throbber
UNITED STATES DISTRICT COURT FOR THE
`WESTERN DISTRICT OF TEXAS
`
`Civil Action No. 6:23-cv-00320-ADA
`
`PROXENSE, LLC,
`
`Plaintiffs,
`
`v.
`
`GOOGLE LLC,
`
`Defendants.
`
`PLAINTIFF’S PRELIMINARY INFRINGMENT CONTENTIONS
`
`Pursuant to this Court’s Standing Order Governing Proceedings in Patent Cases,
`
`Plaintiff Proxense, LLC (“Proxense” or “Plaintiff”), hereby provides its final infringement
`
`contentions concerning Defendant Google LLC, (“Google”, or “Defendant”).
`
`Proxense hereby certifies that it undertook reasonable efforts to prepare its preliminary
`
`infringement contentions and reserves the right to amend them based on material identified
`
`after the invalidity contentions are served and during discovery.
`
`These
`
`infringement contentions are based on Plaintiff’s current knowledge,
`
`understanding, and belief as to the facts and information available to it as of the date of these
`
`disclosures. Proxense has not yet completed its investigation, collection of information,
`
`discovery, or analysis related to this action. The evidence cited in support of the disclosures
`
`herein is necessarily exemplary and is therefore illustrative and not exhaustive. For example,
`
`Proxense anticipates that relevant facts and evidence are uniquely within the possession,
`
`custody, or control of Defendants. As such, Proxense reserves the right to supplement,
`
`amend, or modify the information contained herein and to use and introduce at trial such
`
`information and any subsequently-identified or discovered information.
`
`Page 1 of 49
`
`GOOGLE EXHIBIT 1015
`
`

`

`These final infringement contentions are based at least in part upon Proxense’s present
`
`understanding of U.S. Patent No. 8,352,730 (the “730 patent”), U.S. Patent No. 8,886,954 (the
`
`“954 Patent”), U.S. Patent No. 9,298,905 (the “905 patent”), U.S. Patent No. 8,646,042 (the
`
`“042 Patent”), U.S. Patent No. 9,679,289 (the “289 Patent”), U.S. Patent No. 10,073,960 (the
`
`“960 Patent”) and the accused products in the absence of discovery. The 730, 954, 905, 042,
`
`289, and 960 Patents are collectively referred to herein as the “Proxense Patents” or the
`
`“Patents-in-Suit.”
`
`Proxense reserves the right to amend its infringement contentions and asserted claims
`
`based on information Proxense obtains through discovery and otherwise as this case
`
`progresses. Proxense further reserves the right to amend its final infringement contentions and
`
`asserted claims based on any proceedings before the United States Patent and Trademark
`
`
`
`
`
`Office regarding the Proxense Patents.
`
`I.
`
`IDENTIFICATION OF INFRINGED CLAIMS
`
`The asserted claims of the Patents-in-Suit are as follows:
`
`
`730 Patent
`954 Patent
`905 Patent
`042 Patent
`289 Patent
`960 Patent
`
`
`
`Claims
`1-3, 5, 15-17 (Google Passwordless) and 1-2, 5
`(Google Pay)
`1-3, 5-7, 22-27 (Google Passwordless) and 1-2, 5-7
`(Google Pay)
`1-2, 15 (Google Passwordless) and 1, 4-5, 7 (Google
`Pay)
`10
`14, 16
`14, 16
`
`Proxense
`
`identifies
`
`these asserted claims based on
`
`its current, preliminary
`
`understanding and reserves the right to supplement and/or change its identification as discovery
`
`proceeds, including identifying additional claims and withdrawing claims.
`
`II.
`
`IDENTIFICATION OF ACCUSED PRODUCTS, SYSTEMS,
`
`Page 2 of 49
`
`

`

`
`
`METHODS ANDSERVICES
`
`Based on the information currently available, Proxense identifies the following accused
`
`products, systems, and methods, including all reasonably similar products, systems, methods,
`
`and their variants for each of the Patents-in-Suit.
`
`Hereafter, the term “Accused Instrumentalities” or “Accused Products” refers to the
`
`products listed below, (1) Google’s Universal Passwordless Architecture, which includes (a) Android
`
`Operating System (“OS”), (b) Android SafetyNet Authenticator, (c) Chrome browser, and (d) Google
`
`Identity Platform (also known as Google Identity Services or Google Cloud Identity Platform), (2)
`
`Google Pay services (also known as Google Wallet) and all Google devices preloaded with Google
`
`Pay/Wallet.
`
`III. CHARTS SETTING FORTH WHERE IN THE ACCUSED
`PRODUCT(S) EACH ELEMENT OF THE ASSERTED CLAIM(S) ARE
`FOUND
`
`Subject to ongoing discovery and investigation, Proxense provides claim charts
`
`pertaining to the Patents-in-Suit attached hereto as Exhibits A1-A2 for the 730 patent, Exhibits
`
`B1-B2 for the 905 patent, Exhibits C1-C2 for the 989 patent, Exhibit D for the 042 patent,
`
`Exhibit E for the 289 patent, and Exhibit F for the 960 patent. These infringement contentions
`
`serve a notice function and are not required to—and therefore do not—present every possible
`
`permutation or theory of Proxense’s case.
`
`IV.
`
`LITERAL INFRINGEMENT AND INFRINGEMENT UNDER
`THE DOCTRINEOF EQUIVALENTS
`Proxense contends that Google’s products literally infringe the asserted claims of the
`
`Patents-in-Suit as more specifically explained in the attached claim charts. Proxense reserves
`
`the right to assert infringement under the doctrine of equivalents to the extent that the difference
`
`between any component of any product or system, and any step of any service, method, and/or
`
`Page 3 of 49
`
`

`

`claim element is insubstantial.
`
`V.
`
`PRIORITY DATES AND ALL DOCUMENTS EVIDENCING
`CONCEPTION ANDREDUCTION TO PRACTICE FOR EACH
`CLAIMED INVENTION
`
`The 730 patent matured from application number 11/314,199 (“the 199 application”),
`
`which was filed on December 20, 2005. The 905 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 730 patent are being
`
`collected and will be produced shortly.
`
`The 954 patent matured from application number 13/710,109 (“the 109 application”),
`
`which was filed on December 10, 2012. The 905 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 954 patent are being
`
`collected and will be produced shortly.
`
`The 905 patent matured from application number 14/521,982 (“the 982 application”),
`
`which was filed on October 23, 2014. The 982 application claims priority from provisional
`
`patent application 60/637,538 which was filed on December 20, 2004. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 905 patent are being
`
`collected and will be produced shortly.
`
`The 042 patent matured from application number 13/445,825 (“the 825 application”),
`
`which was filed on April 12, 2012. The 825 application claims priority from provisional patent
`
`application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 042 patent are being
`
`collected and will be produced shortly.
`
`The 289 patent matured from application number 14/961,645 (“the 645 application”),
`
`Page 4 of 49
`
`

`

`which was filed on December 7, 2015. The 645 application claims priority from provisional
`
`patent application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 289 patent are being
`
`collected and will be produced shortly.
`
`The 960 patent matured from application number 15/595,739 (“the 739 application”),
`
`which was filed on May 15, 2017. The 739 application claims priority from provisional patent
`
`application 60/992,953 which was filed on December 6, 2007. Documents evidencing
`
`conception and/or reduction to practice for the claimed inventions of the 960 patent are being
`
`collected and will be produced shortly.
`
`VI. A COPY OF THE FILE HISTORY FOR EACH PATENT IN SUIT
`
`A copy of the file history for each of the Patents-in-Suit is submitted herewith. The
`
`file history of the 730 patent bears production numbers PROX_GOOGLE_000001-
`
`PROX_GOOGLE_00805. The file history of the 954 patent bears production numbers
`
`PROX_GOOGLE_00806- PROX_GOOGLE_01392. The file history of the 905 patent bears
`
`production numbers PROX_GOOGLE_001393- PROX_GOOGLE_001936. The file history
`
`of the 042 patent bears production numbers PROX_GOOGLE_001937-
`
`PROX_GOOGLE_002433. The file history of the 289 patent bears production numbers
`
`PROX_GOOGLE_002434- PROX_GOOGLE_002616. The file history of the 960 patent
`
`bears production numbers PROX_GOOGLE_002617- PROX_GOOGLE_002818.
`
`
`
`
`
`
`Dated: July 24, 2023
`
`
`
` Respectfully submitted,
`
`
`
`/s/ David L. Hecht
`David L. Hecht (Co-Lead Counsel)
`dhecht@hechtpartners.com
`
`Page 5 of 49
`
`

`

`Maxim Price (pro hac vice)
`mprice@hechtpartners.com
`Yi Wen Wu (pro hac vice)
`wwu@hechtpartners.com
`HECHT PARTNERS LLP
`125 Park Avenue, 25th Floor
`New York, New York 10017
`Telephone: (212) 851-6821
`
`Brian D. Melton (Co-Lead Counsel)
`bmelton@susmangodfrey.com
`Geoffrey L. Harrison
`gharrison@susmangodfrey.com
`Meng Xi
`mxi@susmangodfrey.com
`Bryce T. Barcelo
`bbarcelo@susmangodfrey.com
`SUSMAN GODFREY L.L.P.
`1000 Louisiana Street, Suite 5100
`Houston, Texas 77002-5096
`Telephone: (713) 653-7807
`Facsimile: (713) 654-6666
`
`Lear Jiang
`ljiang@susmangodfrey.com
`SUSMAN GODFREY L.L.P.
`1900 Avenue of the Stars, Suite 1400
`Los Angeles, California 90067-6029
`Telephone: (310) 789-3100
`Facsimile: (310) 789-3150
`
`Counsel for Plaintiff Proxense, LLC
`
`Attorneys for Plaintiff Proxense, LLC
`
`
`
`
`Page 6 of 49
`
`

`

`
`
`CERTIFICATE OF SERVICE
`
`I hereby certify that on July 24, 2023, the foregoing was served on counsel for Defendant
`
`Google, LLC.
`
`/s/ David L. Hecht
`David L. Hecht
`
`
`
`
`
`Page 7 of 49
`
`

`

`Exhibit B1
`Exhibit B1
`
`Page 8 of 49
`
`Page 8 of 49
`
`

`

`U.S. Patent Number 9,298,905 – Preliminary Infringement Contentions1
`
`
`Assignee:
`Title:
`Filing Date:
`Publication Date:
`Inventor:
`
`Proxense, LLC
`Biometric personal data key (PDK) authentication
`2014-10-23
`2016-03-29
`Giobbi, John J.
`
`
`
`‘905 Patent Claim2
`1
`A method comprising4:
`
`Accused Instrumentality And Where Each Claim Element Is Found3
`This preamble is not limiting.
`
`Google uses, distributes, sells, and/or offers to sell a Universal Passwordless Architecture (“UPA”) (e.g.
`PROX_GOOGLE_003243, https://developers.google.com/identity/passkeys , which includes: (a)
`Android OS, (b) Android SafetyNet Authenticator, (c) Chrome, and (d) Google Identity Platform
`(“GIP”), which together infringe, literally or under the doctrine of equivalents, the claimed limitations
`as presented below.
`
`
`1 The Preliminary Infringement Contentions (PICS) provided herein are based on information obtained to date and may not be exhaustive. Plaintiff’s
`investigation of Defendants’ infringement is ongoing. Plaintiff reserves the right to supplement and/or amend these PICS to identify additional
`instrumentalities and to further identify where each element of each claim is found in each accused instrumentality, including on the basis of
`discovery obtained from Defendants, and from third parties during the course of this litigation, pursuant to ¶2 of the Order Governing Proceedings –
`Patent Cases under Hon. Alan D. Albright.
`
` 2
`
` All PICS set forth herein for any independent patent claims are hereby incorporated by reference into the PICS alleged for any dependent patent
`claims that depend on such independent claims, as if fully set forth therein.
`
` 3
`
` The Accused Instrumentalities and associated exhibits discussed and/or cited for any claim herein are representative in all material respects of all
`other accused instrumentalities identified for that claim (e.g., a specified device or service may be used as a representative example in these charts
`since the other accused instrumentalities have immaterial differences in their hardware and/or software configuration, the cited references are
`believed to be illustrative of all such accused devices).
`
` 4
`
` Plaintiff’s inclusion of any claim preamble in this claim chart should not be interpreted as an admission that the preamble is limiting. Plaintiff
`reserves the right to take the position that the claim preambles are limiting or not limiting on a claim-by-claim basis.
`
`
`Page 9 of 49
`
`

`

`persistently storing biometric
`data of a legitimate user and an
`ID code on an integrated
`device;
`
`
`Google, through its own actions, and the action of its customers, which Google directs and controls, has
`created and sells5 the use of UPA, including Android/Chrome preloaded6 devices, servers, and software
`supporting and integrating into the UPA architecture. Servers integrating with and supporting the
`architecture include GIP providing FIDO and/or OAuth services. Devices integrating and supporting
`the architecture include devices utilizing the Android OS. Software integrating with and supporting the
`architecture include the Chrome web browser and Android SafetyNet Authenticator.
`persistently storing biometric data of a legitimate user
`
`
`Saving cards to their Google Account enables an expedited checkout process when shopping
`online. See PROX_GOOGLE_003232, Overview | Google Pay API | Google for Developers
`(“When a user clicks the Google Pay payment button, they see a payment sheet that displays the
`payment methods saved to their Google Account, as well as optional fields such as a shipping
`address field. Users can quickly select a payment method, add an optional shipping address, or
`add new information.”). Expediting checkout with saved cards, however, requires the user sign
`into their Google Account, which can be accomplished using biometrics persistently stored on
`Android devices.
`
`Starting with Android 10, Google stored biometric data on Android devices includes a
`fingerprint and facial recognition. PROX_GOOGLE_002913,
`https://source.android.com/docs/security/features/biometric#android10 (“Android 10: Introduces
`the BiometricManager class that developers can use to query the availability of biometric
`authentication. Includes fingerprint and face authentication integration for BiometricPrompt”).
`Android Open-Source Project: Fingerprint HIDL,
`https://source.android.com/docs/security/features/authentication/fingerprint-hal
`
`Per Google’s instructions, Android devices store the biometric data of a legitimate user of the
`device.
`
`
`
`5 See e.g. PROX_GOOGLE_003250, https://cloud.google.com/identity-platform/pricing.
`
`6 For the avoidance of doubt, “preloaded” includes devices that ship with Android and other accused software pre-installed or upon which Android
`and other accused software is otherwise installed by Defendant (e.g., through operating system upgrades, updates, initial installation, or otherwise).
`
`Page 10 of 49
`
`

`

`
`
`
`
`PROX_GOOGLE_002913,
`https://source.android.com/docs/security/features/biometric#android10
`
`persistently storing … an ID code on an integrated device
`
`
`Saving cards to their Google Account enables an expedited checkout process when shopping
`online. See PROX_GOOGLE_003232, Overview | Google Pay API | Google for Developers
`(“When a user clicks the Google Pay payment button, they see a payment sheet that displays the
`payment methods saved to their Google Account, as well as optional fields such as a shipping
`address field. Users can quickly select a payment method, add an optional shipping address, or
`add new information.”). Expediting checkout with saved cards, however, requires the user sign
`into their Google Account, which can be accomplished using device-bound public keys
`persistently stored on Android devices
`
`The Android OS natively includes the Android SafetyNet Authenticator, which is FIDO certified.
`accessible via the FIDO2 API for Android. See PROX_GOOGLE_003793, FIDO® Certified -
`FIDO Alliance. In operation, authenticators store and access the cryptographic material
`underlying FIDO Passkeys. See PROX_GOOGLE_002819, AccountManager | Android
`Developers (“Authenticators (which may be written by third parties) handle the actual details of
`
`Page 11 of 49
`
`

`

`validating account credentials and storing account information. For example, Google, Facebook,
`and Microsoft Exchange each have their own authenticator.”); PROX_GOOGLE_003088, FIDO
`Technical Glossary (fidoalliance.org) (Defining an FIDO Authenticator as “responsible for user
`verification, and maintaining the cryptographic material required for the relying party
`authentication.”); and PROX_GOOGLE_003439, Web Authentication: An API for accessing
`Public Key Credentials - Level 3 (w3.org) (Defining an authenticator as “A cryptographic entity,
`existing in hardware or software, that can register a user with a given Relying Party and later
`assert possession of the registered public key credential, and optionally verify the user, when
`requested by the Relying Party.”).
`
`Having a native authenticator, Android devices support the use of FIDO Passkeys. See
`PROX_GOOGLE_003187, Google Online Security Blog: Security of Passkeys in the Google
`Password Manager (googleblog.com) (“Passkeys are the result of an industry-wide effort. They
`combine secure authentication standards created within the FIDO Alliance and the W3C Web
`Authentication working group with a common terminology and user experience across different
`platforms, recoverability against device loss, and a common integration path for developers.
`Passkeys are supported in Android and other leading industry client OS platforms.”).
`Accordingly, instead of the traditional username and password combination, users of Android
`devices may utilize a passkey to access their Google Account. See PROX_GOOGLE_003192,
`Google Online Security Blog: So long passwords, thanks for all the phish (googleblog.com)
`(“Starting today, you can create and use passkeys on your personal Google Account.”). Not only
`does the Android OS support the use of Passkeys, but Google also helped to create the standards
`upon which they are based. See id. Google Online Security Blog: So long passwords, thanks for
`all the phish (googleblog.com) (“Passkeys are built on the protocols and standards Google
`helped create in the FIDO Alliance and W3C WebAuthn working group. This means passkey
`support works across all platforms and browsers that adopt these standards. You can store the
`passkeys for your Google Account on any compatible device or service.”). As the Android OS
`natively includes a FIDO certified authenticator and supports use the passkeys, Android devices
`must persistently store passkeys on the integrated device.
`
`The specific variant of passkeys stored by the native Android OS authenticator includes a device
`ID code uniquely identifying an integrated device. “[P]asskeys on Android support the proposed
`Device-bound Public Key WebAuthn extension (devicePubKey). If this extension is requested
`when creating or using passkeys on Android, relying parties will receive two signatures in the
`result: One from the passkey private key, which may exist on multiple devices, and an additional
`signature from a second private key that only exists on the current device.”
`PROX_GOOGLE_003187, Google Online Security Blog: Security of Passkeys in the Google
`Password Manager (googleblog.com). The second private key is part of a key-pair.
`PROX_GOOGLE_003439, Web Authentication: An API for accessing Public Key Credentials -
`
`Page 12 of 49
`
`

`

`Level (pr-preview.s3.amazonaws.com) (“This authenticator registration extension and
`authentication extension provides a Relying Party with a “device continuity” signal for backup
`eligible credentials. This is done by creating a user credential-specific hardware-bound device
`key pair on the authenticator, if such a key pair does not already exist for the user credential
`being created or exercised, and returning the device public key along with a signature by the
`device private key to the Relying Party.”). The key pair provided by the Device-Bound Public
`Key extension is unique to each Android device. Id. Web Authentication: An API for accessing
`Public Key Credentials - Level (pr-preview.s3.amazonaws.com) (“The hardware-bound device
`key pair is not on its own a user credential and does not have its own credential ID. Instead, the
`returned device public key is a device-specific contextual attribute of its associated user
`credential.”). As the key-pair is unique, each key of the pair is a unique device ID. However,
`only the public key is sent to uniquely identify an Android device. PROX_GOOGLE_003187,
`Google Online Security Blog: Security of Passkeys in the Google Password Manager
`(googleblog.com) (“This device-bound private key is unique to the passkey in question, and
`each response includes a copy of the corresponding device-bound public key.”); and
`PROX_GOOGLE_003439, Web Authentication: An API for accessing Public Key Credentials -
`Level (pr-preview.s3.amazonaws.com) (“That is, when that user credential is used—along with
`the devicePubKey extension—on a particular authenticator, a particular device public key is
`returned by the extension, along with a signature demonstrating proof-of-possession of the
`device private key by that device.”). Because device bound-public keys are not synced,
`“observing two passkey signatures with the same device-bound public key is a strong signal that
`the signatures are generated by the same device. On the other hand, if a relying party observes a
`device-bound public key it has not seen before, this may indicate that the passkeys has been
`synced to a new device.” PROX_GOOGLE_003187, Google Online Security Blog: Security of
`Passkeys in the Google Password Manager, October 12, 2022,
`https://security.googleblog.com/2022/10/SecurityofPasskeysintheGooglePasswordManager.html.
`Providing an indication of the integrated device generating a signature, the public key of the
`Device-Bound Public Key extensions key-pair is a device ID code uniquely identifying the
`integrated device.
`
`
`
`Google describes the use of Passkeys as a biometric alternative to remembering passwords.
`Passwordless login with passkeys | Authentication | Google for Developers (“Passkeys are a safer and
`easier alternative to passwords. With passkeys, users can sign in to apps and websites with a biometric
`sensor (such as a fingerprint or facial recognition), PIN, or pattern, freeing them from having to
`remember and manage passwords.”) Signing in with a biometric sensor necessarily requires prompting
`a user for a response to an authentication request wherein Google receives scan data from a biometric
`scan. Google utilizes the biometric sensors in smartphones, tablets, and computers to receive data from
`those biometric scans.
`
`responsive to receiving a
`request for a biometric
`verification of a user, receiving
`from a biometric sensor, scan
`data from a biometric scan
`performed by the biometric
`sensor;
`
`Page 13 of 49
`
`

`

`
`
`comparing the scan data to the
`biometric data to determine
`whether the scan data matches
`the biometric data;
`
`
`
`Passwordless login with passkeys | Authentication | Google for Developers
`PROX_GOOGLE_003243, https://developers.google.com/identity/passkeys;
`PROX_GOOGLE_003833, Sign in with a passkey on a phone
`(https://www.youtube.com/watch?v=ywQ8bFla-L8).
`
`
`
`Google describes the use of Passkeys as a biometric alternative to remembering passwords.
`PROX_GOOGLE_003243, Passwordless login with passkeys | Authentication | Google for
`Developers (“Passkeys are a safer and easier alternative to passwords. With passkeys, users can sign in
`to apps and websites with a biometric sensor (such as a fingerprint or facial recognition), PIN, or
`pattern, freeing them from having to remember and manage passwords.”) Signing in with a biometric
`senssor necessarily requires comparing the scan data to the biometric data to determine whether the scan
`data matches the biometric data.
`
`
`Page 14 of 49
`
`

`

`responsive to a determination
`that the scan data matches the
`biometric data, wirelessly
`sending the ID code for
`comparison by a third-party
`trusted authority against one or
`more previously registered ID
`codes maintained by the third
`party trusted authority
`
`
`
`Passwordless login with passkeys | Authentication | Google for Developers
`PROX_GOOGLE_003243, https://developers.google.com/identity/passkeys;
`PROX_GOOGLE_003833, Sign in with a passkey on a phone
`(https://www.youtube.com/watch?v=ywQ8bFla-L8).
`
`
`responsive to a determination that the scan data matches the biometric data, wirelessly sending
`
`
`As detailed by Google using passkeys to sign into a service or application is a simple as unlocking
`their Android device with fingerprint or facial recognition. PROX_GOOGLE_003192, Google
`Online Security Blog: So long passwords, thanks for all the phish (googleblog.com) (“Passkeys
`are a more convenient and safer alternative to passwords. They work on all major platforms and
`browsers, and allow users to sign in by unlocking their computer or mobile device with their
`fingerprint, face recognition or a local PIN.”); and PROX_GOOGLE_003243, Passwordless login
`with passkeys | Authentication | Google for Developers (“When a user wants to sign in to a
`service that uses passkeys, their browser or operating system will help them select and use the
`right passkey. The experience is similar to how saved passwords work today. To make sure only
`the rightful owner can use a passkey, the system will ask them to unlock their device. This may be
`
`Page 15 of 49
`
`

`

`performed with a biometric sensor (such as a fingerprint or facial recognition), PIN, or pattern.”).
`This ease of access if provided by Google’s FIDO certified SafetyNet Authenticator utilizing the
`FIDO2 API for Android. See PROX_GOOGLE_003775 (“The FIDO2 API allows Android
`applications to create and use strong, attested public key- based credentials for the purpose of
`authenticating users. The API provides a WebAuthn Client implementation, which supports the
`use of BLE, NFC, and USB roaming authenticators (security keys) as well as a platform
`authenticator, which allows the user to authenticate using their fingerprint or screenlock.”) In
`operation, the SafetyNet Authenticator utilizes the native capacities of the Android OS, such as
`the Android Keystore to store the cryptographic public-private key pairs underlying the device-
`bound public key extension. See PROX_GOOGLE_003795 ((“The typical way to develop secure
`authenticator on Android mobile devices (smartphones and tablets) is to use a secured hardware-
`backed operating environment... This includes technology such as TEE (“Trusted Execution
`Environment”) that performs cryptographic and other sensitive operations including digital
`signing and biometric data processing used to support FIDO functionality... Android Keystore
`allows app developers to store cryptographic keys in a container and use them in cryptographic
`operations via APIs. Android also offers protection of the fingerprint sensor data via a TEE, which
`allows for encryption and cryptographic authentication... Adding a small application to
`complement some function that are necessary to perform as UAF 1.1 authenticator enables
`Android Keystore with hardware-backed key attestations and fingerprint sensor to become a
`secure FIDO UAF 1.1 authenticator.”). The Android Keystore securely holds a passkey until it is
`unlocked
`by
`biometric
`verification.
`
`See PROX_GOOGLE_003785;
`also
`see
`PROX_GOOGLE_003177, Fingerprint HIDL | Android Open Source Project (“When generating
`or importing a key into the Android KeyStore, you can specify that the key is only authorized to
`be used if the user has been authenticated. The user is authenticated using a subset of their secure
`lock screen credentials (pattern/PIN/password, biometric credentials).”). Biometric unlocking
`within the Android OS is provided by Fingerprint HIDL. See PROX_GOOGLE_003177,
`Fingerprint HIDL | Android Open Source Project (“On devices with a fingerprint sensor, users
`can enroll one or more fingerprints and use those fingerprints to unlock the device and perform
`other tasks. Android uses the Fingerprint Hardware Interface Definition Language (HIDL) to
`connect to a vendor-specific library and fingerprint hardware (for example, a fingerprint sensor)”).
`Accordingly, by utilizing Fingerprint HIDL in combination with the KeyStore, the Android OS
`releases a passkey after a determination that the scan data matches the biometric data.
`
`As detailed supra, Google utilizes device-bound public key extension, which requires
`concurrently sending a public-key and a signature generated with a device-bound private to be
`verified with the public-key. PROX_GOOGLE_003439, Web Authentication: An API for
`accessing Public Key Credentials - Level (pr-preview.s3.amazonaws.com) (“That is, when that
`user credential is used—along with the devicePubKey extension—on a particular authenticator,
`a particular device public key is returned by the extension, along with a signature demonstrating
`
`Page 16 of 49
`
`

`

`proof-of-possession of the device private key by that device.”). As Android devices possess
`cellular and/or Wi-Fi capability, the signature and device bound public key uniquely identifying
`the integrated device sent to Google Identity Platform will be sent wirelessly – either via Wi-Fi
`or a cellular network to the internet.
`
`While the native Android OS authenticator permits the use of passkey in a variety of situations,
`each transmits the device bound public key and corresponding signature over the internet. When
`a user wishes to use a passkey stored on their Android device to access a resource via a browser
`the user is presented with either a QR code or push notification. See PROX_GOOGLE_003236,
`Passkey support on Android and Chrome | Authentication | Google for Developers
`(“Depending on the desktop operating system (e.g. ChromeOS, iOS, MacOS, Windows) users
`may be presented with a QR code to securely use a passkey stored on their mobile device, or a
`notification may be displayed prompting the user to unlock their phone to use the relevant
`passkey.”). In the case of a QR code, the user scans a QR code displayed on the screen of a
`device. PROX_GOOGLE_003192, Google Online Security Blog: So long passwords, thanks
`for all the phish (googleblog.com) (“When you do need to use a passkey from your phone to
`sign in on another device, the first step is usually to scan a QR code displayed by that device.”).
`Proximity between the devices is then verified using Bluetooth. PROX_GOOGLE_003239,
`Passkeys use cases | Authentication | Google for Developers (“The two devices verify that
`they are in proximity with each other using Bluetooth.”). The Bluetooth connection is also
`utilized to establish a secure connection between the devices via the internet.
`PROX_GOOGLE_003192, Google Online Security Blog: So long passwords, thanks for all the
`phish (googleblog.com) (“The device then verifies that your phone is in proximity using a small
`anonymous Bluetooth message and sets up an end-to-end encrypted connection to the phone
`through the internet..”) Utilizing the internet connection, the Android device sends one-time
`passkey signature, including the device-bound public key, to the other device, which is used to
`sign in the user. PROX_GOOGLE_003239, Passkeys use cases | Authentication | Google for
`Developers (“A one-time passkey signature is transferred back to Safari on the Mac, which the
`website then uses to sign the user in.”). Establishing the connection over the internet would
`require utilizing either the device’s wi-fi or cellular capabilities – both of which are wireless
`protocol. Accordingly, responsive to a determination that the scan data matches the biometric
`data, Android devices wirelessly send a passkey signature and accompanying device-bound
`public key uniquely identifying the device.
`
`Push notifications can originate with the “Sign in with Google” button. To receive the benefit of
`quickly and easily managing user authentication utilizing “Sign-in with Google”, the website
`must display a “Sign in with Google” button, which is generated by the Google Identity Services
`JavaScript library, or provide the user the option to sign in with a passkey.
`PROX_GOOGLE_03779 (“Put it another way, the Sign in with Google button must be
`
`Page 17 of 49
`
`

`

`generated by the Google Identity Services JavaScript library now. The button rendering API
`allows you to customize the color, shape, text, and size to meet the branding requirements of
`your website, whereas still stick to Google's guidelines.”); and PROX_G

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket