throbber
Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 1 of 23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 12
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 2 of 23
`
`UNITED STATES DISTRICT COURT
`FOR THE WESTERN DISTRICT OF TEXAS
`WACO DIVISION
`
`
`Plaintiff,
`
`
`
`v.
`
`Defendants.
`
`Plaintiff,
`
`Defendant.
`
`Plaintiff,
`
`
`
`
`
`v.
`
`
`
`
`
`v.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`SAMSUNG ELECTRONICS CO., LTD. and
`SAMSUNG ELECTRONICS AMERICA, INC.,
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`APPLE INC.
`
`
`
`AIRE TECHNOLOGY LTD.,
`
`
`
`
`
`GOOGLE LLC,
`
`
`
`
`
`Case No. 6:21-cv-955-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`Case No. 6:21-cv-1101-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`Case No. 6:21-cv-1104-ADA
`
`JURY TRIAL DEMANDED
`
`
`
`
`Defendant.
`
`
`
`
`
`
`
`DECLARATION OF DR. HUGH SMITH IN SUPPORT OF
`AIRE’S RESPONSIVE CLAIM CONSTRUCTION BRIEF
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 3 of 23
`
`INTRODUCTION
`
`I, Hugh Smith, Ph.D hereby declare and state as follows:
`
`I.
`
`
`1.
`
`I have been retained by Plaintiff Aire Technology Ltd. (“Aire”) to provide my
`
`opinions as to the scope and meaning of certain terms and phrases appearing in U.S. Patent No.
`
`8,205,249 (“the ’249 Patent”) as a person of ordinary skill in the art at the time of the inventions
`
`(“POSITA”). I understand that Defendants Samsung Electronics Co., Ltd. and Samsung
`
`Electronics America, Inc. (“Samsung”), Apple Inc. (“Apple”), and Google LLC (“Google”)
`
`(collectively, “Defendants”) have offered constructions for certain terms and phrases for the ’249
`
`Patent. I have reviewed those constructions and provide my opinions on those constructions
`
`herein.
`
`2.
`
`In rendering my opinions, I have reviewed the ’249 Patent and the respective file
`
`history, as well as the extrinsic evidence offered by Defendants. My opinions are further based
`
`upon over 40 years of education, training, research, knowledge, and personal and professional
`
`experience in the relevant art.
`
`3.
`
`I reserve the right, if permitted by the Court, to supplement and/or amend my
`
`opinions in this declaration based on future positions taken by Defendants, their experts, additional
`
`documents, testimony, or other information provided by the Defendants or their witnesses, any
`
`orders from the Court, or as otherwise necessary.
`
`4.
`
`A detailed record of my professional qualifications, including a list of publications,
`
`awards, professional activities, and recent testimony either at trial or at deposition, has been
`
`provided to Defendants and is attached hereto as Exhibit 1. I also included a list of cases in the
`
`last five years that I have testified by trial or deposition.
`
`5.
`
`I am a tenured full professor in the Department of Computer Engineering at the
`
`
`
`1
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 4 of 23
`
`California Polytechnic State University. I also served as Director of the Cal Poly Computer
`
`Engineering Program, both in 2009-2013 and again in 2016-2017. I received my B.S. degree in
`
`Computer Science from Xavier University in 1985. I received my M.S. degree in Computer
`
`Science from Michigan State University in 1994 with a research focus on parallel and distributed
`
`computing. I received my Ph.D. in Computer Science in 1999 with a research focus on networking
`
`and the transmission of video over the Internet from Michigan State University.
`
`6.
`
`Upon receiving my PhD, I joined the faculty of the Cal Poly Department of
`
`Computer Science in 2000 and moved to Cal Poly’s newly created Department of Computer
`
`Engineering in 2021. I have been teaching and doing research on computer networks, network
`
`security, distributed systems, embedded systems, programming and robotics for the last 22 years.
`
`I have developed and taught courses including an introduction to computer networks, advanced
`
`computer networks, graduate level computer networks, embedded systems and robotics, and
`
`digital design and microcontrollers. Course activities included both hardware and software, the
`
`theoretical aspects of computer networks, security (including both privacy and authentication),
`
`wired and wireless networks, and the implementation of protocol layers from the physical to the
`
`application layer. As part of my teaching, I cover topics including privacy and authentication from
`
`both a theoretical perspective as well as using these technologies in the real-world.
`
`7.
`
`I have over 40 years of experience in computer engineering and computer science.
`
`In addition to my educational and teaching/research experience, I have professional experience in
`
`computer system design and implementation. From 2011 to 2013, I developed, implemented, and
`
`sold an Android App called Lockmenu. I was a Group Manager, Senior Systems Analyst/Project
`
`Manager, and Systems Analyst for the Procter and Gamble Company from 1985-1992. I managed
`
`all aspects of a large distributed Purchasing and Inventory Control system, which included over
`
`
`
`2
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 5 of 23
`
`2,000 users, processed over $250 million in yearly purchases, and tracked over $60 million in
`
`inventory. I led a support team, designed and developed application software, managed capacity
`
`planning, and on-going maintenance. Before that, I was a Programmer Analyst at the Merrell Dow
`
`Research Institute from 1983-1985.
`
`8.
`
` I have reviewed the ’249 Patent and its prosecution history, and the subject matter
`
`of the ’249 Patent is within the scope of my education and experience.
`
`9.
`
`I have been asked to provide my opinion as to the construction of certain terms and
`
`phrases in the tables below, from the standpoint of a POSITA at the time of the respective
`
`inventions.
`
`10.
`
`In my opinion, a POSITA would have at the time of the invention either (1) a
`
`bachelor’s degree in computer science or computer engineering including experience in system
`
`security and authentication and one to two years of work experience in systems involving security
`
`and authentication or (2) equivalent work experience in the design and/or implementation of
`
`systems involving security and authentication. As reflected in the level of ordinary skill, a person
`
`of ordinary skill can have “equivalent education and work experience.” Thus, more education
`
`could substitute for experience, and more experience (e.g., when combined with training), could
`
`substitute for formal college education of the person of ordinary skill in the art. When performing
`
`my analysis that led to my opinions, I apply this standard.
`
`11.
`
`I am being compensated by Aire at a rate of $700/hour for my work in this matter.
`
`My compensation is not tied to the outcome of the case and I have no financial interest in the
`
`outcome of the case.
`
`12.
`
`In forming my opinions, I have considered a variety of facts and materials. These
`
`include all of the materials cited herein in this declaration. I have also relied on my more than 25
`
`
`
`3
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 6 of 23
`
`years of experience as a person of ordinary skill in the art in the field. I have also reviewed the
`
`’249 Patent, its file history, and other extrinsic evidence cited herein.
`
`U.S. PATENT NO. 8,205,249
`
`II.
`
`
`Aire’s Proposed Construction Defendants’ Proposed
`Construction
`Indefinite
`
`
`Plain and ordinary meaning
`
`Disputed Phrase
`
`“an inherently relatively
`lower quality and an
`inherently relatively
`higher quality from a
`security perspective”,
`Claims 1 and 10

`
`
`
`
`13.
`
`I understand that the parties dispute whether the phrase “an inherently relatively
`
`lower quality and an inherently relatively higher quality from a security perspective” in Claims 1
`
`and 10 of the ’249 Patent is indefinite. I agree with Aire that no construction is necessary and that
`
`the phrase is understood under its plain and ordinary meaning. I disagree with Defendants that the
`
`phrase is indefinite.
`
`14.
`
`A POSITA would understand the meaning of the phrase “an inherently relatively
`
`lower quality and an inherently relatively higher quality from a security perspective” with
`
`reasonable certainty in light of the guidance provided by the ’249 Patent claims, specification, and
`
`prosecution history. The disputed phrase requires (1) at least two different authentication methods
`
`and (2) that they differ in their quality from a security perspective. The claims provide a standard
`
`by which the difference in security quality is to be measured: the different authentication methods
`
`are compared to one another, with one method being of an “inherently relatively lower quality” in
`
`comparison to the other method comprising of a “inherently relatively higher quality.”
`
`Additionally, the ’249 Patent provides objective criteria for determining whether a particular
`
`method is of “lower” or “higher” quality from a security perspective—namely, that the “lower”
`
`
`
`4
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 7 of 23
`
`quality method comprise of a knowledge-based authentication method (e.g., PIN), whereas the
`
`“higher” quality method comprise of a biometric-based authentication method (e.g., fingerprint).
`
`15.
`
`The ’249 Patent provides sufficient support to inform a POSITA with reasonable
`
`certainty of the authentication methods that are “inherently relatively” lower or higher quality from
`
`a security perspective. For example, the ’249 Patent specification explains the following:
`
`It preferably supports at least two authentication methods of different order with
`regard to the quality of authentication. It expediently supports at least one
`knowledge-based authentication method, e.g. a PIN check, and at least one
`biometric method, within which a biometric feature of the user 30 to be presented
`at the terminal 14 is checked. The biometric method inherently constitutes the
`higher-quality one here, since it presupposes the personal presence of the user 30;
`this is not ensured in the knowledge-based method since the knowledge can have
`been acquired by an unauthorized user.
`
`
`’249 Patent at 3:24-33.1 According to this embodiment, the “knowledge-based” method (e.g., a
`
`PIN) is the inherently lower quality method in comparison to the “biometric” method, which
`
`constitutes the inherently higher quality method. See also ’249 Patent at 3:58-62 (“it will
`
`hereinafter be assumed that the chip card 20 supports two authentication methods, namely a PIN
`
`check as a knowledge-based, inherently low-quality method, and a fingerprint check as a
`
`biometric, inherently higher-quality method.”). The ’249 Patent also teaches in this embodiment
`
`that the “biometric” is “inherently” of “higher-quality” because “it presupposes the personal
`
`presence of the user,” whereas the “knowledge-based method” is “inherently” of “lower-quality”
`
`because “the knowledge can have been acquired by an unauthorized user.” ’249 Patent at 3:24-
`
`33; see also 1:31-36 (“The intended introduction of biometric features for user authentication
`
`obtains a further improvement of the trustworthiness of an electronic signature compared to the
`
`hitherto usual PIN authentication, because it guarantees that the signature card can only be used in
`
`
`1 All emphasis added unless stated otherwise.
`
`
`
`5
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 8 of 23
`
`the presence of a definite person entitled to do so.”).
`
`16.
`
`The ’249 Patent provides further examples that define the objective criteria for both
`
`the “inherently relatively lower quality” and “inherently relatively higher quality” authentication
`
`methods. For example, the “inherently relatively higher quality” authentication methods are
`
`consistently described in the context of “biometric” authentication methods. See, e.g., ’249 Patent
`
`at 3:24-33, 3:58-62, 5:31-38. The ’249 Patent explains that the “biometric” authentication method
`
`may include “detecting physiological features, such as facial features, features of the eye or
`
`fingerprints, or behavior-based features, such as speech or writing sequences expressed by the
`
`voice or by writing operations.” ’249 Patent at 2:59-63.
`
`17.
`
`In connection with its discussion of the “biometric” authentication methods, the
`
`’249 Patent references Chapter 8.1.2 of “Handbuch der Chipkarten” (hereinafter “Chip Card
`
`Manual”), W. Rankl, W. Effing, 3rd edition, 1999. ’249 Patent at 1:12-14, 2:67 – 3:2. I have
`
`reviewed Chapter 8.1.2 of the “Chip Card Manual” and agree that it teaches “different types and
`
`the implementation of biometric authentication methods.” For example, Chapter 8.1.2 explains
`
`that “[a] biometric identification method is a method that can unambiguously identify a person by
`
`means of unique, individual biological features.” Chip Card Manual at 499. Additionally, the
`
`“Chip Card Manual” explains that “[b]iometric features are usually not modifiable, which is
`
`precisely what makes them attractive for the unambiguous identification of persons.” Chip Card
`
`Manual at 500. Chapter 8.1.2 further provides a discussion of different authentication methods:
`
`
`
`6
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 9 of 23
`
`
`
`Chip Card Manual at 500. Each of these biometric authentication methods are further detailed
`
`therein. Chip Card Manual at 504-510. Thus, the ’249 Patent specification provides objective
`
`criteria concerning the “inherently relatively higher quality” authentication methods, which are
`
`taught as “biometric” authentication methods.
`
`18.
`
`The ’249 Patent contrasts the “higher” quality biometric authentication methods
`
`with “lower” quality authentication methods that are knowledge-based, such as a password or PIN.
`
`See, e.g., ’249 Patent at 1:62 – 2:3, 3:29-33, 3:58-62. The ’249 Patent explains that knowledge-
`
`based methods, for example, are inherently “lower” quality to biometric authentication methods
`
`because “the knowledge can have been acquired by an unauthorized user.” Id. at 3:31-33. Further,
`
`Chapter 8.1.2 of the “Chip Card Manual” also explains that “biometric features cannot be
`
`transferred to another person as easily as PINs” and “[t]his means that the actual person is
`
`identified, rather than a secret shared by the user and the system operator.” See Chip Card Manual
`
`at 499. This discussion underscores that a knowledge-based authentication is of inherently lower
`
`quality than a biometric method. As such, the ’249 Patent specification also provides clear,
`
`objective criteria concerning the “inherently relatively lower quality” authentication methods,
`
`which are taught as knowledge-based authentication methods.
`
`
`
`7
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 10 of 23
`
`19.
`
`The prosecution history also sheds light on the meaning of the “lower” and “higher”
`
`quality authentication methods taught in the ’249 Patent. For example, on multiple occasions the
`
`patentee clarified that the “lower” quality authentication methods are premised on knowledge-
`
`based authentication methods, while the “higher” quality authentication methods are premised on
`
`biometric authentication methods:
`
`Different authentication methods provide different levels of protection. For
`example, a PIN check as a knowledge-based method is an inherently low-
`quality method while a fingerprint check as a biometric check method is an
`inherently higher-quality method (see page 5, lines 25 30 of the originally filed
`specification and the amended specification filed on May 18, 2009). The PIN
`check is a lower quality authentication method since a user merely needs to
`gain knowledge of the PIN to be successfully authenticated. A biometric check
`method is a higher quality method since it would be more difficult for a user
`to duplicate a fingerprint in order to be authenticated and thus, the check
`“presupposes the personal presence of the user” (see specification, page 5, lines
`3-5).
`
`See U.S. Patent App. No. 10/531,259, March 30, 2011 Applicant Remarks; see also U.S. Patent
`
`App. No. 10/531,259, May 27, 2010 Applicant Remarks (“The portable data carrier itself is set up
`
`to perform at least one but expediently a plurality of different quality user authentication methods,
`
`preferably at least two different authentication methods having a different order of security. For
`
`example, it may support at least one knowledge-based authentication method (a PIN check), and
`
`at least one biometric method. Obviously, the biometric method inherently constitutes a higher
`
`quality method of authentication as compared with the knowledge-based authentication
`
`method (id., page 5, first paragraph).”). The patentee’s statements during prosecution reinforce
`
`the ’249 Patent’s teachings concerning the scope of the “inherently relatively higher” and
`
`“inherently relatively lower” authentication methods.
`
`20.
`
`I disagree with Defendants that the patentee’s addition of the word “inherently” to
`
`the ’249 Patent specification and claims adds confusion as to the meaning of the disputed phrase.
`
`
`
`8
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 11 of 23
`
`Defendants’ Brief at 18-19. A review of the amendments and corresponding explanation reveals
`
`that the patentee further clarified the scope of the claim. For example, the patentee amended Claim
`
`10 as follows:
`
`10. (Currently Amended) A portable data carrier for performing a security-
`establishing operation within a secure electronic transaction and arranged to
`perform different quality user authentication methods, wherein the difference in
`quality of user authentication varies between an inherently relatively lower quality
`and an inherently relatively higher quality from a security perspective, whereby the
`portable data carrier is arranged to perform a user authentication using one of said
`implemented user authentication methods and the portable data carrier is arranged
`to confirm the authentication to a terminal, and wherein the data carrier is arranged
`to create quality information about said stating how the authentication of the user
`was performed by the used user authentication method used and to attach such
`quality information to the result of the security establishing operation.
`
`See U.S. Patent App. No. 10/531,259, May 18, 2009 Amendments. The patentee explained that
`
`the amendments clarified the distinction between the categories of authentication methods utilized
`
`by the claimed inventions:
`
`Claim 1 has been amended to clarify the intended meaning of the claim without
`affecting the scope of the claim as previously presented. The difference in
`quality of the user authentication specifically is clarified by denoting that the
`quality may be inherently a relatively lower quality or inherently a relatively
`higher quality from a security perspective. Support for the amendment is found
`on page 5, last paragraph wherein the terms “low-quality” and “higher-quality” are
`used to describe two authentication methods. The word “inherently” has been
`added for clarification to indicate that the method itself inherently provides
`less security or more security depending on the nature of the method (e.g.,
`biometric versus PIN). The objective of the amendment is to better define the
`inherent nature of the user authentication method from a security perspective.
`
`See U.S. Patent App. No. 10/531,259, May 18, 2009 Applicant Remarks. This explanation was
`
`provided in the context of an obviousness objection based on art that taught that the user may use
`
`one of different authentication methods—however, the prior art did not teach that the different
`
`authentication methods utilized by the user differed in quality from a security perspective and that
`
`information regarding the quality of the method used is attached to the result of the security
`
`
`
`9
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 12 of 23
`
`establishing operation. May 18, 2009 Applicant Remarks at 8. To that end, the patentee added
`
`the language in the context of broader amendments to clarify that the two authentication methods
`
`must be “inherently” distinct from a security perspective.
`
`21.
`
`I also disagree with Defendants’ other arguments that the disputed phrase does not
`
`define the scope of the “inherently relatively lower” and “inherently relatively higher”
`
`authentication methods. For example, Defendants argue that the ’249 Patent “does not enable a
`
`POSITA to determine, for example, whether a token-based method is of inherently higher or lower
`
`(or equivalent) quality than a knowledge-based method.” Defendants’ Brief at 16. According to
`
`the Defendants, a “token-based” method is “something you have,” such as “a key fob or ID badge.”
`
`Defendants’ Brief at 14. But a “token-based” method does not make sense in the context of the
`
`claimed portable data carrier because the portable data carrier is in and of itself “something you
`
`have.” The ’249 Patent contemplates that merely possessing the portable data carrier (the “token,”
`
`as defined by Defendants) is not sufficient—there needs to be another category of authentication
`
`(e.g., knowledge-based and/or biometric authentication) used in connection with the portable data
`
`carrier. See ’249 Patent at 1:65 – 2:3. The patentee made this point in distinguishing the prior art
`
`during prosecution of the ’249 Patent:
`
`While Russo mentions the use of smart cards in the written description of the
`published application, the smart cards are used to support a specific
`authentication method during user authentication (using something you have)
`but none of the data carriers is arranged to perform different quality user
`authentication methods and to perform user authentication using one of the
`different user authentication methods.
`
`See U.S. Patent App. No. 10/531,259, May 27, 2010 Applicant Remarks. As this passage explains,
`
`the ’249 Patent contemplates that a “token-based” method is not sufficient and that there needs to
`
`be another category of authentication tied to the token.
`
`22.
`
`I also disagree with Defendants’ argument that the ’249 Patent lacks “whether any
`
`
`
`10
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 13 of 23
`
`given authentication method is of inherently relatively higher or lower (or equivalent) quality than
`
`any other method within the same category,” such as two biometric methods. Defendants’ Brief
`
`at 16. This argument is unpersuasive because the use of two methods within the same category is
`
`not the distinction required by the ’249 Patent. Instead, the claims require a comparison between
`
`authentication methods that differ inherently from a security perspective, for example knowledge-
`
`based vs. biometric-based authentication methods. To that end, the ’249 Patent treats biometric
`
`methods as the “inherently relatively higher quality” methods and are contrasted with lower-
`
`quality knowledge-based authentication methods.
`
`23.
`
`I also find Defendants’ argument that the ’249 Patent does not provide guidance on
`
`how to treat as to “multi-category” authentication methods unpersuasive. Defendants’ Brief at 16.
`
`For example, Defendants argue that the ’249 Patent fails to provide “guidance on how to determine
`
`if a given multi-category authentication method (e.g., fingerprints entered in a specific order) is of
`
`inherently relatively higher or lower (or the same) quality as another multi-category method (e.g.,
`
`fingerprint entered into a key fob), or as a single category method.” Defendants’ Brief at 16. But
`
`the ’249 Patent contemplates that the use of “fingerprints” (whether in a specific order or not) is
`
`considered a “biometric” method of “inherently higher quality” from a security perspective. See
`
`’249 Patent at 2:59-63, 3:58-62. Further, as explained above, the “token-based” methods described
`
`by Defendants are unpersuasive in light of the teachings of the ’249 Patent. For these reasons,
`
`Defendants’ “multi-factor” authentication examples do not add any uncertainty to the contours of
`
`the ’249 Patent.
`
`24.
`
`I also disagree with Defendants’ argument that the ’249 Patent’s teachings that
`
`“biometrics are inherently more secure than knowledge-based methods” by arguing that this is
`
`“incompatible with a POSITA’s understanding.” Defendants’ Brief at 16-17. Based on my
`
`
`
`11
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 14 of 23
`
`understanding of the ’249 Patent claims, specification, and prosecution history, the ’249 Patent’s
`
`teachings that the “biometric” authentication methods are “inherently relatively higher quality”
`
`when compared to knowledge-based authentication methods is taught with reasonable certainty.
`
`Whether there may be instances where one biometric method is more secure than another biometric
`
`method or whether there are instances where a biometric is not used in accordance with its intended
`
`use (for example, using facial recognition or fingerprint input on someone who is “sleeping” or
`
`“unconscious”) does not bear on the ultimate issue of whether the ’249 Patent teaches that
`
`“biometric” authentication methods constitute those with “inherently relatively higher quality”
`
`from a security perspective with reasonable certainty within the context of the ’249 Patent.
`
` declare under the penalty of perjury under the laws of the United States that the above is
`
` I
`
`true and correct.
`
`Executed on this 9th day of June, 2022 in San Luis Obispo CA.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`By: _____________________________
`
`
`
`Hugh Smith, Ph.D.
`
`
`
`12
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 15 of 23
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exhibit 1
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 16 of 23
`Hugh M. Smith, Ph.D.
`hms@husmith.com
`(805) 550-8023
`
`
`
`
`I.
`
`Education
`
`Ph.D. in Computer Science November 1999
`Michigan State University, College of Engineering
`Dissertation Title: Multicast Videoconferencing over Internet Style Networks
`
`Masters of Science in Computer Science, December 1994
`Michigan State University, College of Engineering
`Research Focus: Parallel and Distributed Computing
`
`
`
`Bachelors of Science in Computer Science, May, 1985
`Xavier University, College of Arts and Science
`
`
`II. Academic Experience:
`
`9/16-6/17, 9/09 – 6/13, Director of the Cal Poly Computer Engineering Program
` Associate Director of the Computer Engineering Program, 2007-2009
`
`9/21-present, Department of Computer Engineering, California Polytechnic State University
`1/00 – 9/21, Department of Computer Science, California Polytechnic State University
` Tenured Full Professor in the Department of Computer Science/Computer Engineering
` Awarded the Computer Engineering Program Most User Friendly Award (“In recognition
`of your commitment and dedication to student success), 2015
` Awarded the Computer Science Department Professor of the Year, 2006
` Awarded the College of Engineering/TRW Teaching in Excellence award, 2002.
` Awarded the Computer Engineering Program Instructor of the Year, 2002.
` Awarded the Computer Engineering Program Lab Instructor of the Year, 2001.
` Laboratory Manager for the Cal Poly Advanced Networking Laboratory, 2001-2007
` Developed and taught the senior level Computer Networks I and Networks II courses.
`Course activities included the theoretical aspects of computer networks, security, wired
`and wireless networks, and the implementation of protocol layers from the physical to
`application layer. Courses include reinforcement of these concepts through socket
`programming and hands-on networking experience (routers/switches) in Cal Poly’s
`Advanced Networking Laboratory.
` Developed and taught the Graduate Level Computer Networks course. This course
`involves the study and analysis of the theory and implementation of both academic and
`industry research of computer networks.
` Taught the Introduction to Computer Science, System Programming, and Digital
`Electronics Computer Engineering Program courses.
`
`
`
`March 22, 2022
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 17 of 23
`
`Dr. Hugh M. Smith
`
`
`5/98 – 7/98, Instructor, Department of Computer Science and Engineering, Michigan State
`University
` Taught the “Algorithms and Computing” course, which covered an introduction to
`computer science and programming in C++.
`
`
`9/92 – 5/96, Teaching Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Courses included Object Oriented Programming and Computer Architecture
`
`
`III. Professional Experience:
`
`3/10 – 6/13, Android Mobile Phone App Development
` Developed and released the Android App Lockmenu (www.lockmenu.com)
` Managed the design, implementation, testing, marketing and patent submission for
`the Lockmenu app.
`
`12/03 – present, Intellectual Property Consulting
` Worked as a IP Expert Witness on hardware and software related cases. Work
`included both infringement and invalidity analysis.
` Wrote expert reports and testified in both depositions and trials
`
`
`7/00 – 8/00, Faculty Employment, Cisco Systems
` Responsibilities included development of a process for setting up Advanced Networking
`Labs at teaching universities.
`
`
`9/95 – 5/98, Research Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Researched issues involved in the transmission and control of multicast video over
`heterogeneous networks.
` Addressed issues in controlling multicast video using various compression algorithms
`(MPEG, Motion JPEG) over ATM and Ethernet networks.
`
`
`5/93 – 8/93, Research Assistant, Department of Computer Science and Engineering, Michigan
`State University
` Researched issues in developing AI systems to provide real-time diagnostics tools.
`
`5/85 – 8/92 The Procter and Gamble Company, Cincinnati, Ohio
`9/90 - 8/92, Group Manager,
`5/89 - 9/90, Senior Systems Analyst/Project Manager
`5/85 - 5/89, Systems Analyst
` Managed all aspects of a large distributed Purchasing and Inventory Control system,
`which included over 2,000 users, processed over $250 million in yearly purchases, and
`tracked over $60 million in inventory.
` Managed five-person support team that involved recruiting, training, performance
`appraisals and development plans.
`
`
`
`
`
`(2/5)
`
`
`
`
`
`
`
`
`
`
`

`

`Case 6:21-cv-01101-ADA Document 34-12 Filed 06/09/22 Page 18 of 23
`
`Dr. Hugh M. Smith
`
` Led a division wide effort as a Project Manager to develop a decentralized quality
`monitoring information system.
` Coordinated hardware and software upgrades, capacity planning, and on-going
`maintenance as a computer System Manager.
`
`
`5/83 – 5/85, Programmer Analyst, Merrell Dow Research Institute, Cincinnati, Ohio
` Responsible for system development and support.
`
`
`
`
`IV. Research related activities
`
`
` 
`
` Presented the paper titled: An Embedded System Design Experience for First Year
`Computing Majors, at the 8th annual FYEE Conference, Columbus Ohio, August 2016.
`
` Presented the paper titled: Microcontroller Based Introduction to Computer Engineering, at
`the 7th annual FYEE Conference, Roanoke VA, August 2015.
`
`
` Presented the paper titled: Toward a common host interface for network processor at the
`2003 IASTED International Conference on Communications, Internet, & Information
`Technology (CIIT) Scottsdale, AZ, November 2003.
` Conference session chair for the “Information Systems and the Internet III – Systems
`Architectures” session
`
`
` General Conference Program Committee, IEEE International Conference on
`Communications (ICC), 2003
`
` Presented the paper titled: Effective Call Admission Control for Video Phone Applications at
`the International Conference on Networking (ICON’03) in Sydney Australia, September
`2003.
`
` Presented the paper titled: Feedback Scalability for Multicast Videoconferencing at the
`International Conference on Networking (ICN’01) in Colmar France in July 2001.
`
` Presented the paper titled: Fair Link Sharing with Layered Multicast Videoconferencing at
`the IEEE GLOBECOM in San Francisco in November 2000.
`
` Presented the paper titled: Pattern Smoothing for Compressed Video Transmission at the
`IEEE International Conference on Communications (ICC ’97) in Montreal Canada in June
`1997.
`
` Patent Application t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket