instrumentality, and also biometrically verified as authorized to access sensitive
`
`and/or secure resources. Family B is directed to inventions that improve the capabilities and
`
`flexible arrangements of multiple devices and instrumentalities that are used to provide means of
`
`authorized access to access sensitive and/or secure resources while retaining security.
`
`III. LEVEL OF ORDINARY SKILL IN THE ART
`
`Proxense submits that a person of ordinary skill in the art would have a bachelor’s degree
`
`in computer or electrical engineering (or an equivalent degree) with at least three years of
`
`experience in the field of encryption and security (or an equivalent). This level of skill is
`
`approximate, and more experience would compensate for less formal education, and vice versa.
`
`IV. AGREED CONSTRUCTIONS
`
`The parties have agreed to the following constructions from the Court’s Claim
`
`Construction Order in Proxense v. Samsung:
`
`
`
`
`
`
`
`2
`
`Patent Owner Exhibit 2006, Page 5 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 6 of 20
`
`Term
`
`Patents
`
`Agreed Construction
`
`“ID code”/“device ID code”
`
`“hybrid device”
`
`730 Patent, claims 1, 3, 15;
`954 Patent, claims 1, 3;
`905 Patent, claims 1, 2
`
`042 Patent, claim 10;
`289 Patent, claims 14, 16
`
`A unique code identifying a
`device
`
`A device comprising an
`integrated personal digital
`key (PDK) and an integrated
`receiver-decoder circuit
`
`V.
`
`CONSTRUCTION OF DISPUTED TERMS
`
`A.
`
`Family A
`
`1.
`
`“access message” (730:1, 15; 954, 1; 905:1)
`Proxense’s Construction
`Microsoft’s Construction
`Adopts the Court’s Construction in Proxense v. Samsung:
`a message enabling access
`
`A signal or notification enabling or announcing access
`The Court has already construed the term “access message” in Proxense v. Samsung,
`
`holding that the term “can have the effect of moving the user to the next step of providing
`
`information (like providing the user’s age), which is more than just enabling access.” Proxense
`
`v. Samsung, ECF. No. 149 at 21 (emphasis added). The Court further agreed with Proxense that
`
`“‘access message’ is broader than a message that allows access.” Id. (emphasis added).
`
`Nevertheless, Microsoft requests that the Court adopt essentially the same, narrow
`
`construction the Court previously rejected. In particular, Microsoft requests a construction
`
`wherein an access message is limited to a message that enables access to be permitted. But the
`
`Court’s prior construction includes an access message that (1) announces that access was permitted
`
`and (2) can be a signal or notification. The claim language and specification demonstrated that
`
`the broader construction that the Court previously adopted is correct. See id. at 22 (holding that
`
`the term “suggests that it can serve to notify the user of access, not just enable access”).
`
`Claims “must be construed so as to be consistent with the specification, of which they are
`
`a part.” Phillips v. AWH Corp., 415 F.3d 1303, 1316 (Fed. Cir. 2005) (en banc). The specification
`3
`
`Patent Owner Exhibit 2006, Page 6 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 7 of 20
`
`of the Family A patents contains numerous examples that describe an “access message” as a signal
`
`or notification that enables access, and that also provide an announcement that access is
`
`enabled. Microsoft’s proposed construction, however,
`
`improperly excludes
`
`the
`
`latter
`
`embodiments from the claim. See Helmsderfer v. Bobrick Washroom Equip., Inc., 527 F.3d 1379,
`
`1383 (Fed. Cir. 2008) (“[O]ur court has cautioned against interpreting a claim term in a way that
`
`excludes disclosed embodiments, when that term has multiple ordinary meanings consistent with
`
`the intrinsic record.”).
`
`The claim language itself (“receiving an access message from the agent allowing the user
`
`access to an application . . .”) shows that “access message” is broader than a message that simply
`
`allows access. The word “allowing” as used in this context can be understood to mean both “causes
`
`access to be permitted” and “announces that access is permitted.” The step of receiving a
`
`notification that the agent has allowed access then permits the application to move to a next step
`
`(e.g., check appropriate age before granting access) or inform a party that access was permitted
`
`(e.g., pop up a window to inform a user).
`
`The specification discloses several examples of “access message” having an effect other
`
`than permitting access. For example, an “access message” that provides an announcement that
`
`access is enabled can be an LED (“In one embodiment, LED 130 can also confirm that . . .
`
`authentication has completed.”, 730 Patent 3:33-35; 954 Patent 4:26-28; 905 Patent 4:28-30) or a
`
`pop-up window (“Response to successful authentication of the key, access is allowed 470 to
`
`application. In the slot machine example, a new pop-up window can be spawned to indicate a
`
`successful age verification.”, 730 Patent 6:28-31; 954 Patent 7:23-26; 905 Patent 7:28-29). Other
`
`embodiments disclose that the “access message” can also be one that leads an element of the
`
`system to enable access (e.g., “Authentication module 310 can send a message to application 330,
`
`or otherwise allow access to the application, responsive to a successful authentication by trusted
`
`
`
`4
`
`Patent Owner Exhibit 2006, Page 7 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 8 of 20
`
`key authority 320.”, 730 Patent 5:23-26; 954 Patent 6:15-17; 905 Patent 6:17-19); (“In one
`
`embodiment, application module 330 allows access by a user after receiving a message from
`
`authentication module 310.”, 730 Patent 5:34-36; 954 Patent 6:29-31; 905 Patent 6:31-33). In
`
`another embodiment, access message has the effect of moving to the next step to ask for more
`
`information: “If authentication is successful, the trusted key authority sends an access message to
`
`the application to allow user access and/or provide additional information from the profile (such
`
`as the user’s age).” E.g., 730 Patent 7:18-21.
`
`Moreover, “access message” appears in claims 1, 9, and 13 of the 905 Patent where it
`
`“indicat[es] that the third-party trusted authority successfully authenticated the ID code.” Claim
`
`12 of the 730 Patent recites the steps of receiving an “access message” and allowing access “in
`
`response to a positive access message” as entirely separate steps. These examples are most
`
`consistent with a construction that the access message can be “indicating” (i.e., announcing) that
`
`access is enabled, but can also have an enabling function (as in Proxense’s proposed construction).
`
`This Court already found that “language of ‘indicates’ suggests that [the access message] can serve
`
`to notify the user of access, not just enable access.” Proxense v. Samsung ECF. No. 149 at 21-22.
`
`Microsoft spends much of its briefing on this term ignoring the embodiments described
`
`above that show that an access message can announce access, instead pointing only to examples
`
`within the Family A Patents that show an access message enabling access. This disregards the
`
`context surrounding use of the term, which this Court in Proxense v. Samsung found helpful
`
`previously. Id. Microsoft also argues that: (1) the 730 Patent “describes ‘access message’ in only
`
`one manner in the entire specification” – enabling access, (2) the statement “[t]he user is allowed
`
`access responsive to receipt of an access message from the agent that authenticates the code” made
`
`during prosecution somehow excludes announcing access, and (3) Proxense’s proposed
`
`construction is illogical, as it calls for “announcing access” without requiring granting access. Op.
`
`
`
`5
`
`Patent Owner Exhibit 2006, Page 8 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 9 of 20
`
`Br. at 4-7. None of these arguments prove that the access message does not announce access.
`
`First, for reasons already discussed above with respect to the LED, the pop-up window,
`
`and an access message being used to move to the next step to ask for more information, the access
`
`message is described in more than one manner. In addition to enabling access, it can announce
`
`access, “which is more than just enabling access.” Proxense v. Samsung, ECF 149 at 21
`
`(emphasis added).
`
`Second, the statement “[t]he user is allowed access responsive to receipt of an access
`
`message from the agent that authenticates the code” made during prosecution does not exclude
`
`“announcing access” from the claimed invention. Microsoft asserts that this statement excludes
`
`“announcing access” because “‘announcing access’ was never discussed” in this statement or
`
`during prosecution. Op. Br. at 7. However, To disavow or disclaim the full scope of a claim term,
`
`the patentee’s statements in the prosecution history must amount to a “clear and unmistakable”
`
`surrender. Cordis Corp. v. Bos. Sci. Corp., 561 F.3d 1319, 1329 (Fed. Cir. 2009). But the above
`
`statement was about one embodiment of the claimed invention. See e.g. Innova/Pure Water, Inc.
`
`v. Safari Water Filtration Sys., Inc., 381 F.3d 1111, 1117 (Fed. Cir. 2004). It was not intended to
`
`cover the full scope of the “access message” term – the specification provides the full scope of the
`
`term through its several embodiments; not via a single embodiment as Microsoft asserts. Further,
`
`this statement does not explicitly exclude “announcing access.” There was no disavowal by
`
`Proxense to limit the claim term to only “enabling access.” Moreover, the specification of the
`
`Family A patents is clear that announcing access is within the scope of the term. Therefore, this
`
`statement made during prosecution does not carry more weight that the Family A specification and
`
`does not limit the term. Phillips, 415 F.3d at 1318 (“because the prosecution history represents an
`
`ongoing negotiation between the PTO and the applicant, rather than the final product of that
`
`negotiation, it often lacks the clarity of the specification and thus is less useful for claim
`
`
`
`6
`
`Patent Owner Exhibit 2006, Page 9 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 10 of 20
`
`construction purposes.”); see also Athletic Alts., Inc. v. Prince Mfg., 73 F.3d 1573, 1580 (Fed. Cir.
`
`1996) (ambiguous prosecution history may be “unhelpful as an interpretive resource”).
`
`Third, Microsoft calls Proxense’s proposed construction, as previously adopted by the
`
`Court, “illogical” as:
`
`[t]here is no alternate signal that Proxense proposes as the message enabling access,
`other than “access message.” So if, as Proxense proposes, “access message” can be
`either a “signal or notification enabling access” or a “signal or notification
`announcing access,” then, in instances where “access message” acts as an
`announcement, there would be no signal that enables access—making that
`announcement incorrect.
`
`Op. Br. at 6 (emphasis in original). Microsoft argues that if there is an access message that
`
`announces access, there cannot be a separate access message that enables access. Nothing within
`
`the Family A claims supports this view. Renishaw PLC v. Marposs Societa’ per Azioni, 158 F.3d
`
`1243, 1248 (Fed. Cir. 1998) (“[t]he claim construction inquiry . . . begins and ends in all cases
`
`with the actual words of the claim.”). There is no claim limitation or teaching within the
`
`specification that limits the number of access messages sent or received. There is no explicit
`
`disclosure that states that if there is an access message that enables access there cannot be another
`
`access message that announces access or vice versa. The mere fact that an action is not required
`
`by a claim does not mean that the action is expressly excluded from the environment within which
`
`the claimed invention operates. INVT SPE LLC v. Int'l Trade Comm'n, 46 F.4th 1361, 1374-75
`
`(Fed. Cir. 2022). Further, there is nothing requiring that an access message for enabling access
`
`must be sent if an access message for announcing is sent or vice versa. No such disclosure exists
`
`in the Family A patents. Proxense’s proposed construction allows for either type (enabling or
`
`announcing access) which is what the claim requires and is appropriate based on the disclosures
`
`within the Family A patents.
`
`Furthermore, “access message” being construed as a “signal or notification” is appropriate
`
`based on the disclosure of the Family A Patents. As disclosed in the specification, an LED can be
`
`7
`
`Patent Owner Exhibit 2006, Page 10 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 11 of 20
`
`a signal when illuminated to “confirm that . . . authentication has completed.” 730 Patent 3:33-
`
`35; 954 Patent 4:26-28; 905 Patent 4:28-30. Also, a pop-up window can be a notification “to
`
`indicate a successful age verification.” 730 Patent 6:28-31; 954 Patent 7:23-26; 905 Patent 7:28-
`
`29. Microsoft ignores these embodiments, improperly concluding there is no support for this
`
`construction because the term “notification” does not appear in the Family A patents while
`
`attempting to create a limitation that the term “signal” must be used to describe the access message.
`
`Op. Br. At 7. However, Microsoft’s added limitations and simple word search are insufficient to
`
`support their assertions. A claim term is construed according to its ordinary and accustomed
`
`meaning as understood by one of ordinary skill in the art at the time of the invention in the context
`
`of the patent and intrinsic record. Phillips, 415 F.3d at 1312–14. Here, one of ordinary skill in the
`
`art would understand that an access message comprises a signal or notification based on the
`
`disclosure within the Family A patents.
`
`In short, Microsoft’s proposed construction should be rejected for the same reasons that it
`
`was rejected when Samsung presented it in Proxense v. Samsung. Microsoft provides no new
`
`credible evidence or arguments that could disturb the Court’s previous construction. The Court
`
`should thus adopt its prior construction of “access message” here.
`
`2.
`“wherein the biometric data and the scan data are both based on a
`fingerprint scan by the user” (730:5)
`Proxense’s Construction
`Adopts the Court’s Construction in Proxense v. Samsung:
`
`No construction needed, plain and ordinary meaning
`Microsoft again makes the same argument that this Court rejected in Proxense v. Samsung.
`
`Microsoft’s Construction
`Invalid under §112 ¶4
`
`See Proxense v. Samsung, ECF 149 at 22. Dependent claim 5 is not invalid; it properly reduces the
`
`number of possible fingerprints from those intrinsic to the “palm print” or “hand geometry” of
`
`independent claim 1.
`
`Claim 1 of the 730 Patent describes multiple categories of “biometric data” as “selected
`8
`
`
`
`Patent Owner Exhibit 2006, Page 11 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 12 of 20
`
`from a group consisting of a palm print, a retinal scan, an iris scan, a hand geometry, a facial
`
`recognition, a signature recognition and a voice recognition.” In its briefing, Microsoft raises the
`
`same arguments the Court already considered and rejected, asserting that Claim 5 “broaden[s] []
`
`the Markush group in claim 1 to include the term ‘fingerprint[.]’” Op. Br. at 10. But as the Court
`
`held in Proxense v. Samsung, Claim 5 of the 730 Patent:
`
`properly narrows the scope of “biometric data” to a single “fingerprint.” The plain
`and ordinary meaning of “palm print” would be understood to include some
`combination of prints from the heel and/or flat of the hand, with multiple
`fingerprints and/or a thumb print (see, e.g., 730 Patent 3:4-11, expanding exemplary
`biometric data from “fingerprint” to additional metrics like an entire “palm print”;
`id. at 3:29-33, indicating that biometric data capture could include thumb or other
`fingerprints). Id. at 24 (emphasis added).
`
`There is no need for the Court to hold any differently in this case or to re-construe this
`
`term. Microsoft has not shown any evidence—intrinsic or extrinsic—that suggests that a person
`
`of ordinary skill in the art would not understand “‘palm print’ . . . to include some combination of
`
`prints from the heel and/or flat of the hand, with multiple fingerprints and/or a thumb print.” Id.
`
`Microsoft simply just asserts that to be true. Microsoft’s assertion is wrong. Its argument rests on
`
`the same “inaccurate premises” that Samsung raised in Proxense v. Samsung, namely, that “a
`
`person of ordinary skill in the art would not understand that the plain and ordinary meaning of
`
`‘palm print’ includes multiple fingerprints and/or a thumb print,” and that “the Examiner’s
`
`Amendment that added the Markush group to claim 1 . . . caused dependent claim 5 . . . to become
`
`indefinite.” Proxense v. Samsung, ECF 149 at 24. As the Court already held—and as Proxense re-
`
`submits here in response to Microsoft’s repeat of this argument—“[b]oth premises collapse under
`
`the well-established presumption ‘that an examiner would not introduce an indefinite term into a
`
`claim when he/she chooses to amend the claim for the very purpose of putting the application in a
`
`condition for allowance.’” Id. (citing Tinnus Enterprises, LLC v. Telebrands Corp., 733 F. App'x
`
`1011, 1020 (Fed. Cir. 2018)).
`
`
`
`9
`
`Patent Owner Exhibit 2006, Page 12 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 13 of 20
`
`The incorrectness of Microsoft’s position is further confirmed by the Federal Bureau of
`
`Investigation (“FBI”)’s definition of “palm print,” which confirms that the plain and ordinary
`
`meaning of the term is one of the “area extending from the top of the wrist bracelet to the tips of
`
`the fingers” and provides a figure illustrating the same. Ex. A at 2. Proxense’s construction is
`
`consistent with the FBI’s definition of palm print as well as the Court’s prior rulings. Microsoft’s
`
`arguments fail to challenge the legitimacy of the Court’s prior determination as Claim 5 properly
`
`narrows the scope of the “biometric data” term and does not broaden it.
`
`Even if the claims were somehow ambiguous, despite repeated disclosures of a
`
`“fingerprint” as an exemplary type of “biometric data” in the specification, the term should be
`
`construed to preserve validity. See Phillips, 415 F.3d at 1327. A “fingerprint” is one example of
`
`the “biometric” information, and thus dependent claim 5 properly limits the scope of claim 1. The
`
`scope of claim 5 is readily understood by a POSITA and should not be found invalid.
`
`B.
`
`Family B
`
`1.
`“personal digital key” (042:10)
`Proxense’s Construction
`Adopts the Court’s Construction in Proxense v. Samsung:
`
`An operably connected collection of elements including
`an antenna and a transceiver for communicating with a
`RDC and a controller and memory for storing information
`particular to a user.
`
`Microsoft’s Construction
`a device that includes an
`antenna, a transceiver for
`communicating with the RDC
`and a controller and memory for
`storing information particular to
`a user
`
`The parties’ essential dispute is whether a “personal digital key” must be a stand-alone,
`
`single-purpose, monolithic device (as Microsoft argues) or not (as Proxense argues). Microsoft
`
`again presents an identical construction that Samsung presented in Proxense v. Samsung, and
`
`which this Court rejected.1 Proxense v. Samsung, ECF 149 at 30-31. Proxense’s proposed
`
`
`1 The “personal digital key” term was construed with respect to U.S. Patent Nos. 9,049,188 and 9,235,700
`in Proxense v. Samsung, which both derive from continuation applications of the 042 Patent and share the
`same specification as the Family B Patents.
`
`
`10
`
`Patent Owner Exhibit 2006, Page 13 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 14 of 20
`
`construction properly reflects the patent’s recitation of the elements comprising a personal digital
`
`key (“PDK”), which can be an operably connected collection of elements integrated into a hybrid
`
`device, such as a cell phone.
`
`The shared specification of Family B does not constrain a “personal digital key” to a series
`
`of physically connected elements in a single, stand-alone device. A “personal digital key” must
`
`have, at minimum, “an antenna and a transceiver for communicating with a RDC (not shown) and
`
`a controller and memory for storing information particular to a user.” 042 Patent 13:46-49. The
`
`specification also teaches that a PDK can be a “standalone . . . physical device or can be integrated
`
`into commonly carried items . . . such as a cell phone.” 042 Patent 5:44-47 (emphasis added).
`
`For example, the specification explains that the function of a PDK can be implemented in a cell
`
`phone where a “hybrid device” has the form factor of a SIM card, and “is merely inserted in place
`
`of a conventional SIM card to provide this functionality.” 042 Patent 14:24-32. In another
`
`example, the PDK function can become part of a cell phone by connecting via “internal integration
`
`or an access port,” such that the transceiver and antenna of the PDK are again those of the cell
`
`phone into which it is integrated (“the PDK function becomes part of the cell phone” and “the
`
`PDK enabled phone uses the back channel to perform other validation/update functions via the
`
`cellular infrastructure.”). 042 Patent 15:40-52. As this Court recognized in Proxense v. Samsung,
`
`in such embodiments where the hybrid device/PDK function is integrated into a cell phone (e.g.,
`
`with a SIM card), “the transceiver and/or antenna of the PDK is provided by the cell phone, and
`
`the memory and controller of the PDK are provided by the SIM card.” Proxense v. Samsung, ECF
`
`149 at 30. This supports Proxense’s construction and condemns Microsoft’s proposed construction
`
`to the extent Microsoft requires the PDK be a stand-alone, monolithic device.
`
`Microsoft also mistakenly argues that the PDK’s alleged abilities of (1) portability, (2)
`
`proximity/location tracking, and (3) being able to operate with or without wireless connectivity
`
`
`
`11
`
`Patent Owner Exhibit 2006, Page 14 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 15 of 20
`
`somehow confirms that the “PDK is a singular device.” Id. at 13-15. However, these abilities do
`
`not prove the PDK is limited to a monolithic, stand-alone device. The 042 Patent teaches the PDK
`
`being a collection of elements integrated within a cell phone. 042 Patent 14:24-32; 15:40-52.
`
`Microsoft appears to agree when citing, with emphasis, to the 042 Patent disclosure that “[t]he
`
`PDK 102 can be standalone as a portable, physical device or can be integrated into commonly
`
`carried items.” Op. Br. at 13 (emphasis in original). Thus, a PDK can simultaneously be a
`
`collection of elements integrated within a cell phone and arguably have the abilities of (1)
`
`portability, (2) proximity/location tracking, and (3) being able to operate with or without wireless
`
`connectivity. Moreover, these alleged abilities are not required by the claims and the specification
`
`does not limit them to PDK’s that are only stand-alone devices. Microsoft is attempting to
`
`selectively import partial disclosures in some embodiments to improperly limit the scope of the
`
`claims, which courts have prohibited. See Comark Commc’ns, Inc. v. Harris Corp., 156 F.3d
`
`1182, 1187 (Fed. Cir. 1998) (quoting Constant v. Advanced Micro-Devices, Inc., 848 F.2d 1560,
`
`1571 (Fed. Cir. 1988)) (“‘[a]lthough the specification may aid the court in interpreting the meaning
`
`of disputed claim language, particular embodiments and examples appearing in the specification
`
`will not generally be read into the claims’”).
`
`In sum, Microsoft presents a construction for “personal digital key” that is identical to the
`
`one this Court rejected in Proxense v. Samsung but does not provide any new credible evidence or
`
`argument that could justify disturbing the Court’s prior construction. Accordingly, Proxense
`
`respectfully requests that the Court adopt its prior construction from Proxense v. Samsung.
`
`2.
`“receiver-decoder circuit” (042:10; 289:14, 16)
`Proxense’s Construction
`Microsoft’s Construction
`Adopts the Court’s Construction in Proxense v. Samsung:
`a circuit that wirelessly receives
`encrypted data from the PDK and
`decodes it
`
` A
`
` component or collection of components, capable of
`wirelessly receiving data in an encrypted format and
`decoding the encrypted data for processing.
`
`
`
`12
`
`Patent Owner Exhibit 2006, Page 15 of 20
`
`

`

`Case 6:23-cv-00319-ADA Document 42 Filed 11/27/23 Page 16 of 20
`
`Microsoft, again, seeks to re-construe a term the Court already construed in Proxense v.
`
`Samsung. Here, the parties’ dispute whether the term “receiver decoder circuit,” or “RDC” can
`
`comprise a collection of components (as proposed by Proxense’s and adopted in the Court’s prior
`
`construction), or whether it is restricted t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket