throbber
Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 1 of 20
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`PROXENSE, LLC,
`
`Plaintiff,
`
`v.
`
`MICROSOFT CORPORATION,
`
`Defendant.
`
`Case No. 6:23-cv-319-ADA
`
`JURY TRIAL DEMANDED
`
`DEFENDANT MICROSOFT CORPORATION’S OPENING BRIEF IN SUPPORT OF
`ITS MOTION TO DISMISS FOR FAILURE TO STATE A CLAIM
`
`1
`
`MICROSOFT 1017
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 2 of 20
`
`TABLE OF CONTENTS
`
`Page
`
`I.
`
`II.
`
`III.
`
`IV.
`
`INTRODUCTION .............................................................................................................. 1 
`
`STATEMENT OF RELEVANT FACTS ........................................................................... 2 
`
`A.
`
`B.
`
`C.
`
`Proxense Asserts Six Patents Relating to Authentication ....................................... 2 
`
`Proxense Does Not State Specifically Which Microsoft Product is Accused ........ 3 
`
`Proxense Admits That The Alleged Infringement Involves the Actions and
`Devices of Multiple Third Parties ........................................................................... 3 
`
`LEGAL STANDARD ......................................................................................................... 4 
`
`ARGUMENT ...................................................................................................................... 6 
`
`A.
`
`Proxense’s Complaint Does Not Allege Which Microsoft Products Infringe Or
`How They Allegedly Infringe ................................................................................. 6
`
`1. No Identification of Accused Product(s) .......................................................... 6
`
`2.
`
` No Allegation That Microsoft “Persistently Stor[es] Biometric Data” or
`Communicates with a “Hybrid Device” in a “Proximity Zone” ....................... 7 
`
`Proxense’s Complaint Violates The Fundamental Rule Prohibiting Divided
`Infringement ............................................................................................................ 9 
`
`Dismissal With Prejudice Is Warranted As Any Amendment Would Be Futile .. 14
`
`B.
`
`C.
`
`V.
`
`CONCLUSION ................................................................................................................. 14 
`
`i
`
`2
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 3 of 20
`
`TABLE OF AUTHORITIES
`
`Page(s)
`
`Cases
`
`Aristocrat Techs. Australia Pty Ltd. v. Int'l Game Tech.,
`709 F.3d 1348 (Fed. Cir. 2013)................................................................................................13
`
`Ashcroft v. Iqbal,
`556 U.S. 662 (2009) ...................................................................................................................6
`
`Bell Atl. Corp. v. Twombly,
`550 U.S. 544 (2007) ...................................................................................................................6
`
`Bot M8 LLC v. Sony Corp. of Am.,
`4 F.4th 1342 (Fed. Cir. 2021) ..........................................................................................6, 9, 10
`
`Burke v. Ocwen Loan Servicing,
`855 F. App’x 180 (5th Cir. 2021) ............................................................................................16
`
`Centillion Data Sys., LLC v. Qwest Commnc’ns Int’l Inc.,
`631 F.3d 1279 (Fed. Cir. 2011)............................................................................................7, 13
`
`De La Vega v. Microsoft Corp.,
`No. 19-cv-00612- ADA, 2020 WL 3528411 (W.D. Tex. Feb. 7, 2020) .......................6, 11, 14
`
`Emtel, Inc. v. Lipidlabs, Inc., et al.,
`583 F.Supp.2d 811 (S.D. Tex. 2008) .......................................................................................15
`
`ESW Holdings, Inc. v. Roku, Inc.,
`No. 6-19-CV-00044-ADA, 2021 WL 1069047 (W.D. Tex. Mar. 18, 2021) ...........................13
`
`Intellectual Ventures I LLC v. Motorola Mobility LLC,
`870 F.3d 1320 (Fed. Cir. 2017)................................................................................................13
`
`L&W, Inc. v. Shertech, Inc.,
`471 F.3d 1311 (Fed. Cir. 2006)..................................................................................................7
`
`Mann v. Boatwright,
`477 F.3d 1140 (10th Cir. 2007) .................................................................................................2
`
`Omega Patents, LLC v. CalAmp Corp.,
`920 F.3d 1337 (Fed. Cir. 2019)................................................................................................14
`
`Proxense, LLC v. Samsung Elecs. Co.,
`No. 6.21-CV-00210, Dkt. No. 1 ...............................................................................................15
`
`Ruby Sands LLC v. Am. Nat’l Bank of Tex.,
`No. 2:15-cv-1955-JRG, 2016 WL 3542430 (E.D. Tex. June 28, 2016) ..............................6, 11
`
`ii
`
`3
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 4 of 20
`
`TABLE OF AUTHORITIES (cont’d)
`
`Synchronoss Techs. v. Dropbox, Inc.,
`987 F.3d 1358 (Fed. Cir. 2021)............................................................................................7, 13
`
`Page(s)
`
`TecSec, Inc. v. Int'l Bus. Machines Corp.,
`769 F. Supp. 2d 997 (E.D. Va. 2011), aff'd, 466 F. App’x 882 (Fed. Cir. 2012) ....................13
`
`TeleSign Corp. v. Twilio,
`cv 16-2106-PSG, 2016 WL 4703873 (C.D. Cal. Aug. 3, 2016) ................................................9
`
`Valdez v. Victory Med. Ctr. Southcross,
`No. SA-16-CA-1016-FB, 2016 WL 11605674 (W.D. Tex. Dec. 12, 2016) ............................16
`
`Vervain, LLC v. Micron Tech., Inc.,
`No. 6:21-cv-00487-ADA, 2022 WL 23469 (W.D. Tex. Jan. 3, 2022) ................................6, 10
`
`Zitovault v. IBM,
`No. 3:16-cv-0962-M, 2018 WL 2971179 (N.D. Tex. Mar. 29, 2018) .......................................9
`
`Statutes
`
`35 U.S.C. § 271 (a) ........................................................................................................................13
`
`iii
`
`4
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 5 of 20
`
`I.
`
`INTRODUCTION
`
`Proxense LLC’s (“Proxense”) Complaint fails to specifically state what products are
`
`being accused, how any product is accused of infringing every limitation of any claim, and why
`
`the accused infringement is allegedly willful. With a lengthy1 yet deficient pleading, Proxense
`
`alleges that Microsoft infringes three patents on biometric data authentication and three patents
`
`on hybrid devices in proximity – but never even defines the “Accused Product.” In fact, the
`
`Complaint leaves unclear whether there are multiple accused products, as Proxense
`
`inconsistently uses both the undefined terms, “Accused Product” and “Accused Products,”
`
`throughout the Complaint. Compounding the confusion, Proxense names a multitude of non-
`
`Microsoft products, including: a) products from Apple and Google, b) an “authenticator”; and c)
`
`a “resource”, as contributing to the amorphous infringement. See, e.g., Compl. ¶¶ 47, 59, 60.
`
`Moreover, Proxense fails to allege that any single product—alone or in combination—practices
`
`all of the claimed limitations. Withholding from Microsoft what products are accused, let alone
`
`how Microsoft’s products allegedly correlate with each claim limitation, Proxense fails to state a
`
`plausible claim for patent infringement. For this reason alone, Proxense’s Complaint should be
`
`dismissed under Fed. R. Civ. P. 12(b)(6) with prejudice.
`
`The deficiencies in Proxense’s Complaint go even further. Proxense independently fails
`
`to meet the minimum pleading requirements because it violates the prohibition against divided
`
`infringement. Specifically, Proxense fails to state a plausible claim that Microsoft “makes, uses,
`
`offers to sell, or sells” a product that infringes the Asserted Patents because Proxense’s
`
`1 See Fed. R. Civ. P. 8(a) (requiring a “short and plain statement of the claim” showing
`entitlement to relief); Mann v. Boatwright, 477 F.3d 1140, 1148 (10th Cir. 2007) (affirming Rule
`8 dismissal when it was impossible to “separate the wheat from the chaff” in the complaint and
`because “[i]t was not the district court’s job to stitch together cognizable claims for relief from
`the wholly deficient pleading”).”
`
`1
`
`5
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 6 of 20
`

`
`allegations include the actions and products of multiple third parties, including device
`
`manufacturers and app developers. Indeed, black letter law requires a single entity to commit all
`
`the acts necessary to infringe a patent, either personally or vicariously, and Proxense fails to
`
`plead any allegations that Microsoft uses or controls all the necessary components of the asserted
`
`claims. Due to this fatal flaw, dismissal of Proxense’s infringement allegations is also
`
`warranted.
`
`II.
`
`STATEMENT OF RELEVANT FACTS
`
`A.
`
`Proxense Asserts Six Patents Relating to Authentication
`
`Proxense’s Complaint alleges that Microsoft directly infringes at least one claim of six
`
`asserted patents relating to authentication. Three of these patents, the ’730, ’954, and ’905
`
`patents (collectively, “the Biometric PDK patents”), titled “Biometric Personal Data Key (PDK)
`
`Authentication,” relate to “systems, devices, and methods for an integrated device that
`
`persistently stores biometric data for a user in a tamper-resistant format.” Compl. ¶¶ 21-23, 28.
`
`These patents all require “persistently storing biometric data” of a user, “receiving [] scan data
`
`from a biometric scan,” and “comparing the scan data to the biometric data.” See ’730 patent at
`
`cl. 1; ’954 patent at cl. 1; ’905 patent at cl. 1. The other three patents, the ’042, ’289, and ’960
`
`patents (collectively, “the Hybrid Device patents”), titled “Hybrid Device Having a Personal
`
`Digital Key and Receiver-Decoder Circuit and Methods of Use,” relate to “systems, devices, and
`
`methods of utilizing personal digital keys for verifying a user in order to enable applications,
`
`functions or services.” Compl. ¶¶ 24-26, 28. These patents all require a device that
`
`communicates wirelessly with an external “personal digital key” within a proximity zone. ’042
`
`patent at cl. 10; ’289 patent at cl. 14; ’960 patent at cl. 14. Proxense’s Complaint does not
`
`identify which specific Microsoft product is allegedly infringing or how any Microsoft product
`
`allegedly correlate with each of the claim limitations. See Compl. ¶¶ 41-252.
`
`2
`
`6
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 7 of 20
`
`B.
`
`Proxense Does Not State Specifically Which Microsoft Product is Accused
`
`Proxense does not define “Accused Product” or “Accused Products,” terms used
`
`throughout its Complaint. Id. ¶¶ 46-53, 79, 108. Instead of defining the Accused Products,
`
`Proxense vaguely describes the “infringing architecture” as consisting of “[t]hree primary
`
`components.” Id. ¶47. These three primary components appear to be “Microsoft Identity
`
`Platform,”2 an “authenticator” that can be “developed and sold by Microsoft’s [third party]
`
`partners,” and a “resource,” such as “an application, website, or subscription.” Id. ¶¶ 47, 51, 52.
`
`Moreover, throughout the Complaint, Proxense refers generally to “Microsoft’s universal
`
`platform password-less architecture,” without any further specificity. See, e.g., id. ¶¶ 33, 46, 49,
`
`61, 62, 65, 69, 72, 74, 76, 78, 80. Proxense does not offer any claim charts mapping how
`
`Microsoft’s products allegedly correlate with each of the claim limitations.
`
`C.
`
`Proxense Admits That The Alleged Infringement Involves the Actions and
`Devices of Multiple Third Parties
`
`Proxense does not allege that Microsoft makes, uses, sells, or imports all components of
`
`any system and does not provide any factual allegations to support such an allegation. Id. ¶¶
`
`109, 143, 178, 201, 224, 247. Instead, Proxense expressly acknowledges that the actions and
`
`devices of multiple third parties, including mobile device manufacturers and mobile app
`
`developers, are required. Throughout its Complaint, Proxense specifically accuses “Android”
`
`and “iOS devices,” neither of which is controlled by Microsoft. See, e.g., id. ¶¶ 33, 49, 51, 54,
`
`55, 59, 60, 64, 85, 86, 87, 88, 89, 97, 119, 120, 121, 122, 123, 131, 153, 154, 155, 156, 157, 165,
`
`196, 219, 242; see also Dkts. 1-18, 1-30, 1-33, 1-42 (Android exhibits) and Dkts. 1-19, 1-31 (iOS
`
`exhibits). Further, Proxense alleges that third party developers can “integrate their applications
`
`2 Contrary to Proxense’s suggestion-by-capitalization, the “Microsoft identity platform” is not a
`discrete Microsoft product, but rather is an offering with several components. See, e.g., Dkt. 1-
`26.
`
`3
`
`7
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 8 of 20
`

`
`. . . in order to offer [the accused system of] cross platform password-less authentication via
`
`biometrics and the use of ID and access tokens to their customers and subscribers.” Id. ¶ 51. To
`
`confirm that the accused system requires the devices and actions of third parties, Proxense
`
`acknowledges that at least two of the “three primary components” of the “infringing
`
`architecture” can be provided by a third party “subscribing business,” third party “subscribing
`
`developer,” or generally one of Microsoft’s third-party partners. Id. ¶¶ 47, 51, 52. One of these
`
`three “primary” components is the “authenticator,” which Proxense recognizes can be
`
`“developed and sold by Microsoft’s [third party] partners.” Id. ¶ 47. Another of the three
`
`“primary” components, which Proxense calls the “resource,” “may be an application, website,
`
`and/or a subscription offered by . . . a subscribing business[] or a subscribing developer.” Id.
`
`III. LEGAL STANDARD
`
`To survive a motion to dismiss, “a complaint must contain sufficient factual matter,
`
`accepted as true, to ‘state a claim to relief that is plausible on its face’.” Ashcroft v. Iqbal, 556
`
`U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)).
`
`Allegations “merely consistent with” liability are insufficient. See Twombly, 550 U.S. at 557.
`
`To meet the plausibility standard, plaintiff must plead “factual content that allows the court to
`
`draw the reasonable inference that the defendant is liable for the misconduct alleged” and its
`
`claim must be based on “more than a sheer possibility” of liability. See Iqbal, 556 U.S. at 678.
`
`In a patent infringement case, a plaintiff must “explicitly plead facts to plausibly support”
`
`its assertions of direct infringement. See Ruby Sands LLC v. Am. Nat’l Bank of Tex., No. 2:15-
`
`cv-1955-JRG, 2016 WL 3542430, at *2 (E.D. Tex. June 28, 2016). “There must be some factual
`
`allegations that, when taken as true, articulate why it is plausible that the accused product
`
`infringes the patent claim.” Bot M8 LLC v. Sony Corp. of Am., 4 F.4th 1342, 1352-53 (Fed. Cir.
`
`2021). Failing to show that the accused products plausibly meet all claim limitations renders the
`
`4
`
`8
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 9 of 20
`
`allegations insufficient. See, e.g., De La Vega v. Microsoft Corp., No. 19-cv-00612- ADA, 2020
`
`WL 3528411, at *6 (W.D. Tex. Feb. 7, 2020) (“Because Plaintiff does not include even a short
`
`written description of how the accused instrumentalities meet the ‘coupling’ limitation, his
`
`complaint fails to state a claim upon which relief can be granted.”). Moreover, a greater level of
`
`detail is required for complex technologies or material elements. See Bot M8, 4 F. 4th at 1353
`
`(level of detail required depends on “the complexity of the technology, the materiality of any
`
`given element to practicing the asserted claim(s), and the nature of the allegedly infringing
`
`device”); see also Vervain, LLC v. Micron Tech., Inc., No. 6:21-cv-00487-ADA, 2022 WL
`
`23469, at *5 (W.D. Tex. Jan. 3, 2022) (“Based on the complexity and materiality of the claims,
`
`the Court concludes that pleading infringement . . . will require more than attaching photos of the
`
`Accused Products and summarily alleging that each and every limitation is satisfied.”).
`
`A plaintiff has the burden of showing that each accused product infringes the asserted
`
`claims. See L&W, Inc. v. Shertech, Inc., 471 F.3d 1311, 1318 (Fed. Cir. 2006) (“[Plaintiff] must
`
`make a prima facie showing of infringement as to each accused device . . . .”). For system
`
`claims, direct infringement requires that a single defendant make, use, or sell all portions of the
`
`system. See Centillion Data Sys., LLC v. Qwest Commnc’ns Int’l Inc., 631 F.3d 1279, 1288
`
`(Fed. Cir. 2011); see also Synchronoss Techs. v. Dropbox, Inc., 987 F.3d 1358, 1368 (Fed. Cir.
`
`2021) (“Because Drop-box does not provide its customers with any hardware in conjunction with
`
`its accused software, Dropbox does not make, sell, or offer for sale the complete invention.”).
`
`/ / /
`
`/ / /
`
`/ / /
`
`5
`
`9
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 10 of 20
`
`IV.
`
`ARGUMENT
`
`A. Proxense’s Complaint Does Not Allege Which Microsoft Products Infringe or
`How They Allegedly Infringe
`
`1. No Identification of Accused Product(s)
`
`Proxense’s Complaint relies on a hodgepodge of features taken from websites describing
`
`several different Microsoft authentication offerings, yet never states which offering is accused of
`
`infringement, much less how it infringes. The Complaint merely throws around names of some
`
`Microsoft solutions or products—ranging from the “Microsoft [i]dentity [p]latform,” “Azure
`
`Active Directory,” “Windows Hello,” to “Microsoft Authenticator App”—and non-Microsoft
`
`products—ranging from Android and iOS phones to “authenticators developed by Microsoft’s
`
`partners.” Compl. ¶¶ 50, 51; see also Dkts. 1-18, 1-30, 1-33, 1-42 (Android exhibits) and Dkts.
`
`1-19, 1-31 (iOS exhibits). But Proxense never alleges that any single Microsoft product or
`
`service (or even a specific combination of products, for that matter) meet the limitations of any
`
`asserted claim. Rather, Proxense resorts to vaguely describing aspects of a multitude of different
`
`generic products without alleging how they work together to allegedly infringe satisfy the
`
`numerous elements of the asserted claims. Paragraph 54 is exemplary:
`
`54. Microsoft directly infringes the Patents-in-Suit by creating and utilizing a
`universal platform password-less architecture incorporating authenticators,
`including Windows Hello on Windows 10 and 11, Microsoft Authenticator App on
`Android and iOS devices, and controlling the action of its partners to create
`authenticators that work on Windows, the Microsoft Edge browser, and online
`Microsoft accounts, incorporating the Microsoft Identity platform which controls
`the actions of authenticators and the dissemination of bear [sic] tokens and other
`such access messages, offering services, applications subscriptions and other
`such resources hosted by separate systems which are accessed via tokens provided
`by Microsoft Identity Platform, and offering businesses and developers identity and
`access management services which entail requesting user authentication and
`receiving tokens in a manner directed and controlled by Microsoft, including the
`use of Microsoft Authentication Library.
`
`Id. ¶ 54; see also id. at ¶¶ 81-252.
`
`6
`
`10
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 11 of 20
`
`According to Proxense, an accused product must be three different components with
`
`varying functions. Id. ¶ 47 (claiming the “infringing architecture” consists of “[t]hree primary
`
`components” – the Microsoft identity platform, an “authenticator,” and a “resource” that must be
`
`on a “system separate and distinct from [the] Microsoft [i]dentity [p]latform”). Yet Proxense
`
`fails to plead facts sufficient to support a theory that a combination of products infringe the
`
`Asserted Patents. See Bot M8, 4 F.4th at 1353; TeleSign Corp. v. Twilio, cv 16-2106-PSG, 2016
`
`WL 4703873, at *3 (C.D. Cal. Aug. 3, 2016) (finding plaintiff failed to state a claim for
`
`infringement when it neither plausibly alleged any one product performed all elements nor that
`
`multiple products were used “conjunctively” to infringe); Zitovault v. IBM, No. 3:16-cv-0962-M,
`
`2018 WL 2971179, at *3 (N.D. Tex. Mar. 29, 2018) (stating it would be improper to “only chart
`
`[one product’s] functionality for some limitations and [another product’s] functionality for other
`
`limitations”). That is, Proxense fails to allege how various products together might meet the
`
`limitations. Proxense simply does not describe how any specific combination of components
`
`might plausibly work “conjunctively” together to meet the limitations. See Telesign, 2016 WL
`
`4703873, at *3.
`
`Thus, Proxense’s allegations fail to make out a plausible claim for infringement. See id.;
`
`Bot M8, 4 F.4th at 1355 (“Although the FAC alleges that the PS4 contains multiple storage
`
`media and multiple authentication programs, we agree with the district court… [that they] do not
`
`plausibly allege that gaming information and a mutual authentication program are stored together
`
`on the same memory.”).
`
`2. No Allegation That Microsoft “Persistently Stor[es] Biometric Data” or
`Communicates with a “Hybrid Device” in a “Proximity Zone”
`
`In addition to the deficiencies above, Proxense fails to allege that any product meets
`
`certain required limitations of the Asserted Patents. The Biometric PDK Patents require
`
`7
`
`11
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 12 of 20
`

`
`“persistently storing biometric data” of a user, “receiving [] scan data from a biometric scan,”
`
`and “comparing the scan data to the biometric data.” See ’730 patent at cl. 1; ’954 patent at cl. 1;
`
`’905 patent at cl. 1. For these limitations, however, Proxense does not identify how it alleges
`
`that any Microsoft product stores any biometric data or how it alleges the biometric data is
`
`stored, received, or compared. See, e.g., Compl. ¶¶ 86, 87 (never identifying a Microsoft
`
`product). As a result, Microsoft is given no notice of what Proxense is accusing for these
`
`limitations.
`
`Similarly, for the Hybrid Device Patents, Proxense fails to allege that any products meet
`
`certain limitations. Specifically, these three patents require circuitry that communicates
`
`wirelessly or a “wireless communication interface of a device” with an external “personal digital
`
`key” within a proximity zone. ’042 patent at cl. 10; ’289 patent at cl. 14; ’960 patent at cl. 14.
`
`Proxense, however, does not identify what it alleges is a “receiver-decoder circuit” or a “wireless
`
`communication interface of a device,” or what they allegedly communicate with within a
`
`“proximity zone.”
`
`Indeed, complaints that omit specific claim limitations are “insufficient to satisfy the
`
`Iqbal/Twombly standard” and thus insufficient to “plausibly allege infringement.” Bot M8, 4 F.
`
`4th at 1355. For example, in Bot M8, the Federal Circuit found that “[w]hile Bot M8 point[ed] to
`
`different storage components in the allegedly infringing devices, it never sa[id] which one or
`
`ones satisfy[ied] the mutual authentication limitation.” Id. Here, Proxense also points to various
`
`products or services from multiple parties, but never alleges which one or ones satisfy the
`
`aforementioned limitations. See id.
`
`Proxense thus fails the most basic requirements of governing patent law, which requires
`
`allegations showing how the accused products meet the claimed limitations. See, e.g., Vervain
`
`8
`
`12
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 13 of 20
`
`LLC, 2022 WL 23469, at *9 (granting motion to dismiss where complaint failed to sufficiently
`
`plead factual allegations to support a reasonable inference that the accused product practiced the
`
`claimed “hot blocks” and “data integrity test” limitations); De La Vega, 2020 WL 3528411, at *7
`
`(dismissing direct infringement claims for failure to allege “coupling” limitation met by accused
`
`products); Ruby Sands LLC, 2016 WL 3542430, at *4 (dismissing direct infringement claim
`
`“constructed upon a fatally flawed foundation” as no factual allegations “even remotely
`
`suggest[ed]” that the defendant sold the product that was alleged to meet the claim limitation).
`
`These omissions further show that Proxense’s allegations are fatally incomplete.
`
`B. Proxense’s Complaint Violates the Fundamental Rule Prohibiting Divided
`Infringement
`
`Proxense separately fails to meet the minimum pleading requirements because it violates
`
`the fundamental rule prohibiting divided infringement. In particular, Proxense fails to allege
`
`(and cannot allege) that Microsoft directly infringes the Asserted Patents when the actions and
`
`products of: a) multiple third party device manufacturers; b) third party “authenticators”; and c)
`
`and third party “resources” are pled.
`
`Proxense acknowledges that at least two of the “three primary components” of the
`
`“infringing architecture”—which Proxense calls the “authenticator” and the “resource”—can be
`
`provided by a third party “subscribing business,” third party “subscribing developer,” or
`
`generally one of Microsoft’s third party partners. Compl. ¶¶ 47, 51, 52; see also Dkts. 1-18, 1-
`
`30, 1-33, 1-42 (Android exhibits) and Dkts. 1-19, 1-31 (iOS exhibits). As for these two
`
`components, Proxense concedes that: “the resource is on a system separate and distinct from
`
`Microsoft…” and is a “separate and distinct entit[y]” from the Microsoft identity platform. Id.
`
`(emphasis added). By Proxense’s own pleading, at least two of the three primary components of
`
`the infringing architecture can be or is provided by third parties, not Microsoft.
`
`9
`
`13
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 14 of 20
`
`Proxense repeatedly admits that any infringing product would require the acts and
`
`devices of third party mobile device manufacturers, such as Google for Android devices and
`
`Apple for iOS devices. Throughout its Complaint, Proxense specifically accuses “Android” and
`
`“iOS” devices – neither of which is controlled by Microsoft. See, e.g., id. ¶¶ 33, 49, 51, 54, 55,
`
`59, 60, 64, 85, 86, 87, 88, 89, 97, 119, 120, 121, 122, 123, 131, 153, 154, 155, 156, 157, 165,
`
`196, 219, 242; see also Dkts. 1-18, 1-30, 1-33, 1-42 (Android exhibits) and Dkts. 1-19, 1-31 (iOS
`
`exhibits). In particular, Proxense alleges that “Android devices” and “iOS devices” are
`
`necessary components of any alleged infringement because it is those third party devices that
`
`“persistently stor[e] biometric data in a tamper proof format.” Id. ¶¶ 59, 60. For example,
`
`Proxense’s Complaint alleges the following:
`
`“Android’s implementation guides require tamper-proof raw fingerprint data or
`derivates (for example, templates) [that] must never be accessible from outside the
`sensor driver or TEE (trusted execution environment) and fingerprint acquisition,
`enrollment, and recognition must occur inside the TEE. See Exhibit 17. When
`following these guidelines, requiring acquisition and recognition to occur within
`the TEE means that the biometric data never leaves the TEE. Android’s TEE,
`called Trusty, uses ARM’s TrustzoneTM to virtualize the main processor and create
`a secure trusted execution environment isolated from the rest of the system. See
`Exhibit 29. Accordingly, the biometric data, which never leaves the TEE, also
`never leaves the Trustzone housing Trusty. Keeping biometric data within the
`Trustzone, Android phones persistently store biometric data in a tamper proof
`format. Furthermore, access to the biometric hardware on Android devices is
`controlled by Fingerprint HIDL. Id. The methods enabled by the Fingerprint HIDL
`do not permit altering biometric data. See id.”
`
`Id. ¶ 59 (internal citations omitted and emphasis added). Similarly, Proxense alleges the
`
`following for Apple’s iOS devices:
`
`“Apple’s Secure Enclave is a dedicated secure subsystem … isolated from the main
`processor to provide an extra layer of security designed to keep sensitive data secure
`even when the Application Processor kernel becomes compromised. See Exhibit
`18. During enrollment, the Secure Enclave processes, encrypts, and stores the
`corresponding Touch ID and Face ID template data. Id. The Secure Enclave thus
`provides a tamper proof format for sensitive data, such as biometric data, even
`when a hack or other malicious software compromises the Application Processor.”
`
`10
`
`14
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 15 of 20
`
`Id. ¶ 60 (internal citations omitted and emphasis added). Although the Complaint focuses on
`
`Android and iOS, Proxense does not limit itself to these third parties. Proxense also alleges that
`
`devices “manufactured by Microsoft[’s] partners, such as [but not limited to] Dell” infringe or
`
`are necessary to infringe the Patents-in-Suit by “persistently stor[ing] user data.” Id. ¶ 57.
`
`To demonstrate a defendant is liable for direct infringement, a plaintiff must show that
`
`the defendant “without authority makes, uses, offers to sell, or sells any patented invention,
`
`within the United States or imports into the United States any patented invention during the term
`
`of the patent.” 35 U.S.C. § 271 (a). “[F]or a party to be liable for direct patent infringement
`
`under 35 U.S.C. § 271(a), that party must commit all the acts necessary to infringe the patent,
`
`either personally or vicariously.” Aristocrat Techs. Australia Pty Ltd. v. Int'l Game Tech., 709
`
`F.3d 1348, 1362 (Fed. Cir. 2013).
`
`The Federal Circuit has explained that “to ‘make’ a system under §271(a), [a party]
`
`would need to combine all of the claim elements.” Centillion, 631 F.3d at 1288. And “use” of a
`
`patent system requires that a party “put the invention into service, i.e., control the system as a
`
`whole and obtain benefit from it.” Intellectual Ventures I LLC v. Motorola Mobility LLC, 870
`
`F.3d 1320, 1328 (Fed. Cir. 2017) (quoting Centillion, 631 F.3d at 1284). In other words, “a
`
`person must control (even if indirectly) and benefit from each claimed component.” Id. at 1329
`
`(emphasis added); see also Synchronoss, 987 F.3d at 1369 (“Direct infringement by ‘use’ of a
`
`claimed system requires use of each and every element of the system.”); ESW Holdings, Inc. v.
`
`Roku, Inc., No. 6-19-CV-00044-ADA, 2021 WL 1069047, at *5 (W.D. Tex. Mar. 18, 2021)
`
`(accused infringer cannot infringe system claim where it “neither controls each system
`
`component recited in [the claim] nor makes, sells, or offers to sell [all of] the claimed system.”);
`
`TecSec, Inc. v. Int'l Bus. Machines Corp., 769 F. Supp. 2d 997, 1010 (E.D. Va. 2011), aff'd, 466
`
`11
`
`15
`
`

`

`Case 6:23-cv-00319-ADA Document 21 Filed 07/10/23 Page 16 of 20
`
`F. App’x 882 (Fed. Cir. 2012), and rev’d on other grounds, 731 F.3d 1336 (Fed. Cir. 2013)
`
`(citing Rotec Indus., Inc. v. Mitsubishi Corp., 215 F.3d 1246, 1252 (Fed. Cir. 2000)) (“To prove
`
`that [defendant] directly infringed the system claims, plaintiff must show that [defendant] made,
`
`used, sold, offered for sale, or imported the entire claimed system(s).”).
`
`Here, Proxense’s Complaint is similar to the circumstances in CalAmp, where the Federal
`
`Circuit held that the defendant could not directly infringe where it did not provide an essential
`
`claim element. Omega Patents, LLC v. CalAmp Corp., 920 F.3d 1337, 1345 (Fed. Cir. 2019).
`
`Just as the defendant in CalAmp did not provide the accused cell tower, Microsoft does not
`
`provide the devices, applications, websites, and/or subscriptions that Proxense identifies for the
`
`alleged infringement. Id. Similarly, a case dismissed by this Court involved “[a] system for
`
`selecting streaming image content output by a camera from at least one mobile content
`
`provider.” De La Vega v. Microsoft Corp., No. W-19-CV-00612-ADA, 2020 WL 3528411, at
`
`*2 (W.D. Tex. Feb. 7, 2020). The plaintiff in De La Vega accused applications provided by
`
`Microsoft, specifically Microsoft Mixer and its companion Microsoft Mixer Create App. Id.
`
`However, the asserted claim “require[d] at last three actors” to infringe, and the plaintiff failed to
`
`plead that the actions of these three actors were attributable to the defendants as it failed to
`
`“allege or explain how Microsoft and Google are liable for joint infringement with a any third
`
`parties.” Id. at *7. The Court found this to be fatal to the plaintiff’s claims, which were
`
`dismissed with prejudice. Id.
`
`Moreover, Proxense does not—and cannot plausibly—a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket