throbber
Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 1 of 13 PageID #: 12303
`Case 5:19-cv-00036—RWS Document 348-5 Filed 06/18/20 Page 1 of 13 PageID #: 12303
`
`EXHIBIT 22
`
`EXHIBIT 22
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 2 of 13 PageID #: 12304
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`Invalidity of U.S. Patent No. 10,212,586
`by
`U.S. Patent Application Publication No. 2006/0041746 to Kirkup, et al. (“Kirkup ’746”)
`
`
`The excerpts cited herein are exemplary. For any claim limitation, Defendant may rely on excerpts cited for any other limitation and/or
`additional excerpts not set forth fully herein to the extent necessary to provide a more comprehensive explanation for a reference’s
`disclosure of a limitation. Where an excerpt refers to or discusses a figure or figure items, that figure and any additional descriptions
`of that figure should be understood to be incorporated by reference as if set forth fully therein.
`
`Except where specifically noted otherwise, this chart applies the apparent constructions of claim terms as used by Plaintiff in its
`infringement contentions; such use, however, does not imply that Defendant adopts or agrees with Plaintiff’s constructions in any way.
`
`U.S. Patent No. 10,212,586 (“the ’586 Patent”) claims priority to Japanese Application No. 2012-117105, filed May 23, 2012. For
`purposes of these invaldity contentions, Defendant applies the May 23, 2012, priority date for the ’586 Patent. However, Defendant
`reserves the right to contest Plaintiff’s reliance on the May 23, 2012, priority date, should the priority date become an issue in this
`proceeding.
`
`Kirkup ’746 was filed on August 17, 2004 and published on Feb 23, 2006. As such, Kirkup ’746 qualifies as prior art with regard to
`the ’586 Patent under 35 U.S.C. §§ 102(a), 102(b), and 102(e) (pre-AIA). Alternatively, should the claims of the ’586 Patent be found
`to not be entitled to priority to the foreign filing date, Kirkup ’746 qualifies as prior art under §§ 102(a)(1) and 102(a)(2) (post-AIA).
`Using Plaintiff’s interpretation of the claims, Kirkup ’746 anticipates claims 1-2, 6-7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 102(a),
`(b) and (e).
`
`Alternatively, Kirkup ’746 renders obvious claims 1-2, 6-7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 103(a).
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 7,941,534 to de la Huerga (“de la Huerga ’534”) renders obvious claims 1-2, 6-
`7, 9-10, 13-14, and 16-18 under 35 U.S.C. § 103(a). de la Huerga ’534 was filed on June 26, 2004 and was published on April 28, 2005.
`As such, de la Huerga ’534 qualifies as prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a), 102(b) and 102(e).
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 6,871,063 to Schiffer (“Schiffer ’063”) renders obvious claims 1-2, 6-7, 9-10,
`13-14, and 16-18 under 35 U.S.C. § 103(a). Schiffer ’063 was filed on Jun 20, 2000 and issued on March 22, 2005. As such, Schiffer
`’063 qualifies as prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a), 102(b) and 102(e).
`
`
`
`
`1
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 3 of 13 PageID #: 12305
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`Alternatively, Kirkup ’746 in view of U.S. Patent No. 8,149,089 to Lin (“Lin ’089”) renders obvious claims 1-2, 6-7, 9-10, 13-14, and
`16-18 under 35 U.S.C. § 103(a). Lin ’089 was filed on November 21, 2008 and issued on April 3, 2012. As such, Lin ’089 qualifies as
`prior art with regard to the ’586 Patent under 35 U.S.C. § 102(a) and 102(e).
`
`
`Kirkup ’746
`
`U.S. Patent No. 10,212,586
`Claim 1
`[1(pre)]A mobile terminal
`configured to switch between
`an unlocked state and a locked
`state in which a predetermined
`operation is limited,
`comprising:
`
`[1(a)] a transceiver which
`performs short-range wireless
`communications;
`
`To the extent the preamble is limiting, Kirkup ’746 teaches a mobile terminal that can be locked
`and unlocked:
`
`
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`Kirkup ’746 at ¶ [0045]
`Kirkup ’746 teaches a transceiver which performs short-range communications:
`
`
`Short-range communications subsystem 340 provides for communication between handheld
`electronic device 120 and different systems or devices, such as PC 110. […] Examples of short
`range communication include standards developed by the Infrared Data Association (IrDA),
`Bluetooth, and the 802.11 family of standards developed by IEEE.
`Kirkup ’746 at ¶ [0093]; see also FIG. 3 (depicting “short-range communications subsystem 340”):
`
`
`
`2
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 4 of 13 PageID #: 12306
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`Short-range communications subsystem 340 establishes wireless communications link 145:
`
`
`infrared
`for example, be established by
`link 145 may,
`Wireless communication
`communications or short-range radio frequency communications, such as those specified by
`the Bluetooth or 802.11 standards. […] Other short-range wireless communications media
`and/or protocols may be used to provide communication link 145.
`Wireless communication link 145 may be employed in place of communication link 115 in
`any of the embodiments of systems 100A, 100B, 100C, 100D and 100F (described
`hereinafter).
`
`3
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 5 of 13 PageID #: 12307
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(b)] a memory which
`previously stores information
`about an another mobile
`terminal; and
`
`Id. at ¶¶ [0067]-[0068].
`Kirkup ’746 teaches storing the user’s authetication code for PC 110 (which “may be of any kind
`of computer, such as a normal desktop computer, laptop or other portable or fixed computer
`system,” see ¶ [0047]) in a memory of the mobile device:
`
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Kirkup ’746 at ¶ [0068].
`
`This memory can be, in various disclosed embodiments, smartcard 130, SIM 316 or non-volatile
`memory 324:
`
`
`
`4
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 6 of 13 PageID #: 12308
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`
`
`Alternatively, de la Huerga ’534 teaches this limitation. De la Huerga ’534 teaches that security
`device 10 stores information about other computer devices it can unlock:
`
`
`In some cases the electronic security device can include an address of one or more trusted
`computer systems or servers.
`de la Huerga ’534 at 15:3-4.
`
`These computer devices can include mobile devices (e.g., patient monitoring devices) to which the
`user may authenticate (“mobile terminals”):
`
`
`5
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 7 of 13 PageID #: 12309
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`System 194 includes a plurality of personal computers or computer terminals comprising
`workstations 60 and 60’, which may be located in patient rooms, at nurse stations, in doctor
`offices and administrative offices, a plurality of network devices including databases 158 and
`162 and servers including an Admit, Discharge, and Transfer system or server 166, at least
`one laboratory system or server 170, various bedside treatment devices 116 and 116’ such as
`ventilators and IV infusion pumps, patient monitoring devices 80 and 80’, a pharmacy system
`or server 186, a security verification system or server 168, a billing system or server 171, a
`patient historical records system or server 173 and a unit dose medication dispenser 150.”
`Id. at 20:1-15 (parentheticals omitted).
`
`De la Huerga ’534 further contemplates mobile terminals including patient bracelets (see FIG. 2)
`and locking pill containers (FIG. 5):
`
`
`The other devices include two smart devices including a patient monitor 80’ and a patient
`treatment device 116’, each equipped with a wireless transceiver input device 64 which is
`similar to transceiver 81’ on band 40 (see FIG. 2) and transceiver 81’ on container 200 (see
`FIG. 5)
`Id. at 24:1-5; see also FIGs 2, 5:
`
`
`
`6
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 8 of 13 PageID #: 12310
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`
`Furthermore, de la Huerga ’534 disparages the prior art as not being suitable for portable devices:
`
`
`This [prior art] system is primarily directed to accessing desktop computer terminals on a
`sensitive computer network and is not easily adaptable, however, for restricting access to
`laptops, portable instruments, medical equipment such as respirators, or electronically-
`controlled medication dispensers.
`Id. at 11:38-42.
`
`The motivation to incorporate de la Huerga ’534’s memory storing information about another
`mobile terminal into the system of Kirkup ’746 would be to allow for additional devices to be
`unlocked by the handheld device 120. Modifying Kirkup ’746 in this way would be the use of a
`known technique to improve a similar device in the same way.
`Kirkup ’746 teaches that the microprocessor 338 of handheld device 120 performs all functions:
`
`
`Handheld electronic device 120 comprises a number of components, the controlling
`component being microprocessor 338. Microprocessor 338 controls the overall operation of
`the handheld electronic device 120. The hardware and software control functions described
`above in relation to FIGS. 1A to 1F and FIG. 2 are performed by microprocessor 338.
`Kirkup ’746 at ¶ [0085].
`
`These functions include locking (disabling the use of) and unlocking the device:
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`Kirkup ’746 at ¶ [0045]; see also FIG. 3:
`
`[1(c)] a controller which
`switches the mobile terminal
`between an unlocked state and
`a locked state based on an
`authentication input to the
`mobile terminal, wherein the
`locked state prevents
`unauthorized access to the
`mobile terminal;
`
`
`
`7
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 9 of 13 PageID #: 12311
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(d)] wherein, when
`conditions are met, the
`controller controls the mobile
`terminal to transmit
`information to the another
`mobile terminal for switching
`a state of the another mobile
`terminal from a locked state to
`an unlocked state, wherein the
`conditions include:
`
`
`
`
`Kirkup ’746 teaches that handheld electronic device 120, controlled by the controller, transmits the
`authentication information to PC 110 when the conditions are met, as described below.
`
`
`
`
`The handheld electronic device is configured to transmit the authentication code to the
`computer so as to enable the user to unlock the desktop of the computer and thus gain access
`to the computer functions.
`Kirkup ’746 at ¶ [0040].
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120. Advantageously, the PIN code or other
`
`8
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 10 of 13 PageID #: 12312
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`unlocking code for the handheld electronic device 120 may be entered either into a user
`interface of the handheld electronic device 120 or that of the PC 110 so as to unlock handheld
`electronic device 120 (if it is not already unlocked) and PC 110. … [I]f the user interfaces
`directly with handheld electronic device 120 then, upon authentication of the user (if
`required), the authentication code for PC 110 is extracted from Smart-card 130 and provided
`to PC 110 over communication link 115.
`Kirkup ’746 at ¶ [0053]; see also Fig. 2:
`
`
`
`
`9
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 11 of 13 PageID #: 12313
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`[1(e)] first, the mobile terminal
`is in a locked state, the another
`mobile terminal is in a locked
`state, and the another mobile
`terminal is within
`communication range of the
`
`
`
`
`
`
`Kirkup ’746 teaches that entering the PIN into handheld electronic device 120 serves to unlock
`both it and PC 110 (thus, at the beginning of the authentication process, both devices are necessarily
`in the locked state):
`
`
`10
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 12 of 13 PageID #: 12314
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`short-range wireless
`communications of the
`transceiver while in the locked
`state;
`
`[1(f)] second, after the mobile
`terminal is in the locked state,
`the another mobile terminal is
`in the locked state, and the
`another mobile terminal is
`within communication range
`of the short-range wireless
`communications of the
`transceiver while in the locked
`state, performing, via the
`transceiver, the short-range
`wireless communications with
`the another mobile terminal;
`and
`[1(g)] third, after the
`performing, receiving, by the
`controller, the authentication
`input for switching the mobile
`
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120.
`Kirkup ’746 at ¶ [0053].
`
`Kirkup ’746 further teaches that the process may be initiated when handheld electronic device 120
`enters short-range wireless communications range of PC 110:
`
`
`Advantageously, providing wireless communication link 145 enables a user to approach PC
`110, activate the PC 110 and have it communicate automatically and wirelessly, for example
`using the Bluetooth short-range communication specification, with handheld electronic
`device 120 to access the user's authentication code (stored on the smart-card, SIM card or
`memory of the handheld electronic device) and authenticate the user.
`Id. at ¶ [0068]; see also [0066]-[0067], [0093].
`Kirkup ’746 teaches that wireless communication device 120 automatically communicates over
`communication link 115 (and therefore over wireless communication link 145; see element [1(a)]
`above) with PC 120 when both devices are locked (see element [1(e)] above), when PC 120 detects
`the presence of wireless communication device 120 and initiates the authentication process by
`seeking the authentication code:
`When the user wishes to use PC 110, he or she may perform an activation action, such as
`typing on the keyboard or moving the mouse, whereupon the user may be requested to provide
`a user identification code (either to the PC 110 or the handheld electronic device 120) to
`unlock the PC desktop and enable use thereof […] PC 110 is preferably configured to
`automatically seek the authentication code from handheld electronic device 120 over
`communication link 115 in response to activation.
`Kirkup ’746 at ¶¶ [0048]-[0049]; see also Fig. 2 (supra).
`
`Kirkup ’746 teaches that, responsive to the request for authentication by PC 120, mobile device
`110 requests and receives an authentication code from the user:
`
`Alternatively, if greater security is desired, the handheld electronic device can be configured
`to require entry of a user code, Such as a personal identification number (PIN) or other form
`
`11
`
`

`

`Case 5:19-cv-00036-RWS Document 348-5 Filed 06/18/20 Page 13 of 13 PageID #: 12315
`Defendant’s Invalidity Contentions
`Exhibit H2
`
`
`terminal from the locked state
`to the unlocked state.
`
`Claim 2
`terminal
`[2] The mobile
`according to claim 1, wherein
`the operation
`includes a
`biometrics authentication.
`
`
`
`of authorization, to initiate release of the authentication code for transmission to the
`computer.
`Kirkup ’746 at ¶ [0042].
`
`Depending on the configuration of the handheld electronic device 120, receipt of a
`communication from PC 110 […] may cause the handheld electronic device 120 to request
`user authentication before retrieving the authentication code and communicating it to PC
`110 (or authorization).
`Id. at ¶ [0049].
`
`
`Advantageously, the described arrangements generally allow a user to unlock both the PC
`110 and the handheld electronic device 120 by simply inputting one authorization code,
`namely that for the handheld electronic device 120. Advantageously, the PIN code or other
`unlocking code for the handheld electronic device 120 may be entered either into a user
`interface of the handheld electronic device 120 or that of the PC 110 so as to unlock handheld
`electronic device 120 (if it is not already unlocked) and PC 110. … [I]f the user interfaces
`directly with handheld electronic device 120 then, upon authentication of the user (if
`required), the authentication code for PC 110 is extracted from Smart-card 130 and provided
`to PC 110 over communication link 115.
`Id. at ¶ [0053]; see also Fig. 2 (supra).
`
`
`Kirkup ’746 teaches that the handheld device must be unlocked before the user has access to the
`computer functions:
`
`
`The handheld electronic device is configured to transmit the authentication code to the
`computer so as to enable the user to unlock the desktop of the computer and thus gain access
`to the computer functions.
`Kirkup ’746 at ¶ [0040].
`
`Thus, the “predetermined operation to which access is limited” includes biometric authentication
`together with all other “computer functions” accessed by the user.
`
`
`12
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket