throbber
Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 1 of 50 PageID #: 24440
`Case 5:19-cv-00036—RWS Document 442-6 Filed 07/24/20 Page 1 of 50 PageID #: 24440
`
`EXHIBIT 5
`
`EXHIBIT 5
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 2 of 50 PageID #: 24441
`
`Appendix D
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 3 of 50 PageID #: 24442
`
`APPENDIX D
`
`U.S. Patent No. 10,212,586 (the “’586 patent”)
`
`U.S. Patent No. 6,871,063 to Schiffer (“Schiffer”)
`U.S. Patent Application Publication No. 2006/0041746 to Kirkup, et al. (“Kirkup”)
`
`
`
` I
`
` have provided below a claim chart comparing the disclosures of Schiffer to claims 1, 7, 16, and 17 of the ’586 patent (“the ’586
`Asserted Claims”). In my opinion, as detailed below and in my report, Schiffer anticipates and/or renders obvious each of the ’586
`Asserted Claims. I have also provided below a claim chart comparing the disclosures of the combination of Schiffer and Kirkup to the
`’586 Asserted Claims. In my opinion, as detailed below and in my report, the combination of Schiffer and Kirkup renders obvious each
`of the ’586 Asserted Claims.
`
` I
`
` note that the ’586 patent claims priority to Japanese Application No. 2012-117105, filed May 23, 2012. For purposes of this report, I
`apply the May 23, 2012, priority date for the ’586 patent.
`
`Schiffer was filed on June 30, 2000 and issued on March 22, 2005. Schiffer therefore qualifies as prior art with regard to the ’586
`patent under at least 35 U.S.C. § 102(a), § 102(b), and § 102(e).
`
`Kirkup was filed on August 17, 2004 and published on Feb 23, 2006. Kirkup therefore qualifies as prior art with regard to the ’586
`patent under at least 35 U.S.C. § 102(a), § 102(b), and § 102(e).
`
`
`
`U.S. Patent No. 10,212,586
`Claim 1
`[1(pre)]A mobile terminal
`configured to switch between
`an unlocked state and a locked
`state in which a predetermined
`operation is limited,
`comprising:
`
`
`
`
`Schiffer and Kirkup
`
`Schiffer discloses or renders obvious this claim limitation.
`
`As a preliminary matter, I note that all of the ’586 Asserted Claims involve two “mobile terminals,”
`the first of which unlocks the second mobile terminal. For consistency and readability, I provide
`the following overview of the two claimed mobile terminals:
`
`
`
`1
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 4 of 50 PageID #: 24443
`
`
`
`Relevant claim terms
`
`Role
`
`How unlocked
`
`Other claimed hardware
`
`Mobile Terminal 1
`(unlocking device)
`“a mobile terminal” (claim
`1); “a first mobile terminal”
`(claim 16)
`Sending a wireless signal
`containing an unlock
`instruction to the second
`mobile terminal, upon the
`completion of certain
`claimed conditions.
`Upon receiving an
`authentication input (e.g.,
`passcode, biometric input,
`etc.)
`Transceiver, memory,
`controller
`
`Mobile Terminal 2
`(unlocked device)
`“an another mobile” (claim
`1); “a second mobile
`terminal” (claim 16)
`Unlocked upon receiving the
`instruction to unlock sent
`from the first mobile
`terminal.
`
`Upon receiving an instruction
`to unlock from the first
`mobile terminal.
`
`None
`
` note that claim 1 is written to cover aspects of Mobile Terminal 1 in the table above.
`
` I
`
`
`Schiffer teaches “mobile phone 100,” which is a type of mobile terminal:
`
`
`Mobile phone 100 of FIG. 1 may be any mobile phone capable of long-range communication.
`For example, for one embodiment, mobile phone 100 is a cellular phone, in which case long-
`range transceiver circuit 102 may communicate with a cell base.
`Schiffer at 2:30-34. Figure 1, illustrates the key components of the mobile phone disclosed by
`Schiffer:
`
`
`
`
`
`2
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 5 of 50 PageID #: 24444
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`Schiffer further describes the features of the mobile phone 100 disclosed in Figure 1:
`
`
`FIG. 1 is a system formed in accordance with an embodiment of the present invention. Mobile
`phone 100 includes long-range transceiver circuit 102 along with short-range transceiver
`circuit 103, both coupled to SIM 101. Keypad 105 is also coupled to SIM 101. Computer
`system 110 includes short-range transceiver circuit 111, coupled to processor 112, which is
`coupled to memory 113.
`Schiffer at 2:23-29. See generally id. at 2:23-3:12 (describing various features and embodiments
`of the mobile phone 100).
`
`Schiffer’s mobile phone 100 is configured to switch between an unlocked state and a locked state
`by means of an authentication input:
`
`
`
`
`
`3
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 6 of 50 PageID #: 24445
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`In accordance with one embodiment of the present invention, before step 200 of FIG. 2 a user
`may authenticate him or herself to their mobile phone. Authentication of a user to the mobile
`phone may be accomplished by, for example, the user entering a password onto keypad 105
`of mobile phone 100 of FIG. 1. This password may then be compared to information stored
`in the protected memory region of SIM 101 to verify the password. If the password is verified,
`mobile phone 100 may then be unlocked. Unlocking the phone enables the phone to send and
`receive calls via long-range transceiver circuit 102, exchange information via short-range
`transceiver circuit 103, and allows the user to modify phone settings via keypad 105.
`Alternatively, authentication of the user by the mobile phone may include performing voice
`recognition of the user.
`Schiffer at 3:23-37.
`
`
`Note that for one embodiment, the user may authenticate himself or herself to the mobile
`phone by, for example, entering a password into the mobile phone.
`Schiffer at 2:17-19.
`
`
`After authentication between the user and the mobile phone has taken place, at step 200 of
`FIG. 2 the user enters into the short-range, wireless communication range of computer
`system 110 while carrying mobile phone 100 of FIG. 1. Consequently, a short-range, wireless
`communication link, 121, is established between computer system 110 and mobile phone 100,
`according to step 205.
`Schiffer at 3:38-45. See also id. at Claims 1, 7, 11.
`
`When in a locked state, a predetermined operation of the mobile phone is limited because, for
`example, the phone is unable to send or receive calls:
`
`
`Unlocking the phone enables the phone to send and receive calls via long-range transceiver
`circuit 102, exchange information via short-range transceiver circuit 103, and allows the
`user to modify phone settings via keypad 105.
`Schiffer at 3:32-36. Schiffer also discusses locking and securing computer systems more generally:
`
`
`
`
`
`4
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 7 of 50 PageID #: 24446
`
`Schiffer and Kirkup
`To maintain the confidentiality of this information, Some computer systems may be
`voluntarily “locked” or “secured” by a user. When a computer system is locked, access to
`the computer system may be limited. This not only serves to maintain the confidentiality of
`information Stored on the computer system but also deters theft of the computer system.
`Schiffer at 1:16-23.
`
` incorporate by reference my overview of Schiffer in Section VI.G.1. of my report, which also
`explains why Schiffer teaches this limitation.
`Schiffer discloses or renders obvious this claim limitation.
`
`Schiffer teaches that mobile phone 100 includes “short-range transceiver circuit 103.” Schiffer at
`2:23-29, see also FIG. 1:
`
`
` I
`
`U.S. Patent No. 10,212,586
`
`[1(a)] a transceiver which
`performs short-range wireless
`communications;
`
`
`
`
`5
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 8 of 50 PageID #: 24447
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`
`
`
`See also Schiffer at 3:24-37, 4:10-14, 4:38-41.
`
`Schiffer discloses that this short-range transceiver circuit establishes a short-range, wireless
`communication link:
`
`
`After authentication between the user and the mobile phone has taken place, at step 200 of
`FIG. 2 the user enters into the short-range, wireless communication range of computer
`system 110 while carrying mobile phone 100 of FIG. 1. Consequently, a short-range, wireless
`6
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 9 of 50 PageID #: 24448
`
`Schiffer and Kirkup
`communication link, 121, is established between computer system 110 and mobile phone 100,
`according to step 205. In accordance with one embodiment of the present invention, this
`short-range, wireless communication link is a Bluetooth link, and the short-range, wireless
`communication range is the range of the Bluetooth wireless network.
`Schiffer at 3:39-49. See also id. at 3:32-38, 4:10-22, 4:38-41.
`
`Schiffer further discloses that other types of short-range wireless communications may be
`performed by the transceiver in other embodiments:
`
`
`For an alternate embodiment of the present invention, an alternate, short-range, wireless
`communication link is established, such as a HomeRF* link described in the Shared Wireless
`Access Protocol (SWAP) Specification 1.0, released Jan. 5, 1999. (*Trademarks and trade
`names are the property of their respective owners.)
`
`
`
`Alternatively, other short-range, wireless communication links may be established in
`accordance with alternate embodiments of the present invention. It may be found
`advantageous for the range of the short-range, wireless communication to be less than
`approximately 100 feet while the range of the long-range, wireless communication may be
`greater than approximately 1000 feet.
`Schiffer at 3:50-63.
`
` I
`
` incorporate by reference my overview of Schiffer in Section VI.G.1. of my report, which also
`explains why Schiffer teaches this limitation.
`Schiffer discloses or renders obvious this claim limitation.
`
`Schiffer teaches that mobile phone 100 includes “SIM 101” (see FIG. 1, supra), which includes a
`“protected memory region having data stored therein”:
`
`
`SIM 101 of FIG. 1 includes a protected memory region having data stored therein. A protected
`memory region is a memory region that is not generally modifiable by typical users. Thus,
`important information may be securely stored in the protected memory region of SIM 101 with
`
`U.S. Patent No. 10,212,586
`
`[1(b)] a memory which
`previously stores information
`about an another mobile
`terminal; and
`
`
`
`
`7
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 10 of 50 PageID #: 24449
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`a low risk of being compromised. The data stored in the protected memory region of SIM 101
`includes the subscriber identity number associated with the user of mobile phone 100.
`Schiffer at 2:38-45. Schiffer explains that:
`
`
`As described in more detail below, in accordance with an embodiment of the present invention,
`data stored in the protected memory region of SIM 101 of FIG. 1, including the subscriber
`identity number, is used to wirelessly authenticate the user to computer system 110 by
`transmitting an access code.
`Schiffer at 2:60-65.
`
`Schiffer further discloses that this SIM may store data including an “access code” (or data used to
`generate the access code) for computer system 110. As described below, Schiffer therefore
`discloses information about another mobile terminal (i.e. the access code) that is previously stored
`on the SIM:
`
`
`In response, the mobile phone transmits an access code back to the computer system via the
`link. This access code is generated using data stored in the SIM in the mobile phone. After the
`computer system verifies the access code, access to the computer system is granted in response
`to receiving the access code.
`Id. at 2:7-13. Figure 1 of Schiffer illustrates this memory region of mobile phone 100 (“SIM
`101”), which stores the access code.
`
`
`
`
`
`8
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 11 of 50 PageID #: 24450
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`
`
`In some embodiments, the access code is an “alternate value” stored in the SIM and encrypted
`using the subscriber identity number:
`
`
`The access code transmitted from mobile phone 100 to computer system 110 via short-range,
`wireless communication link 121 of FIG. 1 is generated by mobile phone 100 using data stored
`in SIM 101. For one embodiment of the present invention, this data includes the subscriber
`identity number stored in the protected memory region of SIM 101. For added security, the
`access code may be encrypted by mobile phone 100 before being transmitted. The algorithm
`used to encrypt the access code may use data stored in SIM 101. For one embodiment, the
`access code is all or some portion of the subscriber identity number itself. For another
`embodiment, the access code may be an alternate value that may be encrypted using all or
`some portion of the subscriber identity number as an encryption key.
`9
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 12 of 50 PageID #: 24451
`
`U.S. Patent No. 10,212,586
`
`
`
`
`Schiffer and Kirkup
`Id. at 4:23-36. This “alternate value” (once decrypted) may be a “security code” previously stored
`in computer system 110 by the user:
`
`
`For one embodiment of the present invention, the access code may be decrypted by computer
`system 110 before being verified. Verification may include comparing the access code to a
`previously stored value to detect a match or other predetermined relationship. The previously
`stored value may be stored in a protected memory region of memory 113, such as the BIOS.
`This previously stored value may be entered by the user upon initially setting up an
`authentication system in accordance with the present invention. This previously stored value
`may include, for example, the subscriber identity number, or some portion thereof, or other
`security code.
`Id. at 4:41-52.
`
`Because the “security code” is stored on the computer 110 and allows access to the computer
`system 110, it is “information about” computer system 110. Thus, mobile phone 100 stores
`“information about” computer system 110 in its memory.
`
`Finally, Schiffer discloses that the computer systems (such as computer system 110) contemplated
`by its disclosure may be mobile terminals. For example, Schiffer teaches that the computer systems
`for which a lock control system is needed may be a “small handheld electronic device” or a
`“mobile” system:
`
`
`Computer systems, from small handheld electronic devices to medium-sized mobile and
`desktop systems to large servers and workstations, are becoming increasingly pervasive in our
`society. As such, people are becoming more reliant on computer systems to store and access
`information, much of which may be confidential. To maintain the confidentiality of this
`information, some computer systems may be voluntarily “locked” or “secured” by a user.
`When a computer system is locked, access to the computer system may be limited. This not
`only serves to maintain the confidentiality of information stored on the computer system but
`also deters theft of the computer system.
`Id. at 1:11-22. Indeed, Schiffer explains that the security problems it addresses are particularly
`acute with respect to “mobile computer systems.”
`10
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 13 of 50 PageID #: 24452
`
`
`
`Schiffer and Kirkup
`
`This security problem is particularly of concern to mobile computer users.
`Id. at 1:41-42.
`
`No disclosures in Schiffer limit “computer system 110” to a large, immobile computer systems.
`Accordingly, a POSITA would have understood that “computer system 110” described by Schiffer
`could be implemented as handheld electronic devices and mobile computer systems.
`
` I
`
` incorporate by reference my overview of Schiffer in Section VI.G.1. of my report, which also
`explains why Schiffer teaches this limitation.
`Schiffer discloses or renders obvious this claim limitation.
`
` I
`
` understand this claim element to require that the first mobile terminal is unlocked via the
`controller upon receiving an authentication input, such as a passcode or biometrics authentication
`input. Schiffer discloses the mobile phone being unlocked upon receiving such an authentication
`input and it would have been obvious to a POSITA that some hardware must control the unlocking
`based on the authentication input and accordingly that that hardware is the claimed controller.
`
`Schiffer teaches that mobile phone 100 switches between an unlocked state and a locked state based
`on a password, or other authentication input information, provided by the user. This authentication
`input “is compared” to stored information and, if verified, the mobile phone 100 is unlocked:
`
`
`Authentication of a user to the mobile phone may be accomplished by, for example, the user
`entering a password onto keypad 105 of mobile phone 100 of FIG. 1. This password may then
`be compared to information stored in the protected memory region of SIM 101 to verify the
`password. If the password is verified, mobile phone 100 may then be unlocked.
`Schiffer at 3:25-31.
`
`
`Note that for one embodiment, the user may authenticate himself or herself to the mobile
`phone by, for example, entering a password into the mobile phone.
`Schiffer at 2:17-19. See also supra at element [1(pre)].
`
`
`U.S. Patent No. 10,212,586
`
`[1(c)] a controller which
`switches the mobile terminal
`between an unlocked state and
`a locked state based on an
`authentication input to the
`mobile terminal, wherein the
`locked state prevents
`unauthorized access to the
`mobile terminal;
`
`
`
`
`11
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 14 of 50 PageID #: 24453
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`A POSITA would understand the disclosure of this functionality in a mobile phone to disclose the
`claimed “controller.” A POSITA would know that some piece of hardware would control
`“unlock[ing]” mobile phone 100 (switching it from a locked state to an unlocked state) based on
`the password (authentication input) entered into mobile phone 100 by the user. This piece of
`hardware is the claimed controller. For example, a POSITA would understand that a cellular phone,
`such as “mobile phone 100” would have a microprocessor (or microprocessors) for controlling a
`variety of hardware and software tasks associated with running the operating system, controlling
`the user interface, and controlling other hardware components. Such controllers were well known
`in the art at this time and prevalent in cellular phones at the time of Schiffer as well as by the
`priority date of the ’586 patent, as discussed in the technical background portion of my report,
`which I incorporate here by reference. Moreover, a POSITA would have understood that Schiffer’s
`mobile phone 100 is not limited to just the few elements shown in Figure 1, since mobile phones
`are complex devices requiring additional functionality, such as a processor, to function at all.
`Rather, a POSITA would have recognized that Schiffer focused on certain elements integral to its
`invention but that the lack of other elements, such as a controller, would not indicate that a
`controller would not be present.
`
`Further, Schiffer does disclose that computer system 110, a type of mobile terminal, does include
`a processor. See Schiffer at 2:28-30 (“Computer system 110 includes short-range transceiver
`circuit 111, coupled to processor 112, which is coupled to memory 113.”). See also id. at 4:38-41
`and Figure 1. This is consistent with the understanding a POSITA would have had that mobile
`phones have all the elements of a computer as described in the famous Von Neumann architecture:
`a processor, memory to store data and instructions, and I/O devices. See Sections V.D. and VI.D.
`(Technical Background). Thus, the “computer system 110” described in Schiffer also satisfies this
`limitation, and a POSITA would understand that these same components of “computer system 110”
`could be present in a mobile device.
`
`To the extent not implicitly disclosed by Schiffer, it would have been obvious to a POSITA to
`utilize a microprocessor or another type of controller to switch the phone between a locked state
`and an unlocked state based on the authentication input. As described in the Technical Background
`section of my report, a POSITA would have known that cellular phones around the priority date
`and at the time of Schiffer would have a microprocessor or other controller capable of controlling
`12
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 15 of 50 PageID #: 24454
`
`Schiffer and Kirkup
`a variety of hardware and software tasks. See Report at Section VI.D. (incorporated by reference).
`Kirkup, described below, also is exemplary of a POSITA’s knowledge on this subject.
`Accordingly, it would be well within a POSITA’s ability to select and program a microprocessor
`to control unlocking the mobile phone based on an authentication input. A POSITA would have
`been motivated to make this change (to the extent it is a change at all) to improve the efficiency,
`flexibility, and cost of mobile phone 100 and to allow the disclosed security system to operate
`seamlessly on existing mobile phones without the need to add additional hardware, by instead
`taking advantage of the microprocessor already used for other mobile phone functions. For
`example, using a single microprocessor for these tasks would result in a lower cost mobile phone
`because less hardware would be required in order to perform all of the needed functions. Similarly,
`it would add flexibility to the process because different authentication methods known to a POSITA
`could be programmed into the microprocessor. A POSITA would also know that there were open
`source authentication libraries (such as the OpenSSL library released in the late 1990’s, i.e., before
`the time of the filing of the ’586 patent) that could be used for programming the locking and
`unlocking functions described by Schiffer. See Report at Sections V.D. and VI.D. (Technical
`Background).
`
`Schiffer discloses that, in the locked state, unauthorized access (including sending and receiving
`calls, exchanging information and modifying settings) is prevented:
`Unlocking the phone enables the phone to send and receive calls via long-range transceiver
`circuit 102, exchange information via short-range transceiver circuit 103, and allows the user
`to modify phone settings via keypad 105.
`Schiffer at 3:32-35.
`
` incorporate by reference my overview of Schiffer in Section VI.G.1. of my report, which also
`explains why Schiffer teaches, or renders obvious, this limitation.
`
`In addition to being obvious based on Schiffer alone, a POSITA would have been motivated to
`combine Schiffer with Kirkup and the resulting combination would render this limitation obvious.
`Indeed, a POSITA would have recognized that Kirkup provides detail as to the type of controller
`or microprocessor that would be common on mobile phones at the time (and described above with
`reference to Schiffer alone). Kirkup teaches this claim limitation.
`13
`
` I
`
`U.S. Patent No. 10,212,586
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 16 of 50 PageID #: 24455
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`Kirkup teaches that the microprocessor 338 of handheld electronic device 120 performs all
`functions:
`
`
`Handheld electronic device 120 comprises a number of components, the controlling
`component being microprocessor 338. Microprocessor 338 controls the overall operation of
`the handheld electronic device 120. The hardware and software control functions described
`above in relation to FIGS. 1A to 1F and FIG. 2 are performed by microprocessor 338.
`Kirkup at [0085]; see also id. at [0053], and FIG. 2.
`
`These functions include locking (disabling the use of) and unlocking the device based on a user’s
`authentication input:
`The handheld electronic device 120 requires the user to authenticate himself/herself by
`providing a password or PIN code to unlock the user interface of the handheld electronic
`device 120 and enable use thereof.
`Id. at [0045]; see also FIG. 3:
`
`
`
`
`14
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 17 of 50 PageID #: 24456
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`
`
`Kirkup discloses that the use of the user interface of handheld electronic device 120 is conditioned
`on successful authentication:
`
`
`The handheld electronic device may be a dual mode (data and voice) communication device
`and personal digital assistant device, Such as is described in further detail below in relation
`to FIG. 3. Alternatively, the handheld electronic device may be a single mode (data)
`communication device. The handheld electronic device 120 requires the user to authenticate
`himself/herself by providing a password or PIN code to unlock the user interface of the
`handheld electronic device 120 and enable use thereof.
`
`
`
`
`15
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 18 of 50 PageID #: 24457
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`Kirkup at [0045]. In other words, Kirkup discloses that when the handheld electronic device 120
`is in a locked state, unauthorized access to that device is prevented.
`
`See also Kirkup at [0003], [0045], [0053], [0077], [0085], [0097], FIG. 2, FIG. 3.
`
` I
`
` incorporate by reference my overview of Kirkup in Section VI.G.2. of my report, which also
`explains why Kirkup teaches this limitation.
`
` A
`
` POSITA would have been motivated to modify Schiffer to incorporate Kirkup’s microprocessor.
`First, such a combination would provide a component to perform the various functions described
`by Schiffer’s mobile device 100. To the extent Schiffer does not disclose particular hardware that
`performs the various functions such as unlocking mobile phone 100 or utilizing the short-range
`communication unit, adding Kirkup’s microprocessor would be a simple substitution of known
`hardware to perform the disclosed functions and would not require any change in Schiffer.
`Accordingly, a POSITA could use Kirkup’s microprocessor in Schiffer’s disclosed mobile phone
`100 would expect such a substitution to be straightforward and to obtain predictable results. A
`POSITA would have known that Kirkup’s microprocessor could be programmed to perform
`Schiffer’s authentication described supra for this claim limitation. In fact, Kirkup teaches that
`“[m]icroprocessor 338 controls the overall operation of the handheld electronic device 120. The
`hardware and software control functions described above in relation to FIGS. 1A to 1F and FIG. 2
`[of Kirkup] are performed by microprocessor 338.” Kirkup at [0085].
`
`Using a microprocessor to execute the locking and unlocking functions taught by Schiffer would
`add flexibility to the process because, for example, different authentication methods known to a
`POSITA could be programmed into Kirkup’s microprocessor. A POSITA would also know that
`there were open source authentication libraries (such as the OpenSSL library released in the late
`1990’s, i.e., before the time of the filing of the ’586 patent) that could be used for programming the
`locking and unlocking functions described by Schiffer and Kirkup. I discuss these features at length
`in the Technical Background section of my report, incorporated here by reference. See Report at
`Sections V.D. and VI.D. Thus, the combination of Kirkup’s microprocessor with Schiffer would
`amount to the use of a known technique to improve a similar device, method, or product.
`
`
`
`
`
`16
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 19 of 50 PageID #: 24458
`
`Schiffer and Kirkup
`Moreover, a POSITA would have recognized based on Kirkup’s disclosure that utilizing a
`microprocessor has other benefits such as “control[ling] the overall operation of the handheld
`electronic device” as well as performing the “hardware and software control functions.” Kirkup at
`[0085]. Accordingly, the microprocessor runs software “for providing the user interface of [the]
`handheld electronic device.” Kirkup at [0097]. Because the device in Schiffer, like that in Kirkup,
`may be a multi-function mobile electronic device, such as, for example, a cellular phone, a POSITA
`would have been motivated to use Kirkup’s microprocessor to control the operation of the entire
`device, including the unlocking capability, since this would provide greater efficiency and fewer
`components, ultimately resulting in more reliable performance and lower cost than utilizing a
`separate piece of hardware to control the lock state of the device in Schiffer. Utilizing Kirkup’s
`microprocessor would further have allowed Schiffer’s process to be incorporated into any existing
`mobile phone by simply programming the microprocessor to perform the operations described by
`Schiffer, rather than requiring an entirely new device.
`
`Additionally, a POSITA would be further motivated to combine Schiffer and Kirkup because, for
`example, both references address problems of the same nature (i.e., authenticating users of a
`computer using a handheld device) and both disclose requiring authentication of the unlocking
`device prior to using it to unlock a second device. For example, Schiffer discloses that a user may
`be required to authenticate themselves to the mobile phone by entering a password in order to
`unlock the phone. Schiffer at 2:17-19, 3:23-36. Kirkup similarly teaches that “[t]he handheld
`electronic device 120 requires the user to authenticate himself/herself by providing a password or
`PIN code to unlock the user interface of the handheld electronic device 120 and enable use thereof.”
`Kirkup at [0045]. See also id. at [0054].
`
` further incorporate all motivations to combine Schiffer and Kirkup listed in Section VI.G.3. of
`my report.
`Schiffer discloses or renders obvious this claim limitation.
`
`Claim elements [1(d)] through [1(g)] describe three conditions that must be met, in order, before
`the unlock instruction is sent from the first mobile terminal to the second mobile terminal:
`
`
` I
`
`17
`
`U.S. Patent No. 10,212,586
`
`[1(d)] wherein, when
`conditions are met, the
`controller controls the mobile
`terminal to transmit
`information to the another
`mobile terminal for switching
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 20 of 50 PageID #: 24459
`
`U.S. Patent No. 10,212,586
`a state of the another mobile
`terminal from a locked state to
`an unlocked state, wherein the
`conditions include:
`
`Schiffer and Kirkup
`1. Both the first and second mobile terminal must be locked and within short-range wireless
`communication range of each other, [1(e)].
`2. The first mobile terminal must communicate with the second mobile terminal using its
`transceiver and while both devices remain in a locked state, [1(f)].
`3. The first mobile terminal must receive an authentication input (e.g. a password to unlock
`the first mobile terminal), [1(g)].
`4. The first mobile terminal transmits an unlocking instruction to the second mobile terminal,
`[1(d)].
`
`
`Schiffer teaches that, when the conditions are met (as described below; see elements [1(e)], [1(f)],
`and [1(g)]), the controller controls mobile phone 100 to transmit the access code to computer
`system 110:
`
`
`At step 210 of FIG. 2, an access code is transmitted from short-range transceiver circuit 103
`of mobile phone 100 to short-range transceiver circuit 111 of computer system 110 via link
`121 of FIG. 1.
`Schiffer at 4:10-13; see also FIG. 2:
`
`
`
`
`18
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 21 of 50 PageID #: 24460
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`
`
`
`
`This access code causes computer system 110 to grant the user access (i.e., switch state from a
`locked state to an unlocked state):
`Once the access code has been verified by computer system 110 of FIG. 1, the computer
`system grants the user access to the system at step 215 of FIG. 2. If the access code is not
`verified, i.e. no access code is received or the wrong access code is received, access to the
`computer system remains limited.
`Id. at 4:53-58; see also FIG. 2 at step 215 supra.
`
`
`19
`
`
`
`
`

`

`Case 5:19-cv-00036-RWS Document 442-6 Filed 07/24/20 Page 22 of 50 PageID #: 24461
`
`U.S. Patent No. 10,212,586
`
`Schiffer and Kirkup
`As discussed above

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket