throbber
UNITED STATES DISTRICT COURT FOR THE
`WESTERN DISTRICT OF TEXAS
`
`Civil Action No. 6:23-cv-00320-ADA
`
`PROXENSE, LLC,
`
`Plaintiffs,
`
`v.
`
`GOOGLE LLC,
`
`Defendants.
`
`PLAINTIFF’S PRELIMINARY INFRINGMENT CONTENTIONS
`
`Pursuant to this Court’s Standing Order Governing Proceedings in Patent Cases,
`
`Plaintiff Proxense, LLC (“Proxense” or “Plaintiff”), hereby provides its final infringement
`
`contentions concerning Defendant Google LLC, (“Google”, or “Defendant”).
`
`Proxense hereby certifies that it undertook reasonable efforts to prepare its preliminary
`
`infringement contentions and reserves the right to amend them based on material identified
`
`after the invalidity contentions are served and during discovery.
`
`These
`
`infringement contentions are based on Plaintiff’s current knowledge,
`
`understanding, and belief as to the facts and information available to it as of the date of these
`
`disclosures. Proxense has not yet completed its investigation, collection of information,
`
`discovery, or analysis related to this action. The evidence cited in support of the disclosures
`
`herein is necessarily exemplary and is therefore illustrative and not exhaustive. For example,
`
`Proxense anticipates that relevant facts and evidence are uniquely within the possession,
`
`custody, or control of Defendants. As such, Proxense reserves the right to supplement,
`
`amend, or modify the information contained herein and to use and introduce at trial such
`
`information and any subsequently-identified or discovered information.
`
`Page 1 of 61
`
`GOOGLE EXHIBIT 1013
`
`

`

`These final infringement contentions are based at least in part upon Proxense’s present
`
`understanding of U.S. Patent No. 8,352,730 (the “730 patent”), U.S. Patent No. 8,886,954 (the
`
`“954 Patent”), U.S. Patent No. 9,298,905 (the “905 patent”), U.S. Patent No. 8,646,042 (the
`
`“042 Patent”), U.S. Patent No. 9,679,289 (the “289 Patent”), U.S. Patent No. 10,073,960 (the
`
`“960 Patent”) and the accused products in the absence of discovery. The 730, 954, 905, 042,
`
`289, and 960 Patents are collectively referred to herein as the “Proxense Patents” or the
`
`“Patents-in-Suit.”
`
`Proxense reserves the right to amend its infringement contentions and asserted claims
`
`based on information Proxense obtains through discovery and otherwise as this case
`
`progresses. Proxense further reserves the right to amend its final infringement contentions and
`
`asserted claims based on any proceedings before the United States Patent and Trademark
`
`
`
`
`
`Office regarding the Proxense Patents.
`
`I.
`
`IDENTIFICATION OF INFRINGED CLAIMS
`
`The asserted claims of the Patents-in-Suit are as follows:
`
`
`730 Patent
`954 Patent
`905 Patent
`042 Patent
`289 Patent
`960 Patent
`
`
`
`Claims
`1-3, 5, 15-17 (Google Passwordless) and 1-2, 5
`(Google Pay)
`1-3, 5-7, 22-27 (Google Passwordless) and 1-2, 5-7
`(Google Pay)
`1-2, 15 (Google Passwordless) and 1, 4-5, 7 (Google
`Pay)
`10
`14, 16
`14, 16
`
`Proxense
`
`identifies
`
`these asserted claims based on
`
`its current, preliminary
`
`understanding and reserves the right to supplement and/or change its identification as discovery
`
`proceeds, including identifying additional claims and withdrawing claims.
`
`II.
`
`IDENTIFICATION OF ACCUSED PRODUCTS, SYSTEMS,
`
`Page 2 of 61
`
`

`

`
`
`METHODS ANDSERVICES
`
`Based on the information currently available, Proxense identifies the following accused
`
`products, systems, and methods, including all reasonably similar products, systems, methods,
`
`and their variants for each of the Patents-in-Suit.
`
`Hereafter, the term “Accused Instrumentalities” or “Accused Products” refers to the
`
`products listed below, (1) Google’s Universal Passwordless Architecture, which includes (a) Android
`
`Operating System (“OS”), (b) Android SafetyNet Authenticator, (c) Chrome browser, and (d) Google
`
`Identity Platform (also known as Google Identity Services or Google Cloud Identity Platform), (2)
`
`Google Pay services (also known as Google Wallet) and all Google devices preloaded with Google
`
`Pay/Wallet.
`
`III. CHARTS SETTING FORTH WHERE IN THE ACCUSED
`PRODUCT(S) EACH ELEMENT OF THE ASSERTED CLAIM(S) ARE
`FOUND
`
`Subject to ongoing discovery and investigation, Proxense provides claim charts
`
`pertaining to the Patents-in-Suit attached hereto as Exhibits A1-A2 for the 730 patent, Exhibits
`
`B1-B2 for the 905 patent, Exhibits C1-C2 for the 989 patent, Exhibit D for the 042 patent,
`
`Exhibit E for the 289 patent, and Exhibit F for the 960 patent. These infringement contentions
`
`serve a notice function and are not required to—and therefore do not—present every possible
`
`permutation or theory of Proxense’s case.
`
`IV.
`
`LITERAL INFRINGEMENT AND INFRINGEMENT UNDER
`THE DOCTRINEOF EQUIVALENTS
`Proxense contends that Google’s products literally infringe the asserted claims of the
`
`Patents-in-Suit as more specifically explained in the attached claim charts. Proxense reserves
`
`the right to assert infringement under the doctrine of equivalents to the extent that the difference
`
`between any component of any product or system, and any step of any service, method, and/or
`
`Page 3 of 61
`
`

`

`claim element is insubstantial.
`
`V.
`
`PRIORITY DATES AND ALL DOCUMENTS EVIDENCING
`CONCEPTION ANDREDUCTION TO PRACTICE FOR EACH
`CLAIMED INVENTION
`
`The 730 patent matured from application number 11/314,199 (“the 199 application”),
`
`which was filed on December 20, 2005. The 905 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 730 patent are being
`
`collected and will be produced shortly.
`
`The 954 patent matured from application number 13/710,109 (“the 109 application”),
`
`which was filed on December 10, 2012. The 905 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 954 patent are being
`
`collected and will be produced shortly.
`
`The 905 patent matured from application number 14/521,982 (“the 982 application”),
`
`which was filed on October 23, 2014. The 982 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 905 patent are being
`
`collected and will be produced shortly.
`
`The 042 patent matured from application number 13/445,825 (“the 825 application”),
`
`which was filed on April 12, 2012. The 825 application claims priority from provisional patent
`
`application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 042 patent are being
`
`collected and will be produced shortly.
`
`The 289 patent matured from application number 14/961,645 (“the 645 application”),
`
`Page 4 of 61
`
`

`

`which was filed on December 7, 2015. The 645 application claims priority from provisional
`
`patent application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 289 patent are being
`
`collected and will be produced shortly.
`
`The 960 patent matured from application number 15/595,739 (“the 739 application”),
`
`which was filed on May 15, 2017. The 739 application claims priority from provisional patent
`
`application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 960 patent are being
`
`collected and will be produced shortly.
`
`VI. A COPY OF THE FILE HISTORY FOR EACH PATENT IN SUIT
`
`A copy of the file history for each of the Patents-in-Suit is submitted herewith. The
`
`file history of the 730 patent bears production numbers PROX_GOOGLE_000001-
`
`PROX_GOOGLE_00805. The file history of the 954 patent bears production numbers
`
`PROX_GOOGLE_00806- PROX_GOOGLE_01392. The file history of the 905 patent bears
`
`production numbers PROX_GOOGLE_001393- PROX_GOOGLE_001936. The file history
`
`of the 042 patent bears production numbers PROX_GOOGLE_001937-
`
`PROX_GOOGLE_002433. The file history of the 289 patent bears production numbers
`
`PROX_GOOGLE_002434- PROX_GOOGLE_002616. The file history of the 960 patent
`
`bears production numbers PROX_GOOGLE_002617- PROX_GOOGLE_002818.
`
`
`
`
`
`
`Dated: July 24, 2023
`
`
`
` Respectfully submitted,
`
`
`
`/s/ David L. Hecht
`David L. Hecht (Co-Lead Counsel)
`dhecht@hechtpartners.com
`
`Page 5 of 61
`
`

`

`Maxim Price (pro hac vice)
`mprice@hechtpartners.com
`Yi Wen Wu (pro hac vice)
`wwu@hechtpartners.com
`HECHT PARTNERS LLP
`125 Park Avenue, 25th Floor
`New York, New York 10017
`Telephone: (212) 851-6821
`
`Brian D. Melton (Co-Lead Counsel)
`bmelton@susmangodfrey.com
`Geoffrey L. Harrison
`gharrison@susmangodfrey.com
`Meng Xi
`mxi@susmangodfrey.com
`Bryce T. Barcelo
`bbarcelo@susmangodfrey.com
`SUSMAN GODFREY L.L.P.
`1000 Louisiana Street, Suite 5100
`Houston, Texas 77002-5096
`Telephone: (713) 653-7807
`Facsimile: (713) 654-6666
`
`Lear Jiang
`ljiang@susmangodfrey.com
`SUSMAN GODFREY L.L.P.
`1900 Avenue of the Stars, Suite 1400
`Los Angeles, California 90067-6029
`Telephone: (310) 789-3100
`Facsimile: (310) 789-3150
`
`Counsel for Plaintiff Proxense, LLC
`
`Attorneys for Plaintiff Proxense, LLC
`
`
`
`
`Page 6 of 61
`
`

`

`
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on July 24, 2023, the foregoing was served on counsel for Defendant
`
`Google, LLC.
`
`/s/ David L. Hecht
`David L. Hecht
`
`
`
`
`
`Page 7 of 61
`
`

`

`Exhibit Al
`Exhibit A1
`
`Page 8 of 61
`
`Page 8 of 61
`
`

`

`U.S. Patent Number 8,352,730 – Preliminary Infringement Contentions1
`
`
`
`Assignee:
`Title:
`Filing Date:
`Publication Date:
`Inventor:
`
`
`
`Proxense, LLC
`Biometric personal data key (PDK) authentication
`2005-12-20
`2013-01-08
`Giobbi, John J.
`
`‘730 Patent Claim2
`1
` A method for verifying a user
`during authentication of an
`integrated device, comprising the
`steps of4:
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`Google uses, distributes, sells, and/or offers to sell a Universal Passwordless Architecture (“UPA”) (e.g.
`PROX_GOOGLE_003243, https://developers.google.com/identity/passkeys , which includes: (a)
`Android OS, (b) Android SafetyNet Authenticator, (c) Chrome, and (d) Google Identity Platform
`(“GIP”), which together infringe, literally or under the doctrine of equivalents, the claimed limitations as
`presented below.
`
`
`1 The Preliminary Infringement Contentions (PICS) provided herein are based on information obtained to date and may not be exhaustive. Plaintiff’s
`investigation of Defendants’ infringement is ongoing. Plaintiff reserves the right to supplement and/or amend these PICS to identify additional
`instrumentalities and to further identify where each element of each claim is found in each accused instrumentality, including on the basis of
`discovery obtained from Defendants, and from third parties during the course of this litigation, pursuant to ¶2 of the Order Governing Proceedings –
`Patent Cases under Hon. Alan D. Albright.
`
` 2
`
` All PICS set forth herein for any independent patent claims are hereby incorporated by reference into the PICS alleged for any dependent patent
`claims that depend on such independent claims, as if fully set forth therein.
`
` 3
`
` The Accused Instrumentalities and associated exhibits discussed and/or cited for any claim herein are representative in all material respects of all
`other accused instrumentalities identified for that claim (e.g., a specified phone or service may be used as a representative example in these charts
`since the other accused instrumentalities have immaterial differences in their hardware and/or software configuration, the cited references are
`believed to be illustrative of all such accused devices).
`
` 4
`
` Plaintiff’s inclusion of any claim preamble in this claim chart should not be interpreted as an admission that the preamble is limiting. Plaintiff
`reserves the right to take the position that the claim preambles are limiting or not limiting on a claim-by-claim basis.
`
`
`
`1
`
`Page 9 of 61
`
`

`

`‘730 Patent Claim2
`
` Persistently storing biometric data
`of the user and a plurality of codes
`and other data values comprising a
`device ID code uniquely identifying
`the integrated device and a secret
`decryption value in a tamper proof
`format written to a storage element
`on the integrated device that is
`unable to be subsequently altered;
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`Google, through its own actions, and the action of its customers, which Google directs and controls, has
`created and sells5 the use of UPA, including Android/Chrome preloaded6 devices, servers, and software
`supporting and integrating into the UPA architecture. Servers integrating with and supporting the
`architecture include GIP providing FIDO and/or OAuth services. Devices integrating and supporting
`the architecture include devices utilizing the Android OS. Software integrating with and supporting the
`architecture include the Chrome web browser and Android SafetyNet Authenticator.
`
`Persistently storing biometric data of a user … in a tamper proof format written to a storage element on
`the integrated device that is unable to be subsequently altered
`
`
`Utilizing the Android operating system developed and disseminated by Google, Android devices
`store biometric data of the user in a tamper proof format written to a storage element on the
`integrated device that is unable to be subsequently altered. Starting with Android 10, Google
`stored biometric data on Android devices includes fingerprint and facial recognition.
`PROX_GOOGLE_002913,
`https://source.android.com/docs/security/features/biometric#android10 (“Android 10: Introduces
`the BiometricManager class that developers can use to query the availability of biometric
`authentication. Includes fingerprint and face authentication integration for BiometricPrompt”).
`
`As to protecting biometric data, Android’s implementation guidelines require tamper-proof “raw
`fingerprint data or derivatives (for example, templates) must never be accessible from outside the
`sensor driver or TEE” (trusted execution environment) and “fingerprint acquisition, enrollment,
`and recognition must occur inside the TEE”. Android Open-Source Project: Fingerprint HIDL,
`PROX_GOOGLE_003177,
`https://source.android.com/docs/security/features/authentication/fingerprint-hal. Requiring
`acquisition and recognition to occur inside the TEE, fingerprint data never leaves the TEE.
`Android’s TEE, called Trusty, “uses ARM’s TrustzoneTM to virtualize the main processor and
`create a secure trusted exaction environment” isolated from the rest of the system. Android
`Open-Source Project: Trusty TEE, PROX_GOOGLE_003283,
`https://source.android.com/docs/security/features/trusty. Accordingly, fingerprint data, which
`never leaves the TEE, also never leaves the Trustzone housing Trusty. Keeping biometric data
`
`
`5 See e.g. PROX_GOOGLE_003250, https://cloud.google.com/identity-platform/pricing.
`
`6 For the avoidance of doubt, "preloaded" includes devices that ship with Android and other accused software pre-installed or upon which Android
`and other accused software is otherwise installed by Defendant (e.g., through operating system upgrades, updates, initial installation, or otherwise).
`
`
`2
`
`Page 10 of 61
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`within the Trustzone, Android devices persistently store biometric data in a tamper proof
`format.7
`
`On Android devices, access to biometric hardware is controlled by Fingerprint HIDL. "Android
`uses Fingerprint Hardware Interface Definition Language (HIDL) to connect to a vendor-specific
`library and fingerprint hardware (for example, a fingerprint sensor)." Android Open Source
`Project: Fingerprint HIDL, PROX_GOOGLE_003177,
`https://source.android.com/docs/security/features/authentication/fingerprint-hal. The methods
`enabled by the Fingerprint HIDL do not permit altering biometric data. Id. (providing a listing
`of methods, none of which allows for the alternation of biometric data.). Keeping fingerprint
`and other biometric data within a portion of the Trustzone only accessible by Fingerprint HIDL,
`which lacks a method for altering biometric data, Android devices persistently store biometric
`data of the user in a tamper proof format written to a storage element on the integrated device
`that is unable to be subsequently altered.
`
`Android devices require user consent to enroll a fingerprint. See PROX_GOOGLE_003204,
`How to Add a New Fingerprint to Your Android Device - Technipages (Detailing the process of
`adding a fingerprint to an Android devices by entering a PIN or password for the device before
`adding a fingerprint.). As enrolling fingerprints on Android devices require entering PIN /
`Passcode / Password to evidence user consent, Android devices store biometric data of the user
`in a tamper proof format unable to be subsequently altered.
`
`As Android devices store biometric data in a tamper proof format that is not capable of being
`subsequently altered, Google forces users of the Android OS, exercising control and direction
`over them by controlling every step that the software performs and every prompt for user action,
`to persistently store their biometric data in a tamper proof format written to a storage element on
`an integrated device that is not capable of being subsequently altered.
`
`
`
`
`7 In the alternative, to the extent the TEE and Trustzone are considered to be a different security implementation or if limited alterations are possible
`in limited circumstances and given high levels of security permissions, clearance, or hardware-level permission attribution, the “tamper proof format
`. . . that is unable to be subsequently altered,” limitation is met under the doctrine of equivalents on the grounds that the tamper proofing and
`limitations on alteration utilized in the Trustzone prevent nearly all alteration by nearly all programs that have not been explicitly approved and, at
`least, prevent alteration by all regular-world (non-TEE and non-Trustzone) applications and requires a strict level of physical and/or virtual layers of
`permission to be altered.
`
`
`3
`
`Page 11 of 61
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`persistently storing … a plurality of codes and other data values comprising a device ID code uniquely
`identifying the integrated device … in a tamper proof format written to a storage element on the
`integrated device that is unable to be subsequently altered
`
`
`The Android OS natively includes the Android SafetyNet Authenticator, which is FIDO certified
`and accessible via the FIDO2 API for Android. See PROX_GOOGLE_003793, FIDO®
`Certified - FIDO Alliance. In operation, authenticators store and access the cryptographic
`material underlying FIDO Passkeys. See PROX_GOOGLE_002819,
`AccountManager | Android Developers (“Authenticators (which may be written by third
`parties) handle the actual details of validating account credentials and storing account
`information. For example, Google, Facebook, and Microsoft Exchange each have their own
`authenticator.”); PROX_GOOGLE_003088, FIDO Technical Glossary (fidoalliance.org)
`(Defining a FIDO Authenticator as "responsible for user verification, and maintaining the
`cryptographic material required for the relying party authentication.”); and
`PROX_GOOGLE_003439, Web Authentication: An API for accessing Public Key Credentials -
`Level 3 (w3.org) (Defining an authenticator as “A cryptographic entity, existing in hardware or
`software, that can register a user with a given Relying Party and later assert possession of the
`registered public key credential, and optionally verify the user, when requested by the Relying
`Party.”).
`
`Having a native authenticator, Android devices support the use of FIDO Passkeys. See
`PROX_GOOGLE_003187, Google Online Security Blog: Security of Passkeys in the Google
`Password Manager (googleblog.com) (“Passkeys are the result of an industry-wide effort. They
`combine secure authentication standards created within the FIDO Alliance and the W3C Web
`Authentication working group with common terminology and user experience across different
`platforms, recoverability against device loss, and a common integration path for developers.
`Passkeys are supported in Android and other leading industry client OS platforms.").
`Accordingly, instead of the traditional username and password combination, users of Android
`devices may utilize a passkey to access their Google Account. See PROX_GOOGLE_003192,
`Google Online Security Blog: So long passwords, thanks for all the phish (googleblog.com)
`(“Starting today, you can create and use passkeys on your personal Google Account.”). Not only
`does the Android OS support the use of Passkeys, but Google also helped to create the standards
`upon which they are based. See PROX_GOOGLE_003192, Google Online Security Blog: So
`long passwords, thanks for all the phish (googleblog.com) (“Passkeys are built on the protocols
`and standards Google helped create in the FIDO Alliance and W3C WebAuthn working group.
`
`
`
`4
`
`Page 12 of 61
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`This means Passkey support works across all platforms and browsers that adopt these standards.
`You can store the passkeys for your Google Account on any compatible device or service.”). As
`the Android OS natively includes a FIDO certified authenticator and supports use the passkeys,
`Android devices must persistently store passkeys on the integrated device.
`
`The specific variant of passkeys stored by the native Android OS authenticator includes a device
`ID code uniquely identifying an integrated device. “[P]asskeys on Android support the proposed
`Device-bound Public Key WebAuthn extension (devicePubKey). If this extension is requested
`when creating or using passkeys on Android, relying parties will receive two signatures in the
`result: One from the passkey private key, which may exist on multiple devices, and an additional
`signature from a second private key that only exists on the current device.”
`PROX_GOOGLE_003187, Google Online Security Blog: Security of Passkeys in the Google
`Password Manager (googleblog.com). The second private key is part of a key pair.
`PROX_GOOGLE_003439, Web Authentication: An API for accessing Public Key Credentials -
`Level (pr-preview.s3.amazonaws.com) (“This authenticator registration extension and
`authentication extension provides a Relying Party with a "device continuity" signal for backup
`eligible credentials. This is done by creating a user credential-specific hardware-bound device
`key pair on the authenticator, if such a key pair does not already exist for the user credential
`being created or exercised, and returning the device public key along with a signature by the
`device private key to the Relying Party.”). The key pair provided by the Device-Bound Public
`Key extension is unique to each Android device. PROX_GOOGLE_003439, Web
`Authentication: An API for accessing Public Key Credentials - Level (pr-
`preview.s3.amazonaws.com) (“The hardware-bound device key pair is not on its own a user
`credential and does not have its own credential ID. Instead, the returned device public key is a
`device-specific contextual attribute of its associated user credential.”). As the key-pair is unique,
`each key of the pair is a unique device ID. However, only the public key is sent to uniquely
`identify an Android device. PROX_GOOGLE_003187, Google Online Security Blog: Security
`of Passkeys in the Google Password Manager (googleblog.com) (“This device-bound private key
`is unique to the passkey in question, and each response includes a copy of the corresponding
`device-bound public key.”); and PROX_GOOGLE_003439, Web Authentication: An API for
`accessing Public Key Credentials - Level (pr-preview.s3.amazonaws.com) (“That is, when that
`user credential is used—along with the devicePubKey extension—on a particular authenticator, a
`particular device public key is returned by the extension, along with a signature demonstrating
`proof-of-possession of the device private key by that device.”). Because device bound-public
`keys are not synced, "observing two passkey signatures with the same device-bound public key
`
`
`
`5
`
`Page 13 of 61
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`is a strong signal that the signatures are generated by the same device. On the other hand, if a
`relying party observes a device-bound public key it has not seen before, this may indicate that
`the passkeys has been synced to a new device." Google Online Security Blog: Security of
`Passkeys in the Google Password Manager, October 12, 2022, PROX_GOOGLE_003187,
`https://security.googleblog.com/2022/10/SecurityofPasskeysintheGooglePasswordManager.html.
`Providing an indication of the integrated device generating a signature, the public key of the
`Device-Bound Public Key extensions key-pair is a device ID code uniquely identifying the
`integrated device.
`
`When a Device Bound Public Key is present, the integrated authenticator within the Android OS
`causes the device to store a private key bound to the device. PROX_GOOGLE_003439 at §
`10.2.2.2 (Defining making a credential with a device bound public key as including “5. Let dpk
`be the newly created or existing device public key, in COSE_Key format in the same fashion as
`for the user credential’s credentialPublicKey when the latter is conveyed in attested credential
`data. 6. Let devicePrivateKey be the newly created or existing device private key.”)) The public
`key corresponding to the private key is returned to the relying party and saved.
`PROX_GOOGLE_003439 at § 10.2.2.3.1 (Stating registration at the relying party includes step
`“6. Create a new device-bound key record … add this device-bound key record to the
`devicePubKeys member of the new credential record.”).) When processing an authentication
`request received from Google Identity, the native Android OS SafetyNet authenticator creates a
`signature with the private key associated with the device-bound public key and then sends the
`signature and the device-bound public key back to Google Identity for verification. Id. at §
`10.2.2.2 (Defining authentication as including “9. Let dpkSig be the result of signing the
`assertion signature input with devicePrivateKey. 10. Output dpkSig as the extension’s unsigned
`extension output.”).) Upon receipt of the authentication response, Google Identity extracts the
`device bound public key from the response and uses it to verify the signature. Id. at § 10.2.2.3.2
`(Defining Relying Party verification of the authentication assertion as including “3. Extract the
`contained fields from attObjForDevicePublicKey: aaguid, dpk, scope, nonce, fmt, attStmt. 4.
`Verify that signature is a valid signature over the assertion signature input (i.e., authData and
`hash) by the device public key dpk.”)) If the device bound public key were changed at any time,
`Google Identity would not be able to verify the signature as it would no longer correspond to the
`authenticator’s device bound private key. Accordingly, by being part of a key pair, the device
`bound public key is in a format unable to be subsequently altered.
`
`
`
`
`6
`
`Page 14 of 61
`
`

`

`‘730 Patent Claim2
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`Of course, if both the private key and public key were altered, then the signature could be
`nominally verified. In such a situation, however, the altered device-bound public key would not
`match any of the device-bound public keys stored by the Relying Party (i.e., Microsoft and
`Google). See Id. at § 10.2.2.3.2 (Steps 5 and 6 detailing, during an authentication ceremony,
`comparing the received device-bound public key to a list of stored device-bound public keys,
`where the lack of a match indicates a new device.). The Relying Party, accordingly, would treat
`the altered device-bound public key as representing a new device and not allow the request
`absent further user verification. Accordingly, by being recorded by the relying party, device-
`bound public keys are further placed in a format unable to be subsequently altered.8
`
`As Google controls the protocol utilized by its Identity platform, including the ability to sync
`passkeys across devices, users wanting the benefit of biometric authentication via passkeys have
`no choice but to store on their device a pair of keys generated by the device bound public key
`extension that uniquely identifies the integrated device in a tamper proof format written to a
`storage element on the integrated device that is unable to be subsequently altered.
`
`
`persistently storing … a secret decryption value in a tamper proof format written to a storage element
`on the integrated device that is unable to be subsequently altered;
`
`
`Passkeys in the Google Password Manager are always end-to-end encrypted. See
`PROX_GOOGLE_003187. When a passkey is backed up, its private key is uploaded only in its
`encrypted form using an encryption key that is only accessible on the user’s own devices. Id.
`Without access to the private key, such an attacker cannot use the passkey to sign into its
`corresponding online account. Id. Accordingly, Android devices must contain a secret decryption
`value (i.e., the encryption key only accessible on the user's own device) to decrypt and use
`synced and backed-up passkeys. The decryption values are inherently in a tamper proof format
`as any alteration would prevent correct decryption of the encrypted passkey and thus render the
`passkey unusable. As such, Android devices contain a secret decryption value in a tamper proof
`format unable to be subsequently altered.
`
`As such encryption is dictated by Google and implemented natively in the Android OS, users
`wanting the benefit of biometric authentication via passkeys have no choice but to store on their
`
`
`
`
`8 In the alternative, the device-bound key pair performs the same function in the same way and achieves the same result as storage in a format that is unable to be subsequently
`altered in that alterations are rendered impossible because alterations break the key pair connection and thus would infringe under the doctrine of equivalents as well.
`
`
`7
`
`Page 15 of 61
`
`

`

`‘730 Patent Claim2
`
` wherein the biometric data is
`selected from a group consisting of
`a palm print, a retinal scan, an iris
`scan, a hand geometry, a facial
`recognition, a signature recognition
`and a voice recognition;
` responsive to receiving a request for
`a biometric verification of the user,
`receiving scan data from a biometric
`scan;
`
` comparing the scan data to the
`biometric data to determine whether
`the scan data matches the biometric
`data;
`
` responsive to a determination that
`the scan data matches the biometric
`data, wirelessly sending one or more
`codes from the plurality of codes
`and the other data values for
`authentication by an agent that is a
`third-party trusted authority
`
`
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`device a secret decryption value in a tamper proof format written to a storage element on the
`integrated device that is unable to be subsequently altered.
`
`
`Android’s development documentation describes that biometric data may include, for example, face
`recognition or a fingerprint (a subset of a palm print): “One method of protecting sensitive information
`or premium content within your app is to request biometric authentication, such as using face
`recognition or fingerprint recognition. This guide explains how to support biometric login flows in your
`app.” PROX_GOOGLE_003271, https://developer.android.com/training/sign-in/biometric-auth
`
`Google describes the use of Passkeys as a biometric alternative to remembering passwords.
`PROX_GOOGLE_003243, Passwordless login with passkeys | Authentication | Google for
`Developers (“Passkeys are a safer and easier alternative to passwords. With passkeys, users can sign in
`to apps and websites with a biometric sensor (such as a fingerprint or facial recognition), PIN, or
`pattern, freeing them from having to remember and manage passwords.”) Signing

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket